<div class="container">
    <h1>Security update for the Linux Kernel</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2024:2135-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">bsc#1012628</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">bsc#1065729</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1181674">bsc#1181674</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187716">bsc#1187716</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193599">bsc#1193599</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207948">bsc#1207948</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208593">bsc#1208593</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">bsc#1209657</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213573">bsc#1213573</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1214852">bsc#1214852</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">bsc#1215199</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216196">bsc#1216196</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216358">bsc#1216358</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216702">bsc#1216702</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217169">bsc#1217169</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217384">bsc#1217384</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217408">bsc#1217408</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217489">bsc#1217489</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217750">bsc#1217750</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217959">bsc#1217959</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218205">bsc#1218205</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">bsc#1218336</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218447">bsc#1218447</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">bsc#1218562</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218779">bsc#1218779</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">bsc#1218917</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">bsc#1219104</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">bsc#1219170</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219596">bsc#1219596</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219623">bsc#1219623</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219834">bsc#1219834</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220021">bsc#1220021</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220045">bsc#1220045</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220120">bsc#1220120</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220148">bsc#1220148</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220328">bsc#1220328</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220342">bsc#1220342</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220428">bsc#1220428</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220430">bsc#1220430</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220569">bsc#1220569</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220587">bsc#1220587</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220738">bsc#1220738</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220783">bsc#1220783</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220915">bsc#1220915</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221276">bsc#1221276</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">bsc#1221293</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221303">bsc#1221303</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221375">bsc#1221375</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221504">bsc#1221504</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221612">bsc#1221612</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221615">bsc#1221615</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221635">bsc#1221635</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">bsc#1221645</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221649">bsc#1221649</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221765">bsc#1221765</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221777">bsc#1221777</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221783">bsc#1221783</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">bsc#1221816</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221829">bsc#1221829</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">bsc#1221830</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221858">bsc#1221858</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222115">bsc#1222115</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222173">bsc#1222173</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222264">bsc#1222264</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222273">bsc#1222273</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222294">bsc#1222294</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222301">bsc#1222301</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222303">bsc#1222303</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222304">bsc#1222304</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222307">bsc#1222307</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222357">bsc#1222357</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222366">bsc#1222366</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222368">bsc#1222368</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222371">bsc#1222371</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222378">bsc#1222378</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222379">bsc#1222379</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222385">bsc#1222385</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">bsc#1222422</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222426">bsc#1222426</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222428">bsc#1222428</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222437">bsc#1222437</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222445">bsc#1222445</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222459">bsc#1222459</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222464">bsc#1222464</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222489">bsc#1222489</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222522">bsc#1222522</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222525">bsc#1222525</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222527">bsc#1222527</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222531">bsc#1222531</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222532">bsc#1222532</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222549">bsc#1222549</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222550">bsc#1222550</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222557">bsc#1222557</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">bsc#1222559</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222563">bsc#1222563</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">bsc#1222585</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222586">bsc#1222586</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222596">bsc#1222596</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222606">bsc#1222606</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222608">bsc#1222608</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222613">bsc#1222613</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222615">bsc#1222615</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">bsc#1222618</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222622">bsc#1222622</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">bsc#1222624</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222627">bsc#1222627</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222630">bsc#1222630</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222635">bsc#1222635</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222721">bsc#1222721</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222727">bsc#1222727</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222769">bsc#1222769</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222771">bsc#1222771</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222772">bsc#1222772</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222775">bsc#1222775</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222777">bsc#1222777</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222780">bsc#1222780</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222782">bsc#1222782</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222793">bsc#1222793</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222799">bsc#1222799</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222801">bsc#1222801</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222968">bsc#1222968</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223007">bsc#1223007</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223011">bsc#1223011</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223015">bsc#1223015</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">bsc#1223016</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223020">bsc#1223020</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223023">bsc#1223023</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223024">bsc#1223024</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223030">bsc#1223030</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223033">bsc#1223033</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223034">bsc#1223034</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223035">bsc#1223035</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223038">bsc#1223038</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223039">bsc#1223039</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223041">bsc#1223041</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223045">bsc#1223045</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223046">bsc#1223046</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223051">bsc#1223051</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223052">bsc#1223052</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223058">bsc#1223058</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223060">bsc#1223060</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223061">bsc#1223061</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223076">bsc#1223076</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223077">bsc#1223077</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223084">bsc#1223084</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223111">bsc#1223111</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223113">bsc#1223113</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223138">bsc#1223138</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223143">bsc#1223143</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">bsc#1223187</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223189">bsc#1223189</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223190">bsc#1223190</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">bsc#1223191</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223198">bsc#1223198</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223202">bsc#1223202</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223285">bsc#1223285</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223315">bsc#1223315</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223338">bsc#1223338</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223369">bsc#1223369</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223380">bsc#1223380</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223384">bsc#1223384</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223390">bsc#1223390</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223439">bsc#1223439</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223462">bsc#1223462</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223532">bsc#1223532</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223539">bsc#1223539</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223575">bsc#1223575</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223590">bsc#1223590</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223591">bsc#1223591</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223592">bsc#1223592</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223593">bsc#1223593</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223625">bsc#1223625</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223628">bsc#1223628</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223629">bsc#1223629</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223633">bsc#1223633</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223634">bsc#1223634</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223637">bsc#1223637</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223641">bsc#1223641</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223643">bsc#1223643</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223649">bsc#1223649</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223650">bsc#1223650</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223651">bsc#1223651</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223652">bsc#1223652</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223653">bsc#1223653</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223654">bsc#1223654</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223655">bsc#1223655</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223660">bsc#1223660</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223661">bsc#1223661</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223663">bsc#1223663</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223664">bsc#1223664</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223665">bsc#1223665</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223666">bsc#1223666</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223668">bsc#1223668</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223669">bsc#1223669</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223670">bsc#1223670</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223671">bsc#1223671</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223675">bsc#1223675</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223677">bsc#1223677</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223678">bsc#1223678</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223686">bsc#1223686</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223692">bsc#1223692</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223693">bsc#1223693</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223695">bsc#1223695</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223696">bsc#1223696</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223698">bsc#1223698</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223705">bsc#1223705</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223712">bsc#1223712</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223718">bsc#1223718</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223728">bsc#1223728</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223732">bsc#1223732</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223735">bsc#1223735</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223739">bsc#1223739</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223741">bsc#1223741</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223744">bsc#1223744</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223745">bsc#1223745</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223747">bsc#1223747</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223748">bsc#1223748</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223749">bsc#1223749</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223750">bsc#1223750</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223752">bsc#1223752</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223754">bsc#1223754</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223757">bsc#1223757</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223759">bsc#1223759</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223761">bsc#1223761</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223762">bsc#1223762</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223774">bsc#1223774</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223782">bsc#1223782</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223787">bsc#1223787</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223788">bsc#1223788</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223789">bsc#1223789</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223790">bsc#1223790</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223802">bsc#1223802</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223805">bsc#1223805</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223810">bsc#1223810</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223822">bsc#1223822</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223827">bsc#1223827</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223831">bsc#1223831</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223834">bsc#1223834</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223838">bsc#1223838</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223869">bsc#1223869</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223870">bsc#1223870</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223871">bsc#1223871</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223872">bsc#1223872</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223874">bsc#1223874</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223944">bsc#1223944</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223945">bsc#1223945</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223946">bsc#1223946</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223991">bsc#1223991</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224076">bsc#1224076</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224096">bsc#1224096</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224098">bsc#1224098</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224099">bsc#1224099</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224137">bsc#1224137</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224166">bsc#1224166</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224174">bsc#1224174</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224177">bsc#1224177</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224180">bsc#1224180</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224181">bsc#1224181</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224331">bsc#1224331</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224348">bsc#1224348</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224423">bsc#1224423</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224429">bsc#1224429</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224430">bsc#1224430</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224432">bsc#1224432</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224433">bsc#1224433</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224437">bsc#1224437</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224438">bsc#1224438</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224442">bsc#1224442</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224443">bsc#1224443</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224445">bsc#1224445</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224449">bsc#1224449</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224477">bsc#1224477</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224479">bsc#1224479</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224480">bsc#1224480</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224481">bsc#1224481</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224482">bsc#1224482</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224486">bsc#1224486</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224487">bsc#1224487</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224488">bsc#1224488</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224491">bsc#1224491</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224492">bsc#1224492</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224493">bsc#1224493</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224494">bsc#1224494</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224495">bsc#1224495</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">bsc#1224500</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224501">bsc#1224501</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224502">bsc#1224502</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224504">bsc#1224504</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224505">bsc#1224505</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224506">bsc#1224506</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224507">bsc#1224507</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224508">bsc#1224508</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224509">bsc#1224509</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224511">bsc#1224511</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224513">bsc#1224513</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224517">bsc#1224517</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224519">bsc#1224519</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224521">bsc#1224521</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224524">bsc#1224524</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224525">bsc#1224525</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224526">bsc#1224526</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224530">bsc#1224530</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224531">bsc#1224531</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224534">bsc#1224534</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224537">bsc#1224537</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224541">bsc#1224541</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224542">bsc#1224542</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224543">bsc#1224543</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224546">bsc#1224546</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224550">bsc#1224550</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224552">bsc#1224552</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224553">bsc#1224553</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224555">bsc#1224555</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">bsc#1224557</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224558">bsc#1224558</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224559">bsc#1224559</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224562">bsc#1224562</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224565">bsc#1224565</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224566">bsc#1224566</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224567">bsc#1224567</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224568">bsc#1224568</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224569">bsc#1224569</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224571">bsc#1224571</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224573">bsc#1224573</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224576">bsc#1224576</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224577">bsc#1224577</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224578">bsc#1224578</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224579">bsc#1224579</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224580">bsc#1224580</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224581">bsc#1224581</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224582">bsc#1224582</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224585">bsc#1224585</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224586">bsc#1224586</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224587">bsc#1224587</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224588">bsc#1224588</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224592">bsc#1224592</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224596">bsc#1224596</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224598">bsc#1224598</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224600">bsc#1224600</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224601">bsc#1224601</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224602">bsc#1224602</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224603">bsc#1224603</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224605">bsc#1224605</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224607">bsc#1224607</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224608">bsc#1224608</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224609">bsc#1224609</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224611">bsc#1224611</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224613">bsc#1224613</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224615">bsc#1224615</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224617">bsc#1224617</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224618">bsc#1224618</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224620">bsc#1224620</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224621">bsc#1224621</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224622">bsc#1224622</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224623">bsc#1224623</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224624">bsc#1224624</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224626">bsc#1224626</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224627">bsc#1224627</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224628">bsc#1224628</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224629">bsc#1224629</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224630">bsc#1224630</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224632">bsc#1224632</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224633">bsc#1224633</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224634">bsc#1224634</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">bsc#1224636</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224637">bsc#1224637</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224638">bsc#1224638</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224639">bsc#1224639</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224640">bsc#1224640</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224643">bsc#1224643</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224644">bsc#1224644</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224645">bsc#1224645</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224646">bsc#1224646</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224647">bsc#1224647</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224648">bsc#1224648</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224649">bsc#1224649</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224650">bsc#1224650</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224651">bsc#1224651</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224652">bsc#1224652</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224653">bsc#1224653</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224654">bsc#1224654</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224657">bsc#1224657</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224660">bsc#1224660</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224663">bsc#1224663</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224664">bsc#1224664</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224665">bsc#1224665</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224666">bsc#1224666</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224667">bsc#1224667</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224668">bsc#1224668</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224671">bsc#1224671</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224672">bsc#1224672</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224674">bsc#1224674</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224675">bsc#1224675</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224676">bsc#1224676</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224677">bsc#1224677</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224678">bsc#1224678</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224679">bsc#1224679</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224680">bsc#1224680</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224681">bsc#1224681</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224682">bsc#1224682</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">bsc#1224683</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224685">bsc#1224685</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224686">bsc#1224686</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224687">bsc#1224687</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224688">bsc#1224688</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224692">bsc#1224692</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224696">bsc#1224696</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224697">bsc#1224697</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224699">bsc#1224699</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224701">bsc#1224701</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224703">bsc#1224703</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224704">bsc#1224704</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224705">bsc#1224705</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224706">bsc#1224706</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224707">bsc#1224707</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224709">bsc#1224709</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224710">bsc#1224710</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224712">bsc#1224712</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224714">bsc#1224714</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224716">bsc#1224716</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224717">bsc#1224717</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224718">bsc#1224718</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224719">bsc#1224719</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224720">bsc#1224720</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224721">bsc#1224721</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224722">bsc#1224722</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224723">bsc#1224723</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224725">bsc#1224725</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224727">bsc#1224727</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224728">bsc#1224728</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224729">bsc#1224729</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224730">bsc#1224730</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224731">bsc#1224731</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224732">bsc#1224732</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224733">bsc#1224733</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224736">bsc#1224736</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224738">bsc#1224738</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224739">bsc#1224739</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224740">bsc#1224740</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224741">bsc#1224741</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224742">bsc#1224742</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224747">bsc#1224747</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224749">bsc#1224749</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224763">bsc#1224763</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224764">bsc#1224764</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224765">bsc#1224765</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224766">bsc#1224766</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224790">bsc#1224790</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224792">bsc#1224792</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224793">bsc#1224793</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224803">bsc#1224803</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224804">bsc#1224804</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224866">bsc#1224866</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224936">bsc#1224936</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224989">bsc#1224989</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225007">bsc#1225007</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225053">bsc#1225053</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225133">bsc#1225133</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225134">bsc#1225134</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225136">bsc#1225136</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225172">bsc#1225172</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225502">bsc#1225502</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225578">bsc#1225578</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225579">bsc#1225579</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225580">bsc#1225580</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225593">bsc#1225593</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225605">bsc#1225605</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225607">bsc#1225607</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225610">bsc#1225610</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225616">bsc#1225616</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225618">bsc#1225618</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225640">bsc#1225640</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225642">bsc#1225642</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225692">bsc#1225692</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225694">bsc#1225694</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225695">bsc#1225695</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225696">bsc#1225696</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225698">bsc#1225698</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225699">bsc#1225699</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225704">bsc#1225704</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225705">bsc#1225705</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225708">bsc#1225708</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225710">bsc#1225710</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225712">bsc#1225712</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225714">bsc#1225714</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225715">bsc#1225715</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225720">bsc#1225720</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225722">bsc#1225722</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225728">bsc#1225728</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225734">bsc#1225734</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225735">bsc#1225735</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225736">bsc#1225736</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225747">bsc#1225747</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225748">bsc#1225748</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225749">bsc#1225749</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225750">bsc#1225750</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225756">bsc#1225756</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225765">bsc#1225765</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225766">bsc#1225766</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225769">bsc#1225769</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225773">bsc#1225773</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225775">bsc#1225775</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225842">bsc#1225842</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225945">bsc#1225945</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-3184">jsc#PED-3184</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-3311">jsc#PED-3311</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-3535">jsc#PED-3535</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-4486">jsc#PED-4486</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-4593">jsc#PED-4593</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-5062">jsc#PED-5062</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-542">jsc#PED-542</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-5728">jsc#PED-5728</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-5853">jsc#PED-5853</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-6079">jsc#PED-6079</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-6252">jsc#PED-6252</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-7542">jsc#PED-7542</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-7619">jsc#PED-7619</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-8111">jsc#PED-8111</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-8240">jsc#PED-8240</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-0160.html">CVE-2023-0160</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-47233.html">CVE-2023-47233</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52434.html">CVE-2023-52434</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52458.html">CVE-2023-52458</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52463.html">CVE-2023-52463</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52472.html">CVE-2023-52472</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52483.html">CVE-2023-52483</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52492.html">CVE-2023-52492</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52503.html">CVE-2023-52503</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52591.html">CVE-2023-52591</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52608.html">CVE-2023-52608</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52616.html">CVE-2023-52616</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52618.html">CVE-2023-52618</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52631.html">CVE-2023-52631</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52635.html">CVE-2023-52635</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52640.html">CVE-2023-52640</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52641.html">CVE-2023-52641</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52645.html">CVE-2023-52645</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52652.html">CVE-2023-52652</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52653.html">CVE-2023-52653</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52654.html">CVE-2023-52654</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52655.html">CVE-2023-52655</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52657.html">CVE-2023-52657</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52658.html">CVE-2023-52658</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52659.html">CVE-2023-52659</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52660.html">CVE-2023-52660</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52661.html">CVE-2023-52661</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52662.html">CVE-2023-52662</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52663.html">CVE-2023-52663</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52664.html">CVE-2023-52664</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52667.html">CVE-2023-52667</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52669.html">CVE-2023-52669</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52670.html">CVE-2023-52670</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52671.html">CVE-2023-52671</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52673.html">CVE-2023-52673</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52674.html">CVE-2023-52674</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52675.html">CVE-2023-52675</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52676.html">CVE-2023-52676</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52678.html">CVE-2023-52678</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52679.html">CVE-2023-52679</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52680.html">CVE-2023-52680</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52681.html">CVE-2023-52681</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52683.html">CVE-2023-52683</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52685.html">CVE-2023-52685</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52686.html">CVE-2023-52686</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52687.html">CVE-2023-52687</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52690.html">CVE-2023-52690</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52691.html">CVE-2023-52691</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52692.html">CVE-2023-52692</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52693.html">CVE-2023-52693</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52694.html">CVE-2023-52694</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52695.html">CVE-2023-52695</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52696.html">CVE-2023-52696</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52697.html">CVE-2023-52697</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52698.html">CVE-2023-52698</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52771.html">CVE-2023-52771</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52772.html">CVE-2023-52772</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52860.html">CVE-2023-52860</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52882.html">CVE-2023-52882</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-6238.html">CVE-2023-6238</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-6270.html">CVE-2023-6270</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-6531.html">CVE-2023-6531</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-7042.html">CVE-2023-7042</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-0639.html">CVE-2024-0639</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-21823.html">CVE-2024-21823</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-22099.html">CVE-2024-22099</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-23848.html">CVE-2024-23848</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-24861.html">CVE-2024-24861</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-25739.html">CVE-2024-25739</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26601.html">CVE-2024-26601</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26611.html">CVE-2024-26611</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26614.html">CVE-2024-26614</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26632.html">CVE-2024-26632</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26638.html">CVE-2024-26638</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26642.html">CVE-2024-26642</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26643.html">CVE-2024-26643</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26652.html">CVE-2024-26652</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26654.html">CVE-2024-26654</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26656.html">CVE-2024-26656</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26657.html">CVE-2024-26657</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26671.html">CVE-2024-26671</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26673.html">CVE-2024-26673</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26674.html">CVE-2024-26674</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26675.html">CVE-2024-26675</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26679.html">CVE-2024-26679</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26684.html">CVE-2024-26684</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26685.html">CVE-2024-26685</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26692.html">CVE-2024-26692</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26696.html">CVE-2024-26696</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26697.html">CVE-2024-26697</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26704.html">CVE-2024-26704</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26714.html">CVE-2024-26714</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26726.html">CVE-2024-26726</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26731.html">CVE-2024-26731</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26733.html">CVE-2024-26733</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26736.html">CVE-2024-26736</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26737.html">CVE-2024-26737</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26739.html">CVE-2024-26739</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26740.html">CVE-2024-26740</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26742.html">CVE-2024-26742</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26756.html">CVE-2024-26756</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26757.html">CVE-2024-26757</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26760.html">CVE-2024-26760</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-267600.html">CVE-2024-267600</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26761.html">CVE-2024-26761</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26764.html">CVE-2024-26764</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26769.html">CVE-2024-26769</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26772.html">CVE-2024-26772</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26773.html">CVE-2024-26773</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26774.html">CVE-2024-26774</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26775.html">CVE-2024-26775</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26779.html">CVE-2024-26779</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26783.html">CVE-2024-26783</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26786.html">CVE-2024-26786</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26791.html">CVE-2024-26791</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26793.html">CVE-2024-26793</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26794.html">CVE-2024-26794</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26802.html">CVE-2024-26802</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26805.html">CVE-2024-26805</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26807.html">CVE-2024-26807</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26815.html">CVE-2024-26815</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26816.html">CVE-2024-26816</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26822.html">CVE-2024-26822</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26828.html">CVE-2024-26828</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26832.html">CVE-2024-26832</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26836.html">CVE-2024-26836</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26844.html">CVE-2024-26844</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26846.html">CVE-2024-26846</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26848.html">CVE-2024-26848</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26853.html">CVE-2024-26853</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26854.html">CVE-2024-26854</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26855.html">CVE-2024-26855</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26856.html">CVE-2024-26856</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26857.html">CVE-2024-26857</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26858.html">CVE-2024-26858</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26860.html">CVE-2024-26860</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26861.html">CVE-2024-26861</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26862.html">CVE-2024-26862</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26866.html">CVE-2024-26866</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26868.html">CVE-2024-26868</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26870.html">CVE-2024-26870</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26878.html">CVE-2024-26878</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26881.html">CVE-2024-26881</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26882.html">CVE-2024-26882</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26883.html">CVE-2024-26883</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26884.html">CVE-2024-26884</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26885.html">CVE-2024-26885</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26898.html">CVE-2024-26898</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26899.html">CVE-2024-26899</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26900.html">CVE-2024-26900</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26901.html">CVE-2024-26901</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26903.html">CVE-2024-26903</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26906.html">CVE-2024-26906</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26909.html">CVE-2024-26909</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26921.html">CVE-2024-26921</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26922.html">CVE-2024-26922</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26923.html">CVE-2024-26923</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26925.html">CVE-2024-26925</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26928.html">CVE-2024-26928</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26932.html">CVE-2024-26932</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26933.html">CVE-2024-26933</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26934.html">CVE-2024-26934</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26935.html">CVE-2024-26935</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26937.html">CVE-2024-26937</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26938.html">CVE-2024-26938</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26940.html">CVE-2024-26940</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26943.html">CVE-2024-26943</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26945.html">CVE-2024-26945</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26946.html">CVE-2024-26946</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26948.html">CVE-2024-26948</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26949.html">CVE-2024-26949</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26950.html">CVE-2024-26950</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26951.html">CVE-2024-26951</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26956.html">CVE-2024-26956</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26957.html">CVE-2024-26957</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26958.html">CVE-2024-26958</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26960.html">CVE-2024-26960</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26961.html">CVE-2024-26961</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26962.html">CVE-2024-26962</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26963.html">CVE-2024-26963</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26964.html">CVE-2024-26964</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26972.html">CVE-2024-26972</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26973.html">CVE-2024-26973</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26978.html">CVE-2024-26978</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26979.html">CVE-2024-26979</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26981.html">CVE-2024-26981</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26982.html">CVE-2024-26982</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26983.html">CVE-2024-26983</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26984.html">CVE-2024-26984</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26986.html">CVE-2024-26986</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26988.html">CVE-2024-26988</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26989.html">CVE-2024-26989</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26990.html">CVE-2024-26990</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26991.html">CVE-2024-26991</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26992.html">CVE-2024-26992</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26993.html">CVE-2024-26993</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26994.html">CVE-2024-26994</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26995.html">CVE-2024-26995</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26996.html">CVE-2024-26996</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26997.html">CVE-2024-26997</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26999.html">CVE-2024-26999</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27000.html">CVE-2024-27000</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27001.html">CVE-2024-27001</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27002.html">CVE-2024-27002</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27003.html">CVE-2024-27003</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27004.html">CVE-2024-27004</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27008.html">CVE-2024-27008</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27013.html">CVE-2024-27013</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27014.html">CVE-2024-27014</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27022.html">CVE-2024-27022</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27027.html">CVE-2024-27027</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27028.html">CVE-2024-27028</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27029.html">CVE-2024-27029</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27030.html">CVE-2024-27030</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27031.html">CVE-2024-27031</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27036.html">CVE-2024-27036</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27046.html">CVE-2024-27046</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27056.html">CVE-2024-27056</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27057.html">CVE-2024-27057</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27062.html">CVE-2024-27062</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27067.html">CVE-2024-27067</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27080.html">CVE-2024-27080</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27388.html">CVE-2024-27388</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27389.html">CVE-2024-27389</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27393.html">CVE-2024-27393</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27395.html">CVE-2024-27395</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27396.html">CVE-2024-27396</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27398.html">CVE-2024-27398</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27399.html">CVE-2024-27399</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27400.html">CVE-2024-27400</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27401.html">CVE-2024-27401</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27405.html">CVE-2024-27405</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27408.html">CVE-2024-27408</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27410.html">CVE-2024-27410</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27411.html">CVE-2024-27411</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27412.html">CVE-2024-27412</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27413.html">CVE-2024-27413</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27416.html">CVE-2024-27416</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27417.html">CVE-2024-27417</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27418.html">CVE-2024-27418</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27431.html">CVE-2024-27431</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27432.html">CVE-2024-27432</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27434.html">CVE-2024-27434</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27435.html">CVE-2024-27435</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-27436.html">CVE-2024-27436</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35784.html">CVE-2024-35784</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35786.html">CVE-2024-35786</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35788.html">CVE-2024-35788</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35789.html">CVE-2024-35789</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35790.html">CVE-2024-35790</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35791.html">CVE-2024-35791</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35794.html">CVE-2024-35794</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35795.html">CVE-2024-35795</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35796.html">CVE-2024-35796</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35799.html">CVE-2024-35799</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35800.html">CVE-2024-35800</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35801.html">CVE-2024-35801</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35803.html">CVE-2024-35803</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35804.html">CVE-2024-35804</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35806.html">CVE-2024-35806</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35808.html">CVE-2024-35808</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35809.html">CVE-2024-35809</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35810.html">CVE-2024-35810</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35811.html">CVE-2024-35811</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35812.html">CVE-2024-35812</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35813.html">CVE-2024-35813</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35814.html">CVE-2024-35814</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35815.html">CVE-2024-35815</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35817.html">CVE-2024-35817</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35819.html">CVE-2024-35819</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35821.html">CVE-2024-35821</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35822.html">CVE-2024-35822</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35823.html">CVE-2024-35823</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35824.html">CVE-2024-35824</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35825.html">CVE-2024-35825</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35828.html">CVE-2024-35828</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35829.html">CVE-2024-35829</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35830.html">CVE-2024-35830</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35833.html">CVE-2024-35833</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35834.html">CVE-2024-35834</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35835.html">CVE-2024-35835</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35836.html">CVE-2024-35836</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35837.html">CVE-2024-35837</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35838.html">CVE-2024-35838</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35841.html">CVE-2024-35841</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35842.html">CVE-2024-35842</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35845.html">CVE-2024-35845</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35847.html">CVE-2024-35847</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35849.html">CVE-2024-35849</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35850.html">CVE-2024-35850</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35851.html">CVE-2024-35851</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35852.html">CVE-2024-35852</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35854.html">CVE-2024-35854</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35860.html">CVE-2024-35860</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35861.html">CVE-2024-35861</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35862.html">CVE-2024-35862</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35863.html">CVE-2024-35863</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35864.html">CVE-2024-35864</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35865.html">CVE-2024-35865</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35866.html">CVE-2024-35866</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35867.html">CVE-2024-35867</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35868.html">CVE-2024-35868</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35869.html">CVE-2024-35869</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35870.html">CVE-2024-35870</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35872.html">CVE-2024-35872</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35875.html">CVE-2024-35875</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35877.html">CVE-2024-35877</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35878.html">CVE-2024-35878</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35879.html">CVE-2024-35879</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35883.html">CVE-2024-35883</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35885.html">CVE-2024-35885</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35887.html">CVE-2024-35887</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35889.html">CVE-2024-35889</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35891.html">CVE-2024-35891</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35895.html">CVE-2024-35895</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35901.html">CVE-2024-35901</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35903.html">CVE-2024-35903</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35904.html">CVE-2024-35904</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35905.html">CVE-2024-35905</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35907.html">CVE-2024-35907</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35909.html">CVE-2024-35909</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35911.html">CVE-2024-35911</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35912.html">CVE-2024-35912</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35914.html">CVE-2024-35914</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35915.html">CVE-2024-35915</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35916.html">CVE-2024-35916</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35917.html">CVE-2024-35917</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35921.html">CVE-2024-35921</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35922.html">CVE-2024-35922</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35924.html">CVE-2024-35924</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35927.html">CVE-2024-35927</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35928.html">CVE-2024-35928</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35930.html">CVE-2024-35930</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35931.html">CVE-2024-35931</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35932.html">CVE-2024-35932</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35933.html">CVE-2024-35933</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35935.html">CVE-2024-35935</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35936.html">CVE-2024-35936</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35937.html">CVE-2024-35937</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35938.html">CVE-2024-35938</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35940.html">CVE-2024-35940</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35943.html">CVE-2024-35943</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35944.html">CVE-2024-35944</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35945.html">CVE-2024-35945</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35946.html">CVE-2024-35946</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35947.html">CVE-2024-35947</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35950.html">CVE-2024-35950</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35951.html">CVE-2024-35951</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35952.html">CVE-2024-35952</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35953.html">CVE-2024-35953</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35954.html">CVE-2024-35954</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35955.html">CVE-2024-35955</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35956.html">CVE-2024-35956</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35958.html">CVE-2024-35958</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35959.html">CVE-2024-35959</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35960.html">CVE-2024-35960</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35961.html">CVE-2024-35961</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35963.html">CVE-2024-35963</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35964.html">CVE-2024-35964</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35965.html">CVE-2024-35965</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35966.html">CVE-2024-35966</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35967.html">CVE-2024-35967</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35969.html">CVE-2024-35969</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35971.html">CVE-2024-35971</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35972.html">CVE-2024-35972</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35973.html">CVE-2024-35973</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35974.html">CVE-2024-35974</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35975.html">CVE-2024-35975</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35977.html">CVE-2024-35977</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35978.html">CVE-2024-35978</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35981.html">CVE-2024-35981</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35982.html">CVE-2024-35982</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35984.html">CVE-2024-35984</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35986.html">CVE-2024-35986</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35989.html">CVE-2024-35989</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35990.html">CVE-2024-35990</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35991.html">CVE-2024-35991</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35992.html">CVE-2024-35992</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35995.html">CVE-2024-35995</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35997.html">CVE-2024-35997</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35999.html">CVE-2024-35999</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36002.html">CVE-2024-36002</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36006.html">CVE-2024-36006</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36007.html">CVE-2024-36007</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36009.html">CVE-2024-36009</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36011.html">CVE-2024-36011</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36012.html">CVE-2024-36012</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36013.html">CVE-2024-36013</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36014.html">CVE-2024-36014</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36015.html">CVE-2024-36015</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36016.html">CVE-2024-36016</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36018.html">CVE-2024-36018</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36019.html">CVE-2024-36019</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36020.html">CVE-2024-36020</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36021.html">CVE-2024-36021</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36025.html">CVE-2024-36025</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36026.html">CVE-2024-36026</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36029.html">CVE-2024-36029</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36030.html">CVE-2024-36030</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36032.html">CVE-2024-36032</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36880.html">CVE-2024-36880</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36885.html">CVE-2024-36885</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36890.html">CVE-2024-36890</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36891.html">CVE-2024-36891</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36893.html">CVE-2024-36893</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36894.html">CVE-2024-36894</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36895.html">CVE-2024-36895</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36896.html">CVE-2024-36896</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36897.html">CVE-2024-36897</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36898.html">CVE-2024-36898</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36906.html">CVE-2024-36906</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36918.html">CVE-2024-36918</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36921.html">CVE-2024-36921</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36922.html">CVE-2024-36922</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36928.html">CVE-2024-36928</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36930.html">CVE-2024-36930</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36931.html">CVE-2024-36931</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36936.html">CVE-2024-36936</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36940.html">CVE-2024-36940</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36941.html">CVE-2024-36941</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36942.html">CVE-2024-36942</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36944.html">CVE-2024-36944</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36947.html">CVE-2024-36947</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36949.html">CVE-2024-36949</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36950.html">CVE-2024-36950</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36951.html">CVE-2024-36951</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36955.html">CVE-2024-36955</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36959.html">CVE-2024-36959</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0160</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0160</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-47233</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-47233</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52434</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52434</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52458</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52463</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52463</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52472</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52472</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52483</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52492</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52503</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52591</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52608</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52616</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52618</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52631</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52635</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52640</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52641</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52645</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52645</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52652</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52653</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52654</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52657</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52658</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52659</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52660</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52661</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52662</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52663</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52664</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52667</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52669</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52670</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52671</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52673</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52674</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52675</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52676</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52678</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52679</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52680</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52681</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52683</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52685</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52686</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52687</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52690</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52691</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52692</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52693</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52694</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52695</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52696</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52697</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52698</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52771</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52772</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52772</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52860</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52882</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6238</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6238</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6270</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6270</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6531</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6531</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-7042</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-7042</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-0639</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-0639</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-21823</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-22099</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-22099</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-23848</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-23848</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-24861</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-24861</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-25739</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-25739</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26601</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26601</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26611</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26614</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26632</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26638</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26642</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26643</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26652</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26654</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26656</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26657</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26671</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26673</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26674</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26675</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26679</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26684</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26685</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26692</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26696</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26697</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26704</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26714</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26726</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26731</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26733</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26736</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26737</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26739</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26740</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26742</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26756</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26757</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26760</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26764</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26769</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26772</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26773</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26774</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26775</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26779</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26783</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26786</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26791</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26793</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26794</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26802</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26805</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26807</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26815</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26816</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26822</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26828</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26832</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26836</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26844</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26846</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26848</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26853</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26854</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26855</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26856</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26857</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26858</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26860</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26861</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26862</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26866</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26868</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26870</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26878</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26881</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26881</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26882</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26882</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26883</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26883</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26884</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26884</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26885</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26885</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26898</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26898</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26899</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26899</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26900</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26900</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26901</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26901</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26903</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26903</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26906</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26909</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26909</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26921</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26922</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26923</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26925</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26928</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26932</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26932</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26933</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26933</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26934</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26934</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26935</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26937</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26938</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26940</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26943</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26945</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26946</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26948</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26949</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26949</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26950</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26951</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26956</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26957</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26958</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26960</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26961</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26962</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26963</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26964</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26972</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26973</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26978</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26978</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26979</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">0.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26979</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26981</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26982</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26983</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26984</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26986</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26986</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26988</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26989</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26990</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26991</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26992</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26993</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26994</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26995</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26996</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26997</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26999</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27000</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27001</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27002</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27003</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27004</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27008</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27013</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27013</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27014</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27014</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27022</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27022</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27027</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27028</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27029</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27030</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27031</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27036</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27046</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27056</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27057</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27062</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27067</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27080</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27388</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27389</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27393</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27395</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27396</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27398</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27399</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27400</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27401</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27405</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27408</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27410</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27411</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27412</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27413</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27416</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27417</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27418</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27431</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27432</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27434</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27435</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-27436</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35784</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35786</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35788</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35789</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35790</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35791</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35794</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35795</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35796</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35799</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35800</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35801</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35803</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35804</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35806</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35808</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35809</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35810</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35811</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35812</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35813</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35814</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35815</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35817</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35819</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35821</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35822</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35823</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35824</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35825</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35828</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35829</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35830</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35833</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35834</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35835</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35836</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35837</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35838</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35841</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35842</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35845</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35847</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35849</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35850</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35851</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35852</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35854</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35860</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35861</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35862</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35863</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35864</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35865</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35866</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35867</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35869</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35872</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35875</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35877</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35878</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35879</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35885</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35887</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35889</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35895</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35901</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35903</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35904</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35905</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35907</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35911</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35912</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35914</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35915</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35916</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35917</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35921</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35922</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35924</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35927</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35928</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35930</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35931</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35932</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35933</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35935</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35936</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35937</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35938</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35940</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35943</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35944</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35945</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35946</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35947</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35950</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35951</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35952</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35953</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35954</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35955</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35956</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35958</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35959</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35960</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35961</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35963</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35964</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35965</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35966</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35967</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35969</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35971</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35972</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35972</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35973</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35974</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35975</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35978</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35978</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35981</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35982</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35982</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35984</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35984</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35986</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35989</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35990</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35990</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35991</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35992</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35992</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35995</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35997</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35997</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35999</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36002</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36006</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36007</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36009</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36011</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36012</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36013</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36014</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36015</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36016</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36018</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36019</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36020</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36021</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36025</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36026</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36029</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36030</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36032</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36880</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36885</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36890</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36891</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36891</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36893</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36893</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36894</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36895</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36896</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36897</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36897</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36898</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36906</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">0.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36918</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36921</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36922</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36928</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36930</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36930</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36931</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36936</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36940</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36941</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36942</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36944</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36947</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36949</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36950</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36951</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36955</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36959</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.6</li>
                    
                        <li class="list-group-item">Public Cloud Module 15-SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves 428 vulnerabilities, contains 15 features and has 78 security fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).</li>
<li>CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).</li>
<li>CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).</li>
<li>CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).</li>
<li>CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).</li>
<li>CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).</li>
<li>CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).</li>
<li>CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).</li>
<li>CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).</li>
<li>CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).</li>
<li>CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).</li>
<li>CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).</li>
<li>CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).</li>
<li>CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).</li>
<li>CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).</li>
<li>CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).</li>
<li>CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).</li>
<li>CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).</li>
<li>CVE-2024-26906: Disallowed vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).</li>
<li>CVE-2024-26816: Ignore relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624).</li>
<li>CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).</li>
<li>CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).</li>
<li>CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).</li>
<li>CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).</li>
<li>CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).</li>
<li>CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).</li>
<li>CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).</li>
<li>CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).</li>
<li>CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).</li>
<li>CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801).</li>
<li>CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557).</li>
<li>CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).</li>
<li>CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445).</li>
<li>CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).</li>
<li>CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).</li>
<li>CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915).</li>
<li>CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).</li>
<li>CVE-2024-26614: Fixed the initialization of accept_queue&#x27;s spinlocks (bsc#1221293).</li>
<li>CVE-2024-25739: Fixed possible crash in create_empty_lvol() in drivers/mtd/ubi/vtbl.c (bsc#1219834).</li>
<li>CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).</li>
<li>CVE-2024-36030: Fix the double free in rvu_npc_freemem() (bsc#1225712)</li>
<li>CVE-2023-52698: Fix memory leak in netlbl_calipso_add_pass() (bsc#1224621)</li>
<li>CVE-2024-26860: Fix a memory leak when rechecking the data (bsc#1223077).</li>
<li>CVE-2023-52772: Fix use-after-free in unix_stream_read_actor() (bsc#1224989).</li>
<li>CVE-2024-27431: Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718).</li>
<li>CVE-2024-35860: Support deferring bpf_link dealloc to after RCU grace period BPF link for some program types (bsc#1224531).</li>
<li>CVE-2024-35964: Fix not validating setsockopt user input Check user input length before copying data (bsc#1224581).</li>
<li>CVE-2023-0160: Prevent lock inversion deadlock in map delete elem  (bsc#1209657).</li>
<li>CVE-2024-35903: Fix IP after emitting call depth accounting Adjust the IP passed to <code>emit_patch</code> so it calculates the correct offset for the CALL instruction if <code>x86_call_depth_emit_accounting</code> emits code (bsc#1224493).</li>
<li>CVE-2024-35931: Skip do PCI error slot reset during RAS recovery (bsc#1224652).</li>
<li>CVE-2024-35877: Fix VM_PAT handling in COW mappings (bsc#1224525).</li>
<li>CVE-2024-35969: Fix race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580)</li>
<li>CVE-2024-35852: Fix memory leak when canceling rehash work The rehash delayed work is rescheduled with a delay if the number of credits at end of the work is not negative as supposedly it means that the migration ended (bsc#1224502).</li>
<li>CVE-2024-36006: Fix incorrect list API usage (bsc#1224541).</li>
<li>CVE-2024-36007: Fix warning during rehash (bsc#1224543).</li>
<li>CVE-2024-35872: Fix GUP-fast succeeding on secretmem folios (bsc#1224530).</li>
<li>CVE-2024-35956: Fix qgroup prealloc rsv leak in subvolume operations (bsc#1224674)</li>
<li>CVE-2023-52771: Fix delete_endpoint() vs parent unregistration race  (bsc#1225007).</li>
<li>CVE-2024-27408: Add sync read before starting the  DMA transfer in remote setup (bsc#1224430).</li>
<li>CVE-2024-35943: Add a null pointer check to the omap_prm_domain_init devm_kasprintf()returns a pointer to dynamically allocated memory which can be NULL upon failure (bsc#1224649).</li>
<li>CVE-2024-35921: Fix oops when HEVC init fails (bsc#1224477).</li>
<li>CVE-2023-52860: Use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu uninit process (bsc#1224936).</li>
<li>CVE-2024-35991: kABI workaround for struct idxd_evl (bsc#1224553).</li>
<li>CVE-2024-35854: Fix possible use-after-free during rehash (bsc#1224636).</li>
<li>CVE-2024-27418: Take ownership of skb in mctp_local_output (bsc#1224720)</li>
<li>CVE-2024-27417: Fix potential "struct net" leak in inet6_rtm_getaddr() (bsc#1224721).</li>
<li>CVE-2024-35905: Protect against int overflow for stack access size (bsc#1224488).</li>
<li>CVE-2024-35917: Fix bpf_plt pointer arithmetic (bsc#1224481).</li>
<li>CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() to nsure the value passed to scarlett2_mixer_ctl_put() is between 0 and SCARLETT2_MIXER_MAX_VALUE so we don&#x27;t attempt to access outside scarlett2_mixer_values[] (bsc#1224727).</li>
<li>CVE-2023-52680: Add missing error checks to <em>_ctl_get() because the </em><em>ctl_get() functions which call scarlett2_update</em>*() were not checking the return value (bsc#1224608).</li>
<li>CVE-2023-52692: Add missing error check to scarlett2_usb_set_config() scarlett2_usb_set_config() calls scarlett2_usb_get() but was not checking the result (bsc#1224628).</li>
<li>CVE-2024-35944: Fix memcpy() run-time warning in dg_dispatch_as_host() Syzkaller hit &#x27;WARNING in dg_dispatch_as_host&#x27; bug (bsc#1224648).</li>
<li>CVE-2024-26923: Suppress false-positive lockdep splat for spin_lock()  in __unix_gc() (bsc#1223384).</li>
<li>CVE-2023-52659: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (bsc#1224442).</li>
<li>CVE-2024-21823: Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may have allowed an authorized user to potentially enable denial of service via local access (bsc#1223625).</li>
<li>CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).</li>
<li>CVE-2024-27395: Fix Use-After-Free in ovs_ct_exit Since kfree_rcu (bsc#1224098).</li>
<li>CVE-2023-52483: Perform route lookups under a RCU read-side lock (bsc#1220738).</li>
<li>CVE-2024-27396: Fix Use-After-Free in gtp_dellink (bsc#1224096).</li>
<li>CVE-2024-26632: Fix iterating over an empty bio with  bio_for_each_folio_all (bsc#1221635).</li>
<li>CVE-2024-27401: Ensure that packet_buffer_get respects the user_length provided. (bsc#1224181).</li>
<li>CVE-2024-26775: Avoid potential deadlock at set_capacity (bsc#1222627).</li>
<li>CVE-2024-26958: Fix UAF in direct writes (bsc#1223653).</li>
<li>CVE-2024-26643: Mark set as dead when unbinding anonymous set with timeout While the rhashtable set gc runs asynchronously, a race allowed it to collect elements from anonymous sets with timeouts while it is being released from the commit path. (bsc#1221829).</li>
<li>CVE-2023-52618: Check for unlikely string overflow (bsc#1221615).</li>
<li>CVE-2023-6238: Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption (bsc#1217384).</li>
<li>CVE-2024-26946: Use copy_from_kernel_nofault() to read from unsafe address Read from an unsafe address with copy_from_kernel_nofault() in arch_adjust_kprobe_addr() because this function is used before checking the address is in text or not (bsc#1223669).</li>
<li>CVE-2024-26945: Fix nr_cpus nr_iaa case If nr_cpus nr_iaa, the calculated cpus_per_iaa will be 0, which causes a divide-by-0 in rebalance_wq_table() (bsc#1223732).</li>
<li>CVE-2024-26679: Read sk->sk_family once in inet_recv_error() inet_recv_error() is called without holding the socket lock. IPv6 socket could mutate to IPv4 with IPV6_ADDRFORM socket option and trigger a KCSAN warning (bsc#1222385).</li>
<li>CVE-2024-26791: Properly validate device names (bsc#1222793)</li>
<li>CVE-2023-52641: Add NULL ptr dereference checking at the end of attr_allocate_frame() (bsc#1222303)</li>
<li>CVE-2024-26726: Do not drop extent_map for free space inode on write error (bsc#1222532)</li>
<li>CVE-2024-27022: Defer linking file vma until vma is fully initialized (bsc#1223774).</li>
<li>CVE-2024-26899: Fix deadlock between bd_link_disk_holder and partition scan (bsc#1223045).</li>
<li>CVE-2024-26638: Always initialize struct msghdr completely (bsc#1221649).</li>
<li>CVE-2024-26909: Fix drm bridge use-after-free A recent DRM series purporting to simplify support (bsc#1223143).</li>
<li>CVE-2024-26674: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups (bsc#1222378).</li>
<li>CVE-2024-26832: Fix missing folio cleanup in writeback race path (bsc#1223007).</li>
<li>CVE-2024-26844: Fix WARNING in _copy_from_iter (bsc#1223015).</li>
<li>CVE-2024-26774: Avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt (bsc#1222622).</li>
<li>CVE-2024-26815: Properly check TCA_TAPRIO_TC_ENTRY_INDEX (bsc#1222635).</li>
<li>cve-2024-267600: Fix bio_put() for error case (bsc#1222596).</li>
<li>CVE-2024-26731: Fix NULL pointer dereference in sk_psock_verdict_data_ready() (bsc#1222371).</li>
<li>CVE-2024-26740: Use the backlog for mirred ingress (bsc#1222563).</li>
<li>CVE-2023-52640: Fix oob in ntfs_listxattr The length of name cannot exceed the space occupied by ea (bsc#1222301).</li>
<li>CVE-2023-52631: Fix a NULL dereference bug (bsc#1222264).</li>
<li>CVE-2023-52458: Add check that partition length needs to be aligned  with block size (bsc#1220428).</li>
<li>CVE-2023-6270: Fix the potential use-after-free problem in aoecmd_cfg_pkts  (bsc#1218562).</li>
<li>CVE-2024-26805: Fix kernel-infoleak-after-free in __skb_datagram_iter (bsc#1222630).</li>
<li>
<p>CVE-2024-26991: Do not overflow lpage_info when checking attributes (bsc#1223695).</p>
</li>
<li>
<p>CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).</p>
</li>
<li>CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).</li>
<li>CVE-2024-26822: Set correct id, uid and cruid for multiuser  automounts (bsc#1223011).</li>
<li>CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts()  (bsc#1220148).</li>
<li>CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).</li>
<li>CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).</li>
<li>CVE-2024-35861: Fixed potential UAF in  cifs_signal_cifsd_for_reconnect() (bsc#1224766).</li>
<li>CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()  (bsc#1224764).</li>
<li>CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).</li>
<li>CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break()  (bsc#1224668).</li>
<li>CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()  (bsc#1224765).</li>
<li>CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).</li>
<li>CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).</li>
<li>CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key()  (bsc#1224667).</li>
<li>CVE-2024-35869: Guarantee refcounted children from parent session  (bsc#1224679).</li>
<li>CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).</li>
<li>CVE-2024-26692: Fixed regression in writes when non-standard maximum write  size negotiated (bsc#1222464).</li>
<li>CVE-2024-27036: Fixed writeback data corruption (bsc#1223810).    </li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>9p: add missing locking around taking dentry fid list (git-fixes)</li>
<li>ACPI: CPPC: Fix access width used for PCC registers (git-fixes).</li>
<li>ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro (git-fixes).</li>
<li>ACPI: CPPC: Use access_width over bit_width for system memory accesses (stable-fixes).</li>
<li>ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).</li>
<li>ACPI: LPSS: Advertise number of chip selects via property (git-fixes).</li>
<li>ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).</li>
<li>ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).</li>
<li>ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-fixes).</li>
<li>ACPI: disable -Wstringop-truncation (git-fixes).</li>
<li>ACPI: resource: Add Infinity laptops to irq1_edge_low_force_override (stable-fixes).</li>
<li>ACPI: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).</li>
<li>ACPI: scan: Do not increase dep_unmet for already met dependencies (git-fixes).</li>
<li>ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (bsc#1217750).</li>
<li>ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of CONFIG_X86_ANDROID_TABLETS (stable-fixes).</li>
<li>ACPICA: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() (git-fixes).</li>
<li>ALSA/hda: intel-dsp-config: reduce log verbosity (git-fixes).</li>
<li>ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes).</li>
<li>ALSA: aoa: avoid false-positive format truncation warning (git-fixes).</li>
<li>ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).</li>
<li>ALSA: core: Remove debugfs at disconnection (git-fixes).</li>
<li>ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).</li>
<li>ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).</li>
<li>ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).</li>
<li>ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).</li>
<li>ALSA: hda/realtek - Set GPIO3 to default at S4 state for Thinkpad with ALC1318 (stable-fixes).</li>
<li>ALSA: hda/realtek - fixed headset Mic not show (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for HP Spectre x360 14 eu0000 (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for ASUS Laptops using CS35L56 (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for HP Omen models using CS35L41 (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for Huawei Matebook D14 NBLB-WAX9N (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for some Clevo laptops (stable-fixes).</li>
<li>ALSA: hda/realtek: Add sound quirks for Lenovo Legion slim 7 16ARHA7 models (stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for ASUS Zenbook 2024 HN7306W (stable-fixes).</li>
<li>ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes).</li>
<li>ALSA: hda/realtek: Drop doubly quirk entry for 103c:8a2e (git-fixes).</li>
<li>ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897 (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix build error without CONFIG_PM (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix conflicting PCI SSID 17aa:386f for Lenovo Legion models (bsc#1223462).</li>
<li>ALSA: hda/realtek: Fix internal speakers for Legion Y9000X 2022 IAH7 (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix volumn control of ThinkBook 16P Gen4 (git-fixes).</li>
<li>ALSA: hda/realtek: Fixes for Asus GU605M and GA403U sound (stable-fixes).</li>
<li>ALSA: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone (git-fixes).</li>
<li>ALSA: hda/realtek: cs35l41: Support ASUS ROG G634JYR (stable-fixes).</li>
<li>ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes).</li>
<li>ALSA: hda/realtek: fix the hp playback volume issue for LG machines (stable-fixes).</li>
<li>ALSA: hda/tas2781: Add new vendor_id and subsystem_id to support ThinkPad ICE-1 (stable-fixes).</li>
<li>ALSA: hda/tas2781: add locks to kcontrols (git-fixes).</li>
<li>ALSA: hda/tas2781: correct the register for pow calibrated data (git-fixes).</li>
<li>ALSA: hda/tas2781: remove digital gain kcontrol (git-fixes).</li>
<li>ALSA: hda: Add Intel BMG PCI ID and HDMI codec vid (stable-fixes).</li>
<li>ALSA: hda: clarify Copyright information (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Add support for ASUS ROG 2024 Laptops (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Ignore errors when configuring IRQs (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Remove Speaker ID for Lenovo Legion slim 7 16ARHA7 (git-fixes).</li>
<li>ALSA: hda: cs35l41: Remove redundant argument to cs35l41_request_firmware_file() (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Set the max PCM Gain using tuning setting (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Support HP Omen models without _DSD (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Support Lenovo 13X laptop without _DSD (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Update DSP1RX5/6 Sources for DSP config (stable-fixes).</li>
<li>ALSA: hda: cs35l56: Add ACPI device match tables (git-fixes).</li>
<li>ALSA: hda: cs35l56: Exit cache-only after cs35l56_wait_for_firmware_boot() (stable-fixes).</li>
<li>ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (git-fixes).</li>
<li>ALSA: hda: cs35l56: Set the init_done flag before component_add() (git-fixes).</li>
<li>ALSA: hda: hda_cs_dsp_ctl: Remove notification of driver write (stable-fixes).</li>
<li>ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes).</li>
<li>ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).</li>
<li>ALSA: line6: Zero-initialize message buffers (stable-fixes).</li>
<li>ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).</li>
<li>ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).</li>
<li>ALSA: scarlett2: Add correct product series name to messages (stable-fixes).</li>
<li>ALSA: scarlett2: Add missing error check to scarlett2_config_save() (git-fixes).</li>
<li>ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).</li>
<li>ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).</li>
<li>ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).</li>
<li>ALSA: seq: Do not clear bank selection at event -> UMP MIDI2 conversion (git-fixes).</li>
<li>ALSA: seq: Fix incorrect UMP type for system messages (git-fixes).</li>
<li>ALSA: seq: Fix missing bank setup between MIDI1/MIDI2 UMP conversion (git-fixes).</li>
<li>ALSA: seq: Fix yet another spot for system message conversion (git-fixes).</li>
<li>ALSA: seq: ump: Fix conversion from MIDI2 to MIDI1 UMP messages (git-fixes).</li>
<li>ALSA: seq: ump: Fix swapped song position pointer data (git-fixes).</li>
<li>ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).</li>
<li>ALSA: timer: Set lower bound of start tick time (stable-fixes).</li>
<li>ALSA: ump: Do not accept an invalid UMP protocol number (git-fixes).</li>
<li>ALSA: ump: Do not clear bank selection after sending a program change (git-fixes).</li>
<li>ALSA: ump: Set default protocol when not given explicitly (git-fixes).</li>
<li>ALSA: usb-audio: Add sampling rates support for Mbox3 (stable-fixes).</li>
<li>ALSA: usb-audio: Fix for sampling rates support for Mbox3 (stable-fixes).</li>
<li>ARM: 9381/1: kasan: clear stale stack poison (git-fixes).</li>
<li>ARM: OMAP2+: fix N810 MMC gpiod table (git-fixes).</li>
<li>ARM: OMAP2+: fix USB regression on Nokia N8x0 (git-fixes).</li>
<li>ARM: imx: Check return value of devm_kasprintf in imx_mmdc_perf_init (git-fixes).</li>
<li>ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE (git-fixes).</li>
<li>ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 (stable-fixes).</li>
<li>ARM: s5pv210: fix pm.c kernel-doc warning (git-fixes).</li>
<li>ASoC: Intel: Disable route checks for Skylake boards (git-fixes).</li>
<li>ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).</li>
<li>ASoC: Intel: avs: Fix potential integer overflow (git-fixes).</li>
<li>ASoC: Intel: avs: Populate board selection with new I2S entries (stable-fixes).</li>
<li>ASoC: Intel: avs: Set name of control as in topology (git-fixes).</li>
<li>ASoC: Intel: avs: Test result of avs_get_module_entry() (git-fixes).</li>
<li>ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).</li>
<li>ASoC: Intel: bytcr_rt5640: Apply Asus T100TA quirk to Asus T100TAM too (git-fixes).</li>
<li>ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710) laptops (stable-fixes).</li>
<li>ASoC: SOF: Intel: add default firmware library path for LNL (git-fixes).</li>
<li>ASoC: SOF: Intel: hda-dsp: Skip IMR boot on ACE platforms in case of S3 suspend (stable-fixes).</li>
<li>ASoC: SOF: Intel: lnl: Correct rom_status_reg (git-fixes).</li>
<li>ASoC: SOF: Intel: mtl: Correct rom_status_reg (git-fixes).</li>
<li>ASoC: SOF: Intel: mtl: Disable interrupts when firmware boot failed (git-fixes).</li>
<li>ASoC: SOF: Intel: mtl: Implement firmware boot state check (git-fixes).</li>
<li>ASoC: SOF: Intel: mtl: call dsp dump when boot retry fails (stable-fixes).</li>
<li>ASoC: SOF: amd: Optimize quirk for Valve Galileo (stable-fixes).</li>
<li>ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend (stable-fixes).</li>
<li>ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (git-fixes).</li>
<li>ASoC: acp: Support microphone from device Acer 315-24p (git-fixes).</li>
<li>ASoC: amd: acp: fix for acp_init function error handling (git-fixes).</li>
<li>ASoC: amd: yc: Add Lenovo ThinkBook 21J0 into DMI quirk table (stable-fixes).</li>
<li>ASoC: amd: yc: Fix non-functional mic on ASUS M7600RE (stable-fixes).</li>
<li>ASoC: amd: yc: Fix non-functional mic on Lenovo 21J2 (stable-fixes).</li>
<li>ASoC: amd: yc: Revert "Fix non-functional mic on Lenovo 21J2" (stable-fixes).</li>
<li>ASoC: codecs: wsa881x: set clk_stop_mode1 flag (git-fixes).</li>
<li>ASoC: cs35l41: Update DSP1RX5/6 Sources for DSP config (git-fixes).</li>
<li>ASoC: cs35l56: Fix unintended bus access while resetting amp (git-fixes).</li>
<li>ASoC: cs35l56: Prevent overwriting firmware ASP config (git-fixes).</li>
<li>ASoC: da7219-aad: fix usage of device_get_named_child_node() (git-fixes).</li>
<li>ASoC: kirkwood: Fix potential NULL dereference (git-fixes).</li>
<li>ASoC: mediatek: Assign dummy when codec not specified for a DAI link (git-fixes).</li>
<li>ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).</li>
<li>ASoC: meson: axg-card: make links nonatomic (git-fixes).</li>
<li>ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).</li>
<li>ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).</li>
<li>ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).</li>
<li>ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).</li>
<li>ASoC: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).</li>
<li>ASoC: rockchip: i2s-tdm: Fix inaccurate sampling rates (git-fixes).</li>
<li>ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (git-fixes).</li>
<li>ASoC: rt5645: Make LattePanda board DMI match more precise (stable-fixes).</li>
<li>ASoC: rt5682-sdw: fix locking sequence (git-fixes).</li>
<li>ASoC: rt711-sdca: fix locking sequence (git-fixes).</li>
<li>ASoC: rt711-sdw: fix locking sequence (git-fixes).</li>
<li>ASoC: rt712-sdca-sdw: fix locking sequence (git-fixes).</li>
<li>ASoC: rt715-sdca: volume step modification (git-fixes).</li>
<li>ASoC: rt715: add vendor clear control register (git-fixes).</li>
<li>ASoC: rt722-sdca-sdw: fix locking sequence (git-fixes).</li>
<li>ASoC: rt722-sdca: add headset microphone vrefo setting (git-fixes).</li>
<li>ASoC: rt722-sdca: modify channel number to support 4 channels (git-fixes).</li>
<li>ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).</li>
<li>ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).</li>
<li>ASoC: tas2781: Fix a warning reported by robot kernel test (git-fixes).</li>
<li>ASoC: tas2781: Fix wrong loading calibrated data sequence (git-fixes).</li>
<li>ASoC: tas2781: mark dvc_tlv with __maybe_unused (git-fixes).</li>
<li>ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).</li>
<li>ASoC: ti: Convert Pandora ASoC to GPIO descriptors (stable-fixes).</li>
<li>ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).</li>
<li>ASoC: tlv320adc3xxx: Do not strip remove function when driver is builtin (git-fixes).</li>
<li>ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).</li>
<li>ASoC: wm_adsp: Add missing MODULE_DESCRIPTION() (git-fixes).</li>
<li>ASoC: wm_adsp: Fix missing mutex_lock in wm_adsp_write_ctl() (git-fixes).</li>
<li>Add alt-commit to a nouveau patch</li>
<li>Add cherry-picked id to amdgpu patch</li>
<li>Add cherry-picked id to amdgpu patch (git-fixes)</li>
<li>Add cherry-picked patch references to amdgpu patches</li>
<li>Add reference to L3 bsc#1225765 in BPF control flow graph and precision backtrack fixes (bsc#1225756) The L3 bsc#1225765 was created seperately since our customer requires PTF.</li>
<li>Bluetooth: Add new quirk for broken read key length on ATS2851 (stable-fixes).</li>
<li>Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).</li>
<li>Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).</li>
<li>Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).</li>
<li>Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).</li>
<li>Bluetooth: HCI: Fix potential null-ptr-deref (git-fixes).</li>
<li>Bluetooth: ISO: Align broadcast sync_timeout with connection timeout (stable-fixes).</li>
<li>Bluetooth: ISO: Do not reject BT_ISO_QOS if parameters are unset (git-fixes).</li>
<li>Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).</li>
<li>Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() (git-fixes).</li>
<li>Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID (bsc#1221504).</li>
<li>Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).</li>
<li>Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).</li>
<li>Bluetooth: add quirk for broken address properties (git-fixes).</li>
<li>Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).</li>
<li>Bluetooth: btintel: Fixe build regression (git-fixes).</li>
<li>Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).</li>
<li>Bluetooth: btusb: Fix triggering coredump implementation for QCA (git-fixes).</li>
<li>Bluetooth: hci_core: Cancel request on command timeout (stable-fixes).</li>
<li>Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).</li>
<li>Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).</li>
<li>Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).</li>
<li>Bluetooth: hci_sync: Fix not checking error on hci_cmd_sync_cancel_sync (git-fixes).</li>
<li>Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY (git-fixes).</li>
<li>Bluetooth: hci_sync: Use QoS to determine which PHY to scan (stable-fixes).</li>
<li>Bluetooth: l2cap: Do not double set the HCI_CONN_MGMT_CONNECTED bit (git-fixes).</li>
<li>Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).</li>
<li>Bluetooth: mgmt: Fix limited discoverable off timeout (stable-fixes).</li>
<li>Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).</li>
<li>Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).</li>
<li>Bluetooth: qca: add missing firmware sanity checks (git-fixes).</li>
<li>Bluetooth: qca: fix NULL-deref on non-serdev setup (git-fixes).</li>
<li>Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).</li>
<li>Bluetooth: qca: fix NVM configuration parsing (git-fixes).</li>
<li>Bluetooth: qca: fix device-address endianness (git-fixes).</li>
<li>Bluetooth: qca: fix firmware check error path (git-fixes).</li>
<li>Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).</li>
<li>Delete patches.suse/btrfs-qgroup-fix-qgroup-prealloc-rsv-leak-in-subvolu.patch. Quoting bsc#1225945#c11: "So the upstream 6.5 kernel commit (1b53e51a4a8f ("btrfs: do not commit transaction for every subvol create") ) was never backported to SLE, so that fix eb96e221937a ("btrfs: fix unwritten extent buffer after snapshotting a new subvolume") was never backported."</li>
<li>Docs/admin-guide/mm/damon/usage: fix wrong example of DAMOS filter matching sysfs file (git-fixes).</li>
<li>Drop usb gadget patch that was taken mistakenly and reverted (git-fixes)</li>
<li>EDAC/synopsys: Fix ECC status and IRQ control race condition (git-fixes).</li>
<li>Edit "amdkfd: use calloc instead of kzalloc to avoid integer overflow" Reference CVE and bug numbers.</li>
<li>Enable CONFIG_FIPS_SIGNATURE_SELFTEST (bsc#1222771)</li>
<li>Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_ECDSA.</li>
<li>Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_RSA.</li>
<li>Fix a potential infinite loop in extract_user_to_sg() (git-fixes).</li>
<li>Fix build errors due to new UIO_MEM_DMA_COHERENT mess (git-fixes).</li>
<li>Fix patches.suse/coresight-etm4x-Add-ACPI-support-in-platform-driver.patch (bsc#1218779 bsc#1220587) Put back patch hunk which where missed because file rename drivers/acpi/acpi_amba.c -> drivers/acpi/arm64/amba.c</li>
<li>HID: amd_sfh: Handle "no sensors" in PM operations (git-fixes).</li>
<li>HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up (git-fixes).</li>
<li>HID: input: avoid polling stylus battery on Chromebook Pompom (stable-fixes).</li>
<li>HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).</li>
<li>HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes).</li>
<li>HID: logitech-dj: allow mice to use all types of reports (git-fixes).</li>
<li>HID: multitouch: Add required quirk for Synaptics 0xcddc device (stable-fixes).</li>
<li>IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)</li>
<li>Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).</li>
<li>Input: gpio_keys_polled - suppress deferred probe error for gpio (stable-fixes).</li>
<li>Input: imagis - use FIELD_GET where applicable (stable-fixes).</li>
<li>Input: ims-pcu - fix printf string overflow (git-fixes).</li>
<li>Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).</li>
<li>Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails (stable-fixes).</li>
<li>Input: xpad - add additional HyperX Controller Identifiers (stable-fixes).</li>
<li>Input: xpad - add support for Snakebyte GAMEPADs (stable-fixes).</li>
<li>KEYS: trusted: Do not use WARN when encode fails (git-fixes).</li>
<li>KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).</li>
<li>KVM: SVM: Add support for allowing zero SEV ASIDs (git-fixes).</li>
<li>KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (git-fixes).</li>
<li>KVM: SVM: Use unsigned integers when dealing with ASIDs (git-fixes).</li>
<li>KVM: VMX: Disable LBR virtualization if the CPU does not support LBR callstacks (git-fixes).</li>
<li>KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes).</li>
<li>KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git-fixes).</li>
<li>KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224790).</li>
<li>KVM: x86/mmu: Do not force emulation of L2 accesses to non-APIC internal slots (git-fixes).</li>
<li>KVM: x86/mmu: Move private vs. shared check above slot validity checks (git-fixes).</li>
<li>KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU (git-fixes).</li>
<li>KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (git-fixes).</li>
<li>KVM: x86/pmu: Allow programming events that match unsupported arch events (git-fixes).</li>
<li>KVM: x86/pmu: Always treat Fixed counters as available when supported (git-fixes).</li>
<li>KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs (git-fixes).</li>
<li>KVM: x86/pmu: Disable support for adaptive PEBS (git-fixes).</li>
<li>KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs (git-fixes).</li>
<li>KVM: x86/pmu: Do not ignore bits 31:30 for RDPMC index on AMD (git-fixes).</li>
<li>KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms (git-fixes).</li>
<li>KVM: x86/pmu: Explicitly check NMI from guest to reducee false positives (git-fixes).</li>
<li>KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (git-fixes).</li>
<li>KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET" (git-fixes).</li>
<li>KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled (git-fixes).</li>
<li>KVM: x86/xen: fix recursive deadlock in timer injection (git-fixes).</li>
<li>KVM: x86/xen: improve accuracy of Xen timers (git-fixes).</li>
<li>KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled (git-fixes).</li>
<li>KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery (git-fixes).</li>
<li>KVM: x86: Allow, do not ignore, same-value writes to immutable MSRs (git-fixes).</li>
<li>KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes).</li>
<li>KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (git-fixes).</li>
<li>KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper (git-fixes).</li>
<li>KVM: x86: Mark target gfn of emulated atomic instruction as dirty (git-fixes).</li>
<li>KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled (git-fixes).</li>
<li>KVM: x86: Snapshot if a vCPU&#x27;s vendor model is AMD vs. Intel compatible (git-fixes).</li>
<li>KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they&#x27;re a WIP (git-fixes).</li>
<li>KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT (git-fixes).</li>
<li>Move out-of-tree powerpc patch to the right section</li>
<li>Move the upstreamed BT fix patch to sorted section</li>
<li>Move the upstreamed BT patch into sorted section</li>
<li>Move upstreamed ACPI patch into sorted section</li>
<li>Move upstreamed HD-audio patch into sorted section</li>
<li>Move upstreamed USB fix into sorted section</li>
<li>Move upstreamed media patches into sorted section</li>
<li>Move upstreamed mm patches into sorted section</li>
<li>Move upstreamed patches into sorted section</li>
<li>Move upstreamed patches into sorted section</li>
<li>Move upstreamed patches into sorted section</li>
<li>Move upstreamed patches into sorted section</li>
<li>Move upstreamed powerpc patches into sorted section</li>
<li>Move upstreamed powerpc patches into sorted section</li>
<li>NFC: trf7970a: disable all regulators on removal (git-fixes).</li>
<li>NFS: Fix an off by one in root_nfs_cat() (git-fixes).</li>
<li>NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interrupt (git-fixes).</li>
<li>NFS: Read unlock folio on nfs_page_create_from_folio() error (git-fixes).</li>
<li>NFSD: Convert the callback workqueue to use delayed_work (git-fixes).</li>
<li>NFSD: Fix nfsd_clid_class use of __string_len() macro (git-fixes).</li>
<li>NFSD: Reschedule CB operations when backchannel rpc_clnt is shut down (git-fixes).</li>
<li>NFSD: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes).</li>
<li>NFSD: Retransmit callbacks after client reconnects (git-fixes).</li>
<li>NFSD: change LISTXATTRS cookie encoding to big-endian (git-fixes).</li>
<li>NFSD: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes).</li>
<li>NFSD: fix LISTXATTRS returning more bytes than maxcount (git-fixes).</li>
<li>NFSD: fix nfsd4_listxattr_validate_cookie (git-fixes).</li>
<li>NFSv4.1/pnfs: fix NFS with TLS in pnfs (git-fixes).</li>
<li>NFSv4.2: fix listxattr maximum XDR buffer size (git-fixes).</li>
<li>NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).</li>
<li>Octeontx2-af: fix pause frame configuration in GMP mode (git-fixes).</li>
<li>PCI/AER: Block runtime suspend when handling errors (stable-fixes).</li>
<li>PCI/ASPM: Use RMW accessors for changing LNKCTL (git-fixes).</li>
<li>PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (stable-fixes).</li>
<li>PCI/DPC: Use FIELD_GET() (stable-fixes).</li>
<li>PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).</li>
<li>PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).</li>
<li>PCI/PM: Drain runtime-idle callbacks before driver removal (stable-fixes).</li>
<li>PCI: Delay after FLR of Solidigm P44 Pro NVMe (stable-fixes).</li>
<li>PCI: Disable D3cold on Asus B1400 PCI-NVMe bridge (stable-fixes).</li>
<li>PCI: Execute quirk_enable_clear_retrain_link() earlier (stable-fixes).</li>
<li>PCI: Fix typos in docs and comments (stable-fixes).</li>
<li>PCI: Make link retraining use RMW accessors for changing LNKCTL (git-fixes).</li>
<li>PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word() (stable-fixes).</li>
<li>PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).</li>
<li>PCI: hv: Fix ring buffer size calculation (git-fixes).</li>
<li>PCI: qcom: Add support for sa8775p SoC (git-fixes).</li>
<li>PCI: qcom: Disable ASPM L0s for sc8280xp, sa8540p and sa8295p (git-fixes).</li>
<li>PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).</li>
<li>PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).</li>
<li>PCI: switchtec: Add support for PCIe Gen5 devices (stable-fixes).</li>
<li>PCI: switchtec: Use normal comment style (stable-fixes).</li>
<li>PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).</li>
<li>PM / devfreq: Synchronize devfreq_monitor_[start/stop] (stable-fixes).</li>
<li>PM: s2idle: Make sure CPUs will wakeup directly on resume (git-fixes).</li>
<li>Port "certs: Add ECDSA signature verification self-test".</li>
<li>Port "certs: Move RSA self-test data to separate file".</li>
<li>RAS/AMD/FMPM: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).</li>
<li>RAS/AMD/FMPM: Fix build when debugfs is not enabled (jsc#PED-7619).</li>
<li>RAS/AMD/FMPM: Safely handle saved records of various sizes (jsc#PED-7619).</li>
<li>RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)</li>
<li>RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes)</li>
<li>RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)</li>
<li>RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw (git-fixes)</li>
<li>RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)</li>
<li>RDMA/hns: Fix GMV table pagesize (git-fixes)</li>
<li>RDMA/hns: Fix UAF for cq async event (git-fixes)</li>
<li>RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)</li>
<li>RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)</li>
<li>RDMA/hns: Modify the print level of CQE error (git-fixes)</li>
<li>RDMA/hns: Use complete parentheses in macros (git-fixes)</li>
<li>RDMA/mana_ib: Fix bug in creation of dma regions (git-fixes).</li>
<li>RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)</li>
<li>RDMA/mlx5: Change check for cacheable mkeys (git-fixes)</li>
<li>RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)</li>
<li>RDMA/mlx5: Uncacheable mkey has neither rb_key or cache_ent (git-fixes)</li>
<li>RDMA/rxe: Allow good work requests to be executed (git-fixes)</li>
<li>RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)</li>
<li>RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)</li>
<li>RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes)</li>
<li>README.BRANCH: Remove copy of branch name</li>
<li>Reapply "drm/qxl: simplify qxl_fence_wait" (stable-fixes).</li>
<li>Refresh patches.suse/0002-PKCS-7-Check-codeSigning-EKU-for-kernel-module-and-k.patch (bsc#1222771). In preparation of enabling CONFIG_FIPS_SIGNATURE_SELFTEST, amend the missing &#x27;usage&#x27; argument in the pkcs7_validate_trust() invocation from the PKCS#7 selftest.</li>
<li>Refresh patches.suse/ASoC-SOF-Intel-mtl-Implement-firmware-boot-state-che.patch.</li>
<li>Remove NTFSv3 from configs (bsc#1224429) References: bsc#1224429 comment#3 We only support fuse version of the NTFS-3g driver. Disable NTFSv3 from all configs. This was enabled in d016c04d731 ("Bump to 6.4 kernel (jsc#PED-4593)")</li>
<li>Rename patches.suse/Workaround-broken-chacha-crypto-fallback.patch to patches.suse/powerpc-crypto-chacha-p10-Fix-failure-on-non-Power10.patch.</li>
<li>Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default" (stable-fixes).</li>
<li>Revert "ASoC: SOF: Intel: hda-dai-ops: only allocate/release streams for first CPU DAI" (stable-fixes).</li>
<li>Revert "ASoC: SOF: Intel: hda-dai-ops: reset device count for SoundWire DAIs" (stable-fixes).</li>
<li>Revert "PCI/MSI: Provide IMS (Interrupt Message Store) support" (git-fixes).</li>
<li>Revert "PCI/MSI: Provide pci_ims_alloc/free_irq()" (git-fixes).</li>
<li>Revert "PCI/MSI: Provide stubs for IMS functions" (git-fixes).</li>
<li>Revert "cifs: reconnect work should have reference on server struct" (git-fixes, bsc#1225172).</li>
<li>Revert "drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()" (stable-fixes).</li>
<li>Revert "drm/amd/display: Fix sending VSC (+ colorimetry) packets for DP/eDP displays without PSR" (stable-fixes).</li>
<li>Revert "drm/amdkfd: fix gfx_target_version for certain 11.0.3 devices" (stable-fixes).</li>
<li>Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes).</li>
<li>Revert "drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor()" (stable-fixes).</li>
<li>Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes).</li>
<li>Revert "iommu/amd: Enable PCI/IMS" (git-fixes).</li>
<li>Revert "iommu/vt-d: Enable PCI/IMS" (git-fixes).</li>
<li>Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (git-fixes).</li>
<li>Revert "net/mlx5e: Check the number of elements before walk TC rhashtable" (git-fixes).</li>
<li>Revert "selinux: introduce an initial SID for early boot processes" (bsc#1208593) It caused a regression on ALP-current branch, kernel-obs-qa build failed.</li>
<li>Revert "usb: cdc-wdm: close race between read and workqueue" (git-fixes).</li>
<li>Revert "usb: phy: generic: Get the vbus supply" (git-fixes).</li>
<li>SEV: disable SEV-ES DebugSwap by default (git-fixes).</li>
<li>SUNRPC: fix a memleak in gss_import_v2_context (git-fixes).</li>
<li>SUNRPC: fix some memleaks in gssx_dec_option_array (git-fixes).</li>
<li>USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).</li>
<li>USB: core: Add hub_get() and hub_put() routines (stable-fixes).</li>
<li>USB: core: Fix access violation during port device removal (git-fixes).</li>
<li>USB: core: Fix deadlock in port "disable" sysfs attribute (stable-fixes).</li>
<li>USB: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).</li>
<li>USB: serial: add device ID for VeriFone adapter (stable-fixes).</li>
<li>USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).</li>
<li>USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).</li>
<li>USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).</li>
<li>USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).</li>
<li>USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).</li>
<li>USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).</li>
<li>USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).</li>
<li>USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).</li>
<li>USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).</li>
<li>USB: serial: option: support Quectel EM060K sub-models (stable-fixes).</li>
<li>Update patches.suse/Bluetooth-hci_sync-Don-t-double-print-name-in-add-re.patch (bsc#1216358). Added bugzilla reference</li>
<li>Update patches.suse/nvme-ensure-disabling-pairs-with-unquiesce.patch (jsc#PED-6252 jsc#PED-5728 jsc#PED-5062 jsc#PED-3535 bsc#1224534).</li>
<li>Update ath11k suspend patches from the latest subsystem tree (bsc#1207948).</li>
<li>Update config files. Disable N_GSM (jsc#PED-8240).</li>
<li>Update patches.suse/gpio-tegra186-Fix-tegra186_gpio_is_accessible-check.patch (git-fixes bsc#1223439)</li>
<li>Update patches.suse/powerpc-pseries-vas-Hold-mmap_mutex-after-mmap-lock-.patch (bsc#1012628 jsc#PED-542 git-fixes bsc#1213573 ltc#203238).</li>
<li>Update patches.suse/scsi-qedf-Don-t-process-stag-work-during-unload.patch (bsc#1214852)</li>
<li>Update patches.suse/scsi-qedf-Wait-for-stag-work-during-unload.patch (bsc#1214852)</li>
<li>VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).</li>
<li>VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).</li>
<li>Workaround broken chacha crypto fallback (bsc#1218205).</li>
<li>accel/ivpu: Fix deadlock in context_xa (git-fixes).</li>
<li>admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).</li>
<li>ahci: asm1064: asm1166: do not limit reported ports (git-fixes).</li>
<li>ahci: asm1064: correct count of reported ports (stable-fixes).</li>
<li>amd/amdkfd: sync all devices to wait all processes being evicted (stable-fixes).</li>
<li>amdkfd: use calloc instead of kzalloc to avoid integer overflow (stable-fixes).</li>
<li>arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H (git-fixes).</li>
<li>arm64/ptrace: Use saved floating point state type to determine SVE (git-fixes)</li>
<li>arm64/sve: Lower the maximum allocation for the SVE ptrace regset (git-fixes)</li>
<li>arm64: Add the arm64.no32bit_el0 command line option (jsc#PED-3184). Please note that some adjustments were needed since the upstream commit is based on kernel 6.9 which has idreg-override.c moved under arch/arm64/kernel/pi/.</li>
<li>arm64: bpf: fix 32bit unconditional bswap (git-fixes).</li>
<li>arm64: dts: Fix dtc interrupt_provider warnings (git-fixes)</li>
<li>arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes)</li>
<li>arm64: dts: allwinner: h616: Fix I2C0 pins (git-fixes)</li>
<li>arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)</li>
<li>arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)</li>
<li>arm64: dts: imx8-ss-conn: fix usb lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)</li>
<li>arm64: dts: imx8-ss-dma: fix adc lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-dma: fix can lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-dma: fix spi lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-lsio: fix pwm lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8qm-ss-dma: fix can lpcg indices (git-fixes)</li>
<li>arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)</li>
<li>arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)</li>
<li>arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-fixes)</li>
<li>arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-fixes)</li>
<li>arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)</li>
<li>arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)</li>
<li>arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)</li>
<li>arm64: dts: rockchip: regulator for sd needs to be always on for (git-fixes)</li>
<li>arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f (git-fixes)</li>
<li>arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).</li>
<li>arm64: tegra: Correct Tegra132 I2C alias (git-fixes)</li>
<li>arm64: tegra: Set the correct PHY mode for MGBE (git-fixes)</li>
<li>arm_pmu: acpi: Add a representative platform device for TRBE (bsc#1220587)</li>
<li>arm_pmu: acpi: Refactor arm_spe_acpi_register_device() (bsc#1220587)</li>
<li>asm-generic: make sparse happy with odd-sized put_unaligned_*() (stable-fixes).</li>
<li>ata: libata-core: Allow command duration limits detection for ACS-4 drives (git-fixes).</li>
<li>ata: pata_legacy: make legacy_exit() work again (git-fixes).</li>
<li>ata: sata_gemini: Check clk_enable() result (stable-fixes).</li>
<li>ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-fixes).</li>
<li>ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).</li>
<li>autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).</li>
<li>ax25: Fix netdev refcount issue (git-fixes).</li>
<li>ax25: Fix reference count leak issue of net_device (git-fixes).</li>
<li>ax25: Fix reference count leak issues of ax25_dev (git-fixes).</li>
<li>ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).</li>
<li>batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).</li>
<li>bitops: add missing prototype check (git-fixes).</li>
<li>blacklist.conf: workqueues: system-wide nr_active enforcement patchset;   not worth the risk (bsc#1225580)</li>
<li>blk-cgroup: fix list corruption from reorder of WRITE ->lqueued (bsc#1225605).</li>
<li>blk-cgroup: fix list corruption from resetting io stat (bsc#1225605).</li>
<li>block: fix q->blkg_list corruption during disk rebind (bsc#1223591).</li>
<li>bnx2x: Fix firmware version string character counts (git-fixes).</li>
<li>bnxt_en: Fix error recovery for RoCE ulp client (git-fixes).</li>
<li>bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() (git-fixes).</li>
<li>bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).</li>
<li>bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)</li>
<li>bootconfig: Fix the kerneldoc of _xbc_exit() (git-fixes).</li>
<li>bootconfig: use memblock_free_late to free xbc memory to buddy (git-fixes).</li>
<li>bootmem: use kmemleak_free_part_phys in free_bootmem_page (git-fixes).</li>
<li>bootmem: use kmemleak_free_part_phys in put_page_bootmem (git-fixes).</li>
<li>bpf, arm64: Fix incorrect runtime stats (git-fixes)</li>
<li>bpf, arm64: fix bug in BPF_LDX_MEMSX (git-fixes)</li>
<li>bpf, scripts: Correct GPL license name (git-fixes).</li>
<li>bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).</li>
<li>bpf: fix precision backtracking instruction iteration (bsc#1225756).</li>
<li>bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).</li>
<li>btrfs: add a helper to read the superblock metadata_uuid (git-fixes)</li>
<li>btrfs: add and use helper to check if block group is used (bsc#1220120).</li>
<li>btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)</li>
<li>btrfs: add new unused block groups to the list of unused block groups (bsc#1220120).</li>
<li>btrfs: allow to run delayed refs by bytes to be released instead of count (bsc#1220120).</li>
<li>btrfs: always clear PERTRANS metadata during commit (git-fixes)</li>
<li>btrfs: always print transaction aborted messages with an error level (git-fixes)</li>
<li>btrfs: always reserve space for delayed refs when starting transaction (bsc#1220120).</li>
<li>btrfs: assert correct lock is held at btrfs_select_ref_head() (bsc#1220120).</li>
<li>btrfs: assert delayed node locked when removing delayed item (git-fixes)</li>
<li>btrfs: avoid start and commit empty transaction when flushing qgroups (bsc#1220120).</li>
<li>btrfs: avoid start and commit empty transaction when starting qgroup rescan (bsc#1220120).</li>
<li>btrfs: avoid starting and committing empty transaction when flushing space (bsc#1220120).</li>
<li>btrfs: avoid starting new transaction when flushing delayed items and refs (bsc#1220120).</li>
<li>btrfs: check for BTRFS_FS_ERROR in pending ordered assert (git-fixes)</li>
<li>btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super (git-fixes)</li>
<li>btrfs: defrag: avoid unnecessary defrag caused by incorrect extent size (git-fixes)</li>
<li>btrfs: defrag: reject unknown flags of btrfs_ioctl_defrag_range_args (git-fixes)</li>
<li>btrfs: do not allow non subvolume root targets for snapshot (git-fixes)</li>
<li>btrfs: do not arbitrarily slow down delalloc if we&#x27;re committing (git-fixes)</li>
<li>btrfs: do not delete unused block group if it may be used soon (bsc#1220120).</li>
<li>btrfs: do not refill whole delayed refs block reserve when starting transaction (bsc#1220120).</li>
<li>btrfs: do not start transaction when joining with TRANS_JOIN_NOSTART (git-fixes)</li>
<li>btrfs: do not steal space from global rsv after a transaction abort (bsc#1220120).</li>
<li>btrfs: do not warn if discard range is not aligned to sector (git-fixes)</li>
<li>btrfs: ensure fiemap does not race with writes when FIEMAP_FLAG_SYNC is given (bsc#1223285).</li>
<li>btrfs: error out when COWing block using a stale transaction (git-fixes)</li>
<li>btrfs: error out when reallocating block for defrag using a stale transaction (git-fixes)</li>
<li>btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)</li>
<li>btrfs: fail priority metadata ticket with real fs error (bsc#1220120).</li>
<li>btrfs: file_remove_privs needs an exclusive lock in direct io write (git-fixes)</li>
<li>btrfs: fix 64bit compat send ioctl arguments not initializing version member (git-fixes)</li>
<li>btrfs: fix deadlock with fiemap and extent locking (bsc#1223285).</li>
<li>btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)</li>
<li>btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send() (git-fixes)</li>
<li>btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)</li>
<li>btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)</li>
<li>btrfs: fix off-by-one when checking chunk map includes logical address (git-fixes)</li>
<li>btrfs: fix race between ordered extent completion and fiemap (bsc#1223285).</li>
<li>btrfs: fix race when detecting delalloc ranges during fiemap (bsc#1223285).</li>
<li>btrfs: fix race when refilling delayed refs block reserve (git-fixes)</li>
<li>btrfs: fix start transaction qgroup rsv double free (git-fixes)</li>
<li>btrfs: fix stripe length calculation for non-zoned data chunk allocation (bsc#1217489).</li>
<li>btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range() (git-fixes) Dropped hunk in selftests (test_case_7), 92e1229b204d6.</li>
<li>btrfs: free qgroup rsv on io failure (git-fixes)</li>
<li>btrfs: free the allocated memory if btrfs_alloc_page_array() fails (git-fixes)</li>
<li>btrfs: get rid of label and goto at insert_delayed_ref() (bsc#1220120).</li>
<li>btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)</li>
<li>btrfs: handle errors properly in update_inline_extent_backref() (git-fixes)</li>
<li>btrfs: initialize key where it&#x27;s used when running delayed data ref (bsc#1220120).</li>
<li>btrfs: log message if extent item not found when running delayed extent op (bsc#1220120).</li>
<li>btrfs: make btrfs_cleanup_fs_roots() static (bsc#1220120).</li>
<li>btrfs: make btrfs_destroy_delayed_refs() return void (bsc#1220120).</li>
<li>btrfs: make btrfs_destroy_marked_extents() return void (bsc#1220120).</li>
<li>btrfs: make btrfs_destroy_pinned_extent() return void (bsc#1220120).</li>
<li>btrfs: make error messages more clear when getting a chunk map (git-fixes)</li>
<li>btrfs: make find_first_extent_bit() return a boolean (bsc#1220120).</li>
<li>btrfs: make find_free_dev_extent() static (bsc#1220120).</li>
<li>btrfs: make insert_delayed_ref() return a bool instead of an int (bsc#1220120).</li>
<li>btrfs: merge find_free_dev_extent() and find_free_dev_extent_start() (bsc#1220120).</li>
<li>btrfs: move btrfs_free_excluded_extents() into block-group.c (bsc#1220120).</li>
<li>btrfs: open code trivial btrfs_add_excluded_extent() (bsc#1220120).</li>
<li>btrfs: output extra debug info if we failed to find an inline backref (git-fixes)</li>
<li>btrfs: pass a space_info argument to btrfs_reserve_metadata_bytes() (bsc#1220120).</li>
<li>btrfs: prevent transaction block reserve underflow when starting transaction (git-fixes)</li>
<li>btrfs: print available space across all block groups when dumping space info (bsc#1220120).</li>
<li>btrfs: print available space for a block group when dumping a space info (bsc#1220120).</li>
<li>btrfs: print block group super and delalloc bytes when dumping space info (bsc#1220120).</li>
<li>btrfs: print target number of bytes when dumping free space (bsc#1220120).</li>
<li>btrfs: qgroup: always free reserved space for extent records (bsc#1216196).</li>
<li>btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans (git-fixes)</li>
<li>btrfs: record delayed inode root in transaction (git-fixes)</li>
<li>btrfs: reject encoded write if inode has nodatasum flag set (git-fixes)</li>
<li>btrfs: release path before inode lookup during the ino lookup ioctl (git-fixes)</li>
<li>btrfs: remove pointless &#x27;ref_root&#x27; variable from run_delayed_data_ref() (bsc#1220120).</li>
<li>btrfs: remove pointless in_tree field from struct btrfs_delayed_ref_node (bsc#1220120).</li>
<li>btrfs: remove pointless initialization at btrfs_delayed_refs_rsv_release() (bsc#1220120).</li>
<li>btrfs: remove redundant BUG_ON() from __btrfs_inc_extent_ref() (bsc#1220120).</li>
<li>btrfs: remove refs_to_add argument from __btrfs_inc_extent_ref() (bsc#1220120).</li>
<li>btrfs: remove refs_to_drop argument from __btrfs_free_extent() (bsc#1220120).</li>
<li>btrfs: remove the refcount warning/check at btrfs_put_delayed_ref() (bsc#1220120).</li>
<li>btrfs: remove unnecessary logic when running new delayed references (bsc#1220120).</li>
<li>btrfs: remove unnecessary prototype declarations at disk-io.c (bsc#1220120).</li>
<li>btrfs: remove unused is_head field from struct btrfs_delayed_ref_node (bsc#1220120).</li>
<li>btrfs: rename add_new_free_space() to btrfs_add_new_free_space() (bsc#1220120).</li>
<li>btrfs: reorder some members of struct btrfs_delayed_ref_head (bsc#1220120).</li>
<li>btrfs: reserve space for delayed refs on a per ref basis (bsc#1220120).</li>
<li>btrfs: reset destination buffer when read_extent_buffer() gets invalid range (git-fixes)</li>
<li>btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1 (git-fixes)</li>
<li>btrfs: return -EUCLEAN if extent item is missing when searching inline backref (bsc#1220120).</li>
<li>btrfs: return real error when orphan cleanup fails due to a transaction abort (bsc#1220120).</li>
<li>btrfs: send: do not issue unnecessary zero writes for trailing hole (bsc#1222459).</li>
<li>btrfs: send: ensure send_fd is writable (git-fixes)</li>
<li>btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)</li>
<li>btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)</li>
<li>btrfs: set page extent mapped after read_folio in relocate_one_page (git-fixes)</li>
<li>btrfs: simplify check for extent item overrun at lookup_inline_extent_backref() (bsc#1220120).</li>
<li>btrfs: stop doing excessive space reservation for csum deletion (bsc#1220120).</li>
<li>btrfs: store the error that turned the fs into error state (bsc#1220120).</li>
<li>btrfs: sysfs: validate scrub_speed_max value (git-fixes)</li>
<li>btrfs: tree-checker: fix inline ref size in error messages (git-fixes)</li>
<li>btrfs: update comment for btrfs_join_transaction_nostart() (bsc#1220120).</li>
<li>btrfs: update documentation for add_new_free_space() (bsc#1220120).</li>
<li>btrfs: use a bool to track qgroup record insertion when adding ref head (bsc#1220120).</li>
<li>btrfs: use a single switch statement when initializing delayed ref head (bsc#1220120).</li>
<li>btrfs: use a single variable for return value at lookup_inline_extent_backref() (bsc#1220120).</li>
<li>btrfs: use a single variable for return value at run_delayed_extent_op() (bsc#1220120).</li>
<li>btrfs: use bool type for delayed ref head fields that are used as booleans (bsc#1220120).</li>
<li>btrfs: use the correct superblock to compare fsid in btrfs_validate_super (git-fixes)</li>
<li>btrfs: use u64 for buffer sizes in the tree search ioctls (git-fixes)</li>
<li>btrfs: zoned: do not skip block groups with 100% zone unusable (bsc#1220120).</li>
<li>bus: mhi: ep: check the correct variable in mhi_ep_register_controller() (git-fixes).</li>
<li>ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE (bsc#1224866).</li>
<li>ceph: stop copying to iter at EOF on sync reads (bsc#1222606).</li>
<li>certs: Add ECDSA signature verification self-test (bsc#1222777).</li>
<li>certs: Move RSA self-test data to separate file (bsc#1222777).</li>
<li>cifs: Do not use certain unnecessary folio_*() functions (bsc#1225172).</li>
<li>cifs: account for primary channel in the interface list (bsc#1225172).</li>
<li>cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1225172).</li>
<li>cifs: distribute channels across interfaces based on speed (bsc#1225172).</li>
<li>cifs: do not pass cifs_sb when trying to add channels (bsc#1225172).</li>
<li>cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1225172).</li>
<li>cifs: fix charset issue in reconnection (bsc#1225172).</li>
<li>cifs: fix leak of iface for primary channel (git-fixes, bsc#1225172).</li>
<li>cifs: handle cases where a channel is closed (bsc#1225172).</li>
<li>cifs: handle cases where multiple sessions share connection (bsc#1225172).</li>
<li>cifs: reconnect work should have reference on server struct (bsc#1225172).</li>
<li>clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).</li>
<li>clk: Get runtime PM before walking tree during disable_unused (git-fixes).</li>
<li>clk: Get runtime PM before walking tree for clk_summary (git-fixes).</li>
<li>clk: Initialize struct clk_core kref earlier (stable-fixes).</li>
<li>clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).</li>
<li>clk: Show active consumers of clocks in debugfs (stable-fixes).</li>
<li>clk: mediatek: Do a runtime PM get on controllers during probe (git-fixes).</li>
<li>clk: mediatek: mt8365-mm: fix DPI0 parent (git-fixes).</li>
<li>clk: mediatek: pllfh: Do not log error for missing fhctl node (git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: fix rate setting for Stromer PLLs (git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: remove invalid Stromer register offset (git-fixes).</li>
<li>clk: qcom: dispcc-sm6350: fix DisplayPort clocks (git-fixes).</li>
<li>clk: qcom: dispcc-sm8450: fix DisplayPort clocks (git-fixes).</li>
<li>clk: qcom: dispcc-sm8550: fix DisplayPort clocks (git-fixes).</li>
<li>clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).</li>
<li>clk: qcom: reset: Commonize the de/assert functions (stable-fixes).</li>
<li>clk: qcom: reset: Ensure write completion on reset de/assertion (git-fixes).</li>
<li>clk: renesas: r8a779a0: Fix CANFD parent clock (git-fixes).</li>
<li>clk: renesas: r9a07g043: Add clock and reset entry for PLIC (git-fixes).</li>
<li>clk: rs9: fix wrong default value for clock amplitude (git-fixes).</li>
<li>clk: samsung: exynosautov9: fix wrong pll clock id value (git-fixes).</li>
<li>clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (git-fixes).</li>
<li>clocksource/drivers/arm_global_timer: Fix maximum prescaler value (git-fixes).</li>
<li>clocksource/drivers/imx: Fix -Wunused-but-set-variable warning (git-fixes).</li>
<li>comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).</li>
<li>coresight: trbe: Add a representative coresight_platform_data for (bsc#1220587)</li>
<li>coresight: trbe: Allocate platform data per device (bsc#1220587)</li>
<li>coresight: trbe: Enable ACPI based TRBE devices (bsc#1220587)</li>
<li>counter: linux/counter.h: fix Excess kernel-doc description warning (git-fixes).</li>
<li>cppc_cpufreq: Fix possible null pointer dereference (git-fixes).</li>
<li>cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations (git-fixes).</li>
<li>cpufreq: exit() callback is optional (git-fixes).</li>
<li>cpumask: Add for_each_cpu_from() (bsc#1225053).</li>
<li>crypto: bcm - Fix pointer arithmetic (git-fixes).</li>
<li>crypto: ccp - Add support for PCI device 0x156E (bsc#1223338).</li>
<li>crypto: ccp - Add support for PCI device 0x17E0 (bsc#1223338).</li>
<li>crypto: ccp - drop platform ifdef checks (git-fixes).</li>
<li>crypto: ecc - update ecc_gen_privkey for FIPS 186-5 (bsc#1222782).</li>
<li>crypto: ecdsa - Fix module auto-load on add-key (git-fixes).</li>
<li>crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init (git-fixes).</li>
<li>crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (git-fixes).</li>
<li>crypto: qat - fix ring to service map for dcc in 4xxx (git-fixes).</li>
<li>crypto: qat - improve error logging to be consistent across features (git-fixes).</li>
<li>crypto: qat - relocate and rename get_service_enabled() (stable-fixes).</li>
<li>crypto: qat - specify firmware files for 402xx (git-fixes).</li>
<li>crypto: rsa - add a check for allocation failure (bsc#1222775).</li>
<li>crypto: rsa - allow only odd e and restrict value in FIPS mode (bsc#1222775).</li>
<li>crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c (bsc#1222769).</li>
<li>crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).</li>
<li>crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).</li>
<li>crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).</li>
<li>cxl/acpi: Fix load failures due to single window creation failure (git-fixes).</li>
<li>cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window (git-fixes).</li>
<li>cxl/trace: Properly initialize cxl_poison region name (git-fixes).</li>
<li>dax/bus.c: replace driver-core lock usage by a local rwsem (jsc#PED-5853).</li>
<li>dax/bus.c: replace several sprintf() with sysfs_emit() (jsc#PED-5853).</li>
<li>dax: alloc_dax() return ERR_PTR(-EOPNOTSUPP) for CONFIG_DAX=n (jsc#PED-5853).</li>
<li>device-dax: make dax_bus_type const (jsc#PED-5853).</li>
<li>dlm: fix user space lkb refcounting (git-fixes).</li>
<li>dm crypt: remove redundant state settings after waking up (jsc#PED-7542).</li>
<li>dm thin: add braces around conditional code that spans lines (jsc#PED-7542).</li>
<li>dm verity: set DM_TARGET_SINGLETON feature flag (jsc#PED-7542).</li>
<li>dm-integrity: set max_integrity_segments in dm_integrity_io_hints (jsc#PED-7542).</li>
<li>dm-multipath: dont&#x27;t attempt SG_IO on non-SCSI-disks (bsc#1223575).</li>
<li>dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape (bsc#1219596) Also update diff context in patches.suse/dm-raid-fix-false-positive-for-requeue-needed-during-b25b.patch</li>
<li>dm-raid: add a new helper prepare_suspend() in md_personality (jsc#PED-7542).</li>
<li>dm-raid: really frozen sync_thread during suspend (jsc#PED-7542).</li>
<li>dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).</li>
<li>dm: update relevant MODULE_AUTHOR entries to latest dm-devel mailing list (jsc#PED-7542).</li>
<li>dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (git-fixes).</li>
<li>dma-buf: Fix NULL pointer dereference in sanitycheck() (git-fixes).</li>
<li>dma-mapping: benchmark: fix node id validation (git-fixes).</li>
<li>dma-mapping: benchmark: handle NUMA_NO_NODE correctly (git-fixes).</li>
<li>dma: xilinx_dpdma: Fix locking (git-fixes).</li>
<li>dmaengine: axi-dmac: fix possible race in remove() (git-fixes).</li>
<li>dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).</li>
<li>dmaengine: idxd: Avoid unnecessary destruction of file_ida (git-fixes).</li>
<li>dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).</li>
<li>dmaengine: owl: fix register access functions (git-fixes).</li>
<li>dmaengine: tegra186: Fix residual calculation (git-fixes).</li>
<li>docs: Restore "smart quotes" for quotes (stable-fixes).</li>
<li>docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).</li>
<li>docs: netdev: Fix typo in Signed-off-by tag (git-fixes).</li>
<li>driver core: Introduce device_link_wait_removal() (stable-fixes).</li>
<li>drivers/nvme: Add quirks for device 126f:2262 (git-fixes).</li>
<li>drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() (stable-fixes).</li>
<li>drm/amd/display: Add dml2 copy functions (stable-fixes).</li>
<li>drm/amd/display: Allow dirty rects to be sent to dmub when abm is active (stable-fixes).</li>
<li>drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).</li>
<li>drm/amd/display: Change default size for dummy plane in DML2 (stable-fixes).</li>
<li>drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).</li>
<li>drm/amd/display: Enable colorspace property for MST connectors (git-fixes).</li>
<li>drm/amd/display: Fix bounds check for dcn35 DcfClocks (git-fixes).</li>
<li>drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).</li>
<li>drm/amd/display: Fix idle check for shared firmware state (stable-fixes).</li>
<li>drm/amd/display: Fix incorrect DSC instance for MST (stable-fixes).</li>
<li>drm/amd/display: Fix nanosec stat overflow (stable-fixes).</li>
<li>drm/amd/display: Fix noise issue on HDMI AV mute (stable-fixes).</li>
<li>drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).</li>
<li>drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).</li>
<li>drm/amd/display: Init DPPCLK from SMU on dcn32 (stable-fixes).</li>
<li>drm/amd/display: Override min required DCFCLK in dml1_validate (stable-fixes).</li>
<li>drm/amd/display: Prevent crash when disable stream (stable-fixes).</li>
<li>drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4 (stable-fixes).</li>
<li>drm/amd/display: Remove MPC rate control logic from DCN30 and above (stable-fixes).</li>
<li>drm/amd/display: Remove redundant condition in dcn35_calc_blocks_to_gate() (git-fixes).</li>
<li>drm/amd/display: Return the correct HDCP error code (stable-fixes).</li>
<li>drm/amd/display: Send DTBCLK disable message on first commit (git-fixes).</li>
<li>drm/amd/display: Set DCN351 BB and IP the same as DCN35 (stable-fixes).</li>
<li>drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST (stable-fixes).</li>
<li>drm/amd/display: Update odm when ODM combine is changed on an otg master pipe with no plane (stable-fixes).</li>
<li>drm/amd/display: Use freesync when <code>DRM_EDID_FEATURE_CONTINUOUS_FREQ</code> found (stable-fixes).</li>
<li>drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).</li>
<li>drm/amd/display: fix input states translation error for dcn35 & dcn351 (stable-fixes).</li>
<li>drm/amd/display: handle range offsets in VRR ranges (stable-fixes).</li>
<li>drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).</li>
<li>drm/amd/swsmu: modify the gfx activity scaling (stable-fixes).</li>
<li>drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).</li>
<li>drm/amdgpu/display: Address kdoc for &#x27;is_psr_su&#x27; in &#x27;fill_dc_dirty_rects&#x27; (git-fixes).</li>
<li>drm/amdgpu/pm: Check the validity of overdiver power limit (git-fixes).</li>
<li>drm/amdgpu/pm: Fix NULL pointer dereference when get power limit (git-fixes).</li>
<li>drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).</li>
<li>drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).</li>
<li>drm/amdgpu: Assign correct bits for SDMA HDP flush (stable-fixes).</li>
<li>drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-fixes).</li>
<li>drm/amdgpu: Fix VCN allocation in CPX partition (stable-fixes).</li>
<li>drm/amdgpu: Fix comparison in amdgpu_res_cpu_visible (git-fixes).</li>
<li>drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).</li>
<li>drm/amdgpu: Refine IB schedule error logging (stable-fixes).</li>
<li>drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).</li>
<li>drm/amdgpu: always force full reset for SOC21 (stable-fixes).</li>
<li>drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).</li>
<li>drm/amdgpu: drop setting buffer funcs in sdma442 (git-fixes).</li>
<li>drm/amdgpu: fix deadlock while reading mqd from debugfs (git-fixes).</li>
<li>drm/amdgpu: fix doorbell regression (git-fixes).</li>
<li>drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).</li>
<li>drm/amdgpu: fix mmhub client id out-of-bounds access (git-fixes).</li>
<li>drm/amdgpu: fix use-after-free bug (stable-fixes).</li>
<li>drm/amdgpu: fix visible VRAM handling during faults (git-fixes).</li>
<li>drm/amdgpu: implement IRQ_STATE_ENABLE for SDMA v4.4.2 (stable-fixes).</li>
<li>drm/amdgpu: make damage clips support configurable (stable-fixes).</li>
<li>drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).</li>
<li>drm/amdgpu: remove invalid resource->start check v2 (git-fixes).</li>
<li>drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).</li>
<li>drm/amdkfd: Check cgroup when returning DMABuf info (stable-fixes).</li>
<li>drm/amdkfd: Fix memory leak in create_process failure (git-fixes).</li>
<li>drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).</li>
<li>drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).</li>
<li>drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).</li>
<li>drm/amdkfd: range check cp bad op exception interrupts (stable-fixes).</li>
<li>drm/arm/malidp: fix a possible null pointer dereference (git-fixes).</li>
<li>drm/ast: Fix soft lockup (git-fixes).</li>
<li>drm/bridge: Fix improper bridge init order with pre_enable_prev_first (git-fixes).</li>
<li>drm/bridge: anx7625: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: anx7625: Update audio status while detecting (git-fixes).</li>
<li>drm/bridge: dpc3433: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: icn6211: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: lt8912b: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: lt9611: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: lt9611uxc: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: tc358775: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).</li>
<li>drm/buddy: check range allocation matches alignment (stable-fixes).</li>
<li>drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-fixes).</li>
<li>drm/connector: Add \n to message about demoting connector force-probes (git-fixes).</li>
<li>drm/display: fix typo (git-fixes).</li>
<li>drm/exynos: do not return negative values from .get_modes() (stable-fixes).</li>
<li>drm/fbdev-generic: Do not set physical framebuffer address (git-fixes).</li>
<li>drm/gma500: Remove lid code (git-fixes).</li>
<li>drm/i915/audio: Fix audio time stamp programming for DP (stable-fixes).</li>
<li>drm/i915/bios: Fix parsing backlight BDB data (git-fixes).</li>
<li>drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).</li>
<li>drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).</li>
<li>drm/i915/display: Use i915_gem_object_get_dma_address to get dma address (stable-fixes).</li>
<li>drm/i915/dp: Fix the computation for compressed_bpp for DISPLAY &lt; 13 (git-fixes).</li>
<li>drm/i915/dp: Remove support for UHBR13.5 (git-fixes).</li>
<li>drm/i915/dpt: Make DPT object unshrinkable (git-fixes).</li>
<li>drm/i915/dsb: Fix DSB vblank waits when using VRR (git-fixes).</li>
<li>drm/i915/dsi: Go back to the previous INIT_OTP/DISPLAY_ON order, mostly (git-fixes).</li>
<li>drm/i915/gt: Automate CCS Mode setting during engine resets (git-fixes).</li>
<li>drm/i915/gt: Disable HW load balancing for CCS (git-fixes).</li>
<li>drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes).</li>
<li>drm/i915/gt: Do not generate the command streamer for all the CCS (git-fixes).</li>
<li>drm/i915/gt: Enable only one CCS for compute workload (git-fixes).</li>
<li>drm/i915/gt: Fix CCS id&#x27;s calculation for CCS mode setting (git-fixes).</li>
<li>drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).</li>
<li>drm/i915/guc: avoid FIELD_PREP warning (git-fixes).</li>
<li>drm/i915/hwmon: Fix locking inversion in sysfs getter (git-fixes).</li>
<li>drm/i915/lspcon: Separate function to set expected mode (bsc#1193599).</li>
<li>drm/i915/lspcon: Separate lspcon probe and lspcon init (bsc#1193599).</li>
<li>drm/i915/mst: Limit MST+DSC to TGL+ (git-fixes).</li>
<li>drm/i915/mst: Reject FEC+MST on ICL (git-fixes).</li>
<li>drm/i915/mtl: Update workaround 14018575942 (git-fixes).</li>
<li>drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).</li>
<li>drm/i915/vrr: Generate VRR "safe window" for DSB (git-fixes).</li>
<li>drm/i915: Disable port sync when bigjoiner is used (stable-fixes).</li>
<li>drm/i915: Do not match JSL in ehl_combo_pll_div_frac_wa_needed() (git-fixes).</li>
<li>drm/i915: Fix audio component initialization (git-fixes).</li>
<li>drm/i915: Include the PLL name in the debug messages (stable-fixes).</li>
<li>drm/i915: Pre-populate the cursor physical dma address (git-fixes).</li>
<li>drm/i915: Replace a memset() with zero initialization (stable-fixes).</li>
<li>drm/i915: Stop printing pipe name as hex (stable-fixes).</li>
<li>drm/i915: Suppress old PLL pipe_mask checks for MG/TC/TBT PLLs (stable-fixes).</li>
<li>drm/i915: Try to preserve the current shared_dpll for fastset on type-c ports (stable-fixes).</li>
<li>drm/i915: Use named initializers for DPLL info (stable-fixes).</li>
<li>drm/imx/ipuv3: do not return negative values from .get_modes() (stable-fixes).</li>
<li>drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).</li>
<li>drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).</li>
<li>drm/mediatek: Init <code>ddp_comp</code> with devm_kcalloc() (git-fixes).</li>
<li>drm/mediatek: dp: Fix mtk_dp_aux_transfer return value (git-fixes).</li>
<li>drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).</li>
<li>drm/meson: dw-hdmi: power up phy on device init (git-fixes).</li>
<li>drm/meson: gate px_clk when setting rate (git-fixes).</li>
<li>drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).</li>
<li>drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git-fixes).</li>
<li>drm/msm/adreno: fix CP cycles stat retrieval on a7xx (git-fixes).</li>
<li>drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git-fixes).</li>
<li>drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).</li>
<li>drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).</li>
<li>drm/msm/dpu: Add callback function pointer check before its call (git-fixes).</li>
<li>drm/msm/dpu: Allow configuring multiple active DSC blocks (git-fixes).</li>
<li>drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).</li>
<li>drm/msm/dpu: do not allow overriding data from catalog (git-fixes).</li>
<li>drm/msm/dpu: make error messages at dpu_core_irq_register_callback() more sensible (git-fixes).</li>
<li>drm/msm/dpu: use devres-managed allocation for MDP TOP (stable-fixes).</li>
<li>drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).</li>
<li>drm/msm: Add newlines to some debug prints (git-fixes).</li>
<li>drm/nouveau/disp: Fix missing backlight control on Macbook 5, 1 (bsc#1223838).</li>
<li>drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).</li>
<li>drm/nouveau/dp: Fix incorrect return code in r535_dp_aux_xfer() (git-fixes).</li>
<li>drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (stable-fixes).</li>
<li>drm/nouveau: use tile_mode and pte_kind for VM_BIND bo allocations (git-fixes).</li>
<li>drm/omapdrm: Fix console by implementing fb_dirty (git-fixes).</li>
<li>drm/panel: do not return negative error codes from drm_panel_get_modes() (stable-fixes).</li>
<li>drm/panel: ili9341: Respect deferred probe (git-fixes).</li>
<li>drm/panel: ili9341: Use predefined error codes (git-fixes).</li>
<li>drm/panel: ltk050h3146w: add MIPI_DSI_MODE_VIDEO to LTK050H3148W flags (git-fixes).</li>
<li>drm/panel: ltk050h3146w: drop duplicate commands from LTK050H3148W init (git-fixes).</li>
<li>drm/panel: novatek-nt35950: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).</li>
<li>drm/panel: sitronix-st7789v: fix display size for jt240mhqs_hwt_ek_e3 panel (git-fixes).</li>
<li>drm/panel: sitronix-st7789v: fix timing for jt240mhqs_hwt_ek_e3 panel (git-fixes).</li>
<li>drm/panel: sitronix-st7789v: tweak timing for jt240mhqs_hwt_ek_e3 panel (git-fixes).</li>
<li>drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).</li>
<li>drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() (git-fixes).</li>
<li>drm/panfrost: fix power transition timeout warnings (git-fixes).</li>
<li>drm/prime: Unbreak virtgpu dma-buf export (git-fixes).</li>
<li>drm/probe-helper: warn about negative .get_modes() (stable-fixes).</li>
<li>drm/qxl: remove unused <code>count</code> variable from <code>qxl_surface_id_alloc()</code> (git-fixes).</li>
<li>drm/qxl: remove unused variable from <code>qxl_process_single_command()</code> (git-fixes).</li>
<li>drm/radeon: make -fstrict-flex-arrays=3 happy (git-fixes).</li>
<li>drm/radeon: silence UBSAN warning (v3) (stable-fixes).</li>
<li>drm/rockchip: vop2: Do not divide height twice for YUV (git-fixes).</li>
<li>drm/rockchip: vop2: Remove AR30 and AB30 format support (git-fixes).</li>
<li>drm/sched: fix null-ptr-deref in init entity (git-fixes).</li>
<li>drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (git-fixes).</li>
<li>drm/ttm: return ENOSPC from ttm_bo_mem_space v3 (stable-fixes).</li>
<li>drm/ttm: stop pooling cached NUMA pages v2 (git-fixes).</li>
<li>drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).</li>
<li>drm/vc4: hdmi: do not return negative values from .get_modes() (stable-fixes).</li>
<li>drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-fixes).</li>
<li>drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).</li>
<li>drm/vmwgfx: Fix Legacy Display Unit (git-fixes).</li>
<li>drm/vmwgfx: Fix crtc&#x27;s atomic check conditional (git-fixes).</li>
<li>drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).</li>
<li>drm/vmwgfx: Fix prime import/export (git-fixes).</li>
<li>drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).</li>
<li>drm: Check output polling initialized before disabling (stable-fixes).</li>
<li>drm: Check polling initialized before enabling in drm_helper_probe_single_connector_modes (stable-fixes).</li>
<li>drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).</li>
<li>drm: add drm_gem_object_is_shared_for_memory_stats() helper (stable-fixes).</li>
<li>drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).</li>
<li>drm: nv04: Fix out of bounds access (git-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).</li>
<li>drm: vc4: Fix possible null pointer dereference (git-fixes).</li>
<li>drm: zynqmp_dpsub: Always register bridge (git-fixes).</li>
<li>dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)</li>
<li>dump_stack: Do not get cpu_sync for panic CPU (bsc#1225607).</li>
<li>dyndbg: fix old BUG_ON in >control parser (stable-fixes).</li>
<li>e1000e: Minor flow correction in e1000_shutdown function (git-fixes).</li>
<li>e1000e: Workaround for sporadic MDI error on Meteor Lake systems (git-fixes).</li>
<li>e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue (git-fixes).</li>
<li>ecryptfs: Fix buffer size for tag 66 packet (git-fixes)</li>
<li>ecryptfs: Reject casefold directory inodes (git-fixes)</li>
<li>efi/unaccepted: do not let /proc/vmcore try to access unaccepted memory (git-fixes).</li>
<li>efi/unaccepted: touch soft lockup during memory accept (git-fixes).</li>
<li>efi: disable mirror feature during crashkernel (stable-fixes).</li>
<li>efi: fix panic in kdump kernel (git-fixes).</li>
<li>efi: libstub: only free priv.runtime_map when allocated (git-fixes).</li>
<li>extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).</li>
<li>fast_dput(): handle underflows gracefully (git-fixes)</li>
<li>fat: fix uninitialized field in nostale filehandles (git-fixes)</li>
<li>fbdev: fix incorrect address computation in deferred IO (git-fixes).</li>
<li>fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).</li>
<li>fbdev: sh7760fb: allow modular build (git-fixes).</li>
<li>fbdev: shmobile: fix snprintf truncation (git-fixes).</li>
<li>fbdev: sisfb: hide unused variables (git-fixes).</li>
<li>fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).</li>
<li>fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).</li>
<li>firewire: core: use long bus reset on gap count error (stable-fixes).</li>
<li>firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).</li>
<li>firmware: arm_scmi: Make raw debugfs entries non-seekable (git-fixes).</li>
<li>firmware: dmi-id: add a release callback function (git-fixes).</li>
<li>firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).</li>
<li>firmware: tegra: bpmp: Return directly after a failed kzalloc() in get_filename() (stable-fixes).</li>
<li>fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes)</li>
<li>fs/9p: translate O_TRUNC into OTRUNC (git-fixes)</li>
<li>fs: Fix error checking for d_hash_and_lookup() (git-fixes)</li>
<li>fs: indicate request originates from old mount API (git-fixes)</li>
<li>fs: relax mount_setattr() permission checks (git-fixes)</li>
<li>fsverity: skip PKCS#7 parser when keyring is empty (git-fixes)</li>
<li>ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes).</li>
<li>fuse: do not unhash root (bsc#1223946).</li>
<li>fuse: fix root lookup with nonzero generation (bsc#1223945).</li>
<li>geneve: fix header validation in geneve[6]_xmit_skb (git-fixes).</li>
<li>geneve: make sure to pull inner header in geneve_rx() (git-fixes).</li>
<li>gpio: cdev: check for NULL labels when sanitizing them for irqs (git-fixes).</li>
<li>gpio: cdev: fix missed label sanitizing in debounce_setup() (git-fixes).</li>
<li>gpio: cdev: sanitize the label before requesting the interrupt (stable-fixes).</li>
<li>gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).</li>
<li>gpio: tangier: Use correct type for the IRQ chip data (git-fixes).</li>
<li>gpio: tegra186: Fix tegra186_gpio_is_accessible() check (git-fixes).</li>
<li>gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).</li>
<li>gpiolib: cdev: fix uninitialised kfifo (git-fixes).</li>
<li>gpiolib: cdev: relocate debounce_period_us from struct gpio_desc (stable-fixes).</li>
<li>gpiolib: swnode: Remove wrong header inclusion (git-fixes).</li>
<li>gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).</li>
<li>gtp: fix use-after-free and null-ptr-deref in gtp_newlink() (git-fixes).</li>
<li>hwmon: (amc6821) add of_match table (stable-fixes).</li>
<li>hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-fixes).</li>
<li>hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).</li>
<li>hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).</li>
<li>hwmon: (intel-m10-bmc-hwmon) Fix multiplier for N6000 board power sensor (git-fixes).</li>
<li>hwmon: (lm70) fix links in doc and comments (git-fixes).</li>
<li>hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).</li>
<li>hwmon: (shtc1) Fix property misspelling (git-fixes).</li>
<li>hwtracing: hisi_ptt: Move type check to the beginning of hisi_ptt_pmu_event_init() (git-fixes).</li>
<li>i2c: cadence: Avoid fifo clear after start (git-fixes).</li>
<li>i2c: pxa: hide unused icr_bits[] variable (git-fixes).</li>
<li>i2c: smbus: fix NULL function pointer dereference (git-fixes).</li>
<li>i2c: synquacer: Fix an error handling path in synquacer_i2c_probe() (git-fixes).</li>
<li>i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).</li>
<li>i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).</li>
<li>i40e: Enforce software interrupt during busy-poll exit (git-fixes).</li>
<li>i40e: Fix VF MAC filter removal (git-fixes).</li>
<li>i40e: Fix firmware version comparison function (git-fixes).</li>
<li>i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-fixes).</li>
<li>i40e: fix i40e_count_filters() to count only active/new filters (git-fixes).</li>
<li>i40e: fix vf may be used uninitialized in this function warning (git-fixes).</li>
<li>i915: make inject_virtual_interrupt() void (stable-fixes).</li>
<li>ice: Refactor FW data type and fix bitmap casting issue (git-fixes).</li>
<li>ice: fix enabling RX VLAN filtering (git-fixes).</li>
<li>ice: fix memory corruption bug with suspend and rebuild (git-fixes).</li>
<li>ice: fix stats being updated by way too large values (git-fixes).</li>
<li>ice: fix typo in assignment (git-fixes).</li>
<li>ice: fix uninitialized dplls mutex usage (git-fixes).</li>
<li>ice: reconfig host after changing MSI-X on VF (git-fixes).</li>
<li>ice: reorder disabling IRQ and NAPI in ice_qp_dis (git-fixes).</li>
<li>ice: use relative VSI index for VFs instead of PF VSI number (git-fixes).</li>
<li>ice: virtchnl: stop pretending to support RSS over AQ or registers (git-fixes).</li>
<li>ida: make &#x27;ida_dump&#x27; static (git-fixes).</li>
<li>idma64: Do not try to serve interrupts when device is powered off (git-fixes).</li>
<li>idpf: disable local BH when scheduling napi for marker packets (git-fixes).</li>
<li>idpf: extend tx watchdog timeout (bsc#1224137).</li>
<li>idpf: fix kernel panic on unknown packet types (git-fixes).</li>
<li>igb: Fix missing time sync events (git-fixes).</li>
<li>igb: extend PTP timestamp adjustments to i211 (git-fixes).</li>
<li>igc: Fix missing time sync events (git-fixes).</li>
<li>igc: Remove stale comment about Tx timestamping (git-fixes).</li>
<li>igc: avoid returning frame twice in XDP_REDIRECT (git-fixes).</li>
<li>iio: accel: mxc4005: Interrupt handling fixes (git-fixes).</li>
<li>iio: adc: stm32: Fixing err code to not indicate success (git-fixes).</li>
<li>iio: core: Leave private pointer NULL when no private data supplied (git-fixes).</li>
<li>iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).</li>
<li>iio: gts-helper: Fix division loop (git-fixes).</li>
<li>iio: pressure: Fixes BME280 SPI driver data (git-fixes).</li>
<li>iio: pressure: dps310: support negative temperature values (git-fixes).</li>
<li>iio:imu: adis16475: Fix sync mode setting (git-fixes).</li>
<li>inet: frags: eliminate kernel-doc warning (git-fixes).</li>
<li>inet_diag: annotate data-races around inet_diag_table[] (git-fixes).</li>
<li>init/main.c: Fix potential static_command_line memory overflow (git-fixes).</li>
<li>init: open /initrd.image with O_LARGEFILE (stable-fixes).</li>
<li>input/touchscreen: imagis: Correct the maximum touch area value (stable-fixes).</li>
<li>intel: legacy: Partial revert of field get conversion (git-fixes).</li>
<li>interconnect: qcom: osm-l3: Replace custom implementation of COUNT_ARGS() (git-fixes).</li>
<li>interconnect: qcom: qcm2290: Fix mas_snoc_bimc QoS port assignment (git-fixes).</li>
<li>interconnect: qcom: sc8180x: Mark CO0 BCM keepalive (git-fixes).</li>
<li>interconnect: qcom: sm8550: Enable sync_state (git-fixes).</li>
<li>io_uring: kabi cookie remove (bsc#1217384).</li>
<li>iomap: clear the per-folio dirty bits on all writeback failures (git-fixes)</li>
<li>iommu/arm-smmu-v3: Check that the RID domain is S1 in SVA (git-fixes).</li>
<li>iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)</li>
<li>iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).</li>
<li>iommu/vt-d: Allocate local memory for page request queue (git-fixes).</li>
<li>iommu/vt-d: Fix wrong use of pasid config (git-fixes).</li>
<li>iommu/vt-d: Set SSADE when attaching to a parent with dirty tracking (git-fixes).</li>
<li>iommu: Map reserved memory as cacheable if device is coherent (git-fixes).</li>
<li>iommufd/iova_bitmap: Bounds check mapped::pages access (git-fixes).</li>
<li>iommufd/iova_bitmap: Consider page offset for the pages to be pinned (git-fixes).</li>
<li>iommufd/iova_bitmap: Switch iova_bitmap::bitmap to an u8 array (git-fixes).</li>
<li>iommufd: Add missing IOMMUFD_DRIVER kconfig for the selftest (git-fixes).</li>
<li>iommufd: Fix iopt_access_list_id overwrite bug (git-fixes).</li>
<li>iommufd: Reject non-zero data_type if no data_len is provided (git-fixes).</li>
<li>ionic: set adminq irq affinity (git-fixes).</li>
<li>ipv4: annotate data-races around fi->fib_dead (git-fixes).</li>
<li>irqchip/alpine-msi: Fix off-by-one in allocation error path (git-fixes).</li>
<li>irqchip/armada-370-xp: Suppress unused-function warning (git-fixes).</li>
<li>irqchip/gic-v3-its: Do not assume vPE tables are preallocated (git-fixes).</li>
<li>irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-fixes).</li>
<li>irqchip/gic-v3-its: Prevent double free on error (git-fixes).</li>
<li>irqchip/loongson-pch-msi: Fix off-by-one on allocation error path (git-fixes).</li>
<li>irqchip/mbigen: Do not use bus_get_dev_root() to find the parent (git-fixes).</li>
<li>irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on register&#x27;s index (stable-fixes).</li>
<li>irqchip/renesas-rzg2l: Flush posted write in irq_eoi() (git-fixes).</li>
<li>irqchip/renesas-rzg2l: Implement restriction when writing ISCR register (stable-fixes).</li>
<li>irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type (git-fixes).</li>
<li>irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() (stable-fixes).</li>
<li>irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() (stable-fixes).</li>
<li>ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).</li>
<li>ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).</li>
<li>jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).</li>
<li>kABI fix of KVM: x86/pmu: Allow programming events that match unsupported arch events (bsc#1225696).</li>
<li>kABI fix of KVM: x86: Snapshot if a vCPU&#x27;s vendor model is AMD vs.  Intel compatible (git-fixes).</li>
<li>kABI workaround for cs35l56 (git-fixes).</li>
<li>kABI workaround for of driver changes (git-fixes).</li>
<li>kABI: Adjust trace_iterator.wait_index (git-fixes).</li>
<li>kabi fix of perf/x86/intel: Expose existence of callback support to KVM (git fixes).</li>
<li>kabi/severities: Remove mitigation-related symbols Those are used by the core kernel to implement CPU vulnerabilities mitigation and are not expected to be consumed by 3rd party users.</li>
<li>kabi/severities: ignore IMS functions They were dropped in previous patches. Noone is supposed to use them.</li>
<li>kabi/severities: ignore TAS2781 symbol drop, it&#x27;s only locally used</li>
<li>kabi/severities: ignore Wangxun ethernet driver local symbols</li>
<li>kabi/severities: ignore brcmfmac-specific local symbols</li>
<li>kasan, fortify: properly rename memintrinsics (git-fixes).</li>
<li>kasan/test: avoid gcc warning for intentional overflow (git-fixes).</li>
<li>kasan: disable kasan_non_canonical_hook() for HW tags (git-fixes).</li>
<li>kasan: print the original fault addr when access invalid shadow (git-fixes).</li>
<li>kbuild: Move -Wenum-{compare-conditional,enum-conversion} into W=1 (stable-fixes).</li>
<li>kconfig: fix infinite loop when expanding a macro at the end of file (git-fixes).</li>
<li>kexec: do syscore_shutdown() in kernel_kexec (git-fixes).</li>
<li>kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).</li>
<li>kselftest: Add a ksft_perror() helper (stable-fixes).</li>
<li>kunit/fortify: Fix mismatched kvalloc()/vfree() usage (git-fixes).</li>
<li>leds: pwm: Disable PWM when going to suspend (git-fixes).</li>
<li>lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (git-fixes).</li>
<li>libnvdimm: Fix ACPI_NFIT in BLK_DEV_PMEM help (jsc#PED-5853).</li>
<li>libperf evlist: Avoid out-of-bounds access (git-fixes).</li>
<li>libsubcmd: Fix parse-options memory leak (git-fixes).</li>
<li>livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).</li>
<li>locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes)</li>
<li>lsm: fix the logic in security_inode_getsecctx() (git-fixes).</li>
<li>mac802154: fix llsec key resources release in mac802154_llsec_key_del (git-fixes).</li>
<li>maple_tree: fix mas_empty_area_rev() null pointer dereference (git-fixes).</li>
<li>md/dm-raid: do not call md_reap_sync_thread() directly (jsc#PED-7542).</li>
<li>md/raid1-10: add a helper raid1_check_read_range() (jsc#PED-7542).</li>
<li>md/raid1-10: factor out a new helper raid1_should_read_first() (jsc#PED-7542).</li>
<li>md/raid1: factor out choose_bb_rdev() from read_balance() (jsc#PED-7542).</li>
<li>md/raid1: factor out choose_slow_rdev() from read_balance() (jsc#PED-7542).</li>
<li>md/raid1: factor out helpers to add rdev to conf (jsc#PED-7542).</li>
<li>md/raid1: factor out helpers to choose the best rdev from read_balance() (jsc#PED-7542).</li>
<li>md/raid1: factor out read_first_rdev() from read_balance() (jsc#PED-7542).</li>
<li>md/raid1: factor out the code to manage sequential IO (jsc#PED-7542).</li>
<li>md/raid1: fix choose next idle in read_balance() (jsc#PED-7542).</li>
<li>md/raid1: record nonrot rdevs while adding/removing rdevs to conf (jsc#PED-7542).</li>
<li>md: Do not clear MD_CLOSING when the raid is about to stop (jsc#PED-7542).</li>
<li>md: add a new helper rdev_has_badblock() (jsc#PED-7542).</li>
<li>md: add a new helper reshape_interrupted() (jsc#PED-7542).</li>
<li>md: changed the switch of RAID_VERSION to if (jsc#PED-7542).</li>
<li>md: check mddev->pers before calling md_set_readonly() (jsc#PED-7542).</li>
<li>md: clean up invalid BUG_ON in md_ioctl (jsc#PED-7542).</li>
<li>md: clean up openers check in do_md_stop() and md_set_readonly() (jsc#PED-7542).</li>
<li>md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (jsc#PED-7542).</li>
<li>md: export helper md_is_rdwr() (jsc#PED-7542).</li>
<li>md: export helpers to stop sync_thread (jsc#PED-7542).</li>
<li>md: factor out a helper to sync mddev (jsc#PED-7542).</li>
<li>md: fix kmemleak of rdev->serial (jsc#PED-7542).</li>
<li>md: get rdev->mddev with READ_ONCE() (jsc#PED-7542).</li>
<li>md: merge the check of capabilities into md_ioctl_valid() (jsc#PED-7542).</li>
<li>md: preserve KABI in struct md_personality (jsc#PED-7542).</li>
<li>md: remove redundant check of &#x27;mddev->sync_thread&#x27; (jsc#PED-7542).</li>
<li>md: remove redundant md_wakeup_thread() (jsc#PED-7542).</li>
<li>md: return directly before setting did_set_md_closing (jsc#PED-7542).</li>
<li>md: sync blockdev before stopping raid or setting readonly (jsc#PED-7542).</li>
<li>md: use RCU lock to protect traversal in md_spares_need_change() (jsc#PED-7542).</li>
<li>media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).</li>
<li>media: cadence: csi2rx: use match fwnode for media link (git-fixes).</li>
<li>media: cec: core: remove length check of Timer Status (stable-fixes).</li>
<li>media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).</li>
<li>media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes).</li>
<li>media: i2c: et8ek8: Do not strip remove function when driver is builtin (git-fixes).</li>
<li>media: ipu3-cio2: Request IRQ earlier (git-fixes).</li>
<li>media: mc: Fix flags handling when creating pad links (stable-fixes).</li>
<li>media: mc: Fix graph walk in media_pipeline_start (git-fixes).</li>
<li>media: mc: Rename pad variable to clarify intent (stable-fixes).</li>
<li>media: mc: mark the media devnode as registered from the, start (git-fixes).</li>
<li>media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).</li>
<li>media: rcar-vin: work around -Wenum-compare-conditional warning (git-fixes).</li>
<li>media: rkisp1: Fix IRQ handling due to shared interrupts (stable-fixes).</li>
<li>media: sta2x11: fix irq handler cast (stable-fixes).</li>
<li>media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).</li>
<li>media: sunxi: a83-mips-csi2: also select GENERIC_PHY (git-fixes).</li>
<li>media: uvcvideo: Add quirk for Logitech Rally Bar (git-fixes).</li>
<li>media: v4l2-subdev: Fix stream handling for crop API (git-fixes).</li>
<li>media: v4l: Do not turn on privacy LED if streamon fails (git-fixes).</li>
<li>mei: me: add arrow lake point H DID (stable-fixes).</li>
<li>mei: me: add arrow lake point S DID (stable-fixes).</li>
<li>mei: me: add lunar lake point M DID (stable-fixes).</li>
<li>mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).</li>
<li>mlxbf_gige: call request_irq() after NAPI initialized (git-fixes).</li>
<li>mlxbf_gige: stop PHY during open() error paths (git-fixes).</li>
<li>mlxbf_gige: stop interface during shutdown (git-fixes).</li>
<li>mlxsw: Use refcount_t for reference counting (git-fixes).</li>
<li>mm,page_owner: Defer enablement of static branch (bsc#1222366).</li>
<li>mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).</li>
<li>mm,page_owner: Fix printing of stack records (bsc#1222366).</li>
<li>mm,page_owner: Fix refcount imbalance (bsc#1222366).</li>
<li>mm,page_owner: Update metadata for tail pages (bsc#1222366).</li>
<li>mm,page_owner: check for null stack_record before bumping its refcount (bsc#1222366).</li>
<li>mm,page_owner: drop unnecessary check (bsc#1222366).</li>
<li>mm,page_owner: fix recursion (bsc#1222366).</li>
<li>mm/slab: make __free(kfree) accept error pointers (git-fixes).</li>
<li>mm: memcg: do not periodically flush stats when memcg is disabled (bsc#1222525).</li>
<li>mm: memcg: use larger batches for proactive reclaim (bsc#1222522).</li>
<li>mm: page_owner: fix wrong information in dump_page_owner (git-fixes).</li>
<li>mm_init kABI workaround (git-fixes).</li>
<li>mmc: core: Add HS400 tuning in HS400es initialization (stable-fixes).</li>
<li>mmc: core: Avoid negative index with array access (git-fixes).</li>
<li>mmc: core: Initialize mmc_blk_ioc_data (git-fixes).</li>
<li>mmc: davinci: Do not strip remove function when driver is builtin (git-fixes).</li>
<li>mmc: omap: fix broken slot switch lookup (git-fixes).</li>
<li>mmc: omap: fix deferred probe (git-fixes).</li>
<li>mmc: omap: restore original power up/down steps (git-fixes).</li>
<li>mmc: sdhci-msm: pervent access to suspended controller (git-fixes).</li>
<li>mmc: sdhci-omap: re-tuning is needed after a pm transition to support emmc HS200 mode (git-fixes).</li>
<li>mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes).</li>
<li>mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes).</li>
<li>mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).</li>
<li>mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes).</li>
<li>mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).</li>
<li>modpost: Add &#x27;.ltext&#x27; and &#x27;.ltext.*&#x27; to TEXT_SECTIONS (stable-fixes).</li>
<li>mptcp: Remove unnecessary test for __mptcp_init_sock() (git-fixes).</li>
<li>mptcp: annotate data-races around msk->rmem_fwd_alloc (git-fixes).</li>
<li>mptcp: fix bogus receive window shrinkage with multiple subflows (git-fixes).</li>
<li>mptcp: move __mptcp_error_report in protocol.c (git-fixes).</li>
<li>mptcp: process pending subflow error on close (git-fixes).</li>
<li>mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).</li>
<li>mtd: diskonchip: work around ubsan link failure (stable-fixes).</li>
<li>mtd: rawnand: hynix: fixed typo (git-fixes).</li>
<li>mtd: spinand: Add support for 5-byte IDs (stable-fixes).</li>
<li>net/mlx5: Correctly compare pkt reformat ids (git-fixes).</li>
<li>net/mlx5: E-switch, Change flow rule destination checking (git-fixes).</li>
<li>net/mlx5: E-switch, store eswitch pointer before registering devlink_param (git-fixes).</li>
<li>net/mlx5: Fix fw reporter diagnose output (git-fixes).</li>
<li>net/mlx5: Fix peer devlink set for SF representor devlink port (git-fixes).</li>
<li>net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes).</li>
<li>net/mlx5: Properly link new fs rules into the tree (git-fixes).</li>
<li>net/mlx5: Register devlink first under devlink lock (git-fixes).</li>
<li>net/mlx5: Restore mistakenly dropped parts in register devlink flow (git-fixes).</li>
<li>net/mlx5: SF, Stop waiting for FW as teardown was called (git-fixes).</li>
<li>net/mlx5: offset comp irq index in name by one (git-fixes).</li>
<li>net/mlx5e: Change the warning when ignore_flow_level is not supported (git-fixes).</li>
<li>net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit (git-fixes).</li>
<li>net/mlx5e: Fix mlx5e_priv_init() cleanup flow (git-fixes).</li>
<li>net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).</li>
<li>net/mlx5e: RSS, Block XOR hash with over 128 channels (git-fixes).</li>
<li>net/mlx5e: RSS, Block changing channels number when RXFH is configured (git-fixes).</li>
<li>net/mlx5e: Switch to using _bh variant of of spinlock API in port timestamping NAPI poll context (git-fixes).</li>
<li>net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (git-fixes).</li>
<li>net/smc: bugfix for smcr v2 server connect success statistic (git-fixes).</li>
<li>net/smc: fix documentation of buffer sizes (git-fixes).</li>
<li>net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add (git-fixes).</li>
<li>net/x25: fix incorrect parameter validation in the x25_getsockopt() function (git-fixes).</li>
<li>net: NSH: fix kernel-doc notation warning (git-fixes).</li>
<li>net: Use sockaddr_storage for getsockopt(SO_PEERNAME) (git-fixes).</li>
<li>net: add netdev_lockdep_set_classes() to virtual drivers (git-fixes).</li>
<li>net: annotate data-races around sk->sk_bind_phc (git-fixes).</li>
<li>net: annotate data-races around sk->sk_forward_alloc (git-fixes).</li>
<li>net: annotate data-races around sk->sk_lingertime (git-fixes).</li>
<li>net: annotate data-races around sk->sk_tsflags (git-fixes).</li>
<li>net: bonding: remove kernel-doc comment marker (git-fixes).</li>
<li>net: cfg802154: fix kernel-doc notation warnings (git-fixes).</li>
<li>net: dsa: microchip: fix register write order in ksz8_ind_write8() (git-fixes).</li>
<li>net: dsa: mt7530: fix handling of all link-local frames (git-fixes).</li>
<li>net: dsa: mt7530: fix link-local frames that ingress vlan filtering ports (git-fixes).</li>
<li>net: dsa: mt7530: prevent possible incorrect XTAL frequency selection (git-fixes).</li>
<li>net: dsa: mt7530: trap link-local frames regardless of ST Port State (git-fixes).</li>
<li>net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45() (git-fixes).</li>
<li>net: ena: Fix incorrect descriptor free behavior (git-fixes).</li>
<li>net: ena: Fix potential sign extension issue (git-fixes).</li>
<li>net: ena: Move XDP code to its new files (git-fixes).</li>
<li>net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() (git-fixes).</li>
<li>net: ena: Remove ena_select_queue (git-fixes).</li>
<li>net: ena: Set tx_info->xdpf value to NULL (git-fixes).</li>
<li>net: ena: Use tx_ring instead of xdp_ring for XDP channel TX (git-fixes).</li>
<li>net: ena: Wrong missing IO completions check order (git-fixes).</li>
<li>net: ethernet: mtk_eth_soc: fix PPE hanging issue (git-fixes).</li>
<li>net: ethernet: ti: cpsw: enable mac_managed_pm to fix mdio (git-fixes).</li>
<li>net: fec: Set mac_managed_pm during probe (git-fixes).</li>
<li>net: hns3: fix index limit to support all queue stats (git-fixes).</li>
<li>net: hns3: fix kernel crash when 1588 is received on HIP08 devices (git-fixes).</li>
<li>net: hns3: fix kernel crash when devlink reload during pf initialization (git-fixes).</li>
<li>net: hns3: fix port duplex configure error in IMP reset (git-fixes).</li>
<li>net: hns3: fix wrong judgment condition issue (git-fixes).</li>
<li>net: hns3: mark unexcuted loopback test result as UNEXECUTED (git-fixes).</li>
<li>net: hns3: tracing: fix hclgevf trace event strings (git-fixes).</li>
<li>net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() (git-fixes).</li>
<li>net: ks8851: Handle softirqs at the end of IRQ thread to fix hang (git-fixes).</li>
<li>net: ks8851: Inline ks8851_rx_skb() (git-fixes).</li>
<li>net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs (git-fixes).</li>
<li>net: lan743x: Add set RFE read fifo threshold for PCI1x1x chips (git-fixes).</li>
<li>net: libwx: fix memory leak on free page (git-fixes).</li>
<li>net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).</li>
<li>net: llc: fix kernel-doc notation warnings (git-fixes).</li>
<li>net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).</li>
<li>net: mediatek: mtk_eth_soc: clear MAC_MCR_FORCE_LINK only when MAC is up (git-fixes).</li>
<li>net: nfc: remove inappropriate attrs check (stable-fixes).</li>
<li>net: pcs: xpcs: Return EINVAL in the internal methods (git-fixes).</li>
<li>net: phy: fix phy_read_poll_timeout argument type in genphy_loopback (git-fixes).</li>
<li>net: phy: micrel: Fix potential null pointer dereference (git-fixes).</li>
<li>net: phy: micrel: lan8814: Fix when enabling/disabling 1-step timestamping (git-fixes).</li>
<li>net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8061 (git-fixes).</li>
<li>net: phy: phy_device: Prevent nullptr exceptions on ISR (git-fixes).</li>
<li>net: phy: phy_device: Prevent nullptr exceptions on ISR (stable-fixes).</li>
<li>net: ravb: Always process TX descriptor ring (git-fixes).</li>
<li>net: ravb: Let IP-specific receive function to interrogate descriptors (git-fixes).</li>
<li>net: smsc95xx: add support for SYS TEC USB-SPEmodule1 (git-fixes).</li>
<li>net: sparx5: Fix use after free inside sparx5_del_mact_entry (git-fixes).</li>
<li>net: sparx5: fix wrong config being used when reconfiguring PCS (git-fixes).</li>
<li>net: sparx5: flower: fix fragment flags handling (git-fixes).</li>
<li>net: stmmac: Fix incorrect dereference in interrupt handlers (git-fixes).</li>
<li>net: stmmac: dwmac-starfive: Add support for JH7100 SoC (git-fixes).</li>
<li>net: stmmac: fix rx queue priority assignment (git-fixes).</li>
<li>net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).</li>
<li>net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).</li>
<li>net: tls, fix WARNIING in __sk_msg_free (bsc#1221858).</li>
<li>net: tls: fix returned read length with async decrypt (bsc#1221858).</li>
<li>net: tls: fix use-after-free with partial reads and async (bsc#1221858).</li>
<li>net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).</li>
<li>net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).</li>
<li>net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).</li>
<li>net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).</li>
<li>net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-fixes).</li>
<li>net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).</li>
<li>net: usb: sr9700: stop lying about skb->truesize (git-fixes).</li>
<li>net: veth: do not manipulate GRO when using XDP (git-fixes).</li>
<li>net: wwan: t7xx: Split 64bit accesses to fix alignment issues (git-fixes).</li>
<li>net:usb:qmi_wwan: support Rolling modules (stable-fixes).</li>
<li>netfilter: nf_tables: disable toggling dormant table state more than once (git-fixes).</li>
<li>netfilter: nf_tables: uapi: Describe NFTA_RULE_CHAIN_ID (git-fixes).</li>
<li>netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).</li>
<li>netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes).</li>
<li>nf_conntrack: fix -Wunused-const-variable= (git-fixes).</li>
<li>nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).</li>
<li>nfc: nci: Fix kcov check in nci_rx_work() (git-fixes).</li>
<li>nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).</li>
<li>nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).</li>
<li>nfp: flower: handle acti_netdevs allocation failure (git-fixes).</li>
<li>nfs: fix panic when nfs4_ff_layout_prepare_ds() fails (git-fixes).</li>
<li>nfsd: Fix a regression in nfsd_setattr() (git-fixes).</li>
<li>nfsd: do not call locks_release_private() twice concurrently (git-fixes).</li>
<li>nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).</li>
<li>nilfs2: fix OOB in nilfs_set_de_type (git-fixes).</li>
<li>nilfs2: fix out-of-range warning (git-fixes).</li>
<li>nilfs2: fix potential bug in end_buffer_async_write (git-fixes).</li>
<li>nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).</li>
<li>nilfs2: fix use-after-free of timer for log writer thread (git-fixes).</li>
<li>nilfs2: make superblock data array index computation sparse friendly (git-fixes).</li>
<li>nouveau/dmem: handle kcalloc() allocation failure (git-fixes).</li>
<li>nouveau/gsp: do not check devinit disable on GSP (git-fixes).</li>
<li>nouveau/uvmm: fix addr/range calcs for remap operations (git-fixes).</li>
<li>nouveau: fix devinit paths to only handle display on GSP (git-fixes).</li>
<li>nouveau: fix function cast warning (git-fixes).</li>
<li>nouveau: fix instmem race condition around ptr stores (git-fixes).</li>
<li>nouveau: lock the client object tree (stable-fixes).</li>
<li>nouveau: reset the bo resource bus info after an eviction (git-fixes).</li>
<li>nvdimm/pmem: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal (jsc#PED-5853).</li>
<li>nvdimm/pmem: fix leak on dax_add_host() failure (jsc#PED-5853).</li>
<li>nvdimm: make nvdimm_bus_type const (jsc#PED-5853).</li>
<li>nvme-fc: do not wait in vain when unloading module (git-fixes).</li>
<li>nvme-multipath: fix io accounting on failover (git-fixes).</li>
<li>nvme-pci: Add quirk for broken MSIs (git-fixes).</li>
<li>nvme-tcp: strict pdu pacing to avoid send stalls on TLS (bsc#1221858).</li>
<li>nvme: fix multipath batched completion accounting (git-fixes).</li>
<li>nvme: fix reconnection fail due to reserved tag allocation (git-fixes).</li>
<li>nvme: fix warn output about shared namespaces without CONFIG_NVME_MULTIPATH (git-fixes).</li>
<li>nvmet-fc: abort command when there is no binding (git-fixes).</li>
<li>nvmet-fc: defer cleanup using RCU properly (git-fixes).</li>
<li>nvmet-fc: hold reference on hostport match (git-fixes).</li>
<li>nvmet-fc: release reference on target port (git-fixes).</li>
<li>nvmet-fcloop: swap the list_add_tail arguments (git-fixes).</li>
<li>nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).++ kernel-source-azure.spec (revision 4)%define git_commit ba2f81d0ba1ad117dc6a5494a21d358f354126d7Release:    &lt;RELEASE>.gba2f81d</li>
<li>nvmet: fix ns enable/disable possible hang (git-fixes).</li>
<li>octeontx2-af: Add array index check (git-fixes).</li>
<li>octeontx2-af: Fix NIX SQ mode and BP config (git-fixes).</li>
<li>octeontx2-af: Fix devlink params (git-fixes).</li>
<li>octeontx2-af: Fix issue with loading coalesced KPU profiles (git-fixes).</li>
<li>octeontx2-af: Use matching wake_up API variant in CGX command interface (git-fixes).</li>
<li>octeontx2-af: Use separate handlers for interrupts (git-fixes).</li>
<li>octeontx2-pf: Fix transmit scheduler resource leak (git-fixes).</li>
<li>octeontx2-pf: Send UP messages to VF only when VF is up (git-fixes).</li>
<li>octeontx2-pf: Use default max_active works instead of one (git-fixes).</li>
<li>octeontx2-pf: Wait till detach_resources msg is complete (git-fixes).</li>
<li>octeontx2-pf: check negative error code in otx2_open() (git-fixes).</li>
<li>octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation (git-fixes).</li>
<li>octeontx2: Detect the mbox up or down message via register (git-fixes).</li>
<li>of: dynamic: Synchronize of_changeset_destroy() with the devlink removals (git-fixes).</li>
<li>of: module: add buffer overflow check in of_modalias() (git-fixes).</li>
<li>of: module: prevent NULL pointer dereference in vsnprintf() (stable-fixes).</li>
<li>of: property: Add in-ports/out-ports support to of_graph_get_port_parent() (stable-fixes).</li>
<li>of: property: Improve finding the consumer of a remote-endpoint property (git-fixes).</li>
<li>of: property: Improve finding the supplier of a remote-endpoint property (git-fixes).</li>
<li>of: property: fix typo in io-channels (git-fixes).</li>
<li>of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing (git-fixes).</li>
<li>of: unittest: Fix compile in the non-dynamic case (git-fixes).</li>
<li>overflow: Allow non-type arg to type_max() and type_min() (stable-fixes).</li>
<li>peci: linux/peci.h: fix Excess kernel-doc description warning (git-fixes).</li>
<li>perf annotate: Fix annotation_calc_lines() to pass correct address to get_srcline() (git-fixes).</li>
<li>perf annotate: Get rid of duplicate --group option item (git-fixes).</li>
<li>perf auxtrace: Fix multiple use of --itrace option (git-fixes).</li>
<li>perf bench internals inject-build-id: Fix trap divide when collecting just one DSO (git-fixes).</li>
<li>perf bench uprobe: Remove lib64 from libc.so.6 binary path (git-fixes).</li>
<li>perf bpf: Clean up the generated/copied vmlinux.h (git-fixes).</li>
<li>perf daemon: Fix file leak in daemon_session__control (git-fixes).</li>
<li>perf docs: Document bpf event modifier (git-fixes).</li>
<li>perf evsel: Fix duplicate initialization of data->id in evsel__parse_sample() (git-fixes).</li>
<li>perf expr: Fix "has_event" function for metric style events (git-fixes).</li>
<li>perf intel-pt: Fix unassigned instruction op (discovered by MemorySanitizer) (git-fixes).</li>
<li>perf jevents: Drop or simplify small integer values (git-fixes).</li>
<li>perf list: fix short description for some cache events (git-fixes).</li>
<li>perf lock contention: Add a missing NULL check (git-fixes).</li>
<li>perf metric: Do not remove scale from counts (git-fixes).</li>
<li>perf pmu: Count sys and cpuid JSON events separately (git fixes).</li>
<li>perf pmu: Fix a potential memory leak in perf_pmu__lookup() (git-fixes).</li>
<li>perf pmu: Treat the msr pmu as software (git-fixes).</li>
<li>perf print-events: make is_event_supported() more robust (git-fixes).</li>
<li>perf probe: Add missing libgen.h header needed for using basename() (git-fixes).</li>
<li>perf record: Check conflict between &#x27;--timestamp-filename&#x27; option and pipe mode before recording (git-fixes).</li>
<li>perf record: Fix debug message placement for test consumption (git-fixes).</li>
<li>perf record: Fix possible incorrect free in record__switch_output() (git-fixes).</li>
<li>perf report: Avoid SEGV in report__setup_sample_type() (git-fixes).</li>
<li>perf sched timehist: Fix -g/--call-graph option failure (git-fixes).</li>
<li>perf script: Show also errors for --insn-trace option (git-fixes).</li>
<li>perf srcline: Add missed addr2line closes (git-fixes).</li>
<li>perf stat: Avoid metric-only segv (git-fixes).</li>
<li>perf stat: Do not display metric header for non-leader uncore events (git-fixes).</li>
<li>perf stat: Do not fail on metrics on s390 z/VM systems (git-fixes).</li>
<li>perf symbols: Fix ownership of string in dso__load_vmlinux() (git-fixes).</li>
<li>perf test shell arm_coresight: Increase buffer size for Coresight basic tests (git-fixes).</li>
<li>perf tests: Apply attributes to all events in object code reading test (git-fixes).</li>
<li>perf tests: Make "test data symbol" more robust on Neoverse N1 (git-fixes).</li>
<li>perf tests: Make data symbol test wait for perf to start (bsc#1220045).</li>
<li>perf tests: Skip data symbol test if buf1 symbol is missing (bsc#1220045).</li>
<li>perf thread: Fixes to thread__new() related to initializing comm (git-fixes).</li>
<li>perf thread_map: Free strlist on normal path in thread_map__new_by_tid_str() (git-fixes).</li>
<li>perf top: Uniform the event name for the hybrid machine (git-fixes).</li>
<li>perf top: Use evsel&#x27;s cpus to replace user_requested_cpus (git-fixes).</li>
<li>perf ui browser: Avoid SEGV on title (git fixes).</li>
<li>perf ui browser: Do not save pointer to stack memory (git-fixes).</li>
<li>perf vendor events amd: Add Zen 4 memory controller events (git-fixes).</li>
<li>perf vendor events amd: Fix Zen 4 cache latency events (git-fixes).</li>
<li>perf/x86/amd/core: Avoid register reset when CPU is dead (git-fixes).</li>
<li>perf/x86/amd/core: Update and fix stalled-cycles-* events for Zen 2 and later (git-fixes).</li>
<li>perf/x86/amd/lbr: Discard erroneous branch entries (git-fixes).</li>
<li>perf/x86/amd/lbr: Use freeze based on availability (git-fixes).</li>
<li>perf/x86/intel/ds: Do not clear ->pebs_data_cfg for the last PEBS event (git-fixes).</li>
<li>perf/x86/intel: Expose existence of callback support to KVM (git-fixes).</li>
<li>perf/x86: Fix out of range data (git-fixes).</li>
<li>phy: freescale: imx8m-pcie: fix pcie link-up instability (git-fixes).</li>
<li>phy: marvell: a3700-comphy: Fix hardcoded array size (git-fixes).</li>
<li>phy: marvell: a3700-comphy: Fix out of bounds read (git-fixes).</li>
<li>phy: rockchip-snps-pcie3: fix bifurcation on rk3588 (git-fixes).</li>
<li>phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits (git-fixes).</li>
<li>phy: rockchip: naneng-combphy: Fix mux on rk3588 (git-fixes).</li>
<li>phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered (git-fixes).</li>
<li>pinctrl/meson: fix typo in PDM&#x27;s pin name (git-fixes).</li>
<li>pinctrl: armada-37xx: remove an unused variable (git-fixes).</li>
<li>pinctrl: baytrail: Fix selecting gpio pinctrl state (git-fixes).</li>
<li>pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).</li>
<li>pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).</li>
<li>pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback (git-fixes).</li>
<li>pinctrl: mediatek: paris: Rework support for PIN_CONFIG_{INPUT,OUTPUT}_ENABLE (git-fixes).</li>
<li>pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).</li>
<li>pinctrl: qcom: pinctrl-sm7150: Fix sdc1 and ufs special pins regs (git-fixes).</li>
<li>pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).</li>
<li>platform/chrome: cros_ec_uart: properly fix race condition (git-fixes).</li>
<li>platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes (stable-fixes).</li>
<li>platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).</li>
<li>platform/x86: ISST: Add Granite Rapids-D to HPM CPU list (stable-fixes).</li>
<li>platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).</li>
<li>platform/x86: x86-android-tablets: Fix acer_b1_750_goodix_gpios name (stable-fixes).</li>
<li>platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).</li>
<li>power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).</li>
<li>power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator (git-fixes).</li>
<li>powerpc/crypto/chacha-p10: Fix failure on non Power10 (bsc#1218205).</li>
<li>powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).</li>
<li>powerpc/hv-gpci: Fix the H_GET_PERF_COUNTER_INFO hcall return value checks (git-fixes).</li>
<li>powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).</li>
<li>powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).</li>
<li>powerpc/pseries: make max polling consistent for longer H_CALLs (bsc#1215199).</li>
<li>powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).</li>
<li>powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).</li>
<li>powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).</li>
<li>ppdev: Add an error check in register_device (git-fixes).</li>
<li>prctl: generalize PR_SET_MDWE support check to be per-arch (bsc#1225610).</li>
<li>printk: Add this_cpu_in_panic() (bsc#1225607).</li>
<li>printk: Adjust mapping for 32bit seq macros (bsc#1225607).</li>
<li>printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1225607).</li>
<li>printk: Consolidate console deferred printing (bsc#1225607).</li>
<li>printk: Disable passing console lock owner completely during panic() (bsc#1225607).</li>
<li>printk: Do not take console lock for console_flush_on_panic() (bsc#1225607).</li>
<li>printk: For @suppress_panic_printk check for other CPU in panic (bsc#1225607).</li>
<li>printk: Keep non-panic-CPUs out of console lock (bsc#1225607).</li>
<li>printk: Let no_printk() use _printk() (bsc#1225618).</li>
<li>printk: Reduce console_unblank() usage in unsafe scenarios (bsc#1225607).</li>
<li>printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1225607).</li>
<li>printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).</li>
<li>printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1225607).</li>
<li>printk: Wait for all reserved records with pr_flush() (bsc#1225607).</li>
<li>printk: nbcon: Relocate 32bit seq macros (bsc#1225607).</li>
<li>printk: ringbuffer: Clarify special lpos values (bsc#1225607).</li>
<li>printk: ringbuffer: Cleanup reader terminology (bsc#1225607).</li>
<li>printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1225607).</li>
<li>printk: ringbuffer: Skip non-finalized records in panic (bsc#1225607).</li>
<li>proc/kcore: do not try to access unaccepted memory (git-fixes).</li>
<li>pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).</li>
<li>pstore: inode: Convert mutex usage to guard(mutex) (stable-fixes).</li>
<li>pstore: inode: Only d_invalidate() is needed (git-fixes).</li>
<li>pwm: img: fix pwm clock lookup (git-fixes).</li>
<li>qibfs: fix dentry leak (git-fixes)</li>
<li>r8169: fix issue caused by buggy BIOS on certain boards with RTL8168d (git-fixes).</li>
<li>r8169: skip DASH fw status checks when DASH is disabled (git-fixes).</li>
<li>random: handle creditable entropy from atomic process context (git-fixes).</li>
<li>regmap: Add regmap_read_bypassed() (git-fixes).</li>
<li>regmap: kunit: Ensure that changed bytes are actually different (stable-fixes).</li>
<li>regmap: maple: Fix cache corruption in regcache_maple_drop() (git-fixes).</li>
<li>regmap: maple: Fix uninitialized symbol &#x27;ret&#x27; warnings (git-fixes).</li>
<li>regulator: bd71828: Do not overwrite runtime voltages (git-fixes).</li>
<li>regulator: change devm_regulator_get_enable_optional() stub to return Ok (git-fixes).</li>
<li>regulator: change stubbed devm_regulator_get_enable to return Ok (git-fixes).</li>
<li>regulator: core: fix debugfs creation regression (git-fixes).</li>
<li>regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).</li>
<li>regulator: tps65132: Add of_match table (stable-fixes).</li>
<li>remoteproc: k3-r5: Do not allow core1 to power up before core0 via sysfs (git-fixes).</li>
<li>remoteproc: k3-r5: Jump to error handling labels in start/stop errors (git-fixes).</li>
<li>remoteproc: k3-r5: Wait for core0 power-up before powering up core1 (git-fixes).</li>
<li>remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).</li>
<li>remoteproc: stm32: Fix incorrect type assignment returned by stm32_rproc_get_loaded_rsc_tablef (git-fixes).</li>
<li>remoteproc: virtio: Fix wdg cannot recovery remote processor (git-fixes).</li>
<li>ring-buffer: Do not set shortest_full when full target is hit (git-fixes).</li>
<li>ring-buffer: Fix a race between readers and resize checks (git-fixes).</li>
<li>ring-buffer: Fix full_waiters_pending in poll (git-fixes).</li>
<li>ring-buffer: Fix resetting of shortest_full (git-fixes).</li>
<li>ring-buffer: Fix waking up ring buffer readers (git-fixes).</li>
<li>ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).</li>
<li>ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).</li>
<li>ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes).</li>
<li>rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).</li>
<li>s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224792).</li>
<li>s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223869).</li>
<li>s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224793).</li>
<li>s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1225133).</li>
<li>s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224348).</li>
<li>s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225136).</li>
<li>s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225134).</li>
<li>s390/ism: Properly fix receive message buffer allocation (git-fixes bsc#1223590).</li>
<li>s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223871).</li>
<li>s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223872).</li>
<li>s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223874).</li>
<li>s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223870).</li>
<li>s390/vdso: drop &#x27;-fPIC&#x27; from LDFLAGS (git-fixes bsc#1223593).</li>
<li>s390/vtime: fix average steal time calculation (git-fixes bsc#1221783).</li>
<li>s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223592).</li>
<li>sched-fair-Add-EAS-checks-before-updating-root_domain-overutilized.patch.</li>
<li>sched-fair-Combine-EAS-check-with-overutilized-access.patch.</li>
<li>sched-fair-Introduce-is_rd_overutilized-helper-function-to-access-root_domain-overutilized.patch.</li>
<li>sched/balancing: Rename newidle_balance() => sched_balance_newidle() (bsc#1222173).</li>
<li>sched/fair: Check root_domain::overload value before update (bsc#1222173).</li>
<li>sched/fair: Use helper functions to access root_domain::overload (bsc#1222173).</li>
<li>sched/psi: Select KERNFS as needed (git-fixes).</li>
<li>sched/topology: Optimize topology_span_sane() (bsc#1225053).</li>
<li>scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).</li>
<li>scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).</li>
<li>scsi: core: Fix unremoved procfs host directory regression (git-fixes).</li>
<li>scsi: csiostor: Avoid function pointer casts (git-fixes).</li>
<li>scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() (git-fixes).</li>
<li>scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() (git-fixes).</li>
<li>scsi: libsas: Fix disk not being scanned in after being removed (git-fixes).</li>
<li>scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).</li>
<li>scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).</li>
<li>scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842). Refresh:    - patches.suse/lpfc-reintroduce-old-irq-probe-logic.patch</li>
<li>scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).</li>
<li>scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).</li>
<li>scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).</li>
<li>scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).</li>
<li>scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).</li>
<li>scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).</li>
<li>scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).</li>
<li>scsi: lpfc: Define types in a union for generic void *context3 ptr (bsc#1221777).</li>
<li>scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).</li>
<li>scsi: lpfc: Move NPIV&#x27;s transport unregistration to after resource clean up (bsc#1221777).</li>
<li>scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1221777).</li>
<li>scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777 bsc#1217959).</li>
<li>scsi: lpfc: Remove unnecessary log message in queuecommand path (bsc#1221777).</li>
<li>scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port() (bsc#1221777).</li>
<li>scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).</li>
<li>scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).</li>
<li>scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).</li>
<li>scsi: mpi3mr: Reduce stack usage in mpi3mr_refresh_sas_ports() (git-fixes).</li>
<li>scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).</li>
<li>scsi: mylex: Fix sysfs buffer lengths (git-fixes).</li>
<li>scsi: qla2xxx: Change debug message during driver unload (bsc1221816).</li>
<li>scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).</li>
<li>scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).</li>
<li>scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).</li>
<li>scsi: qla2xxx: Fix double free of fcport (bsc1221816).</li>
<li>scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).</li>
<li>scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).</li>
<li>scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).</li>
<li>scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).</li>
<li>scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).</li>
<li>scsi: qla2xxx: Update manufacturer detail (bsc1221816).</li>
<li>scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).</li>
<li>scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).</li>
<li>scsi: sg: Avoid race in error handling & drop bogus warn (git-fixes).</li>
<li>scsi: sg: Avoid sg device teardown race (git-fixes).</li>
<li>scsi: smartpqi: Fix disable_managed_interrupts (git-fixes).</li>
<li>sctp: annotate data-races around sk->sk_wmem_queued (git-fixes).</li>
<li>sdhci-of-dwcmshc: disable PM runtime in dwcmshc_remove() (git-fixes).</li>
<li>selftests/binderfs: use the Makefile&#x27;s rules, not Make&#x27;s implicit rules (git-fixes).</li>
<li>selftests/bpf: add edge case backtracking logic test (bsc#1225756).</li>
<li>selftests/bpf: precision tracking test for BPF_NEG and BPF_END (bsc#1225756).</li>
<li>selftests/ftrace: Fix event filter target_func selection (stable-fixes).</li>
<li>selftests/ftrace: Limit length in subsystem-enable tests (git-fixes).</li>
<li>selftests/kcmp: remove unused open mode (git-fixes).</li>
<li>selftests/net: convert test_bridge_neigh_suppress.sh to run it in unique namespace (stable-fixes).</li>
<li>selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).</li>
<li>selftests/powerpc/dexcr: Add -no-pie to hashchk tests (git-fixes).</li>
<li>selftests/powerpc/papr-vpd: Fix missing variable initialization (jsc#PED-4486 git-fixes).</li>
<li>selftests/resctrl: fix clang build failure: use LOCAL_HDRS (git-fixes).</li>
<li>selftests/timers/posix_timers: Reimplement check_timer_distribution() (git-fixes).</li>
<li>selftests: default to host arch for LLVM builds (git-fixes).</li>
<li>selftests: forwarding: Fix ping failure due to short timeout (git-fixes).</li>
<li>selftests: kselftest: Fix build failure with NOLIBC (git-fixes).</li>
<li>selftests: kselftest: Mark functions that unconditionally call exit() as __noreturn (git-fixes).</li>
<li>selftests: net: bridge: increase IGMP/MLD exclude timeout membership interval (git-fixes).</li>
<li>selftests: net: kill smcrouted in the cleanup logic in amt.sh (git-fixes).</li>
<li>selftests: net: move amt to socat for better compatibility (git-fixes).</li>
<li>selftests: test_bridge_neigh_suppress.sh: Fix failures due to duplicate MAC (git-fixes).</li>
<li>selftests: timers: Convert posix_timers test to generate KTAP output (stable-fixes).</li>
<li>selftests: timers: Fix abs() warning in posix_timers test (git-fixes).</li>
<li>selftests: timers: Fix posix_timers ksft_print_msg() warning (git-fixes).</li>
<li>selftests: timers: Fix valid-adjtimex signed left-shift undefined behavior (stable-fixes).</li>
<li>selftests: vxlan_mdb: Fix failures with old libnet (git-fixes).</li>
<li>selinux: avoid dereference of garbage after mount failure (git-fixes).</li>
<li>selinux: introduce an initial SID for early boot processes (bsc#1208593).</li>
<li>serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).</li>
<li>serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).</li>
<li>serial: 8250_dw: Revert: Do not reclock if already at correct rate (git-fixes).</li>
<li>serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).</li>
<li>serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup (git-fixes).</li>
<li>serial: Lock console when calling into driver before registration (git-fixes).</li>
<li>serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).</li>
<li>serial: core: only stop transmit when HW fifo is empty (git-fixes).</li>
<li>serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).</li>
<li>serial: max3100: Fix bitwise types (git-fixes).</li>
<li>serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-fixes).</li>
<li>serial: max310x: fix NULL pointer dereference in I2C instantiation (git-fixes).</li>
<li>serial: max310x: fix syntax error in IRQ error message (git-fixes).</li>
<li>serial: mxs-auart: add spinlock around changing cts state (git-fixes).</li>
<li>serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).</li>
<li>serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).</li>
<li>serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).</li>
<li>serial: stm32: Reset .throttled state in .startup() (git-fixes).</li>
<li>series.conf: cleanup Fix subsection header to silence series_insert error.</li>
<li>slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-fixes).</li>
<li>slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).</li>
<li>smb3: show beginning time for per share stats (bsc#1225172).</li>
<li>smb: client: ensure to try all targets when finding nested links (bsc#1225172).</li>
<li>smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1225172).</li>
<li>smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes, bsc#1225172).</li>
<li>smb: client: get rid of dfs code dep in namespace.c (bsc#1225172).</li>
<li>smb: client: get rid of dfs naming in automount code (bsc#1225172).</li>
<li>smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1225172).</li>
<li>smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1225172).</li>
<li>smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1225172).</li>
<li>smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1225172).</li>
<li>soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).</li>
<li>soc: fsl: qbman: Use raw spinlock for cgr_lock (git-fixes).</li>
<li>soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).</li>
<li>soc: microchip: Fix POLARFIRE_SOC_SYS_CTRL input prompt (stable-fixes).</li>
<li>soc: qcom: pmic_glink: Make client-lock non-sleeping (git-fixes).</li>
<li>soc: qcom: pmic_glink: do not traverse clients list without a lock (git-fixes).</li>
<li>soc: qcom: pmic_glink: notify clients about the current state (git-fixes).</li>
<li>soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).</li>
<li>sock_diag: annotate data-races around sock_diag_handlers[family] (git-fixes).</li>
<li>soundwire: amd: fix for wake interrupt handling for clockstop mode (git-fixes).</li>
<li>speakup: Avoid crash on very long word (git-fixes).</li>
<li>speakup: Fix 8bit characters from direct synth (git-fixes).</li>
<li>speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).</li>
<li>spi: Do not mark message DMA mapped when no transfer in it is (git-fixes).</li>
<li>spi: fix null pointer dereference within spi_sync (git-fixes).</li>
<li>spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes).</li>
<li>spi: intel-pci: Add support for Lunar Lake-M SPI serial flash (stable-fixes).</li>
<li>spi: lm70llp: fix links in doc and comments (git-fixes).</li>
<li>spi: lpspi: Avoid potential use-after-free in probe() (git-fixes).</li>
<li>spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe (git-fixes).</li>
<li>spi: microchip-core-qspi: fix setting spi bus clock rate (git-fixes).</li>
<li>spi: spi-fsl-lpspi: remove redundant spi_controller_put call (git-fixes).</li>
<li>spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).</li>
<li>spi: stm32: Do not warn about spurious interrupts (git-fixes).</li>
<li>spi: xilinx: Fix kernel documentation in the xilinx_spi.h (git-fixes).</li>
<li>spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).</li>
<li>staging: vc04_services: changen strncpy() to strscpy_pad() (stable-fixes).</li>
<li>staging: vc04_services: fix information leak in create_component() (git-fixes).</li>
<li>staging: vt6655: Remove unused declaration of RFbAL7230SelectChannelPostProcess() (git-fixes).</li>
<li>stmmac: Clear variable when destroying workqueue (git-fixes).</li>
<li>supported.conf: support tcp_dctcp module (jsc#PED-8111)</li>
<li>swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)</li>
<li>swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)</li>
<li>swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)</li>
<li>swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331)</li>
<li>swiotlb: use the calculated number of areas (git-fixes).</li>
<li>thermal/drivers/qcom/lmh: Check for SCM availability at probe (git-fixes).</li>
<li>thermal/drivers/tsens: Fix null pointer dereference (git-fixes).</li>
<li>thermal/of: Assume polling-delay(-passive) 0 when absent (stable-fixes).</li>
<li>thermal: devfreq_cooling: Fix perf state when calculate dfc res_util (git-fixes).</li>
<li>thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).</li>
<li>thunderbolt: Do not create DisplayPort tunnels on adapters of the same router (git-fixes).</li>
<li>thunderbolt: Fix wake configurations after device unplug (stable-fixes).</li>
<li>thunderbolt: Introduce tb_path_deactivate_hop() (stable-fixes).</li>
<li>thunderbolt: Introduce tb_port_reset() (stable-fixes).</li>
<li>thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4 routers (stable-fixes).</li>
<li>thunderbolt: Reset only non-USB4 host routers in resume (git-fixes).</li>
<li>tls: break out of main loop when PEEK gets a non-data record (bsc#1221858).</li>
<li>tls: do not skip over different type records from the rx_list (bsc#1221858).</li>
<li>tls: fix peeking with sync+async decryption (bsc#1221858).</li>
<li>tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1221858).</li>
<li>tools/arch/x86/intel_sdsi: Fix maximum meter bundle length (git-fixes).</li>
<li>tools/arch/x86/intel_sdsi: Fix meter_certificate decoding (git-fixes).</li>
<li>tools/arch/x86/intel_sdsi: Fix meter_show display (git-fixes).</li>
<li>tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).</li>
<li>tools/power turbostat: Expand probe_intel_uncore_frequency() (bsc#1221765).</li>
<li>tools/power/turbostat: Fix uncore frequency file string (bsc#1221765).</li>
<li>tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).</li>
<li>tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).</li>
<li>tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).</li>
<li>tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).</li>
<li>tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).</li>
<li>tracing: Remove precision vsnprintf() check from print event (git-fixes).</li>
<li>tracing: Use .flush() call to wake up readers (git-fixes).</li>
<li>tracing: hide unused ftrace_event_id_fops (git-fixes).</li>
<li>tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).</li>
<li>tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).</li>
<li>tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).</li>
<li>tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).</li>
<li>ubifs: Queue up space reservation tasks if retrying many times (git-fixes).</li>
<li>ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).</li>
<li>ubifs: Set page uptodate in the correct place (git-fixes).</li>
<li>ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).</li>
<li>ubifs: fix sort function prototype (git-fixes).</li>
<li>usb: Disable USB3 LPM at shutdown (stable-fixes).</li>
<li>usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (bsc#1220569).</li>
<li>usb: aqc111: stop lying about skb->truesize (git-fixes).</li>
<li>usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor (git-fixes).</li>
<li>usb: cdc-wdm: close race between read and workqueue (git-fixes).</li>
<li>usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).</li>
<li>usb: dwc2: gadget: LPM flow fix (git-fixes).</li>
<li>usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).</li>
<li>usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).</li>
<li>usb: dwc2: host: Fix hibernation flow (git-fixes).</li>
<li>usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).</li>
<li>usb: dwc3-am62: Disable wakeup at remove (git-fixes).</li>
<li>usb: dwc3-am62: Rename private data (git-fixes).</li>
<li>usb: dwc3-am62: fix module unload/reload behavior (git-fixes).</li>
<li>usb: dwc3: Properly set system wakeup (git-fixes).</li>
<li>usb: dwc3: Wait unconditionally after issuing EndXfer command (git-fixes).</li>
<li>usb: dwc3: core: Prevent phy suspend during init (Git-fixes).</li>
<li>usb: dwc3: pci: Drop duplicate ID (git-fixes).</li>
<li>usb: fotg210: Add missing kernel doc description (git-fixes).</li>
<li>usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).</li>
<li>usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).</li>
<li>usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (git-fixes).</li>
<li>usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).</li>
<li>usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-fixes).</li>
<li>usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).</li>
<li>usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (git-fixes).</li>
<li>usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR (stable-fixes).</li>
<li>usb: gadget: uvc: use correct buffer size when parsing configfs lists (git-fixes).</li>
<li>usb: ohci: Prevent missed ohci interrupts (git-fixes).</li>
<li>usb: phy: generic: Get the vbus supply (git-fixes).</li>
<li>usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).</li>
<li>usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).</li>
<li>usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).</li>
<li>usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).</li>
<li>usb: typec: tcpm: Correct port source pdo array in pd_set callback (git-fixes).</li>
<li>usb: typec: tcpm: Correct the PDO counting in pd_set (git-fixes).</li>
<li>usb: typec: tcpm: Update PD of Type-C port upon pd_set (git-fixes).</li>
<li>usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes).</li>
<li>usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd() (git-fixes).</li>
<li>usb: typec: tcpm: unregister existing source caps before re-registration (git-fixes).</li>
<li>usb: typec: tipd: fix event checking for tps6598x (git-fixes).</li>
<li>usb: typec: ucsi: Ack unsupported commands (stable-fixes).</li>
<li>usb: typec: ucsi: Check for notifications after init (git-fixes).</li>
<li>usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).</li>
<li>usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).</li>
<li>usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).</li>
<li>usb: typec: ucsi: Fix connector check on init (git-fixes).</li>
<li>usb: typec: ucsi: Fix race between typec_switch and role_switch (git-fixes).</li>
<li>usb: typec: ucsi: Limit read size on v1.2 (stable-fixes).</li>
<li>usb: typec: ucsi: always register a link to USB PD device (git-fixes).</li>
<li>usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).</li>
<li>usb: typec: ucsi: simplify partner&#x27;s PD caps registration (git-fixes).</li>
<li>usb: typec: ucsi_acpi: Refactor and fix DELL quirk (git-fixes).</li>
<li>usb: udc: remove warning when queue disabled ep (stable-fixes).</li>
<li>usb: xhci-plat: Do not include xhci.h (stable-fixes).</li>
<li>usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).</li>
<li>usb: xhci: Implement xhci_handshake_check_state() helper.</li>
<li>usb: xhci: correct return value in case of STS_HCE (git-fixes).</li>
<li>vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).</li>
<li>vboxsf: explicitly deny setlease attempts (stable-fixes).</li>
<li>vdpa/mlx5: Allow CVQ size changes (git-fixes).</li>
<li>vdpa_sim: reset must not run (git-fixes).</li>
<li>veth: try harder when allocating queue memory (git-fixes).</li>
<li>vhost: Add smp_rmb() in vhost_enable_notify() (git-fixes).</li>
<li>vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes).</li>
<li>virtio-blk: Ensure no requests in virtqueues before deleting vqs (git-fixes).</li>
<li>virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223944).</li>
<li>virtio_net: Do not send RSS key if it is not supported (git-fixes).</li>
<li>vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).</li>
<li>vsock/virtio: fix packet delivery to tap device (git-fixes).</li>
<li>watchdog: bd9576: Drop "always-running" property (git-fixes).</li>
<li>watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).</li>
<li>watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).</li>
<li>watchdog: sa1100: Fix PTR_ERR_OR_ZERO() vs NULL check in sa1100dog_probe() (git-fixes).</li>
<li>wifi: ar5523: enable proper endpoint verification (git-fixes).</li>
<li>wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).</li>
<li>wifi: ath10k: poll service ready message before failing (git-fixes).</li>
<li>wifi: ath10k: populate board data for WCN3990 (git-fixes).</li>
<li>wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).</li>
<li>wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).</li>
<li>wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() (git-fixes).</li>
<li>wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).</li>
<li>wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro (stable-fixes).</li>
<li>wifi: brcmfmac: Demote vendor-specific attach/detach messages to info (git-fixes).</li>
<li>wifi: brcmfmac: add per-vendor feature detection callback (stable-fixes).</li>
<li>wifi: brcmfmac: cfg80211: Use WSEC to set SAE password (stable-fixes).</li>
<li>wifi: brcmfmac: pcie: handle randbuf allocation failure (git-fixes).</li>
<li>wifi: carl9170: add a proper sanity check for endpoints (git-fixes).</li>
<li>wifi: carl9170: re-fix fortified-memset warning (git-fixes).</li>
<li>wifi: cfg80211: check A-MSDU format more carefully (stable-fixes).</li>
<li>wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).</li>
<li>wifi: ieee80211: fix ieee80211_mle_basic_sta_prof_size_ok() (git-fixes).</li>
<li>wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).</li>
<li>wifi: iwlwifi: fw: fix compile w/o CONFIG_ACPI (git-fixes).</li>
<li>wifi: iwlwifi: mvm: allocate STA links only for active links (git-fixes).</li>
<li>wifi: iwlwifi: mvm: fix active link counting during recovery (git-fixes).</li>
<li>wifi: iwlwifi: mvm: fix check in iwl_mvm_sta_fw_id_mask (git-fixes).</li>
<li>wifi: iwlwifi: mvm: guard against invalid STA ID on removal (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: include link ID when releasing frames (git-fixes).</li>
<li>wifi: iwlwifi: mvm: init vif works only once (git-fixes).</li>
<li>wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).</li>
<li>wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).</li>
<li>wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).</li>
<li>wifi: iwlwifi: mvm: select STA mask only for active links (git-fixes).</li>
<li>wifi: iwlwifi: mvm: use correct address 3 in A-MSDU (stable-fixes).</li>
<li>wifi: iwlwifi: pcie: Add the PCI device id for new hardware (stable-fixes).</li>
<li>wifi: iwlwifi: pcie: fix RB status reading (stable-fixes).</li>
<li>wifi: iwlwifi: read txq->read_ptr under lock (stable-fixes).</li>
<li>wifi: iwlwifi: reconfigure TLC during HW restart (git-fixes).</li>
<li>wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).</li>
<li>wifi: mac80211: clean up assignments to pointer cache (stable-fixes).</li>
<li>wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).</li>
<li>wifi: mac80211: fix prep_connection error path (stable-fixes).</li>
<li>wifi: mac80211: fix unaligned le16 access (git-fixes).</li>
<li>wifi: mac80211: only call drv_sta_rc_update for uploaded stations (stable-fixes).</li>
<li>wifi: mac80211: remove link before AP (git-fixes).</li>
<li>wifi: mac80211_hwsim: init peer measurement result (git-fixes).</li>
<li>wifi: mt76: mt7603: add wpdma tx eof flag for PSE client reset (git-fixes).</li>
<li>wifi: mt76: mt7603: fix tx queue of loopback packets (git-fixes).</li>
<li>wifi: mt76: mt7915: workaround too long expansion sparse warnings (git-fixes).</li>
<li>wifi: mt76: mt7996: add locking for accessing mapped registers (stable-fixes).</li>
<li>wifi: mt76: mt7996: disable AMSDU for non-data frames (stable-fixes).</li>
<li>wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).</li>
<li>wifi: nl80211: do not free NULL coalescing rule (git-fixes).</li>
<li>wifi: rtw88: 8821cu: Fix connection failure (stable-fixes).</li>
<li>wifi: rtw88: Add missing VID/PIDs for 8811CU and 8821CU (stable-fixes).</li>
<li>wifi: rtw89: fix null pointer access when abort scan (stable-fixes).</li>
<li>wifi: rtw89: pci: correct TX resource checking for PCI DMA channel of firmware command (git-fixes).</li>
<li>wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor (stable-fixes).</li>
<li>wireguard: netlink: access device through ctx instead of peer (git-fixes).</li>
<li>wireguard: netlink: check for dangling peer via is_dead instead of empty list (git-fixes).</li>
<li>wireguard: receive: annotate data-race around receiving_counter.counter (git-fixes).</li>
<li>x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (git-fixes).</li>
<li>x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (git-fixes).</li>
<li>x86/bugs: Fix BHI retpoline check (git-fixes).</li>
<li>x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).</li>
<li>x86/bugs: Remove default case for fully switched enums (git-fixes).</li>
<li>x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (git-fixes).</li>
<li>x86/coco: Require seeding RNG with RDRAND on CoCo systems (git-fixes).</li>
<li>x86/cpu: Add model number for Intel Arrow Lake mobile processor (git-fixes).</li>
<li>x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).</li>
<li>x86/efistub: Add missing boot_params for mixed mode compat entry (git-fixes).</li>
<li>x86/efistub: Call mixed mode boot services on the firmware&#x27;s stack (git-fixes).</li>
<li>x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).</li>
<li>x86/hyperv: Allow 15-bit APIC IDs for VTL platforms (git-fixes).</li>
<li>x86/hyperv: Use per cpu initial stack for vtl context (git-fixes).</li>
<li>x86/kconfig: Select ARCH_WANT_FRAME_POINTERS again when UNWINDER_FRAME_POINTER=y (git-fixes).</li>
<li>x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (git-fixes).</li>
<li>x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).</li>
<li>x86/nmi: Fix the inverse "in NMI handler" check (git-fixes).</li>
<li>x86/nospec: Refactor UNTRAIN_RET[_*] (git-fixes).</li>
<li>x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes).</li>
<li>x86/purgatory: Switch to the position-independent small code model (git-fixes).</li>
<li>x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (git-fixes).</li>
<li>x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk (git-fixes).</li>
<li>x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).</li>
<li>x86/srso: Disentangle rethunk-dependent options (git-fixes).</li>
<li>x86/srso: Fix unret validation dependencies (git-fixes).</li>
<li>x86/srso: Improve i-cache locality for alias mitigation (git-fixes).</li>
<li>x86/srso: Print actual mitigation if requested mitigation isn&#x27;t possible (git-fixes).</li>
<li>x86/srso: Remove &#x27;pred_cmd&#x27; label (git-fixes).</li>
<li>x86/srso: Unexport untraining functions (git-fixes).</li>
<li>x86/xen: Add some null pointer checking to smp.c (git-fixes).</li>
<li>x86/xen: attempt to inflate the memory balloon on PVH (git-fixes).</li>
<li>xdp, bonding: Fix feature flags when there are no slave devs anymore (git-fixes).</li>
<li>xen-netfront: Add missing skb_mark_for_recycle (git-fixes).</li>
<li>xen/events: drop xen_allocate_irqs_dynamic() (git-fixes).</li>
<li>xen/events: fix error code in xen_bind_pirq_msi_to_irq() (git-fixes).</li>
<li>xen/events: increment refcnt only if event channel is refcounted (git-fixes).</li>
<li>xen/events: modify internal [un]bind interfaces (git-fixes).</li>
<li>xen/events: reduce externally visible helper functions (git-fixes).</li>
<li>xen/events: remove some simple helpers from events_base.c (git-fixes).</li>
<li>xen/evtchn: avoid WARN() when unbinding an event channel (git-fixes).</li>
<li>xen: evtchn: Allow shared registration of IRQ handers (git-fixes).</li>
<li>xfs: add lock protection when remove perag from radix tree (git-fixes).</li>
<li>xfs: allow extent free intents to be retried (git-fixes).</li>
<li>xfs: fix perag leak when growfs fails (git-fixes).</li>
<li>xfs: force all buffers to be written during btree bulk load (git-fixes).</li>
<li>xfs: make xchk_iget safer in the presence of corrupt inode btrees (git-fixes).</li>
<li>xfs: pass the xfs_defer_pending object to iop_recover (git-fixes).</li>
<li>xfs: recompute growfsrtfree transaction reservation while growing rt volume (git-fixes).</li>
<li>xfs: transfer recovered intent item ownership in ->iop_recover (git-fixes).</li>
<li>xfs: use xfs_defer_pending objects to recover intent items (git-fixes).</li>
<li>xhci: Simplify event ring dequeue pointer update for port change events (git-fixes).</li>
<li>xhci: add helper that checks for unhandled events on a event ring (git-fixes).</li>
<li>xhci: remove unnecessary event_ring_deq parameter from xhci_handle_event() (git-fixes).</li>
<li>xhci: simplify event ring dequeue tracking for transfer events (git-fixes).</li>
<li>9p: add missing locking around taking dentry fid list (git-fixes)</li>
<li>accel/ivpu: Fix deadlock in context_xa (git-fixes).</li>
<li>ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).</li>
<li>ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).</li>
<li>ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-fixes).</li>
<li>ACPI: CPPC: Fix access width used for PCC registers (git-fixes).</li>
<li>ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro (git-fixes).</li>
<li>ACPI: CPPC: Use access_width over bit_width for system memory accesses (stable-fixes).</li>
<li>ACPI: disable -Wstringop-truncation (git-fixes).</li>
<li>ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).</li>
<li>ACPI: LPSS: Advertise number of chip selects via property (git-fixes).</li>
<li>ACPI: resource: Add Infinity laptops to irq1_edge_low_force_override (stable-fixes).</li>
<li>ACPI: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).</li>
<li>ACPI: scan: Do not increase dep_unmet for already met dependencies (git-fixes).</li>
<li>ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (bsc#1217750).</li>
<li>ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of CONFIG_X86_ANDROID_TABLETS (stable-fixes).</li>
<li>ACPICA: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() (git-fixes).</li>
<li>admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).</li>
<li>ahci: asm1064: asm1166: do not limit reported ports (git-fixes).</li>
<li>ahci: asm1064: correct count of reported ports (stable-fixes).</li>
<li>ALSA: aoa: avoid false-positive format truncation warning (git-fixes).</li>
<li>ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).</li>
<li>ALSA: core: Remove debugfs at disconnection (git-fixes).</li>
<li>ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).</li>
<li>ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes).</li>
<li>ALSA: hda: Add Intel BMG PCI ID and HDMI codec vid (stable-fixes).</li>
<li>ALSA: hda: clarify Copyright information (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Add support for ASUS ROG 2024 Laptops (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Ignore errors when configuring IRQs (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Remove redundant argument to cs35l41_request_firmware_file() (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Remove Speaker ID for Lenovo Legion slim 7 16ARHA7 (git-fixes).</li>
<li>ALSA: hda: cs35l41: Set the max PCM Gain using tuning setting (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Support HP Omen models without _DSD (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Support Lenovo 13X laptop without _DSD (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Update DSP1RX5/6 Sources for DSP config (stable-fixes).</li>
<li>ALSA: hda: cs35l56: Add ACPI device match tables (git-fixes).</li>
<li>ALSA: hda: cs35l56: Exit cache-only after cs35l56_wait_for_firmware_boot() (stable-fixes).</li>
<li>ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (git-fixes).</li>
<li>ALSA: hda: cs35l56: Set the init_done flag before component_add() (git-fixes).</li>
<li>ALSA: hda: hda_cs_dsp_ctl: Remove notification of driver write (stable-fixes).</li>
<li>ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes).</li>
<li>ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).</li>
<li>ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).</li>
<li>ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).</li>
<li>ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).</li>
<li>ALSA: hda/realtek - fixed headset Mic not show (stable-fixes).</li>
<li>ALSA: hda/realtek - Set GPIO3 to default at S4 state for Thinkpad with ALC1318 (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for HP Spectre x360 14 eu0000 (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for ASUS Laptops using CS35L56 (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for HP Omen models using CS35L41 (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for Huawei Matebook D14 NBLB-WAX9N (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for some Clevo laptops (stable-fixes).</li>
<li>ALSA: hda/realtek: Add sound quirks for Lenovo Legion slim 7 16ARHA7 models (stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for ASUS Zenbook 2024 HN7306W (stable-fixes).</li>
<li>ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes).</li>
<li>ALSA: hda/realtek: cs35l41: Support ASUS ROG G634JYR (stable-fixes).</li>
<li>ALSA: hda/realtek: Drop doubly quirk entry for 103c:8a2e (git-fixes).</li>
<li>ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897 (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix build error without CONFIG_PM (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix conflicting PCI SSID 17aa:386f for Lenovo Legion models (bsc#1223462).</li>
<li>ALSA: hda/realtek: Fix internal speakers for Legion Y9000X 2022 IAH7 (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).</li>
<li>ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes).</li>
<li>ALSA: hda/realtek: fix the hp playback volume issue for LG machines (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix volumn control of ThinkBook 16P Gen4 (git-fixes).</li>
<li>ALSA: hda/realtek: Fixes for Asus GU605M and GA403U sound (stable-fixes).</li>
<li>ALSA: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone (git-fixes).</li>
<li>ALSA: hda/tas2781: add locks to kcontrols (git-fixes).</li>
<li>ALSA: hda/tas2781: Add new vendor_id and subsystem_id to support ThinkPad ICE-1 (stable-fixes).</li>
<li>ALSA: hda/tas2781: correct the register for pow calibrated data (git-fixes).</li>
<li>ALSA: hda/tas2781: remove digital gain kcontrol (git-fixes).</li>
<li>ALSA: line6: Zero-initialize message buffers (stable-fixes).</li>
<li>ALSA: scarlett2: Add correct product series name to messages (stable-fixes).</li>
<li>ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).</li>
<li>ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).</li>
<li>ALSA: scarlett2: Add missing error check to scarlett2_config_save() (git-fixes).</li>
<li>ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).</li>
<li>ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).</li>
<li>ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).</li>
<li>ALSA: seq: Do not clear bank selection at event -> UMP MIDI2 conversion (git-fixes).</li>
<li>ALSA: seq: Fix incorrect UMP type for system messages (git-fixes).</li>
<li>ALSA: seq: Fix missing bank setup between MIDI1/MIDI2 UMP conversion (git-fixes).</li>
<li>ALSA: seq: Fix yet another spot for system message conversion (git-fixes).</li>
<li>ALSA: seq: ump: Fix conversion from MIDI2 to MIDI1 UMP messages (git-fixes).</li>
<li>ALSA: seq: ump: Fix swapped song position pointer data (git-fixes).</li>
<li>ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).</li>
<li>ALSA: timer: Set lower bound of start tick time (stable-fixes).</li>
<li>ALSA: ump: Do not accept an invalid UMP protocol number (git-fixes).</li>
<li>ALSA: ump: Do not clear bank selection after sending a program change (git-fixes).</li>
<li>ALSA: ump: Set default protocol when not given explicitly (git-fixes).</li>
<li>ALSA: usb-audio: Add sampling rates support for Mbox3 (stable-fixes).</li>
<li>ALSA: usb-audio: Fix for sampling rates support for Mbox3 (stable-fixes).</li>
<li>ALSA/hda: intel-dsp-config: reduce log verbosity (git-fixes).</li>
<li>amd/amdkfd: sync all devices to wait all processes being evicted (stable-fixes).</li>
<li>amdkfd: use calloc instead of kzalloc to avoid integer overflow (stable-fixes).</li>
<li>arm_pmu: acpi: Add a representative platform device for TRBE (bsc#1220587)</li>
<li>arm_pmu: acpi: Refactor arm_spe_acpi_register_device() (bsc#1220587)</li>
<li>ARM: 9381/1: kasan: clear stale stack poison (git-fixes).</li>
<li>ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE (git-fixes).</li>
<li>ARM: imx: Check return value of devm_kasprintf in imx_mmdc_perf_init (git-fixes).</li>
<li>ARM: OMAP2+: fix N810 MMC gpiod table (git-fixes).</li>
<li>ARM: OMAP2+: fix USB regression on Nokia N8x0 (git-fixes).</li>
<li>ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 (stable-fixes).</li>
<li>ARM: s5pv210: fix pm.c kernel-doc warning (git-fixes).</li>
<li>arm64: Add the arm64.no32bit_el0 command line option (jsc#PED-3184).</li>
<li>arm64: bpf: fix 32bit unconditional bswap (git-fixes).</li>
<li>arm64: dts: allwinner: h616: Fix I2C0 pins (git-fixes)</li>
<li>arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes)</li>
<li>arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)</li>
<li>arm64: dts: Fix dtc interrupt_provider warnings (git-fixes)</li>
<li>arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)</li>
<li>arm64: dts: imx8-ss-conn: fix usb lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)</li>
<li>arm64: dts: imx8-ss-dma: fix adc lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-dma: fix can lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-dma: fix spi lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-lsio: fix pwm lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8qm-ss-dma: fix can lpcg indices (git-fixes)</li>
<li>arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)</li>
<li>arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)</li>
<li>arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-fixes)</li>
<li>arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)</li>
<li>arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)</li>
<li>arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)</li>
<li>arm64: dts: rockchip: regulator for sd needs to be always on for (git-fixes)</li>
<li>arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)</li>
<li>arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f (git-fixes)</li>
<li>arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).</li>
<li>arm64: tegra: Correct Tegra132 I2C alias (git-fixes)</li>
<li>arm64: tegra: Set the correct PHY mode for MGBE (git-fixes)</li>
<li>arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H (git-fixes).</li>
<li>arm64/ptrace: Use saved floating point state type to determine SVE (git-fixes)</li>
<li>arm64/sve: Lower the maximum allocation for the SVE ptrace regset (git-fixes)</li>
<li>asm-generic: make sparse happy with odd-sized put_unaligned_*() (stable-fixes).</li>
<li>ASoC: acp: Support microphone from device Acer 315-24p (git-fixes).</li>
<li>ASoC: amd: acp: fix for acp_init function error handling (git-fixes).</li>
<li>ASoC: amd: yc: Add Lenovo ThinkBook 21J0 into DMI quirk table (stable-fixes).</li>
<li>ASoC: amd: yc: Fix non-functional mic on ASUS M7600RE (stable-fixes).</li>
<li>ASoC: amd: yc: Fix non-functional mic on Lenovo 21J2 (stable-fixes).</li>
<li>ASoC: amd: yc: Revert "Fix non-functional mic on Lenovo 21J2" (stable-fixes).</li>
<li>ASoC: codecs: wsa881x: set clk_stop_mode1 flag (git-fixes).</li>
<li>ASoC: cs35l41: Update DSP1RX5/6 Sources for DSP config (git-fixes).</li>
<li>ASoC: cs35l56: Fix unintended bus access while resetting amp (git-fixes).</li>
<li>ASoC: cs35l56: Prevent overwriting firmware ASP config (git-fixes).</li>
<li>ASoC: da7219-aad: fix usage of device_get_named_child_node() (git-fixes).</li>
<li>ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).</li>
<li>ASoC: Intel: avs: Fix potential integer overflow (git-fixes).</li>
<li>ASoC: Intel: avs: Populate board selection with new I2S entries (stable-fixes).</li>
<li>ASoC: Intel: avs: Set name of control as in topology (git-fixes).</li>
<li>ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).</li>
<li>ASoC: Intel: avs: Test result of avs_get_module_entry() (git-fixes).</li>
<li>ASoC: Intel: bytcr_rt5640: Apply Asus T100TA quirk to Asus T100TAM too (git-fixes).</li>
<li>ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710) laptops (stable-fixes).</li>
<li>ASoC: Intel: Disable route checks for Skylake boards (git-fixes).</li>
<li>ASoC: kirkwood: Fix potential NULL dereference (git-fixes).</li>
<li>ASoC: mediatek: Assign dummy when codec not specified for a DAI link (git-fixes).</li>
<li>ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).</li>
<li>ASoC: meson: axg-card: make links nonatomic (git-fixes).</li>
<li>ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).</li>
<li>ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).</li>
<li>ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).</li>
<li>ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).</li>
<li>ASoC: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).</li>
<li>ASoC: rockchip: i2s-tdm: Fix inaccurate sampling rates (git-fixes).</li>
<li>ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (git-fixes).</li>
<li>ASoC: rt5645: Make LattePanda board DMI match more precise (stable-fixes).</li>
<li>ASoC: rt5682-sdw: fix locking sequence (git-fixes).</li>
<li>ASoC: rt711-sdca: fix locking sequence (git-fixes).</li>
<li>ASoC: rt711-sdw: fix locking sequence (git-fixes).</li>
<li>ASoC: rt712-sdca-sdw: fix locking sequence (git-fixes).</li>
<li>ASoC: rt715-sdca: volume step modification (git-fixes).</li>
<li>ASoC: rt715: add vendor clear control register (git-fixes).</li>
<li>ASoC: rt722-sdca-sdw: fix locking sequence (git-fixes).</li>
<li>ASoC: rt722-sdca: add headset microphone vrefo setting (git-fixes).</li>
<li>ASoC: rt722-sdca: modify channel number to support 4 channels (git-fixes).</li>
<li>ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).</li>
<li>ASoC: SOF: amd: Optimize quirk for Valve Galileo (stable-fixes).</li>
<li>ASoC: SOF: Intel: add default firmware library path for LNL (git-fixes).</li>
<li>ASoC: SOF: Intel: hda-dsp: Skip IMR boot on ACE platforms in case of S3 suspend (stable-fixes).</li>
<li>ASoC: SOF: Intel: lnl: Correct rom_status_reg (git-fixes).</li>
<li>ASoC: SOF: Intel: mtl: call dsp dump when boot retry fails (stable-fixes).</li>
<li>ASoC: SOF: Intel: mtl: Correct rom_status_reg (git-fixes).</li>
<li>ASoC: SOF: Intel: mtl: Disable interrupts when firmware boot failed (git-fixes).</li>
<li>ASoC: SOF: Intel: mtl: Implement firmware boot state check (git-fixes).</li>
<li>ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend (stable-fixes).</li>
<li>ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (git-fixes).</li>
<li>ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).</li>
<li>ASoC: tas2781: Fix a warning reported by robot kernel test (git-fixes).</li>
<li>ASoC: tas2781: Fix wrong loading calibrated data sequence (git-fixes).</li>
<li>ASoC: tas2781: mark dvc_tlv with __maybe_unused (git-fixes).</li>
<li>ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).</li>
<li>ASoC: ti: Convert Pandora ASoC to GPIO descriptors (stable-fixes).</li>
<li>ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).</li>
<li>ASoC: tlv320adc3xxx: Do not strip remove function when driver is builtin (git-fixes).</li>
<li>ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).</li>
<li>ASoC: wm_adsp: Add missing MODULE_DESCRIPTION() (git-fixes).</li>
<li>ASoC: wm_adsp: Fix missing mutex_lock in wm_adsp_write_ctl() (git-fixes).</li>
<li>ata: libata-core: Allow command duration limits detection for ACS-4 drives (git-fixes).</li>
<li>ata: pata_legacy: make legacy_exit() work again (git-fixes).</li>
<li>ata: sata_gemini: Check clk_enable() result (stable-fixes).</li>
<li>ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-fixes).</li>
<li>ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).</li>
<li>autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).</li>
<li>ax25: Fix netdev refcount issue (git-fixes).</li>
<li>ax25: Fix reference count leak issue of net_device (git-fixes).</li>
<li>ax25: Fix reference count leak issues of ax25_dev (git-fixes).</li>
<li>ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).</li>
<li>batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).</li>
<li>bitops: add missing prototype check (git-fixes).</li>
<li>blk-cgroup: fix list corruption from reorder of WRITE ->lqueued (bsc#1225605).</li>
<li>blk-cgroup: fix list corruption from resetting io stat (bsc#1225605).</li>
<li>block: fix q->blkg_list corruption during disk rebind (bsc#1223591).</li>
<li>Bluetooth: Add new quirk for broken read key length on ATS2851 (stable-fixes).</li>
<li>Bluetooth: add quirk for broken address properties (git-fixes).</li>
<li>Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).</li>
<li>Bluetooth: btintel: Fixe build regression (git-fixes).</li>
<li>Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).</li>
<li>Bluetooth: btusb: Fix triggering coredump implementation for QCA (git-fixes).</li>
<li>Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).</li>
<li>Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).</li>
<li>Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).</li>
<li>Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).</li>
<li>Bluetooth: hci_core: Cancel request on command timeout (stable-fixes).</li>
<li>Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).</li>
<li>Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).</li>
<li>Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).</li>
<li>Bluetooth: hci_sync: Fix not checking error on hci_cmd_sync_cancel_sync (git-fixes).</li>
<li>Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY (git-fixes).</li>
<li>Bluetooth: hci_sync: Use QoS to determine which PHY to scan (stable-fixes).</li>
<li>Bluetooth: HCI: Fix potential null-ptr-deref (git-fixes).</li>
<li>Bluetooth: ISO: Align broadcast sync_timeout with connection timeout (stable-fixes).</li>
<li>Bluetooth: ISO: Do not reject BT_ISO_QOS if parameters are unset (git-fixes).</li>
<li>Bluetooth: l2cap: Do not double set the HCI_CONN_MGMT_CONNECTED bit (git-fixes).</li>
<li>Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).</li>
<li>Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).</li>
<li>Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() (git-fixes).</li>
<li>Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID (bsc#1221504).</li>
<li>Bluetooth: mgmt: Fix limited discoverable off timeout (stable-fixes).</li>
<li>Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).</li>
<li>Bluetooth: qca: add missing firmware sanity checks (git-fixes).</li>
<li>Bluetooth: qca: fix device-address endianness (git-fixes).</li>
<li>Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).</li>
<li>Bluetooth: qca: fix firmware check error path (git-fixes).</li>
<li>Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).</li>
<li>Bluetooth: qca: fix NULL-deref on non-serdev setup (git-fixes).</li>
<li>Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).</li>
<li>Bluetooth: qca: fix NVM configuration parsing (git-fixes).</li>
<li>Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).</li>
<li>Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).</li>
<li>bnx2x: Fix firmware version string character counts (git-fixes).</li>
<li>bnxt_en: Fix error recovery for RoCE ulp client (git-fixes).</li>
<li>bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() (git-fixes).</li>
<li>bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).</li>
<li>bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)</li>
<li>bootconfig: Fix the kerneldoc of _xbc_exit() (git-fixes).</li>
<li>bootconfig: use memblock_free_late to free xbc memory to buddy (git-fixes).</li>
<li>bootmem: use kmemleak_free_part_phys in free_bootmem_page (git-fixes).</li>
<li>bootmem: use kmemleak_free_part_phys in put_page_bootmem (git-fixes).</li>
<li>bpf, arm64: fix bug in BPF_LDX_MEMSX (git-fixes)</li>
<li>bpf, arm64: Fix incorrect runtime stats (git-fixes)</li>
<li>bpf, scripts: Correct GPL license name (git-fixes).</li>
<li>bpf: fix precision backtracking instruction iteration (bsc#1225756).</li>
<li>bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).</li>
<li>bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).</li>
<li>btrfs: add a helper to read the superblock metadata_uuid (git-fixes)</li>
<li>btrfs: add and use helper to check if block group is used (bsc#1220120).</li>
<li>btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)</li>
<li>btrfs: add new unused block groups to the list of unused block groups (bsc#1220120).</li>
<li>btrfs: allow to run delayed refs by bytes to be released instead of count (bsc#1220120).</li>
<li>btrfs: always clear PERTRANS metadata during commit (git-fixes)</li>
<li>btrfs: always print transaction aborted messages with an error level (git-fixes)</li>
<li>btrfs: always reserve space for delayed refs when starting transaction (bsc#1220120).</li>
<li>btrfs: assert correct lock is held at btrfs_select_ref_head() (bsc#1220120).</li>
<li>btrfs: assert delayed node locked when removing delayed item (git-fixes)</li>
<li>btrfs: avoid start and commit empty transaction when flushing qgroups (bsc#1220120).</li>
<li>btrfs: avoid start and commit empty transaction when starting qgroup rescan (bsc#1220120).</li>
<li>btrfs: avoid starting and committing empty transaction when flushing space (bsc#1220120).</li>
<li>btrfs: avoid starting new transaction when flushing delayed items and refs (bsc#1220120).</li>
<li>btrfs: check for BTRFS_FS_ERROR in pending ordered assert (git-fixes)</li>
<li>btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super (git-fixes)</li>
<li>btrfs: defrag: avoid unnecessary defrag caused by incorrect extent size (git-fixes)</li>
<li>btrfs: defrag: reject unknown flags of btrfs_ioctl_defrag_range_args (git-fixes)</li>
<li>btrfs: do not allow non subvolume root targets for snapshot (git-fixes)</li>
<li>btrfs: do not arbitrarily slow down delalloc if we&#x27;re committing (git-fixes)</li>
<li>btrfs: do not delete unused block group if it may be used soon (bsc#1220120).</li>
<li>btrfs: do not refill whole delayed refs block reserve when starting transaction (bsc#1220120).</li>
<li>btrfs: do not start transaction when joining with TRANS_JOIN_NOSTART (git-fixes)</li>
<li>btrfs: do not steal space from global rsv after a transaction abort (bsc#1220120).</li>
<li>btrfs: do not warn if discard range is not aligned to sector (git-fixes)</li>
<li>btrfs: ensure fiemap does not race with writes when FIEMAP_FLAG_SYNC is given (bsc#1223285).</li>
<li>btrfs: error out when COWing block using a stale transaction (git-fixes)</li>
<li>btrfs: error out when reallocating block for defrag using a stale transaction (git-fixes)</li>
<li>btrfs: error when COWing block from a root that is being deleted (git-fixes)</li>
<li>btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)</li>
<li>btrfs: fail priority metadata ticket with real fs error (bsc#1220120).</li>
<li>btrfs: file_remove_privs needs an exclusive lock in direct io write (git-fixes)</li>
<li>btrfs: fix 64bit compat send ioctl arguments not initializing version member (git-fixes)</li>
<li>btrfs: fix deadlock with fiemap and extent locking (bsc#1223285).</li>
<li>btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)</li>
<li>btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send() (git-fixes)</li>
<li>btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)</li>
<li>btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)</li>
<li>btrfs: fix off-by-one when checking chunk map includes logical address (git-fixes)</li>
<li>btrfs: fix race between ordered extent completion and fiemap (bsc#1223285).</li>
<li>btrfs: fix race when detecting delalloc ranges during fiemap (bsc#1223285).</li>
<li>btrfs: fix race when refilling delayed refs block reserve (git-fixes)</li>
<li>btrfs: fix start transaction qgroup rsv double free (git-fixes)</li>
<li>btrfs: fix stripe length calculation for non-zoned data chunk allocation (bsc#1217489).</li>
<li>btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range() (git-fixes) Dropped hunk in selftests (test_case_7), 92e1229b204d6.</li>
<li>btrfs: free qgroup rsv on io failure (git-fixes)</li>
<li>btrfs: free the allocated memory if btrfs_alloc_page_array() fails (git-fixes)</li>
<li>btrfs: get rid of label and goto at insert_delayed_ref() (bsc#1220120).</li>
<li>btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)</li>
<li>btrfs: handle errors properly in update_inline_extent_backref() (git-fixes)</li>
<li>btrfs: initialize key where it&#x27;s used when running delayed data ref (bsc#1220120).</li>
<li>btrfs: log message if extent item not found when running delayed extent op (bsc#1220120).</li>
<li>btrfs: make btrfs_cleanup_fs_roots() static (bsc#1220120).</li>
<li>btrfs: make btrfs_destroy_delayed_refs() return void (bsc#1220120).</li>
<li>btrfs: make btrfs_destroy_marked_extents() return void (bsc#1220120).</li>
<li>btrfs: make btrfs_destroy_pinned_extent() return void (bsc#1220120).</li>
<li>btrfs: make error messages more clear when getting a chunk map (git-fixes)</li>
<li>btrfs: make find_first_extent_bit() return a boolean (bsc#1220120).</li>
<li>btrfs: make find_free_dev_extent() static (bsc#1220120).</li>
<li>btrfs: make insert_delayed_ref() return a bool instead of an int (bsc#1220120).</li>
<li>btrfs: merge find_free_dev_extent() and find_free_dev_extent_start() (bsc#1220120).</li>
<li>btrfs: move btrfs_free_excluded_extents() into block-group.c (bsc#1220120).</li>
<li>btrfs: open code trivial btrfs_add_excluded_extent() (bsc#1220120).</li>
<li>btrfs: output extra debug info if we failed to find an inline backref (git-fixes)</li>
<li>btrfs: pass a space_info argument to btrfs_reserve_metadata_bytes() (bsc#1220120).</li>
<li>btrfs: prevent transaction block reserve underflow when starting transaction (git-fixes)</li>
<li>btrfs: print available space across all block groups when dumping space info (bsc#1220120).</li>
<li>btrfs: print available space for a block group when dumping a space info (bsc#1220120).</li>
<li>btrfs: print block group super and delalloc bytes when dumping space info (bsc#1220120).</li>
<li>btrfs: print target number of bytes when dumping free space (bsc#1220120).</li>
<li>btrfs: qgroup: always free reserved space for extent records (bsc#1216196).</li>
<li>btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans (git-fixes)</li>
<li>btrfs: record delayed inode root in transaction (git-fixes)</li>
<li>btrfs: reject encoded write if inode has nodatasum flag set (git-fixes)</li>
<li>btrfs: release path before inode lookup during the ino lookup ioctl (git-fixes)</li>
<li>btrfs: remove pointless &#x27;ref_root&#x27; variable from run_delayed_data_ref() (bsc#1220120).</li>
<li>btrfs: remove pointless in_tree field from struct btrfs_delayed_ref_node (bsc#1220120).</li>
<li>btrfs: remove pointless initialization at btrfs_delayed_refs_rsv_release() (bsc#1220120).</li>
<li>btrfs: remove redundant BUG_ON() from __btrfs_inc_extent_ref() (bsc#1220120).</li>
<li>btrfs: remove refs_to_add argument from __btrfs_inc_extent_ref() (bsc#1220120).</li>
<li>btrfs: remove refs_to_drop argument from __btrfs_free_extent() (bsc#1220120).</li>
<li>btrfs: remove the refcount warning/check at btrfs_put_delayed_ref() (bsc#1220120).</li>
<li>btrfs: remove unnecessary logic when running new delayed references (bsc#1220120).</li>
<li>btrfs: remove unnecessary prototype declarations at disk-io.c (bsc#1220120).</li>
<li>btrfs: remove unused is_head field from struct btrfs_delayed_ref_node (bsc#1220120).</li>
<li>btrfs: rename add_new_free_space() to btrfs_add_new_free_space() (bsc#1220120).</li>
<li>btrfs: reorder some members of struct btrfs_delayed_ref_head (bsc#1220120).</li>
<li>btrfs: reserve space for delayed refs on a per ref basis (bsc#1220120).</li>
<li>btrfs: reset destination buffer when read_extent_buffer() gets invalid range (git-fixes)</li>
<li>btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1 (git-fixes)</li>
<li>btrfs: return -EUCLEAN if extent item is missing when searching inline backref (bsc#1220120).</li>
<li>btrfs: return real error when orphan cleanup fails due to a transaction abort (bsc#1220120).</li>
<li>btrfs: send: do not issue unnecessary zero writes for trailing hole (bsc#1222459).</li>
<li>btrfs: send: ensure send_fd is writable (git-fixes)</li>
<li>btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)</li>
<li>btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)</li>
<li>btrfs: set page extent mapped after read_folio in relocate_one_page (git-fixes)</li>
<li>btrfs: simplify check for extent item overrun at lookup_inline_extent_backref() (bsc#1220120).</li>
<li>btrfs: stop doing excessive space reservation for csum deletion (bsc#1220120).</li>
<li>btrfs: store the error that turned the fs into error state (bsc#1220120).</li>
<li>btrfs: sysfs: validate scrub_speed_max value (git-fixes)</li>
<li>btrfs: tree-checker: fix inline ref size in error messages (git-fixes)</li>
<li>btrfs: update comment for btrfs_join_transaction_nostart() (bsc#1220120).</li>
<li>btrfs: update documentation for add_new_free_space() (bsc#1220120).</li>
<li>btrfs: use a bool to track qgroup record insertion when adding ref head (bsc#1220120).</li>
<li>btrfs: use a single switch statement when initializing delayed ref head (bsc#1220120).</li>
<li>btrfs: use a single variable for return value at lookup_inline_extent_backref() (bsc#1220120).</li>
<li>btrfs: use a single variable for return value at run_delayed_extent_op() (bsc#1220120).</li>
<li>btrfs: use bool type for delayed ref head fields that are used as booleans (bsc#1220120).</li>
<li>btrfs: use the correct superblock to compare fsid in btrfs_validate_super (git-fixes)</li>
<li>btrfs: use u64 for buffer sizes in the tree search ioctls (git-fixes)</li>
<li>btrfs: zoned: do not skip block groups with 100% zone unusable (bsc#1220120).</li>
<li>bus: mhi: ep: check the correct variable in mhi_ep_register_controller() (git-fixes).</li>
<li>ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE (bsc#1224866).</li>
<li>ceph: stop copying to iter at EOF on sync reads (bsc#1222606).</li>
<li>certs: Add ECDSA signature verification self-test (bsc#1222777).</li>
<li>certs: Move RSA self-test data to separate file (bsc#1222777).</li>
<li>clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).</li>
<li>clk: Get runtime PM before walking tree during disable_unused (git-fixes).</li>
<li>clk: Get runtime PM before walking tree for clk_summary (git-fixes).</li>
<li>clk: Initialize struct clk_core kref earlier (stable-fixes).</li>
<li>clk: mediatek: Do a runtime PM get on controllers during probe (git-fixes).</li>
<li>clk: mediatek: mt8365-mm: fix DPI0 parent (git-fixes).</li>
<li>clk: mediatek: pllfh: Do not log error for missing fhctl node (git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: fix rate setting for Stromer PLLs (git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: remove invalid Stromer register offset (git-fixes).</li>
<li>clk: qcom: dispcc-sm6350: fix DisplayPort clocks (git-fixes).</li>
<li>clk: qcom: dispcc-sm8450: fix DisplayPort clocks (git-fixes).</li>
<li>clk: qcom: dispcc-sm8550: fix DisplayPort clocks (git-fixes).</li>
<li>clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).</li>
<li>clk: qcom: reset: Commonize the de/assert functions (stable-fixes).</li>
<li>clk: qcom: reset: Ensure write completion on reset de/assertion (git-fixes).</li>
<li>clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).</li>
<li>clk: renesas: r8a779a0: Fix CANFD parent clock (git-fixes).</li>
<li>clk: renesas: r9a07g043: Add clock and reset entry for PLIC (git-fixes).</li>
<li>clk: rs9: fix wrong default value for clock amplitude (git-fixes).</li>
<li>clk: samsung: exynosautov9: fix wrong pll clock id value (git-fixes).</li>
<li>clk: Show active consumers of clocks in debugfs (stable-fixes).</li>
<li>clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (git-fixes).</li>
<li>clocksource/drivers/arm_global_timer: Fix maximum prescaler value (git-fixes).</li>
<li>clocksource/drivers/imx: Fix -Wunused-but-set-variable warning (git-fixes).</li>
<li>comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).</li>
<li>coresight: trbe: Add a representative coresight_platform_data for (bsc#1220587)</li>
<li>coresight: trbe: Allocate platform data per device (bsc#1220587)</li>
<li>coresight: trbe: Enable ACPI based TRBE devices (bsc#1220587)</li>
<li>counter: linux/counter.h: fix Excess kernel-doc description warning (git-fixes).</li>
<li>cppc_cpufreq: Fix possible null pointer dereference (git-fixes).</li>
<li>cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations (git-fixes).</li>
<li>cpufreq: exit() callback is optional (git-fixes).</li>
<li>cpumask: Add for_each_cpu_from() (bsc#1225053).</li>
<li>crypto: bcm - Fix pointer arithmetic (git-fixes).</li>
<li>crypto: ccp - Add support for PCI device 0x156E (bsc#1223338).</li>
<li>crypto: ccp - Add support for PCI device 0x17E0 (bsc#1223338).</li>
<li>crypto: ccp - drop platform ifdef checks (git-fixes).</li>
<li>crypto: ecc - update ecc_gen_privkey for FIPS 186-5 (bsc#1222782).</li>
<li>crypto: ecdsa - Fix module auto-load on add-key (git-fixes).</li>
<li>crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init (git-fixes).</li>
<li>crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (git-fixes).</li>
<li>crypto: qat - fix ring to service map for dcc in 4xxx (git-fixes).</li>
<li>crypto: qat - improve error logging to be consistent across features (git-fixes).</li>
<li>crypto: qat - relocate and rename get_service_enabled() (stable-fixes).</li>
<li>crypto: qat - specify firmware files for 402xx (git-fixes).</li>
<li>crypto: rsa - add a check for allocation failure (bsc#1222775).</li>
<li>crypto: rsa - allow only odd e and restrict value in FIPS mode (bsc#1222775).</li>
<li>crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c (bsc#1222769).</li>
<li>crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).</li>
<li>crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).</li>
<li>crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).</li>
<li>cxl/acpi: Fix load failures due to single window creation failure (git-fixes).</li>
<li>cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window (git-fixes).</li>
<li>cxl/trace: Properly initialize cxl_poison region name (git-fixes).</li>
<li>dax: alloc_dax() return ERR_PTR(-EOPNOTSUPP) for CONFIG_DAX=n (jsc#PED-5853).</li>
<li>dax/bus.c: replace driver-core lock usage by a local rwsem (jsc#PED-5853).</li>
<li>dax/bus.c: replace several sprintf() with sysfs_emit() (jsc#PED-5853).</li>
<li>device-dax: make dax_bus_type const (jsc#PED-5853).</li>
<li>dlm: fix user space lkb refcounting (git-fixes).</li>
<li>dm crypt: remove redundant state settings after waking up (jsc#PED-7542).</li>
<li>dm thin: add braces around conditional code that spans lines (jsc#PED-7542).</li>
<li>dm verity: set DM_TARGET_SINGLETON feature flag (jsc#PED-7542).</li>
<li>dm-integrity: set max_integrity_segments in dm_integrity_io_hints (jsc#PED-7542).</li>
<li>dm-multipath: dont&#x27;t attempt SG_IO on non-SCSI-disks (bsc#1223575).</li>
<li>dm-raid: add a new helper prepare_suspend() in md_personality (jsc#PED-7542).</li>
<li>dm-raid: really frozen sync_thread during suspend (jsc#PED-7542).</li>
<li>dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape (bsc#1219596)</li>
<li>dm: update relevant MODULE_AUTHOR entries to latest dm-devel mailing list (jsc#PED-7542).</li>
<li>dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).</li>
<li>dma-buf: Fix NULL pointer dereference in sanitycheck() (git-fixes).</li>
<li>dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (git-fixes).</li>
<li>dma-mapping: benchmark: fix node id validation (git-fixes).</li>
<li>dma-mapping: benchmark: handle NUMA_NO_NODE correctly (git-fixes).</li>
<li>dma: xilinx_dpdma: Fix locking (git-fixes).</li>
<li>dmaengine: axi-dmac: fix possible race in remove() (git-fixes).</li>
<li>dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).</li>
<li>dmaengine: idxd: Avoid unnecessary destruction of file_ida (git-fixes).</li>
<li>dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).</li>
<li>dmaengine: owl: fix register access functions (git-fixes).</li>
<li>dmaengine: tegra186: Fix residual calculation (git-fixes).</li>
<li>driver core: Introduce device_link_wait_removal() (stable-fixes).</li>
<li>drivers/nvme: Add quirks for device 126f:2262 (git-fixes).</li>
<li>drm: add drm_gem_object_is_shared_for_memory_stats() helper (stable-fixes).</li>
<li>drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).</li>
<li>drm: Check output polling initialized before disabling (stable-fixes).</li>
<li>drm: Check polling initialized before enabling in drm_helper_probe_single_connector_modes (stable-fixes).</li>
<li>drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).</li>
<li>drm: nv04: Fix out of bounds access (git-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).</li>
<li>drm: vc4: Fix possible null pointer dereference (git-fixes).</li>
<li>drm: zynqmp_dpsub: Always register bridge (git-fixes).</li>
<li>drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).</li>
<li>drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() (stable-fixes).</li>
<li>drm/amd/display: Add dml2 copy functions (stable-fixes).</li>
<li>drm/amd/display: Allow dirty rects to be sent to dmub when abm is active (stable-fixes).</li>
<li>drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).</li>
<li>drm/amd/display: Change default size for dummy plane in DML2 (stable-fixes).</li>
<li>drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).</li>
<li>drm/amd/display: Enable colorspace property for MST connectors (git-fixes).</li>
<li>drm/amd/display: Fix bounds check for dcn35 DcfClocks (git-fixes).</li>
<li>drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).</li>
<li>drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).</li>
<li>drm/amd/display: Fix idle check for shared firmware state (stable-fixes).</li>
<li>drm/amd/display: Fix incorrect DSC instance for MST (stable-fixes).</li>
<li>drm/amd/display: fix input states translation error for dcn35 & dcn351 (stable-fixes).</li>
<li>drm/amd/display: Fix nanosec stat overflow (stable-fixes).</li>
<li>drm/amd/display: Fix noise issue on HDMI AV mute (stable-fixes).</li>
<li>drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).</li>
<li>drm/amd/display: handle range offsets in VRR ranges (stable-fixes).</li>
<li>drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).</li>
<li>drm/amd/display: Init DPPCLK from SMU on dcn32 (stable-fixes).</li>
<li>drm/amd/display: Override min required DCFCLK in dml1_validate (stable-fixes).</li>
<li>drm/amd/display: Prevent crash when disable stream (stable-fixes).</li>
<li>drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4 (stable-fixes).</li>
<li>drm/amd/display: Remove MPC rate control logic from DCN30 and above (stable-fixes).</li>
<li>drm/amd/display: Remove redundant condition in dcn35_calc_blocks_to_gate() (git-fixes).</li>
<li>drm/amd/display: Return the correct HDCP error code (stable-fixes).</li>
<li>drm/amd/display: Send DTBCLK disable message on first commit (git-fixes).</li>
<li>drm/amd/display: Set DCN351 BB and IP the same as DCN35 (stable-fixes).</li>
<li>drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST (stable-fixes).</li>
<li>drm/amd/display: Update odm when ODM combine is changed on an otg master pipe with no plane (stable-fixes).</li>
<li>drm/amd/display: Use freesync when <code>DRM_EDID_FEATURE_CONTINUOUS_FREQ</code> found (stable-fixes).</li>
<li>drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).</li>
<li>drm/amd/swsmu: modify the gfx activity scaling (stable-fixes).</li>
<li>drm/amdgpu: always force full reset for SOC21 (stable-fixes).</li>
<li>drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).</li>
<li>drm/amdgpu: Assign correct bits for SDMA HDP flush (stable-fixes).</li>
<li>drm/amdgpu: drop setting buffer funcs in sdma442 (git-fixes).</li>
<li>drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-fixes).</li>
<li>drm/amdgpu: Fix comparison in amdgpu_res_cpu_visible (git-fixes).</li>
<li>drm/amdgpu: fix deadlock while reading mqd from debugfs (git-fixes).</li>
<li>drm/amdgpu: fix doorbell regression (git-fixes).</li>
<li>drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).</li>
<li>drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).</li>
<li>drm/amdgpu: fix mmhub client id out-of-bounds access (git-fixes).</li>
<li>drm/amdgpu: fix use-after-free bug (stable-fixes).</li>
<li>drm/amdgpu: Fix VCN allocation in CPX partition (stable-fixes).</li>
<li>drm/amdgpu: fix visible VRAM handling during faults (git-fixes).</li>
<li>drm/amdgpu: implement IRQ_STATE_ENABLE for SDMA v4.4.2 (stable-fixes).</li>
<li>drm/amdgpu: make damage clips support configurable (stable-fixes).</li>
<li>drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).</li>
<li>drm/amdgpu: Refine IB schedule error logging (stable-fixes).</li>
<li>drm/amdgpu: remove invalid resource->start check v2 (git-fixes).</li>
<li>drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).</li>
<li>drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).</li>
<li>drm/amdgpu/display: Address kdoc for &#x27;is_psr_su&#x27; in &#x27;fill_dc_dirty_rects&#x27; (git-fixes).</li>
<li>drm/amdgpu/pm: Check the validity of overdiver power limit (git-fixes).</li>
<li>drm/amdgpu/pm: Fix NULL pointer dereference when get power limit (git-fixes).</li>
<li>drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).</li>
<li>drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).</li>
<li>drm/amdkfd: Check cgroup when returning DMABuf info (stable-fixes).</li>
<li>drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).</li>
<li>drm/amdkfd: Fix memory leak in create_process failure (git-fixes).</li>
<li>drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).</li>
<li>drm/amdkfd: range check cp bad op exception interrupts (stable-fixes).</li>
<li>drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).</li>
<li>drm/arm/malidp: fix a possible null pointer dereference (git-fixes).</li>
<li>drm/ast: Fix soft lockup (git-fixes).</li>
<li>drm/bridge: anx7625: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: anx7625: Update audio status while detecting (git-fixes).</li>
<li>drm/bridge: dpc3433: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: Fix improper bridge init order with pre_enable_prev_first (git-fixes).</li>
<li>drm/bridge: icn6211: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: lt8912b: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: lt9611: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: lt9611uxc: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: tc358775: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).</li>
<li>drm/buddy: check range allocation matches alignment (stable-fixes).</li>
<li>drm/ci: update device type for volteer devices (git-fixes).</li>
<li>drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-fixes).</li>
<li>drm/connector: Add \n to message about demoting connector force-probes (git-fixes).</li>
<li>drm/display: fix typo (git-fixes).</li>
<li>drm/exynos: do not return negative values from .get_modes() (stable-fixes).</li>
<li>drm/fbdev-generic: Do not set physical framebuffer address (git-fixes).</li>
<li>drm/gma500: Remove lid code (git-fixes).</li>
<li>drm/i915: Disable live M/N updates when using bigjoiner (stable-fixes).</li>
<li>drm/i915: Disable port sync when bigjoiner is used (stable-fixes).</li>
<li>drm/i915: Do not match JSL in ehl_combo_pll_div_frac_wa_needed() (git-fixes).</li>
<li>drm/i915: Fix audio component initialization (git-fixes).</li>
<li>drm/i915: Include the PLL name in the debug messages (stable-fixes).</li>
<li>drm/i915: Pre-populate the cursor physical dma address (git-fixes).</li>
<li>drm/i915: Replace a memset() with zero initialization (stable-fixes).</li>
<li>drm/i915: Stop printing pipe name as hex (stable-fixes).</li>
<li>drm/i915: Suppress old PLL pipe_mask checks for MG/TC/TBT PLLs (stable-fixes).</li>
<li>drm/i915: Try to preserve the current shared_dpll for fastset on type-c ports (stable-fixes).</li>
<li>drm/i915: Use named initializers for DPLL info (stable-fixes).</li>
<li>drm/i915/audio: Fix audio time stamp programming for DP (stable-fixes).</li>
<li>drm/i915/bios: Fix parsing backlight BDB data (git-fixes).</li>
<li>drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).</li>
<li>drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).</li>
<li>drm/i915/display: Use i915_gem_object_get_dma_address to get dma address (stable-fixes).</li>
<li>drm/i915/dp: Fix the computation for compressed_bpp for DISPLAY &lt; 13 (git-fixes).</li>
<li>drm/i915/dp: Remove support for UHBR13.5 (git-fixes).</li>
<li>drm/i915/dpt: Make DPT object unshrinkable (git-fixes).</li>
<li>drm/i915/dsb: Fix DSB vblank waits when using VRR (git-fixes).</li>
<li>drm/i915/dsi: Go back to the previous INIT_OTP/DISPLAY_ON order, mostly (git-fixes).</li>
<li>drm/i915/gt: Automate CCS Mode setting during engine resets (git-fixes).</li>
<li>drm/i915/gt: Disable HW load balancing for CCS (git-fixes).</li>
<li>drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes).</li>
<li>drm/i915/gt: Do not generate the command streamer for all the CCS (git-fixes).</li>
<li>drm/i915/gt: Enable only one CCS for compute workload (git-fixes).</li>
<li>drm/i915/gt: Fix CCS id&#x27;s calculation for CCS mode setting (git-fixes).</li>
<li>drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).</li>
<li>drm/i915/guc: avoid FIELD_PREP warning (git-fixes).</li>
<li>drm/i915/hwmon: Fix locking inversion in sysfs getter (git-fixes).</li>
<li>drm/i915/lspcon: Separate function to set expected mode (bsc#1193599).</li>
<li>drm/i915/lspcon: Separate lspcon probe and lspcon init (bsc#1193599).</li>
<li>drm/i915/mst: Limit MST+DSC to TGL+ (git-fixes).</li>
<li>drm/i915/mst: Reject FEC+MST on ICL (git-fixes).</li>
<li>drm/i915/mtl: Update workaround 14018575942 (git-fixes).</li>
<li>drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).</li>
<li>drm/i915/vrr: Generate VRR "safe window" for DSB (git-fixes).</li>
<li>drm/imx/ipuv3: do not return negative values from .get_modes() (stable-fixes).</li>
<li>drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).</li>
<li>drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).</li>
<li>drm/mediatek: dp: Fix mtk_dp_aux_transfer return value (git-fixes).</li>
<li>drm/mediatek: Init <code>ddp_comp</code> with devm_kcalloc() (git-fixes).</li>
<li>drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).</li>
<li>drm/meson: dw-hdmi: power up phy on device init (git-fixes).</li>
<li>drm/meson: gate px_clk when setting rate (git-fixes).</li>
<li>drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).</li>
<li>drm/msm: Add newlines to some debug prints (git-fixes).</li>
<li>drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git-fixes).</li>
<li>drm/msm/adreno: fix CP cycles stat retrieval on a7xx (git-fixes).</li>
<li>drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).</li>
<li>drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git-fixes).</li>
<li>drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).</li>
<li>drm/msm/dpu: Add callback function pointer check before its call (git-fixes).</li>
<li>drm/msm/dpu: Allow configuring multiple active DSC blocks (git-fixes).</li>
<li>drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).</li>
<li>drm/msm/dpu: do not allow overriding data from catalog (git-fixes).</li>
<li>drm/msm/dpu: make error messages at dpu_core_irq_register_callback() more sensible (git-fixes).</li>
<li>drm/msm/dpu: use devres-managed allocation for MDP TOP (stable-fixes).</li>
<li>drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).</li>
<li>drm/nouveau: use tile_mode and pte_kind for VM_BIND bo allocations (git-fixes).</li>
<li>drm/nouveau/disp: Fix missing backlight control on Macbook 5, 1 (bsc#1223838).</li>
<li>drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).</li>
<li>drm/nouveau/dp: Fix incorrect return code in r535_dp_aux_xfer() (git-fixes).</li>
<li>drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (stable-fixes).</li>
<li>drm/omapdrm: Fix console by implementing fb_dirty (git-fixes).</li>
<li>drm/panel: do not return negative error codes from drm_panel_get_modes() (stable-fixes).</li>
<li>drm/panel: ili9341: Respect deferred probe (git-fixes).</li>
<li>drm/panel: ili9341: Use predefined error codes (git-fixes).</li>
<li>drm/panel: ltk050h3146w: add MIPI_DSI_MODE_VIDEO to LTK050H3148W flags (git-fixes).</li>
<li>drm/panel: ltk050h3146w: drop duplicate commands from LTK050H3148W init (git-fixes).</li>
<li>drm/panel: novatek-nt35950: Do not log an error when DSI host can&#x27;t be found (git-fixes).</li>
<li>drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).</li>
<li>drm/panel: sitronix-st7789v: fix display size for jt240mhqs_hwt_ek_e3 panel (git-fixes).</li>
<li>drm/panel: sitronix-st7789v: fix timing for jt240mhqs_hwt_ek_e3 panel (git-fixes).</li>
<li>drm/panel: sitronix-st7789v: tweak timing for jt240mhqs_hwt_ek_e3 panel (git-fixes).</li>
<li>drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).</li>
<li>drm/panfrost: fix power transition timeout warnings (git-fixes).</li>
<li>drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() (git-fixes).</li>
<li>drm/prime: Unbreak virtgpu dma-buf export (git-fixes).</li>
<li>drm/probe-helper: warn about negative .get_modes() (stable-fixes).</li>
<li>drm/qxl: remove unused <code>count</code> variable from <code>qxl_surface_id_alloc()</code> (git-fixes).</li>
<li>drm/qxl: remove unused variable from <code>qxl_process_single_command()</code> (git-fixes).</li>
<li>drm/radeon: make -fstrict-flex-arrays=3 happy (git-fixes).</li>
<li>drm/radeon: silence UBSAN warning (v3) (stable-fixes).</li>
<li>drm/rockchip: vop2: Do not divide height twice for YUV (git-fixes).</li>
<li>drm/rockchip: vop2: Remove AR30 and AB30 format support (git-fixes).</li>
<li>drm/sched: fix null-ptr-deref in init entity (git-fixes).</li>
<li>drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (git-fixes).</li>
<li>drm/ttm: return ENOSPC from ttm_bo_mem_space v3 (stable-fixes).</li>
<li>drm/ttm: stop pooling cached NUMA pages v2 (git-fixes).</li>
<li>drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).</li>
<li>drm/vc4: hdmi: do not return negative values from .get_modes() (stable-fixes).</li>
<li>drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-fixes).</li>
<li>drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).</li>
<li>drm/vmwgfx: Fix crtc&#x27;s atomic check conditional (git-fixes).</li>
<li>drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).</li>
<li>drm/vmwgfx: Fix Legacy Display Unit (git-fixes).</li>
<li>drm/vmwgfx: Fix prime import/export (git-fixes).</li>
<li>drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).</li>
<li>dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)</li>
<li>dump_stack: Do not get cpu_sync for panic CPU (bsc#1225607).</li>
<li>dyndbg: fix old BUG_ON in >control parser (stable-fixes).</li>
<li>e1000e: Minor flow correction in e1000_shutdown function (git-fixes).</li>
<li>e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue (git-fixes).</li>
<li>e1000e: Workaround for sporadic MDI error on Meteor Lake systems (git-fixes).</li>
<li>ecryptfs: Fix buffer size for tag 66 packet (git-fixes)</li>
<li>ecryptfs: Reject casefold directory inodes (git-fixes)</li>
<li>EDAC/synopsys: Fix ECC status and IRQ control race condition (git-fixes).</li>
<li>efi: disable mirror feature during crashkernel (stable-fixes).</li>
<li>efi: fix panic in kdump kernel (git-fixes).</li>
<li>efi: libstub: only free priv.runtime_map when allocated (git-fixes).</li>
<li>efi/unaccepted: do not let /proc/vmcore try to access unaccepted memory (git-fixes).</li>
<li>efi/unaccepted: touch soft lockup during memory accept (git-fixes).</li>
<li>extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).</li>
<li>fast_dput(): handle underflows gracefully (git-fixes)</li>
<li>fat: fix uninitialized field in nostale filehandles (git-fixes)</li>
<li>fbdev: fix incorrect address computation in deferred IO (git-fixes).</li>
<li>fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).</li>
<li>fbdev: sh7760fb: allow modular build (git-fixes).</li>
<li>fbdev: shmobile: fix snprintf truncation (git-fixes).</li>
<li>fbdev: sisfb: hide unused variables (git-fixes).</li>
<li>fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).</li>
<li>fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).</li>
<li>firewire: core: use long bus reset on gap count error (stable-fixes).</li>
<li>firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).</li>
<li>firmware: arm_scmi: Make raw debugfs entries non-seekable (git-fixes).</li>
<li>firmware: dmi-id: add a release callback function (git-fixes).</li>
<li>firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).</li>
<li>firmware: tegra: bpmp: Return directly after a failed kzalloc() in get_filename() (stable-fixes).</li>
<li>fs: Fix error checking for d_hash_and_lookup() (git-fixes)</li>
<li>fs: indicate request originates from old mount API (git-fixes)</li>
<li>fs: relax mount_setattr() permission checks (git-fixes)</li>
<li>fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes)</li>
<li>fs/9p: translate O_TRUNC into OTRUNC (git-fixes)</li>
<li>fsverity: skip PKCS#7 parser when keyring is empty (git-fixes)</li>
<li>ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes).</li>
<li>fuse: do not unhash root (bsc#1223946).</li>
<li>fuse: fix root lookup with nonzero generation (bsc#1223945).</li>
<li>geneve: fix header validation in geneve[6]_xmit_skb (git-fixes).</li>
<li>geneve: make sure to pull inner header in geneve_rx() (git-fixes).</li>
<li>gpio: cdev: check for NULL labels when sanitizing them for irqs (git-fixes).</li>
<li>gpio: cdev: fix missed label sanitizing in debounce_setup() (git-fixes).</li>
<li>gpio: cdev: sanitize the label before requesting the interrupt (stable-fixes).</li>
<li>gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).</li>
<li>gpio: tangier: Use correct type for the IRQ chip data (git-fixes).</li>
<li>gpio: tegra186: Fix tegra186_gpio_is_accessible() check (git-fixes).</li>
<li>gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).</li>
<li>gpiolib: cdev: fix uninitialised kfifo (git-fixes).</li>
<li>gpiolib: cdev: relocate debounce_period_us from struct gpio_desc (stable-fixes).</li>
<li>gpiolib: swnode: Remove wrong header inclusion (git-fixes).</li>
<li>gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).</li>
<li>gtp: fix use-after-free and null-ptr-deref in gtp_newlink() (git-fixes).</li>
<li>HID: amd_sfh: Handle "no sensors" in PM operations (git-fixes).</li>
<li>HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up (git-fixes).</li>
<li>HID: input: avoid polling stylus battery on Chromebook Pompom (stable-fixes).</li>
<li>HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).</li>
<li>HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes).</li>
<li>HID: logitech-dj: allow mice to use all types of reports (git-fixes).</li>
<li>HID: multitouch: Add required quirk for Synaptics 0xcddc device (stable-fixes).</li>
<li>hwmon: (amc6821) add of_match table (stable-fixes).</li>
<li>hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-fixes).</li>
<li>hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).</li>
<li>hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).</li>
<li>hwmon: (intel-m10-bmc-hwmon) Fix multiplier for N6000 board power sensor (git-fixes).</li>
<li>hwmon: (lm70) fix links in doc and comments (git-fixes).</li>
<li>hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).</li>
<li>hwmon: (shtc1) Fix property misspelling (git-fixes).</li>
<li>hwtracing: hisi_ptt: Move type check to the beginning of hisi_ptt_pmu_event_init() (git-fixes).</li>
<li>i2c: acpi: Unbind mux adapters before delete (git-fixes).</li>
<li>i2c: cadence: Avoid fifo clear after start (git-fixes).</li>
<li>i2c: pxa: hide unused icr_bits[] variable (git-fixes).</li>
<li>i2c: smbus: fix NULL function pointer dereference (git-fixes).</li>
<li>i2c: synquacer: Fix an error handling path in synquacer_i2c_probe() (git-fixes).</li>
<li>i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).</li>
<li>i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).</li>
<li>i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-fixes).</li>
<li>i40e: Enforce software interrupt during busy-poll exit (git-fixes).</li>
<li>i40e: Fix firmware version comparison function (git-fixes).</li>
<li>i40e: fix i40e_count_filters() to count only active/new filters (git-fixes).</li>
<li>i40e: Fix VF MAC filter removal (git-fixes).</li>
<li>i40e: fix vf may be used uninitialized in this function warning (git-fixes).</li>
<li>i915: make inject_virtual_interrupt() void (stable-fixes).</li>
<li>IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)</li>
<li>ice: fix enabling RX VLAN filtering (git-fixes).</li>
<li>ice: fix memory corruption bug with suspend and rebuild (git-fixes).</li>
<li>ice: fix stats being updated by way too large values (git-fixes).</li>
<li>ice: fix typo in assignment (git-fixes).</li>
<li>ice: fix uninitialized dplls mutex usage (git-fixes).</li>
<li>ice: reconfig host after changing MSI-X on VF (git-fixes).</li>
<li>ice: Refactor FW data type and fix bitmap casting issue (git-fixes).</li>
<li>ice: reorder disabling IRQ and NAPI in ice_qp_dis (git-fixes).</li>
<li>ice: use relative VSI index for VFs instead of PF VSI number (git-fixes).</li>
<li>ice: virtchnl: stop pretending to support RSS over AQ or registers (git-fixes).</li>
<li>ida: make &#x27;ida_dump&#x27; static (git-fixes).</li>
<li>idma64: Do not try to serve interrupts when device is powered off (git-fixes).</li>
<li>idpf: disable local BH when scheduling napi for marker packets (git-fixes).</li>
<li>idpf: extend tx watchdog timeout (bsc#1224137).</li>
<li>idpf: fix kernel panic on unknown packet types (git-fixes).</li>
<li>igb: extend PTP timestamp adjustments to i211 (git-fixes).</li>
<li>igb: Fix missing time sync events (git-fixes).</li>
<li>igc: avoid returning frame twice in XDP_REDIRECT (git-fixes).</li>
<li>igc: Fix missing time sync events (git-fixes).</li>
<li>igc: Remove stale comment about Tx timestamping (git-fixes).</li>
<li>iio: accel: mxc4005: Interrupt handling fixes (git-fixes).</li>
<li>iio: adc: stm32: Fixing err code to not indicate success (git-fixes).</li>
<li>iio: core: Leave private pointer NULL when no private data supplied (git-fixes).</li>
<li>iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).</li>
<li>iio: gts-helper: Fix division loop (git-fixes).</li>
<li>iio: pressure: dps310: support negative temperature values (git-fixes).</li>
<li>iio: pressure: Fixes BME280 SPI driver data (git-fixes).</li>
<li>iio:imu: adis16475: Fix sync mode setting (git-fixes).</li>
<li>inet_diag: annotate data-races around inet_diag_table[] (git-fixes).</li>
<li>inet: frags: eliminate kernel-doc warning (git-fixes).</li>
<li>init: open /initrd.image with O_LARGEFILE (stable-fixes).</li>
<li>init/main.c: Fix potential static_command_line memory overflow (git-fixes).</li>
<li>Input: allocate keycode for Display refresh rate toggle (stable-fixes).</li>
<li>Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).</li>
<li>Input: gpio_keys_polled - suppress deferred probe error for gpio (stable-fixes).</li>
<li>Input: imagis - use FIELD_GET where applicable (stable-fixes).</li>
<li>Input: ims-pcu - fix printf string overflow (git-fixes).</li>
<li>Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).</li>
<li>Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails (stable-fixes).</li>
<li>Input: xpad - add additional HyperX Controller Identifiers (stable-fixes).</li>
<li>Input: xpad - add support for Snakebyte GAMEPADs (stable-fixes).</li>
<li>input/touchscreen: imagis: Correct the maximum touch area value (stable-fixes).</li>
<li>intel: legacy: Partial revert of field get conversion (git-fixes).</li>
<li>interconnect: qcom: osm-l3: Replace custom implementation of COUNT_ARGS() (git-fixes).</li>
<li>interconnect: qcom: qcm2290: Fix mas_snoc_bimc QoS port assignment (git-fixes).</li>
<li>interconnect: qcom: sc8180x: Mark CO0 BCM keepalive (git-fixes).</li>
<li>interconnect: qcom: sm8550: Enable sync_state (git-fixes).</li>
<li>io_uring: kabi cookie remove (bsc#1217384).</li>
<li>iomap: clear the per-folio dirty bits on all writeback failures (git-fixes)</li>
<li>iommu: Map reserved memory as cacheable if device is coherent (git-fixes).</li>
<li>iommu/arm-smmu-v3: Check that the RID domain is S1 in SVA (git-fixes).</li>
<li>iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)</li>
<li>iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).</li>
<li>iommu/vt-d: Allocate local memory for page request queue (git-fixes).</li>
<li>iommu/vt-d: Fix wrong use of pasid config (git-fixes).</li>
<li>iommu/vt-d: Set SSADE when attaching to a parent with dirty tracking (git-fixes).</li>
<li>iommu/vt-d: Update iotlb in nested domain attach (git-fixes).</li>
<li>iommufd: Add missing IOMMUFD_DRIVER kconfig for the selftest (git-fixes).</li>
<li>iommufd: Fix iopt_access_list_id overwrite bug (git-fixes).</li>
<li>iommufd: Reject non-zero data_type if no data_len is provided (git-fixes).</li>
<li>iommufd/iova_bitmap: Bounds check mapped::pages access (git-fixes).</li>
<li>iommufd/iova_bitmap: Consider page offset for the pages to be pinned (git-fixes).</li>
<li>iommufd/iova_bitmap: Switch iova_bitmap::bitmap to an u8 array (git-fixes).</li>
<li>ionic: set adminq irq affinity (git-fixes).</li>
<li>ipv4: annotate data-races around fi->fib_dead (git-fixes).</li>
<li>irqchip/alpine-msi: Fix off-by-one in allocation error path (git-fixes).</li>
<li>irqchip/armada-370-xp: Suppress unused-function warning (git-fixes).</li>
<li>irqchip/gic-v3-its: Do not assume vPE tables are preallocated (git-fixes).</li>
<li>irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-fixes).</li>
<li>irqchip/gic-v3-its: Prevent double free on error (git-fixes).</li>
<li>irqchip/loongson-pch-msi: Fix off-by-one on allocation error path (git-fixes).</li>
<li>irqchip/mbigen: Do not use bus_get_dev_root() to find the parent (git-fixes).</li>
<li>irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on register&#x27;s index (stable-fixes).</li>
<li>irqchip/renesas-rzg2l: Flush posted write in irq_eoi() (git-fixes).</li>
<li>irqchip/renesas-rzg2l: Implement restriction when writing ISCR register (stable-fixes).</li>
<li>irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type (git-fixes).</li>
<li>irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() (stable-fixes).</li>
<li>irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() (stable-fixes).</li>
<li>ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).</li>
<li>ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).</li>
<li>jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).</li>
<li>kabi/severities: ignore brcmfmac-specific local symbols</li>
<li>kabi/severities: ignore IMS functions They were dropped in previous patches. Noone is supposed to use them.</li>
<li>kabi/severities: ignore TAS2781 symbol drop, it&#x27;s only locally used</li>
<li>kabi/severities: ignore Wangxun ethernet driver local symbols</li>
<li>kabi/severities: Remove mitigation-related symbols Those are used by the core kernel to implement CPU vulnerabilities mitigation and are not expected to be consumed by 3rd party users.</li>
<li>kasan, fortify: properly rename memintrinsics (git-fixes).</li>
<li>kasan: disable kasan_non_canonical_hook() for HW tags (git-fixes).</li>
<li>kasan: print the original fault addr when access invalid shadow (git-fixes).</li>
<li>kasan/test: avoid gcc warning for intentional overflow (git-fixes).</li>
<li>kexec: do syscore_shutdown() in kernel_kexec (git-fixes).</li>
<li>KEYS: trusted: Do not use WARN when encode fails (git-fixes).</li>
<li>KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).</li>
<li>kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).</li>
<li>kselftest: Add a ksft_perror() helper (stable-fixes).</li>
<li>kunit/fortify: Fix mismatched kvalloc()/vfree() usage (git-fixes).</li>
<li>KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git-fixes).</li>
<li>KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224790).</li>
<li>KVM: SVM: Add support for allowing zero SEV ASIDs (git-fixes).</li>
<li>KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (git-fixes).</li>
<li>KVM: SVM: Use unsigned integers when dealing with ASIDs (git-fixes).</li>
<li>KVM: VMX: Disable LBR virtualization if the CPU does not support LBR callstacks (git-fixes).</li>
<li>KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes).</li>
<li>KVM: x86: Allow, do not ignore, same-value writes to immutable MSRs (git-fixes).</li>
<li>KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes).</li>
<li>KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (git-fixes).</li>
<li>KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper (git-fixes).</li>
<li>KVM: x86: Mark target gfn of emulated atomic instruction as dirty (git-fixes).</li>
<li>KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled (git-fixes).</li>
<li>KVM: x86: Snapshot if a vCPU&#x27;s vendor model is AMD vs. Intel compatible (git-fixes).</li>
<li>KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they&#x27;re a WIP (git-fixes).</li>
<li>KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT (git-fixes).</li>
<li>KVM: x86/mmu: Do not force emulation of L2 accesses to non-APIC internal slots (git-fixes).</li>
<li>KVM: x86/mmu: Move private vs. shared check above slot validity checks (git-fixes).</li>
<li>KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU (git-fixes).</li>
<li>KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (git-fixes).</li>
<li>KVM: x86/pmu: Allow programming events that match unsupported arch events (git-fixes).</li>
<li>KVM: x86/pmu: Always treat Fixed counters as available when supported (git-fixes).</li>
<li>KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs (git-fixes).</li>
<li>KVM: x86/pmu: Disable support for adaptive PEBS (git-fixes).</li>
<li>KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs (git-fixes).</li>
<li>KVM: x86/pmu: Do not ignore bits 31:30 for RDPMC index on AMD (git-fixes).</li>
<li>KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms (git-fixes).</li>
<li>KVM: x86/pmu: Explicitly check NMI from guest to reducee false positives (git-fixes).</li>
<li>KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (git-fixes).</li>
<li>KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET" (git-fixes).</li>
<li>KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled (git-fixes).</li>
<li>KVM: x86/xen: fix recursive deadlock in timer injection (git-fixes).</li>
<li>KVM: x86/xen: improve accuracy of Xen timers (git-fixes).</li>
<li>KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled (git-fixes).</li>
<li>KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery (git-fixes).</li>
<li>leds: pwm: Disable PWM when going to suspend (git-fixes).</li>
<li>lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (git-fixes).</li>
<li>libnvdimm: Fix ACPI_NFIT in BLK_DEV_PMEM help (jsc#PED-5853).</li>
<li>libsubcmd: Fix parse-options memory leak (git-fixes).</li>
<li>livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).</li>
<li>locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes)</li>
<li>lsm: fix the logic in security_inode_getsecctx() (git-fixes).</li>
<li>mac802154: fix llsec key resources release in mac802154_llsec_key_del (git-fixes).</li>
<li>maple_tree: fix mas_empty_area_rev() null pointer dereference (git-fixes).</li>
<li>md: add a new helper rdev_has_badblock() (jsc#PED-7542).</li>
<li>md: add a new helper reshape_interrupted() (jsc#PED-7542).</li>
<li>md: changed the switch of RAID_VERSION to if (jsc#PED-7542).</li>
<li>md: check mddev->pers before calling md_set_readonly() (jsc#PED-7542).</li>
<li>md: clean up invalid BUG_ON in md_ioctl (jsc#PED-7542).</li>
<li>md: clean up openers check in do_md_stop() and md_set_readonly() (jsc#PED-7542).</li>
<li>md: Do not clear MD_CLOSING when the raid is about to stop (jsc#PED-7542).</li>
<li>md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (jsc#PED-7542).</li>
<li>md: export helper md_is_rdwr() (jsc#PED-7542).</li>
<li>md: export helpers to stop sync_thread (jsc#PED-7542).</li>
<li>md: factor out a helper to sync mddev (jsc#PED-7542).</li>
<li>md: fix kmemleak of rdev->serial (jsc#PED-7542).</li>
<li>md: get rdev->mddev with READ_ONCE() (jsc#PED-7542).</li>
<li>md: merge the check of capabilities into md_ioctl_valid() (jsc#PED-7542).</li>
<li>md: preserve KABI in struct md_personality (jsc#PED-7542).</li>
<li>md: remove redundant check of &#x27;mddev->sync_thread&#x27; (jsc#PED-7542).</li>
<li>md: remove redundant md_wakeup_thread() (jsc#PED-7542).</li>
<li>md: return directly before setting did_set_md_closing (jsc#PED-7542).</li>
<li>md: sync blockdev before stopping raid or setting readonly (jsc#PED-7542).</li>
<li>md: use RCU lock to protect traversal in md_spares_need_change() (jsc#PED-7542).</li>
<li>md/dm-raid: do not call md_reap_sync_thread() directly (jsc#PED-7542).</li>
<li>md/raid1-10: add a helper raid1_check_read_range() (jsc#PED-7542).</li>
<li>md/raid1-10: factor out a new helper raid1_should_read_first() (jsc#PED-7542).</li>
<li>md/raid1: factor out choose_bb_rdev() from read_balance() (jsc#PED-7542).</li>
<li>md/raid1: factor out choose_slow_rdev() from read_balance() (jsc#PED-7542).</li>
<li>md/raid1: factor out helpers to add rdev to conf (jsc#PED-7542).</li>
<li>md/raid1: factor out helpers to choose the best rdev from read_balance() (jsc#PED-7542).</li>
<li>md/raid1: factor out read_first_rdev() from read_balance() (jsc#PED-7542).</li>
<li>md/raid1: factor out the code to manage sequential IO (jsc#PED-7542).</li>
<li>md/raid1: fix choose next idle in read_balance() (jsc#PED-7542).</li>
<li>md/raid1: record nonrot rdevs while adding/removing rdevs to conf (jsc#PED-7542).</li>
<li>media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).</li>
<li>media: cadence: csi2rx: use match fwnode for media link (git-fixes).</li>
<li>media: cec: core: remove length check of Timer Status (stable-fixes).</li>
<li>media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).</li>
<li>media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes).</li>
<li>media: i2c: et8ek8: Do not strip remove function when driver is builtin (git-fixes).</li>
<li>media: ipu3-cio2: Request IRQ earlier (git-fixes).</li>
<li>media: mc: Fix flags handling when creating pad links (stable-fixes).</li>
<li>media: mc: Fix graph walk in media_pipeline_start (git-fixes).</li>
<li>media: mc: mark the media devnode as registered from the, start (git-fixes).</li>
<li>media: mc: Rename pad variable to clarify intent (stable-fixes).</li>
<li>media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).</li>
<li>media: rcar-vin: work around -Wenum-compare-conditional warning (git-fixes).</li>
<li>media: rkisp1: Fix IRQ handling due to shared interrupts (stable-fixes).</li>
<li>media: sta2x11: fix irq handler cast (stable-fixes).</li>
<li>media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).</li>
<li>media: sunxi: a83-mips-csi2: also select GENERIC_PHY (git-fixes).</li>
<li>media: uvcvideo: Add quirk for Logitech Rally Bar (git-fixes).</li>
<li>media: v4l: Do not turn on privacy LED if streamon fails (git-fixes).</li>
<li>media: v4l2-subdev: Fix stream handling for crop API (git-fixes).</li>
<li>mei: me: add arrow lake point H DID (stable-fixes).</li>
<li>mei: me: add arrow lake point S DID (stable-fixes).</li>
<li>mei: me: add lunar lake point M DID (stable-fixes).</li>
<li>mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).</li>
<li>mlxbf_gige: call request_irq() after NAPI initialized (git-fixes).</li>
<li>mlxbf_gige: stop interface during shutdown (git-fixes).</li>
<li>mlxbf_gige: stop PHY during open() error paths (git-fixes).</li>
<li>mlxsw: Use refcount_t for reference counting (git-fixes).</li>
<li>mm_init kABI workaround (git-fixes).</li>
<li>mm,page_owner: check for null stack_record before bumping its refcount (bsc#1222366).</li>
<li>mm,page_owner: Defer enablement of static branch (bsc#1222366).</li>
<li>mm,page_owner: drop unnecessary check (bsc#1222366).</li>
<li>mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).</li>
<li>mm,page_owner: Fix printing of stack records (bsc#1222366).</li>
<li>mm,page_owner: fix recursion (bsc#1222366).</li>
<li>mm,page_owner: Fix refcount imbalance (bsc#1222366).</li>
<li>mm,page_owner: Update metadata for tail pages (bsc#1222366).</li>
<li>mm: memcg: do not periodically flush stats when memcg is disabled (bsc#1222525).</li>
<li>mm: memcg: use larger batches for proactive reclaim (bsc#1222522).</li>
<li>mm: page_owner: fix wrong information in dump_page_owner (git-fixes).</li>
<li>mm/slab: make __free(kfree) accept error pointers (git-fixes).</li>
<li>mmc: core: Add HS400 tuning in HS400es initialization (stable-fixes).</li>
<li>mmc: core: Avoid negative index with array access (git-fixes).</li>
<li>mmc: core: Initialize mmc_blk_ioc_data (git-fixes).</li>
<li>mmc: davinci: Do not strip remove function when driver is builtin (git-fixes).</li>
<li>mmc: omap: fix broken slot switch lookup (git-fixes).</li>
<li>mmc: omap: fix deferred probe (git-fixes).</li>
<li>mmc: omap: restore original power up/down steps (git-fixes).</li>
<li>mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes).</li>
<li>mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes).</li>
<li>mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).</li>
<li>mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes).</li>
<li>mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).</li>
<li>mmc: sdhci-msm: pervent access to suspended controller (git-fixes).</li>
<li>mmc: sdhci-omap: re-tuning is needed after a pm transition to support emmc HS200 mode (git-fixes).</li>
<li>modpost: Add &#x27;.ltext&#x27; and &#x27;.ltext.*&#x27; to TEXT_SECTIONS (stable-fixes).</li>
<li>mptcp: annotate data-races around msk->rmem_fwd_alloc (git-fixes).</li>
<li>mptcp: fix bogus receive window shrinkage with multiple subflows (git-fixes).</li>
<li>mptcp: move __mptcp_error_report in protocol.c (git-fixes).</li>
<li>mptcp: process pending subflow error on close (git-fixes).</li>
<li>mptcp: Remove unnecessary test for __mptcp_init_sock() (git-fixes).</li>
<li>mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).</li>
<li>mtd: diskonchip: work around ubsan link failure (stable-fixes).</li>
<li>mtd: rawnand: hynix: fixed typo (git-fixes).</li>
<li>mtd: spinand: Add support for 5-byte IDs (stable-fixes).</li>
<li>net: add netdev_lockdep_set_classes() to virtual drivers (git-fixes).</li>
<li>net: annotate data-races around sk->sk_bind_phc (git-fixes).</li>
<li>net: annotate data-races around sk->sk_forward_alloc (git-fixes).</li>
<li>net: annotate data-races around sk->sk_lingertime (git-fixes).</li>
<li>net: annotate data-races around sk->sk_tsflags (git-fixes).</li>
<li>net: bonding: remove kernel-doc comment marker (git-fixes).</li>
<li>net: cfg802154: fix kernel-doc notation warnings (git-fixes).</li>
<li>net: dsa: microchip: fix register write order in ksz8_ind_write8() (git-fixes).</li>
<li>net: dsa: mt7530: fix handling of all link-local frames (git-fixes).</li>
<li>net: dsa: mt7530: fix link-local frames that ingress vlan filtering ports (git-fixes).</li>
<li>net: dsa: mt7530: prevent possible incorrect XTAL frequency selection (git-fixes).</li>
<li>net: dsa: mt7530: trap link-local frames regardless of ST Port State (git-fixes).</li>
<li>net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45() (git-fixes).</li>
<li>net: ena: Fix incorrect descriptor free behavior (git-fixes).</li>
<li>net: ena: Fix potential sign extension issue (git-fixes).</li>
<li>net: ena: Move XDP code to its new files (git-fixes).</li>
<li>net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() (git-fixes).</li>
<li>net: ena: Remove ena_select_queue (git-fixes).</li>
<li>net: ena: Set tx_info->xdpf value to NULL (git-fixes).</li>
<li>net: ena: Use tx_ring instead of xdp_ring for XDP channel TX (git-fixes).</li>
<li>net: ena: Wrong missing IO completions check order (git-fixes).</li>
<li>net: ethernet: mtk_eth_soc: fix PPE hanging issue (git-fixes).</li>
<li>net: ethernet: ti: cpsw: enable mac_managed_pm to fix mdio (git-fixes).</li>
<li>net: fec: Set mac_managed_pm during probe (git-fixes).</li>
<li>net: hns3: fix index limit to support all queue stats (git-fixes).</li>
<li>net: hns3: fix kernel crash when 1588 is received on HIP08 devices (git-fixes).</li>
<li>net: hns3: fix kernel crash when devlink reload during pf initialization (git-fixes).</li>
<li>net: hns3: fix port duplex configure error in IMP reset (git-fixes).</li>
<li>net: hns3: fix wrong judgment condition issue (git-fixes).</li>
<li>net: hns3: mark unexcuted loopback test result as UNEXECUTED (git-fixes).</li>
<li>net: hns3: tracing: fix hclgevf trace event strings (git-fixes).</li>
<li>net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() (git-fixes).</li>
<li>net: ks8851: Handle softirqs at the end of IRQ thread to fix hang (git-fixes).</li>
<li>net: ks8851: Inline ks8851_rx_skb() (git-fixes).</li>
<li>net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs (git-fixes).</li>
<li>net: lan743x: Add set RFE read fifo threshold for PCI1x1x chips (git-fixes).</li>
<li>net: libwx: fix memory leak on free page (git-fixes).</li>
<li>net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).</li>
<li>net: llc: fix kernel-doc notation warnings (git-fixes).</li>
<li>net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).</li>
<li>net: mediatek: mtk_eth_soc: clear MAC_MCR_FORCE_LINK only when MAC is up (git-fixes).</li>
<li>net: nfc: remove inappropriate attrs check (stable-fixes).</li>
<li>net: NSH: fix kernel-doc notation warning (git-fixes).</li>
<li>net: pcs: xpcs: Return EINVAL in the internal methods (git-fixes).</li>
<li>net: phy: fix phy_read_poll_timeout argument type in genphy_loopback (git-fixes).</li>
<li>net: phy: micrel: Fix potential null pointer dereference (git-fixes).</li>
<li>net: phy: micrel: lan8814: Fix when enabling/disabling 1-step timestamping (git-fixes).</li>
<li>net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8061 (git-fixes).</li>
<li>net: phy: phy_device: Prevent nullptr exceptions on ISR (git-fixes).</li>
<li>net: phy: phy_device: Prevent nullptr exceptions on ISR (stable-fixes).</li>
<li>net: ravb: Always process TX descriptor ring (git-fixes).</li>
<li>net: ravb: Always update error counters (git-fixes).</li>
<li>net: ravb: Let IP-specific receive function to interrogate descriptors (git-fixes).</li>
<li>net: smsc95xx: add support for SYS TEC USB-SPEmodule1 (git-fixes).</li>
<li>net: sparx5: Fix use after free inside sparx5_del_mact_entry (git-fixes).</li>
<li>net: sparx5: fix wrong config being used when reconfiguring PCS (git-fixes).</li>
<li>net: sparx5: flower: fix fragment flags handling (git-fixes).</li>
<li>net: stmmac: dwmac-starfive: Add support for JH7100 SoC (git-fixes).</li>
<li>net: stmmac: Fix incorrect dereference in interrupt handlers (git-fixes).</li>
<li>net: stmmac: fix rx queue priority assignment (git-fixes).</li>
<li>net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).</li>
<li>net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).</li>
<li>net: tls, fix WARNIING in __sk_msg_free (bsc#1221858).</li>
<li>net: tls: fix returned read length with async decrypt (bsc#1221858).</li>
<li>net: tls: fix use-after-free with partial reads and async (bsc#1221858).</li>
<li>net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).</li>
<li>net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).</li>
<li>net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).</li>
<li>net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).</li>
<li>net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-fixes).</li>
<li>net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).</li>
<li>net: usb: sr9700: stop lying about skb->truesize (git-fixes).</li>
<li>net: Use sockaddr_storage for getsockopt(SO_PEERNAME) (git-fixes).</li>
<li>net: veth: do not manipulate GRO when using XDP (git-fixes).</li>
<li>net: wwan: t7xx: Split 64bit accesses to fix alignment issues (git-fixes).</li>
<li>net:usb:qmi_wwan: support Rolling modules (stable-fixes).</li>
<li>net/mlx5: Correctly compare pkt reformat ids (git-fixes).</li>
<li>net/mlx5: E-switch, Change flow rule destination checking (git-fixes).</li>
<li>net/mlx5: E-switch, store eswitch pointer before registering devlink_param (git-fixes).</li>
<li>net/mlx5: Fix fw reporter diagnose output (git-fixes).</li>
<li>net/mlx5: Fix peer devlink set for SF representor devlink port (git-fixes).</li>
<li>net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes).</li>
<li>net/mlx5: offset comp irq index in name by one (git-fixes).</li>
<li>net/mlx5: Properly link new fs rules into the tree (git-fixes).</li>
<li>net/mlx5: Register devlink first under devlink lock (git-fixes).</li>
<li>net/mlx5: Restore mistakenly dropped parts in register devlink flow (git-fixes).</li>
<li>net/mlx5: SF, Stop waiting for FW as teardown was called (git-fixes).</li>
<li>net/mlx5e: Change the warning when ignore_flow_level is not supported (git-fixes).</li>
<li>net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit (git-fixes).</li>
<li>net/mlx5e: Fix MACsec state loss upon state update in offload path (git-fixes).</li>
<li>net/mlx5e: Fix mlx5e_priv_init() cleanup flow (git-fixes).</li>
<li>net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).</li>
<li>net/mlx5e: RSS, Block changing channels number when RXFH is configured (git-fixes).</li>
<li>net/mlx5e: RSS, Block XOR hash with over 128 channels (git-fixes).</li>
<li>net/mlx5e: Switch to using _bh variant of of spinlock API in port timestamping NAPI poll context (git-fixes).</li>
<li>net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (git-fixes).</li>
<li>net/smc: bugfix for smcr v2 server connect success statistic (git-fixes).</li>
<li>net/smc: fix documentation of buffer sizes (git-fixes).</li>
<li>net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add (git-fixes).</li>
<li>net/x25: fix incorrect parameter validation in the x25_getsockopt() function (git-fixes).</li>
<li>netfilter: nf_tables: disable toggling dormant table state more than once (git-fixes).</li>
<li>netfilter: nf_tables: uapi: Describe NFTA_RULE_CHAIN_ID (git-fixes).</li>
<li>netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).</li>
<li>netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes).</li>
<li>nf_conntrack: fix -Wunused-const-variable= (git-fixes).</li>
<li>nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).</li>
<li>nfc: nci: Fix kcov check in nci_rx_work() (git-fixes).</li>
<li>nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).</li>
<li>nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).</li>
<li>NFC: trf7970a: disable all regulators on removal (git-fixes).</li>
<li>nfp: flower: handle acti_netdevs allocation failure (git-fixes).</li>
<li>NFS: Fix an off by one in root_nfs_cat() (git-fixes).</li>
<li>NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interrupt (git-fixes).</li>
<li>nfs: fix panic when nfs4_ff_layout_prepare_ds() fails (git-fixes).</li>
<li>NFS: Read unlock folio on nfs_page_create_from_folio() error (git-fixes).</li>
<li>NFSD: change LISTXATTRS cookie encoding to big-endian (git-fixes).</li>
<li>NFSD: Convert the callback workqueue to use delayed_work (git-fixes).</li>
<li>nfsd: do not call locks_release_private() twice concurrently (git-fixes).</li>
<li>nfsd: Fix a regression in nfsd_setattr() (git-fixes).</li>
<li>NFSD: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes).</li>
<li>NFSD: fix LISTXATTRS returning more bytes than maxcount (git-fixes).</li>
<li>NFSD: Fix nfsd_clid_class use of __string_len() macro (git-fixes).</li>
<li>NFSD: fix nfsd4_listxattr_validate_cookie (git-fixes).</li>
<li>NFSD: Reschedule CB operations when backchannel rpc_clnt is shut down (git-fixes).</li>
<li>NFSD: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes).</li>
<li>NFSD: Retransmit callbacks after client reconnects (git-fixes).</li>
<li>nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).</li>
<li>NFSv4.1/pnfs: fix NFS with TLS in pnfs (git-fixes).</li>
<li>NFSv4.2: fix listxattr maximum XDR buffer size (git-fixes).</li>
<li>NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).</li>
<li>nilfs2: fix OOB in nilfs_set_de_type (git-fixes).</li>
<li>nilfs2: fix out-of-range warning (git-fixes).</li>
<li>nilfs2: fix potential bug in end_buffer_async_write (git-fixes).</li>
<li>nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).</li>
<li>nilfs2: fix use-after-free of timer for log writer thread (git-fixes).</li>
<li>nilfs2: make superblock data array index computation sparse friendly (git-fixes).</li>
<li>nouveau: fix devinit paths to only handle display on GSP (git-fixes).</li>
<li>nouveau: fix function cast warning (git-fixes).</li>
<li>nouveau: fix instmem race condition around ptr stores (git-fixes).</li>
<li>nouveau: lock the client object tree (stable-fixes).</li>
<li>nouveau: reset the bo resource bus info after an eviction (git-fixes).</li>
<li>nouveau/dmem: handle kcalloc() allocation failure (git-fixes).</li>
<li>nouveau/gsp: do not check devinit disable on GSP (git-fixes).</li>
<li>nouveau/uvmm: fix addr/range calcs for remap operations (git-fixes).</li>
<li>nvdimm: make nvdimm_bus_type const (jsc#PED-5853).</li>
<li>nvdimm/pmem: fix leak on dax_add_host() failure (jsc#PED-5853).</li>
<li>nvdimm/pmem: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal (jsc#PED-5853).</li>
<li>nvme-fc: do not wait in vain when unloading module (git-fixes).</li>
<li>nvme-pci: Add quirk for broken MSIs (git-fixes).</li>
<li>nvme-tcp: strict pdu pacing to avoid send stalls on TLS (bsc#1221858).</li>
<li>nvme: fix reconnection fail due to reserved tag allocation (git-fixes).</li>
<li>nvme: fix warn output about shared namespaces without CONFIG_NVME_MULTIPATH (git-fixes).</li>
<li>nvmet-fc: abort command when there is no binding (git-fixes).</li>
<li>nvmet-fc: avoid deadlock on delete association path (git-fixes).</li>
<li>nvmet-fc: defer cleanup using RCU properly (git-fixes).</li>
<li>nvmet-fc: hold reference on hostport match (git-fixes).</li>
<li>nvmet-fc: release reference on target port (git-fixes).</li>
<li>nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).</li>
<li>nvmet-fcloop: swap the list_add_tail arguments (git-fixes).</li>
<li>nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).</li>
<li>octeontx2-af: Add array index check (git-fixes).</li>
<li>octeontx2-af: Fix devlink params (git-fixes).</li>
<li>octeontx2-af: Fix issue with loading coalesced KPU profiles (git-fixes).</li>
<li>octeontx2-af: Fix NIX SQ mode and BP config (git-fixes).</li>
<li>Octeontx2-af: fix pause frame configuration in GMP mode (git-fixes).</li>
<li>octeontx2-af: Use matching wake_up API variant in CGX command interface (git-fixes).</li>
<li>octeontx2-af: Use separate handlers for interrupts (git-fixes).</li>
<li>octeontx2-pf: check negative error code in otx2_open() (git-fixes).</li>
<li>octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation (git-fixes).</li>
<li>octeontx2-pf: Fix transmit scheduler resource leak (git-fixes).</li>
<li>octeontx2-pf: Send UP messages to VF only when VF is up (git-fixes).</li>
<li>octeontx2-pf: Use default max_active works instead of one (git-fixes).</li>
<li>octeontx2-pf: Wait till detach_resources msg is complete (git-fixes).</li>
<li>octeontx2: Detect the mbox up or down message via register (git-fixes).</li>
<li>of: dynamic: Synchronize of_changeset_destroy() with the devlink removals (git-fixes).</li>
<li>of: module: add buffer overflow check in of_modalias() (git-fixes).</li>
<li>of: module: prevent NULL pointer dereference in vsnprintf() (stable-fixes).</li>
<li>of: property: Add in-ports/out-ports support to of_graph_get_port_parent() (stable-fixes).</li>
<li>of: property: fix typo in io-channels (git-fixes).</li>
<li>of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing (git-fixes).</li>
<li>of: property: Improve finding the consumer of a remote-endpoint property (git-fixes).</li>
<li>of: property: Improve finding the supplier of a remote-endpoint property (git-fixes).</li>
<li>of: unittest: Fix compile in the non-dynamic case (git-fixes).</li>
<li>PCI: Delay after FLR of Solidigm P44 Pro NVMe (stable-fixes).</li>
<li>PCI: Disable D3cold on Asus B1400 PCI-NVMe bridge (stable-fixes).</li>
<li>PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).</li>
<li>PCI: Execute quirk_enable_clear_retrain_link() earlier (stable-fixes).</li>
<li>PCI: Fix typos in docs and comments (stable-fixes).</li>
<li>PCI: hv: Fix ring buffer size calculation (git-fixes).</li>
<li>PCI: Make link retraining use RMW accessors for changing LNKCTL (git-fixes).</li>
<li>PCI: qcom: Add support for sa8775p SoC (git-fixes).</li>
<li>PCI: qcom: Disable ASPM L0s for sc8280xp, sa8540p and sa8295p (git-fixes).</li>
<li>PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).</li>
<li>PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).</li>
<li>PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word() (stable-fixes).</li>
<li>PCI: switchtec: Add support for PCIe Gen5 devices (stable-fixes).</li>
<li>PCI: switchtec: Use normal comment style (stable-fixes).</li>
<li>PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).</li>
<li>PCI/AER: Block runtime suspend when handling errors (stable-fixes).</li>
<li>PCI/ASPM: Use RMW accessors for changing LNKCTL (git-fixes).</li>
<li>PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (stable-fixes).</li>
<li>PCI/DPC: Use FIELD_GET() (stable-fixes).</li>
<li>PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).</li>
<li>PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).</li>
<li>PCI/PM: Drain runtime-idle callbacks before driver removal (stable-fixes).</li>
<li>peci: linux/peci.h: fix Excess kernel-doc description warning (git-fixes).</li>
<li>perf tests: Make data symbol test wait for perf to start (bsc#1220045).</li>
<li>perf tests: Skip data symbol test if buf1 symbol is missing (bsc#1220045).</li>
<li>perf/x86/amd/core: Avoid register reset when CPU is dead (git-fixes).</li>
<li>perf/x86/amd/core: Update and fix stalled-cycles-* events for Zen 2 and later (git-fixes).</li>
<li>perf/x86/amd/lbr: Use freeze based on availability (git-fixes).</li>
<li>perf/x86/intel: Expose existence of callback support to KVM (git-fixes).</li>
<li>phy: freescale: imx8m-pcie: fix pcie link-up instability (git-fixes).</li>
<li>phy: marvell: a3700-comphy: Fix hardcoded array size (git-fixes).</li>
<li>phy: marvell: a3700-comphy: Fix out of bounds read (git-fixes).</li>
<li>phy: rockchip-snps-pcie3: fix bifurcation on rk3588 (git-fixes).</li>
<li>phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits (git-fixes).</li>
<li>phy: rockchip: naneng-combphy: Fix mux on rk3588 (git-fixes).</li>
<li>phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered (git-fixes).</li>
<li>pinctrl: armada-37xx: remove an unused variable (git-fixes).</li>
<li>pinctrl: baytrail: Fix selecting gpio pinctrl state (git-fixes).</li>
<li>pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).</li>
<li>pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).</li>
<li>pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback (git-fixes).</li>
<li>pinctrl: mediatek: paris: Rework support for PIN_CONFIG_{INPUT,OUTPUT}_ENABLE (git-fixes).</li>
<li>pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).</li>
<li>pinctrl: qcom: pinctrl-sm7150: Fix sdc1 and ufs special pins regs (git-fixes).</li>
<li>pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).</li>
<li>pinctrl/meson: fix typo in PDM&#x27;s pin name (git-fixes).</li>
<li>platform/chrome: cros_ec_uart: properly fix race condition (git-fixes).</li>
<li>platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-fixes).</li>
<li>platform/x86: ISST: Add Granite Rapids-D to HPM CPU list (stable-fixes).</li>
<li>platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).</li>
<li>platform/x86: x86-android-tablets: Fix acer_b1_750_goodix_gpios name (stable-fixes).</li>
<li>platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).</li>
<li>platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes (stable-fixes).</li>
<li>platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).</li>
<li>PM / devfreq: Synchronize devfreq_monitor_[start/stop] (stable-fixes).</li>
<li>PM: s2idle: Make sure CPUs will wakeup directly on resume (git-fixes).</li>
<li>power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).</li>
<li>power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator (git-fixes).</li>
<li>powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).</li>
<li>powerpc/crypto/chacha-p10: Fix failure on non Power10 (bsc#1218205).</li>
<li>powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).</li>
<li>powerpc/hv-gpci: Fix the H_GET_PERF_COUNTER_INFO hcall return value checks (git-fixes).</li>
<li>powerpc/pseries: make max polling consistent for longer H_CALLs (bsc#1215199).</li>
<li>powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).</li>
<li>ppdev: Add an error check in register_device (git-fixes).</li>
<li>prctl: generalize PR_SET_MDWE support check to be per-arch (bsc#1225610).</li>
<li>printk: Add this_cpu_in_panic() (bsc#1225607).</li>
<li>printk: Adjust mapping for 32bit seq macros (bsc#1225607).</li>
<li>printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1225607).</li>
<li>printk: Consolidate console deferred printing (bsc#1225607).</li>
<li>printk: Disable passing console lock owner completely during panic() (bsc#1225607).</li>
<li>printk: Do not take console lock for console_flush_on_panic() (bsc#1225607).</li>
<li>printk: For @suppress_panic_printk check for other CPU in panic (bsc#1225607).</li>
<li>printk: Keep non-panic-CPUs out of console lock (bsc#1225607).</li>
<li>printk: Let no_printk() use _printk() (bsc#1225618).</li>
<li>printk: nbcon: Relocate 32bit seq macros (bsc#1225607).</li>
<li>printk: Reduce console_unblank() usage in unsafe scenarios (bsc#1225607).</li>
<li>printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1225607).</li>
<li>printk: ringbuffer: Clarify special lpos values (bsc#1225607).</li>
<li>printk: ringbuffer: Cleanup reader terminology (bsc#1225607).</li>
<li>printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1225607).</li>
<li>printk: ringbuffer: Skip non-finalized records in panic (bsc#1225607).</li>
<li>printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).</li>
<li>printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1225607).</li>
<li>printk: Wait for all reserved records with pr_flush() (bsc#1225607).</li>
<li>proc/kcore: do not try to access unaccepted memory (git-fixes).</li>
<li>pstore: inode: Convert mutex usage to guard(mutex) (stable-fixes).</li>
<li>pstore: inode: Only d_invalidate() is needed (git-fixes).</li>
<li>pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).</li>
<li>pwm: img: fix pwm clock lookup (git-fixes).</li>
<li>qibfs: fix dentry leak (git-fixes)</li>
<li>r8169: fix issue caused by buggy BIOS on certain boards with RTL8168d (git-fixes).</li>
<li>r8169: skip DASH fw status checks when DASH is disabled (git-fixes).</li>
<li>random: handle creditable entropy from atomic process context (git-fixes).</li>
<li>RAS/AMD/FMPM: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).</li>
<li>RAS/AMD/FMPM: Fix build when debugfs is not enabled (jsc#PED-7619).</li>
<li>RAS/AMD/FMPM: Safely handle saved records of various sizes (jsc#PED-7619).</li>
<li>RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)</li>
<li>RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes)</li>
<li>RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw (git-fixes)</li>
<li>RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)</li>
<li>RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)</li>
<li>RDMA/hns: Fix GMV table pagesize (git-fixes)</li>
<li>RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)</li>
<li>RDMA/hns: Fix UAF for cq async event (git-fixes)</li>
<li>RDMA/hns: Modify the print level of CQE error (git-fixes)</li>
<li>RDMA/hns: Use complete parentheses in macros (git-fixes)</li>
<li>RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)</li>
<li>RDMA/mana_ib: Fix bug in creation of dma regions (git-fixes).</li>
<li>RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)</li>
<li>RDMA/mlx5: Change check for cacheable mkeys (git-fixes)</li>
<li>RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)</li>
<li>RDMA/mlx5: Uncacheable mkey has neither rb_key or cache_ent (git-fixes)</li>
<li>RDMA/rxe: Allow good work requests to be executed (git-fixes)</li>
<li>RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)</li>
<li>RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)</li>
<li>RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes)</li>
<li>regmap: Add regmap_read_bypassed() (git-fixes).</li>
<li>regmap: kunit: Ensure that changed bytes are actually different (stable-fixes).</li>
<li>regmap: maple: Fix cache corruption in regcache_maple_drop() (git-fixes).</li>
<li>regmap: maple: Fix uninitialized symbol &#x27;ret&#x27; warnings (git-fixes).</li>
<li>regulator: bd71828: Do not overwrite runtime voltages (git-fixes).</li>
<li>regulator: change devm_regulator_get_enable_optional() stub to return Ok (git-fixes).</li>
<li>regulator: change stubbed devm_regulator_get_enable to return Ok (git-fixes).</li>
<li>regulator: core: fix debugfs creation regression (git-fixes).</li>
<li>regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).</li>
<li>regulator: tps65132: Add of_match table (stable-fixes).</li>
<li>remoteproc: k3-r5: Do not allow core1 to power up before core0 via sysfs (git-fixes).</li>
<li>remoteproc: k3-r5: Jump to error handling labels in start/stop errors (git-fixes).</li>
<li>remoteproc: k3-r5: Wait for core0 power-up before powering up core1 (git-fixes).</li>
<li>remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).</li>
<li>remoteproc: stm32: Fix incorrect type assignment returned by stm32_rproc_get_loaded_rsc_tablef (git-fixes).</li>
<li>remoteproc: virtio: Fix wdg cannot recovery remote processor (git-fixes).</li>
<li>Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default" (stable-fixes).</li>
<li>Revert "ASoC: SOF: Intel: hda-dai-ops: only allocate/release streams for first CPU DAI" (stable-fixes).</li>
<li>Revert "ASoC: SOF: Intel: hda-dai-ops: reset device count for SoundWire DAIs" (stable-fixes).</li>
<li>Revert "drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()" (stable-fixes).</li>
<li>Revert "drm/amd/display: Fix sending VSC (+ colorimetry) packets for DP/eDP displays without PSR" (stable-fixes).</li>
<li>Revert "drm/amd/display: fix USB-C flag update after enc10 feature init" (stable-fixes).</li>
<li>Revert "drm/amdkfd: fix gfx_target_version for certain 11.0.3 devices" (stable-fixes).</li>
<li>Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes).</li>
<li>Revert "drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor()" (stable-fixes).</li>
<li>Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes).</li>
<li>Revert "iommu/amd: Enable PCI/IMS" (git-fixes).</li>
<li>Revert "iommu/vt-d: Enable PCI/IMS" (git-fixes).</li>
<li>Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (git-fixes).</li>
<li>Revert "net/mlx5e: Check the number of elements before walk TC rhashtable" (git-fixes).</li>
<li>Revert "PCI/MSI: Provide IMS (Interrupt Message Store) support" (git-fixes).</li>
<li>Revert "PCI/MSI: Provide pci_ims_alloc/free_irq()" (git-fixes).</li>
<li>Revert "PCI/MSI: Provide stubs for IMS functions" (git-fixes).</li>
<li>Revert "selinux: introduce an initial SID for early boot processes" (bsc#1208593) It caused a regression on ALP-current branch, kernel-obs-qa build failed.</li>
<li>Revert "thermal: core: Do not update trip points inside the hysteresis range" (git-fixes).</li>
<li>Revert "usb: cdc-wdm: close race between read and workqueue" (git-fixes).</li>
<li>Revert "usb: phy: generic: Get the vbus supply" (git-fixes).</li>
<li>ring-buffer: Do not set shortest_full when full target is hit (git-fixes).</li>
<li>ring-buffer: Fix a race between readers and resize checks (git-fixes).</li>
<li>ring-buffer: Fix full_waiters_pending in poll (git-fixes).</li>
<li>ring-buffer: Fix resetting of shortest_full (git-fixes).</li>
<li>ring-buffer: Fix waking up ring buffer readers (git-fixes).</li>
<li>ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).</li>
<li>ring-buffer: Only update pages_touched when a new page is touched (git-fixes).</li>
<li>ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes).</li>
<li>ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).</li>
<li>rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).</li>
<li>s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224792).</li>
<li>s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223869).</li>
<li>s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224793).</li>
<li>s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1225133).</li>
<li>s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224348).</li>
<li>s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225136).</li>
<li>s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225134).</li>
<li>s390/ism: Properly fix receive message buffer allocation (git-fixes bsc#1223590).</li>
<li>s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223871).</li>
<li>s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223872).</li>
<li>s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223874).</li>
<li>s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223870).</li>
<li>s390/vdso: drop &#x27;-fPIC&#x27; from LDFLAGS (git-fixes bsc#1223593).</li>
<li>s390/vtime: fix average steal time calculation (git-fixes bsc#1221783).</li>
<li>s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223592).</li>
<li>sched/balancing: Rename newidle_balance() => sched_balance_newidle() (bsc#1222173).</li>
<li>sched/fair: Check root_domain::overload value before update (bsc#1222173).</li>
<li>sched/fair: Use helper functions to access root_domain::overload (bsc#1222173).</li>
<li>sched/psi: Select KERNFS as needed (git-fixes).</li>
<li>sched/topology: Optimize topology_span_sane() (bsc#1225053).</li>
<li>scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).</li>
<li>scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).</li>
<li>scsi: core: Fix unremoved procfs host directory regression (git-fixes).</li>
<li>scsi: csiostor: Avoid function pointer casts (git-fixes).</li>
<li>scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() (git-fixes).</li>
<li>scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() (git-fixes).</li>
<li>scsi: libsas: Fix disk not being scanned in after being removed (git-fixes).</li>
<li>scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).</li>
<li>scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).</li>
<li>scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).</li>
<li>scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).</li>
<li>scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).</li>
<li>scsi: lpfc: Define types in a union for generic void *context3 ptr (bsc#1221777).</li>
<li>scsi: lpfc: Move NPIV&#x27;s transport unregistration to after resource clean up (bsc#1221777).</li>
<li>scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1221777).</li>
<li>scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777 bsc#1217959).</li>
<li>scsi: lpfc: Remove unnecessary log message in queuecommand path (bsc#1221777).</li>
<li>scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port() (bsc#1221777).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).</li>
<li>scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).</li>
<li>scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).</li>
<li>scsi: mpi3mr: Reduce stack usage in mpi3mr_refresh_sas_ports() (git-fixes).</li>
<li>scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).</li>
<li>scsi: mylex: Fix sysfs buffer lengths (git-fixes).</li>
<li>scsi: qla2xxx: Change debug message during driver unload (bsc1221816).</li>
<li>scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).</li>
<li>scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).</li>
<li>scsi: qla2xxx: Fix double free of fcport (bsc1221816).</li>
<li>scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).</li>
<li>scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).</li>
<li>scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).</li>
<li>scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).</li>
<li>scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).</li>
<li>scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).</li>
<li>scsi: qla2xxx: Update manufacturer detail (bsc1221816).</li>
<li>scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).</li>
<li>scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).</li>
<li>scsi: sg: Avoid race in error handling & drop bogus warn (git-fixes).</li>
<li>scsi: sg: Avoid sg device teardown race (git-fixes).</li>
<li>scsi: smartpqi: Fix disable_managed_interrupts (git-fixes).</li>
<li>sctp: annotate data-races around sk->sk_wmem_queued (git-fixes).</li>
<li>sdhci-of-dwcmshc: disable PM runtime in dwcmshc_remove() (git-fixes).</li>
<li>selftests: default to host arch for LLVM builds (git-fixes).</li>
<li>selftests: forwarding: Fix ping failure due to short timeout (git-fixes).</li>
<li>selftests: kselftest: Fix build failure with NOLIBC (git-fixes).</li>
<li>selftests: kselftest: Mark functions that unconditionally call exit() as __noreturn (git-fixes).</li>
<li>selftests: net: bridge: increase IGMP/MLD exclude timeout membership interval (git-fixes).</li>
<li>selftests: net: kill smcrouted in the cleanup logic in amt.sh (git-fixes).</li>
<li>selftests: net: move amt to socat for better compatibility (git-fixes).</li>
<li>selftests: test_bridge_neigh_suppress.sh: Fix failures due to duplicate MAC (git-fixes).</li>
<li>selftests: timers: Convert posix_timers test to generate KTAP output (stable-fixes).</li>
<li>selftests: timers: Fix abs() warning in posix_timers test (git-fixes).</li>
<li>selftests: timers: Fix posix_timers ksft_print_msg() warning (git-fixes).</li>
<li>selftests: timers: Fix valid-adjtimex signed left-shift undefined behavior (stable-fixes).</li>
<li>selftests: vxlan_mdb: Fix failures with old libnet (git-fixes).</li>
<li>selftests/binderfs: use the Makefile&#x27;s rules, not Make&#x27;s implicit rules (git-fixes).</li>
<li>selftests/bpf: add edge case backtracking logic test (bsc#1225756).</li>
<li>selftests/bpf: precision tracking test for BPF_NEG and BPF_END (bsc#1225756).</li>
<li>selftests/ftrace: Fix event filter target_func selection (stable-fixes).</li>
<li>selftests/ftrace: Limit length in subsystem-enable tests (git-fixes).</li>
<li>selftests/kcmp: remove unused open mode (git-fixes).</li>
<li>selftests/net: convert test_bridge_neigh_suppress.sh to run it in unique namespace (stable-fixes).</li>
<li>selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).</li>
<li>selftests/powerpc/dexcr: Add -no-pie to hashchk tests (git-fixes).</li>
<li>selftests/powerpc/papr-vpd: Fix missing variable initialization (jsc#PED-4486 git-fixes).</li>
<li>selftests/resctrl: fix clang build failure: use LOCAL_HDRS (git-fixes).</li>
<li>selftests/timers/posix_timers: Reimplement check_timer_distribution() (git-fixes).</li>
<li>selinux: avoid dereference of garbage after mount failure (git-fixes).</li>
<li>selinux: introduce an initial SID for early boot processes (bsc#1208593).</li>
<li>serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).</li>
<li>serial: 8250_dw: Revert: Do not reclock if already at correct rate (git-fixes).</li>
<li>serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).</li>
<li>serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup (git-fixes).</li>
<li>serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).</li>
<li>serial: core: only stop transmit when HW fifo is empty (git-fixes).</li>
<li>serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).</li>
<li>serial: Lock console when calling into driver before registration (git-fixes).</li>
<li>serial: max3100: Fix bitwise types (git-fixes).</li>
<li>serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-fixes).</li>
<li>serial: max3100: Update uart_driver_registered on driver removal (git-fixes).</li>
<li>serial: max310x: fix NULL pointer dereference in I2C instantiation (git-fixes).</li>
<li>serial: max310x: fix syntax error in IRQ error message (git-fixes).</li>
<li>serial: mxs-auart: add spinlock around changing cts state (git-fixes).</li>
<li>serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).</li>
<li>serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).</li>
<li>serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).</li>
<li>serial: stm32: Reset .throttled state in .startup() (git-fixes).</li>
<li>serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).</li>
<li>SEV: disable SEV-ES DebugSwap by default (git-fixes).</li>
<li>slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-fixes).</li>
<li>slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).</li>
<li>soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).</li>
<li>soc: fsl: qbman: Use raw spinlock for cgr_lock (git-fixes).</li>
<li>soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).</li>
<li>soc: microchip: Fix POLARFIRE_SOC_SYS_CTRL input prompt (stable-fixes).</li>
<li>soc: qcom: pmic_glink: do not traverse clients list without a lock (git-fixes).</li>
<li>soc: qcom: pmic_glink: Make client-lock non-sleeping (git-fixes).</li>
<li>soc: qcom: pmic_glink: notify clients about the current state (git-fixes).</li>
<li>soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).</li>
<li>sock_diag: annotate data-races around sock_diag_handlers[family] (git-fixes).</li>
<li>soundwire: amd: fix for wake interrupt handling for clockstop mode (git-fixes).</li>
<li>speakup: Avoid crash on very long word (git-fixes).</li>
<li>speakup: Fix 8bit characters from direct synth (git-fixes).</li>
<li>speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).</li>
<li>spi: Do not mark message DMA mapped when no transfer in it is (git-fixes).</li>
<li>spi: fix null pointer dereference within spi_sync (git-fixes).</li>
<li>spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes).</li>
<li>spi: intel-pci: Add support for Lunar Lake-M SPI serial flash (stable-fixes).</li>
<li>spi: lm70llp: fix links in doc and comments (git-fixes).</li>
<li>spi: lpspi: Avoid potential use-after-free in probe() (git-fixes).</li>
<li>spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe (git-fixes).</li>
<li>spi: microchip-core-qspi: fix setting spi bus clock rate (git-fixes).</li>
<li>spi: spi-fsl-lpspi: remove redundant spi_controller_put call (git-fixes).</li>
<li>spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).</li>
<li>spi: stm32: Do not warn about spurious interrupts (git-fixes).</li>
<li>spi: xilinx: Fix kernel documentation in the xilinx_spi.h (git-fixes).</li>
<li>spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).</li>
<li>staging: vc04_services: changen strncpy() to strscpy_pad() (stable-fixes).</li>
<li>staging: vc04_services: fix information leak in create_component() (git-fixes).</li>
<li>staging: vt6655: Remove unused declaration of RFbAL7230SelectChannelPostProcess() (git-fixes).</li>
<li>stmmac: Clear variable when destroying workqueue (git-fixes).</li>
<li>SUNRPC: fix a memleak in gss_import_v2_context (git-fixes).</li>
<li>SUNRPC: fix some memleaks in gssx_dec_option_array (git-fixes).</li>
<li>supported.conf: support tcp_dctcp module (jsc#PED-8111)</li>
<li>swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331)</li>
<li>swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)</li>
<li>swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)</li>
<li>swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)</li>
<li>swiotlb: use the calculated number of areas (git-fixes).</li>
<li>thermal: devfreq_cooling: Fix perf state when calculate dfc res_util (git-fixes).</li>
<li>thermal/drivers/qcom/lmh: Check for SCM availability at probe (git-fixes).</li>
<li>thermal/drivers/tsens: Fix null pointer dereference (git-fixes).</li>
<li>thermal/of: Assume polling-delay(-passive) 0 when absent (stable-fixes).</li>
<li>thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).</li>
<li>thunderbolt: Do not create DisplayPort tunnels on adapters of the same router (git-fixes).</li>
<li>thunderbolt: Fix wake configurations after device unplug (stable-fixes).</li>
<li>thunderbolt: Introduce tb_path_deactivate_hop() (stable-fixes).</li>
<li>thunderbolt: Introduce tb_port_reset() (stable-fixes).</li>
<li>thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4 routers (stable-fixes).</li>
<li>thunderbolt: Reset only non-USB4 host routers in resume (git-fixes).</li>
<li>tls: break out of main loop when PEEK gets a non-data record (bsc#1221858).</li>
<li>tls: do not skip over different type records from the rx_list (bsc#1221858).</li>
<li>tls: fix peeking with sync+async decryption (bsc#1221858).</li>
<li>tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1221858).</li>
<li>tools/arch/x86/intel_sdsi: Fix maximum meter bundle length (git-fixes).</li>
<li>tools/arch/x86/intel_sdsi: Fix meter_certificate decoding (git-fixes).</li>
<li>tools/arch/x86/intel_sdsi: Fix meter_show display (git-fixes).</li>
<li>tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).</li>
<li>tools/power turbostat: Expand probe_intel_uncore_frequency() (bsc#1221765).</li>
<li>tools/power/turbostat: Fix uncore frequency file string (bsc#1221765).</li>
<li>tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).</li>
<li>tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).</li>
<li>tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).</li>
<li>tracing: hide unused ftrace_event_id_fops (git-fixes).</li>
<li>tracing: Remove precision vsnprintf() check from print event (git-fixes).</li>
<li>tracing: Use .flush() call to wake up readers (git-fixes).</li>
<li>tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).</li>
<li>tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).</li>
<li>tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).</li>
<li>tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).</li>
<li>tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).</li>
<li>tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).</li>
<li>ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).</li>
<li>ubifs: fix sort function prototype (git-fixes).</li>
<li>ubifs: Queue up space reservation tasks if retrying many times (git-fixes).</li>
<li>ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).</li>
<li>ubifs: Set page uptodate in the correct place (git-fixes).</li>
<li>usb: aqc111: stop lying about skb->truesize (git-fixes).</li>
<li>usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor (git-fixes).</li>
<li>usb: cdc-wdm: close race between read and workqueue (git-fixes).</li>
<li>USB: core: Add hub_get() and hub_put() routines (stable-fixes).</li>
<li>USB: core: Fix access violation during port device removal (git-fixes).</li>
<li>USB: core: Fix deadlock in port "disable" sysfs attribute (stable-fixes).</li>
<li>USB: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).</li>
<li>usb: Disable USB3 LPM at shutdown (stable-fixes).</li>
<li>usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).</li>
<li>usb: dwc2: gadget: LPM flow fix (git-fixes).</li>
<li>usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).</li>
<li>usb: dwc2: host: Fix hibernation flow (git-fixes).</li>
<li>usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).</li>
<li>usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).</li>
<li>usb: dwc3-am62: Disable wakeup at remove (git-fixes).</li>
<li>usb: dwc3-am62: fix module unload/reload behavior (git-fixes).</li>
<li>usb: dwc3-am62: Rename private data (git-fixes).</li>
<li>usb: dwc3: core: Prevent phy suspend during init (Git-fixes).</li>
<li>usb: dwc3: pci: Drop duplicate ID (git-fixes).</li>
<li>usb: dwc3: Properly set system wakeup (git-fixes).</li>
<li>usb: dwc3: Wait unconditionally after issuing EndXfer command (git-fixes).</li>
<li>usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (bsc#1220569).</li>
<li>usb: fotg210: Add missing kernel doc description (git-fixes).</li>
<li>usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).</li>
<li>usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).</li>
<li>usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (git-fixes).</li>
<li>usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).</li>
<li>usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-fixes).</li>
<li>usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).</li>
<li>usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (git-fixes).</li>
<li>usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR (stable-fixes).</li>
<li>usb: gadget: uvc: use correct buffer size when parsing configfs lists (git-fixes).</li>
<li>usb: ohci: Prevent missed ohci interrupts (git-fixes).</li>
<li>usb: phy: generic: Get the vbus supply (git-fixes).</li>
<li>USB: serial: add device ID for VeriFone adapter (stable-fixes).</li>
<li>USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).</li>
<li>USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).</li>
<li>USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).</li>
<li>USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).</li>
<li>USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).</li>
<li>USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).</li>
<li>USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).</li>
<li>USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).</li>
<li>USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).</li>
<li>USB: serial: option: support Quectel EM060K sub-models (stable-fixes).</li>
<li>usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).</li>
<li>usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).</li>
<li>usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).</li>
<li>usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).</li>
<li>usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes).</li>
<li>usb: typec: tcpm: Correct port source pdo array in pd_set callback (git-fixes).</li>
<li>usb: typec: tcpm: Correct the PDO counting in pd_set (git-fixes).</li>
<li>usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd() (git-fixes).</li>
<li>usb: typec: tcpm: unregister existing source caps before re-registration (git-fixes).</li>
<li>usb: typec: tcpm: Update PD of Type-C port upon pd_set (git-fixes).</li>
<li>usb: typec: tipd: fix event checking for tps6598x (git-fixes).</li>
<li>usb: typec: ucsi_acpi: Refactor and fix DELL quirk (git-fixes).</li>
<li>usb: typec: ucsi: Ack unsupported commands (stable-fixes).</li>
<li>usb: typec: ucsi: always register a link to USB PD device (git-fixes).</li>
<li>usb: typec: ucsi: Check for notifications after init (git-fixes).</li>
<li>usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).</li>
<li>usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).</li>
<li>usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).</li>
<li>usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).</li>
<li>usb: typec: ucsi: Fix connector check on init (git-fixes).</li>
<li>usb: typec: ucsi: Fix race between typec_switch and role_switch (git-fixes).</li>
<li>usb: typec: ucsi: Limit read size on v1.2 (stable-fixes).</li>
<li>usb: typec: ucsi: simplify partner&#x27;s PD caps registration (git-fixes).</li>
<li>USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).</li>
<li>usb: udc: remove warning when queue disabled ep (stable-fixes).</li>
<li>usb: xhci-plat: Do not include xhci.h (stable-fixes).</li>
<li>usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).</li>
<li>usb: xhci: correct return value in case of STS_HCE (git-fixes).</li>
<li>usb: xhci: Implement xhci_handshake_check_state() helper.</li>
<li>vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).</li>
<li>vboxsf: explicitly deny setlease attempts (stable-fixes).</li>
<li>vdpa_sim: reset must not run (git-fixes).</li>
<li>vdpa/mlx5: Allow CVQ size changes (git-fixes).</li>
<li>veth: try harder when allocating queue memory (git-fixes).</li>
<li>vhost: Add smp_rmb() in vhost_enable_notify() (git-fixes).</li>
<li>vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes).</li>
<li>virtio_net: Do not send RSS key if it is not supported (git-fixes).</li>
<li>virtio-blk: Ensure no requests in virtqueues before deleting vqs (git-fixes).</li>
<li>virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223944).</li>
<li>VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).</li>
<li>VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).</li>
<li>vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).</li>
<li>vsock/virtio: fix packet delivery to tap device (git-fixes).</li>
<li>watchdog: bd9576: Drop "always-running" property (git-fixes).</li>
<li>watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).</li>
<li>watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).</li>
<li>watchdog: sa1100: Fix PTR_ERR_OR_ZERO() vs NULL check in sa1100dog_probe() (git-fixes).</li>
<li>wifi: ar5523: enable proper endpoint verification (git-fixes).</li>
<li>wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).</li>
<li>wifi: ath10k: poll service ready message before failing (git-fixes).</li>
<li>wifi: ath10k: populate board data for WCN3990 (git-fixes).</li>
<li>wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).</li>
<li>wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).</li>
<li>wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() (git-fixes).</li>
<li>wifi: ath12k: Update Qualcomm Innovation Center, Inc. copyrights (stable-fixes).</li>
<li>wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).</li>
<li>wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro (stable-fixes).</li>
<li>wifi: brcmfmac: add per-vendor feature detection callback (stable-fixes).</li>
<li>wifi: brcmfmac: cfg80211: Use WSEC to set SAE password (stable-fixes).</li>
<li>wifi: brcmfmac: Demote vendor-specific attach/detach messages to info (git-fixes).</li>
<li>wifi: brcmfmac: pcie: handle randbuf allocation failure (git-fixes).</li>
<li>wifi: carl9170: add a proper sanity check for endpoints (git-fixes).</li>
<li>wifi: carl9170: re-fix fortified-memset warning (git-fixes).</li>
<li>wifi: cfg80211: check A-MSDU format more carefully (stable-fixes).</li>
<li>wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).</li>
<li>wifi: ieee80211: fix ieee80211_mle_basic_sta_prof_size_ok() (git-fixes).</li>
<li>wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).</li>
<li>wifi: iwlwifi: fw: fix compile w/o CONFIG_ACPI (git-fixes).</li>
<li>wifi: iwlwifi: mvm: allocate STA links only for active links (git-fixes).</li>
<li>wifi: iwlwifi: mvm: fix active link counting during recovery (git-fixes).</li>
<li>wifi: iwlwifi: mvm: fix check in iwl_mvm_sta_fw_id_mask (git-fixes).</li>
<li>wifi: iwlwifi: mvm: guard against invalid STA ID on removal (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: include link ID when releasing frames (git-fixes).</li>
<li>wifi: iwlwifi: mvm: init vif works only once (git-fixes).</li>
<li>wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).</li>
<li>wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).</li>
<li>wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).</li>
<li>wifi: iwlwifi: mvm: select STA mask only for active links (git-fixes).</li>
<li>wifi: iwlwifi: mvm: use correct address 3 in A-MSDU (stable-fixes).</li>
<li>wifi: iwlwifi: pcie: Add the PCI device id for new hardware (stable-fixes).</li>
<li>wifi: iwlwifi: pcie: fix RB status reading (stable-fixes).</li>
<li>wifi: iwlwifi: read txq->read_ptr under lock (stable-fixes).</li>
<li>wifi: iwlwifi: reconfigure TLC during HW restart (git-fixes).</li>
<li>wifi: mac80211_hwsim: init peer measurement result (git-fixes).</li>
<li>wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).</li>
<li>wifi: mac80211: clean up assignments to pointer cache (stable-fixes).</li>
<li>wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).</li>
<li>wifi: mac80211: fix prep_connection error path (stable-fixes).</li>
<li>wifi: mac80211: fix unaligned le16 access (git-fixes).</li>
<li>wifi: mac80211: only call drv_sta_rc_update for uploaded stations (stable-fixes).</li>
<li>wifi: mac80211: remove link before AP (git-fixes).</li>
<li>wifi: mt76: mt7603: add wpdma tx eof flag for PSE client reset (git-fixes).</li>
<li>wifi: mt76: mt7603: fix tx queue of loopback packets (git-fixes).</li>
<li>wifi: mt76: mt7915: workaround too long expansion sparse warnings (git-fixes).</li>
<li>wifi: mt76: mt7996: add locking for accessing mapped registers (stable-fixes).</li>
<li>wifi: mt76: mt7996: disable AMSDU for non-data frames (stable-fixes).</li>
<li>wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).</li>
<li>wifi: nl80211: do not free NULL coalescing rule (git-fixes).</li>
<li>wifi: rtw88: 8821cu: Fix connection failure (stable-fixes).</li>
<li>wifi: rtw88: Add missing VID/PIDs for 8811CU and 8821CU (stable-fixes).</li>
<li>wifi: rtw89: fix null pointer access when abort scan (stable-fixes).</li>
<li>wifi: rtw89: pci: correct TX resource checking for PCI DMA channel of firmware command (git-fixes).</li>
<li>wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor (stable-fixes).</li>
<li>wireguard: netlink: access device through ctx instead of peer (git-fixes).</li>
<li>wireguard: netlink: check for dangling peer via is_dead instead of empty list (git-fixes).</li>
<li>wireguard: receive: annotate data-race around receiving_counter.counter (git-fixes).</li>
<li>x86/bugs: Fix BHI retpoline check (git-fixes).</li>
<li>x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).</li>
<li>x86/bugs: Remove default case for fully switched enums (git-fixes).</li>
<li>x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (git-fixes).</li>
<li>x86/coco: Require seeding RNG with RDRAND on CoCo systems (git-fixes).</li>
<li>x86/cpu: Add model number for Intel Arrow Lake mobile processor (git-fixes).</li>
<li>x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (git-fixes).</li>
<li>x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).</li>
<li>x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).</li>
<li>x86/efistub: Add missing boot_params for mixed mode compat entry (git-fixes).</li>
<li>x86/efistub: Call mixed mode boot services on the firmware&#x27;s stack (git-fixes).</li>
<li>x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).</li>
<li>x86/hyperv: Allow 15-bit APIC IDs for VTL platforms (git-fixes).</li>
<li>x86/hyperv: Use per cpu initial stack for vtl context (git-fixes).</li>
<li>x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (git-fixes).</li>
<li>x86/kconfig: Select ARCH_WANT_FRAME_POINTERS again when UNWINDER_FRAME_POINTER=y (git-fixes).</li>
<li>x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (git-fixes).</li>
<li>x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).</li>
<li>x86/nmi: Fix the inverse "in NMI handler" check (git-fixes).</li>
<li>x86/nospec: Refactor UNTRAIN_RET[_*] (git-fixes).</li>
<li>x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes).</li>
<li>x86/purgatory: Switch to the position-independent small code model (git-fixes).</li>
<li>x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (git-fixes).</li>
<li>x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk (git-fixes).</li>
<li>x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).</li>
<li>x86/srso: Disentangle rethunk-dependent options (git-fixes).</li>
<li>x86/srso: Fix unret validation dependencies (git-fixes).</li>
<li>x86/srso: Improve i-cache locality for alias mitigation (git-fixes).</li>
<li>x86/srso: Print actual mitigation if requested mitigation isn&#x27;t possible (git-fixes).</li>
<li>x86/srso: Remove &#x27;pred_cmd&#x27; label (git-fixes).</li>
<li>x86/srso: Unexport untraining functions (git-fixes).</li>
<li>x86/xen: Add some null pointer checking to smp.c (git-fixes).</li>
<li>x86/xen: attempt to inflate the memory balloon on PVH (git-fixes).</li>
<li>xdp, bonding: Fix feature flags when there are no slave devs anymore (git-fixes).</li>
<li>xen-netfront: Add missing skb_mark_for_recycle (git-fixes).</li>
<li>xen: evtchn: Allow shared registration of IRQ handers (git-fixes).</li>
<li>xen/events: drop xen_allocate_irqs_dynamic() (git-fixes).</li>
<li>xen/events: fix error code in xen_bind_pirq_msi_to_irq() (git-fixes).</li>
<li>xen/events: increment refcnt only if event channel is refcounted (git-fixes).</li>
<li>xen/events: modify internal [un]bind interfaces (git-fixes).</li>
<li>xen/events: reduce externally visible helper functions (git-fixes).</li>
<li>xen/events: remove some simple helpers from events_base.c (git-fixes).</li>
<li>xen/evtchn: avoid WARN() when unbinding an event channel (git-fixes).</li>
<li>xfs: add lock protection when remove perag from radix tree (git-fixes).</li>
<li>xfs: allow extent free intents to be retried (git-fixes).</li>
<li>xfs: fix perag leak when growfs fails (git-fixes).</li>
<li>xfs: force all buffers to be written during btree bulk load (git-fixes).</li>
<li>xfs: make xchk_iget safer in the presence of corrupt inode btrees (git-fixes).</li>
<li>xfs: pass the xfs_defer_pending object to iop_recover (git-fixes).</li>
<li>xfs: recompute growfsrtfree transaction reservation while growing rt volume (git-fixes).</li>
<li>xfs: transfer recovered intent item ownership in ->iop_recover (git-fixes).</li>
<li>xfs: use xfs_defer_pending objects to recover intent items (git-fixes).</li>
<li>xhci: add helper that checks for unhandled events on a event ring (git-fixes).</li>
<li>xhci: remove unnecessary event_ring_deq parameter from xhci_handle_event() (git-fixes).</li>
<li>xhci: Simplify event ring dequeue pointer update for port change events (git-fixes).</li>
<li>xhci: simplify event ring dequeue tracking for transfer events (git-fixes).</li>
<li>xhci: update event ring dequeue pointer position to controller correctly (git-fixes). Altered because we cannot take the multiple interrupter code</li>
</ul>



    
        <h2>Special Instructions and Notes:</h2>
        <ul>
            
            
                <li>Please reboot the system after installing this update.</li>
            
            
        </ul>
    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                openSUSE Leap 15.6
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-2024-2135=1 openSUSE-SLE-15.6-2024-2135=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                Public Cloud Module 15-SP6
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2135=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    openSUSE Leap 15.6 (aarch64 x86_64)
                    <ul>
                        
                            <li>reiserfs-kmp-azure-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-extra-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-debuginfo-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-extra-debuginfo-6.4.0-150600.8.5.4</li>
                        
                            <li>dlm-kmp-azure-debuginfo-6.4.0-150600.8.5.4</li>
                        
                            <li>dlm-kmp-azure-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-optional-6.4.0-150600.8.5.4</li>
                        
                            <li>ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.5.4</li>
                        
                            <li>gfs2-kmp-azure-6.4.0-150600.8.5.4</li>
                        
                            <li>kselftests-kmp-azure-debuginfo-6.4.0-150600.8.5.4</li>
                        
                            <li>cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-syms-azure-6.4.0-150600.8.5.1</li>
                        
                            <li>kernel-azure-devel-debuginfo-6.4.0-150600.8.5.4</li>
                        
                            <li>gfs2-kmp-azure-debuginfo-6.4.0-150600.8.5.4</li>
                        
                            <li>cluster-md-kmp-azure-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-livepatch-devel-6.4.0-150600.8.5.4</li>
                        
                            <li>ocfs2-kmp-azure-6.4.0-150600.8.5.4</li>
                        
                            <li>reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-debugsource-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-devel-6.4.0-150600.8.5.4</li>
                        
                            <li>kselftests-kmp-azure-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-optional-debuginfo-6.4.0-150600.8.5.4</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.6 (aarch64 nosrc x86_64)
                    <ul>
                        
                            <li>kernel-azure-6.4.0-150600.8.5.4</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.6 (x86_64)
                    <ul>
                        
                            <li>kernel-azure-vdso-debuginfo-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-vdso-6.4.0-150600.8.5.4</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.6 (noarch)
                    <ul>
                        
                            <li>kernel-devel-azure-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-source-azure-6.4.0-150600.8.5.4</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
                    <ul>
                        
                            <li>kernel-azure-6.4.0-150600.8.5.4</li>
                        
                    </ul>
                </li>
            
                <li>
                    Public Cloud Module 15-SP6 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-syms-azure-6.4.0-150600.8.5.1</li>
                        
                            <li>kernel-azure-devel-debuginfo-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-debugsource-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-devel-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-azure-debuginfo-6.4.0-150600.8.5.4</li>
                        
                    </ul>
                </li>
            
                <li>
                    Public Cloud Module 15-SP6 (noarch)
                    <ul>
                        
                            <li>kernel-devel-azure-6.4.0-150600.8.5.4</li>
                        
                            <li>kernel-source-azure-6.4.0-150600.8.5.4</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-0160.html">https://www.suse.com/security/cve/CVE-2023-0160.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-47233.html">https://www.suse.com/security/cve/CVE-2023-47233.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52434.html">https://www.suse.com/security/cve/CVE-2023-52434.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52458.html">https://www.suse.com/security/cve/CVE-2023-52458.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52463.html">https://www.suse.com/security/cve/CVE-2023-52463.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52472.html">https://www.suse.com/security/cve/CVE-2023-52472.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52483.html">https://www.suse.com/security/cve/CVE-2023-52483.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52492.html">https://www.suse.com/security/cve/CVE-2023-52492.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52503.html">https://www.suse.com/security/cve/CVE-2023-52503.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52591.html">https://www.suse.com/security/cve/CVE-2023-52591.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52608.html">https://www.suse.com/security/cve/CVE-2023-52608.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52616.html">https://www.suse.com/security/cve/CVE-2023-52616.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52618.html">https://www.suse.com/security/cve/CVE-2023-52618.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52631.html">https://www.suse.com/security/cve/CVE-2023-52631.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52635.html">https://www.suse.com/security/cve/CVE-2023-52635.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52640.html">https://www.suse.com/security/cve/CVE-2023-52640.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52641.html">https://www.suse.com/security/cve/CVE-2023-52641.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52645.html">https://www.suse.com/security/cve/CVE-2023-52645.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52652.html">https://www.suse.com/security/cve/CVE-2023-52652.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52653.html">https://www.suse.com/security/cve/CVE-2023-52653.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52654.html">https://www.suse.com/security/cve/CVE-2023-52654.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52655.html">https://www.suse.com/security/cve/CVE-2023-52655.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52657.html">https://www.suse.com/security/cve/CVE-2023-52657.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52658.html">https://www.suse.com/security/cve/CVE-2023-52658.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52659.html">https://www.suse.com/security/cve/CVE-2023-52659.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52660.html">https://www.suse.com/security/cve/CVE-2023-52660.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52661.html">https://www.suse.com/security/cve/CVE-2023-52661.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52662.html">https://www.suse.com/security/cve/CVE-2023-52662.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52663.html">https://www.suse.com/security/cve/CVE-2023-52663.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52664.html">https://www.suse.com/security/cve/CVE-2023-52664.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52667.html">https://www.suse.com/security/cve/CVE-2023-52667.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52669.html">https://www.suse.com/security/cve/CVE-2023-52669.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52670.html">https://www.suse.com/security/cve/CVE-2023-52670.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52671.html">https://www.suse.com/security/cve/CVE-2023-52671.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52673.html">https://www.suse.com/security/cve/CVE-2023-52673.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52674.html">https://www.suse.com/security/cve/CVE-2023-52674.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52675.html">https://www.suse.com/security/cve/CVE-2023-52675.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52676.html">https://www.suse.com/security/cve/CVE-2023-52676.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52678.html">https://www.suse.com/security/cve/CVE-2023-52678.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52679.html">https://www.suse.com/security/cve/CVE-2023-52679.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52680.html">https://www.suse.com/security/cve/CVE-2023-52680.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52681.html">https://www.suse.com/security/cve/CVE-2023-52681.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52683.html">https://www.suse.com/security/cve/CVE-2023-52683.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52685.html">https://www.suse.com/security/cve/CVE-2023-52685.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52686.html">https://www.suse.com/security/cve/CVE-2023-52686.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52687.html">https://www.suse.com/security/cve/CVE-2023-52687.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52690.html">https://www.suse.com/security/cve/CVE-2023-52690.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52691.html">https://www.suse.com/security/cve/CVE-2023-52691.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52692.html">https://www.suse.com/security/cve/CVE-2023-52692.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52693.html">https://www.suse.com/security/cve/CVE-2023-52693.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52694.html">https://www.suse.com/security/cve/CVE-2023-52694.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52695.html">https://www.suse.com/security/cve/CVE-2023-52695.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52696.html">https://www.suse.com/security/cve/CVE-2023-52696.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52697.html">https://www.suse.com/security/cve/CVE-2023-52697.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52698.html">https://www.suse.com/security/cve/CVE-2023-52698.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52771.html">https://www.suse.com/security/cve/CVE-2023-52771.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52772.html">https://www.suse.com/security/cve/CVE-2023-52772.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52860.html">https://www.suse.com/security/cve/CVE-2023-52860.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52882.html">https://www.suse.com/security/cve/CVE-2023-52882.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-6238.html">https://www.suse.com/security/cve/CVE-2023-6238.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-6270.html">https://www.suse.com/security/cve/CVE-2023-6270.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-6531.html">https://www.suse.com/security/cve/CVE-2023-6531.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-7042.html">https://www.suse.com/security/cve/CVE-2023-7042.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-0639.html">https://www.suse.com/security/cve/CVE-2024-0639.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-21823.html">https://www.suse.com/security/cve/CVE-2024-21823.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-22099.html">https://www.suse.com/security/cve/CVE-2024-22099.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-23848.html">https://www.suse.com/security/cve/CVE-2024-23848.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-24861.html">https://www.suse.com/security/cve/CVE-2024-24861.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-25739.html">https://www.suse.com/security/cve/CVE-2024-25739.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26601.html">https://www.suse.com/security/cve/CVE-2024-26601.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26611.html">https://www.suse.com/security/cve/CVE-2024-26611.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26614.html">https://www.suse.com/security/cve/CVE-2024-26614.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26632.html">https://www.suse.com/security/cve/CVE-2024-26632.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26638.html">https://www.suse.com/security/cve/CVE-2024-26638.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26642.html">https://www.suse.com/security/cve/CVE-2024-26642.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26643.html">https://www.suse.com/security/cve/CVE-2024-26643.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26652.html">https://www.suse.com/security/cve/CVE-2024-26652.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26654.html">https://www.suse.com/security/cve/CVE-2024-26654.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26656.html">https://www.suse.com/security/cve/CVE-2024-26656.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26657.html">https://www.suse.com/security/cve/CVE-2024-26657.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26671.html">https://www.suse.com/security/cve/CVE-2024-26671.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26673.html">https://www.suse.com/security/cve/CVE-2024-26673.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26674.html">https://www.suse.com/security/cve/CVE-2024-26674.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26675.html">https://www.suse.com/security/cve/CVE-2024-26675.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26679.html">https://www.suse.com/security/cve/CVE-2024-26679.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26684.html">https://www.suse.com/security/cve/CVE-2024-26684.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26685.html">https://www.suse.com/security/cve/CVE-2024-26685.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26692.html">https://www.suse.com/security/cve/CVE-2024-26692.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26696.html">https://www.suse.com/security/cve/CVE-2024-26696.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26697.html">https://www.suse.com/security/cve/CVE-2024-26697.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26704.html">https://www.suse.com/security/cve/CVE-2024-26704.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26714.html">https://www.suse.com/security/cve/CVE-2024-26714.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26726.html">https://www.suse.com/security/cve/CVE-2024-26726.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26731.html">https://www.suse.com/security/cve/CVE-2024-26731.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26733.html">https://www.suse.com/security/cve/CVE-2024-26733.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26736.html">https://www.suse.com/security/cve/CVE-2024-26736.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26737.html">https://www.suse.com/security/cve/CVE-2024-26737.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26739.html">https://www.suse.com/security/cve/CVE-2024-26739.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26740.html">https://www.suse.com/security/cve/CVE-2024-26740.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26742.html">https://www.suse.com/security/cve/CVE-2024-26742.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26756.html">https://www.suse.com/security/cve/CVE-2024-26756.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26757.html">https://www.suse.com/security/cve/CVE-2024-26757.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26760.html">https://www.suse.com/security/cve/CVE-2024-26760.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-267600.html">https://www.suse.com/security/cve/CVE-2024-267600.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26761.html">https://www.suse.com/security/cve/CVE-2024-26761.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26764.html">https://www.suse.com/security/cve/CVE-2024-26764.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26769.html">https://www.suse.com/security/cve/CVE-2024-26769.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26772.html">https://www.suse.com/security/cve/CVE-2024-26772.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26773.html">https://www.suse.com/security/cve/CVE-2024-26773.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26774.html">https://www.suse.com/security/cve/CVE-2024-26774.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26775.html">https://www.suse.com/security/cve/CVE-2024-26775.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26779.html">https://www.suse.com/security/cve/CVE-2024-26779.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26783.html">https://www.suse.com/security/cve/CVE-2024-26783.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26786.html">https://www.suse.com/security/cve/CVE-2024-26786.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26791.html">https://www.suse.com/security/cve/CVE-2024-26791.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26793.html">https://www.suse.com/security/cve/CVE-2024-26793.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26794.html">https://www.suse.com/security/cve/CVE-2024-26794.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26802.html">https://www.suse.com/security/cve/CVE-2024-26802.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26805.html">https://www.suse.com/security/cve/CVE-2024-26805.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26807.html">https://www.suse.com/security/cve/CVE-2024-26807.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26815.html">https://www.suse.com/security/cve/CVE-2024-26815.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26816.html">https://www.suse.com/security/cve/CVE-2024-26816.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26822.html">https://www.suse.com/security/cve/CVE-2024-26822.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26828.html">https://www.suse.com/security/cve/CVE-2024-26828.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26832.html">https://www.suse.com/security/cve/CVE-2024-26832.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26836.html">https://www.suse.com/security/cve/CVE-2024-26836.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26844.html">https://www.suse.com/security/cve/CVE-2024-26844.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26846.html">https://www.suse.com/security/cve/CVE-2024-26846.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26848.html">https://www.suse.com/security/cve/CVE-2024-26848.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26853.html">https://www.suse.com/security/cve/CVE-2024-26853.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26854.html">https://www.suse.com/security/cve/CVE-2024-26854.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26855.html">https://www.suse.com/security/cve/CVE-2024-26855.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26856.html">https://www.suse.com/security/cve/CVE-2024-26856.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26857.html">https://www.suse.com/security/cve/CVE-2024-26857.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26858.html">https://www.suse.com/security/cve/CVE-2024-26858.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26860.html">https://www.suse.com/security/cve/CVE-2024-26860.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26861.html">https://www.suse.com/security/cve/CVE-2024-26861.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26862.html">https://www.suse.com/security/cve/CVE-2024-26862.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26866.html">https://www.suse.com/security/cve/CVE-2024-26866.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26868.html">https://www.suse.com/security/cve/CVE-2024-26868.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26870.html">https://www.suse.com/security/cve/CVE-2024-26870.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26878.html">https://www.suse.com/security/cve/CVE-2024-26878.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26881.html">https://www.suse.com/security/cve/CVE-2024-26881.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26882.html">https://www.suse.com/security/cve/CVE-2024-26882.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26883.html">https://www.suse.com/security/cve/CVE-2024-26883.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26884.html">https://www.suse.com/security/cve/CVE-2024-26884.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26885.html">https://www.suse.com/security/cve/CVE-2024-26885.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26898.html">https://www.suse.com/security/cve/CVE-2024-26898.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26899.html">https://www.suse.com/security/cve/CVE-2024-26899.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26900.html">https://www.suse.com/security/cve/CVE-2024-26900.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26901.html">https://www.suse.com/security/cve/CVE-2024-26901.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26903.html">https://www.suse.com/security/cve/CVE-2024-26903.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26906.html">https://www.suse.com/security/cve/CVE-2024-26906.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26909.html">https://www.suse.com/security/cve/CVE-2024-26909.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26921.html">https://www.suse.com/security/cve/CVE-2024-26921.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26922.html">https://www.suse.com/security/cve/CVE-2024-26922.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26923.html">https://www.suse.com/security/cve/CVE-2024-26923.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26925.html">https://www.suse.com/security/cve/CVE-2024-26925.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26928.html">https://www.suse.com/security/cve/CVE-2024-26928.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26932.html">https://www.suse.com/security/cve/CVE-2024-26932.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26933.html">https://www.suse.com/security/cve/CVE-2024-26933.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26934.html">https://www.suse.com/security/cve/CVE-2024-26934.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26935.html">https://www.suse.com/security/cve/CVE-2024-26935.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26937.html">https://www.suse.com/security/cve/CVE-2024-26937.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26938.html">https://www.suse.com/security/cve/CVE-2024-26938.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26940.html">https://www.suse.com/security/cve/CVE-2024-26940.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26943.html">https://www.suse.com/security/cve/CVE-2024-26943.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26945.html">https://www.suse.com/security/cve/CVE-2024-26945.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26946.html">https://www.suse.com/security/cve/CVE-2024-26946.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26948.html">https://www.suse.com/security/cve/CVE-2024-26948.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26949.html">https://www.suse.com/security/cve/CVE-2024-26949.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26950.html">https://www.suse.com/security/cve/CVE-2024-26950.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26951.html">https://www.suse.com/security/cve/CVE-2024-26951.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26956.html">https://www.suse.com/security/cve/CVE-2024-26956.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26957.html">https://www.suse.com/security/cve/CVE-2024-26957.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26958.html">https://www.suse.com/security/cve/CVE-2024-26958.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26960.html">https://www.suse.com/security/cve/CVE-2024-26960.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26961.html">https://www.suse.com/security/cve/CVE-2024-26961.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26962.html">https://www.suse.com/security/cve/CVE-2024-26962.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26963.html">https://www.suse.com/security/cve/CVE-2024-26963.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26964.html">https://www.suse.com/security/cve/CVE-2024-26964.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26972.html">https://www.suse.com/security/cve/CVE-2024-26972.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26973.html">https://www.suse.com/security/cve/CVE-2024-26973.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26978.html">https://www.suse.com/security/cve/CVE-2024-26978.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26979.html">https://www.suse.com/security/cve/CVE-2024-26979.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26981.html">https://www.suse.com/security/cve/CVE-2024-26981.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26982.html">https://www.suse.com/security/cve/CVE-2024-26982.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26983.html">https://www.suse.com/security/cve/CVE-2024-26983.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26984.html">https://www.suse.com/security/cve/CVE-2024-26984.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26986.html">https://www.suse.com/security/cve/CVE-2024-26986.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26988.html">https://www.suse.com/security/cve/CVE-2024-26988.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26989.html">https://www.suse.com/security/cve/CVE-2024-26989.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26990.html">https://www.suse.com/security/cve/CVE-2024-26990.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26991.html">https://www.suse.com/security/cve/CVE-2024-26991.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26992.html">https://www.suse.com/security/cve/CVE-2024-26992.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26993.html">https://www.suse.com/security/cve/CVE-2024-26993.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26994.html">https://www.suse.com/security/cve/CVE-2024-26994.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26995.html">https://www.suse.com/security/cve/CVE-2024-26995.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26996.html">https://www.suse.com/security/cve/CVE-2024-26996.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26997.html">https://www.suse.com/security/cve/CVE-2024-26997.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26999.html">https://www.suse.com/security/cve/CVE-2024-26999.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27000.html">https://www.suse.com/security/cve/CVE-2024-27000.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27001.html">https://www.suse.com/security/cve/CVE-2024-27001.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27002.html">https://www.suse.com/security/cve/CVE-2024-27002.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27003.html">https://www.suse.com/security/cve/CVE-2024-27003.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27004.html">https://www.suse.com/security/cve/CVE-2024-27004.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27008.html">https://www.suse.com/security/cve/CVE-2024-27008.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27013.html">https://www.suse.com/security/cve/CVE-2024-27013.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27014.html">https://www.suse.com/security/cve/CVE-2024-27014.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27022.html">https://www.suse.com/security/cve/CVE-2024-27022.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27027.html">https://www.suse.com/security/cve/CVE-2024-27027.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27028.html">https://www.suse.com/security/cve/CVE-2024-27028.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27029.html">https://www.suse.com/security/cve/CVE-2024-27029.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27030.html">https://www.suse.com/security/cve/CVE-2024-27030.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27031.html">https://www.suse.com/security/cve/CVE-2024-27031.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27036.html">https://www.suse.com/security/cve/CVE-2024-27036.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27046.html">https://www.suse.com/security/cve/CVE-2024-27046.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27056.html">https://www.suse.com/security/cve/CVE-2024-27056.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27057.html">https://www.suse.com/security/cve/CVE-2024-27057.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27062.html">https://www.suse.com/security/cve/CVE-2024-27062.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27067.html">https://www.suse.com/security/cve/CVE-2024-27067.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27080.html">https://www.suse.com/security/cve/CVE-2024-27080.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27388.html">https://www.suse.com/security/cve/CVE-2024-27388.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27389.html">https://www.suse.com/security/cve/CVE-2024-27389.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27393.html">https://www.suse.com/security/cve/CVE-2024-27393.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27395.html">https://www.suse.com/security/cve/CVE-2024-27395.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27396.html">https://www.suse.com/security/cve/CVE-2024-27396.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27398.html">https://www.suse.com/security/cve/CVE-2024-27398.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27399.html">https://www.suse.com/security/cve/CVE-2024-27399.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27400.html">https://www.suse.com/security/cve/CVE-2024-27400.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27401.html">https://www.suse.com/security/cve/CVE-2024-27401.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27405.html">https://www.suse.com/security/cve/CVE-2024-27405.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27408.html">https://www.suse.com/security/cve/CVE-2024-27408.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27410.html">https://www.suse.com/security/cve/CVE-2024-27410.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27411.html">https://www.suse.com/security/cve/CVE-2024-27411.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27412.html">https://www.suse.com/security/cve/CVE-2024-27412.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27413.html">https://www.suse.com/security/cve/CVE-2024-27413.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27416.html">https://www.suse.com/security/cve/CVE-2024-27416.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27417.html">https://www.suse.com/security/cve/CVE-2024-27417.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27418.html">https://www.suse.com/security/cve/CVE-2024-27418.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27431.html">https://www.suse.com/security/cve/CVE-2024-27431.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27432.html">https://www.suse.com/security/cve/CVE-2024-27432.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27434.html">https://www.suse.com/security/cve/CVE-2024-27434.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27435.html">https://www.suse.com/security/cve/CVE-2024-27435.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-27436.html">https://www.suse.com/security/cve/CVE-2024-27436.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35784.html">https://www.suse.com/security/cve/CVE-2024-35784.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35786.html">https://www.suse.com/security/cve/CVE-2024-35786.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35788.html">https://www.suse.com/security/cve/CVE-2024-35788.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35789.html">https://www.suse.com/security/cve/CVE-2024-35789.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35790.html">https://www.suse.com/security/cve/CVE-2024-35790.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35791.html">https://www.suse.com/security/cve/CVE-2024-35791.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35794.html">https://www.suse.com/security/cve/CVE-2024-35794.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35795.html">https://www.suse.com/security/cve/CVE-2024-35795.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35796.html">https://www.suse.com/security/cve/CVE-2024-35796.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35799.html">https://www.suse.com/security/cve/CVE-2024-35799.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35800.html">https://www.suse.com/security/cve/CVE-2024-35800.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35801.html">https://www.suse.com/security/cve/CVE-2024-35801.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35803.html">https://www.suse.com/security/cve/CVE-2024-35803.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35804.html">https://www.suse.com/security/cve/CVE-2024-35804.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35806.html">https://www.suse.com/security/cve/CVE-2024-35806.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35808.html">https://www.suse.com/security/cve/CVE-2024-35808.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35809.html">https://www.suse.com/security/cve/CVE-2024-35809.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35810.html">https://www.suse.com/security/cve/CVE-2024-35810.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35811.html">https://www.suse.com/security/cve/CVE-2024-35811.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35812.html">https://www.suse.com/security/cve/CVE-2024-35812.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35813.html">https://www.suse.com/security/cve/CVE-2024-35813.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35814.html">https://www.suse.com/security/cve/CVE-2024-35814.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35815.html">https://www.suse.com/security/cve/CVE-2024-35815.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35817.html">https://www.suse.com/security/cve/CVE-2024-35817.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35819.html">https://www.suse.com/security/cve/CVE-2024-35819.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35821.html">https://www.suse.com/security/cve/CVE-2024-35821.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35822.html">https://www.suse.com/security/cve/CVE-2024-35822.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35823.html">https://www.suse.com/security/cve/CVE-2024-35823.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35824.html">https://www.suse.com/security/cve/CVE-2024-35824.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35825.html">https://www.suse.com/security/cve/CVE-2024-35825.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35828.html">https://www.suse.com/security/cve/CVE-2024-35828.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35829.html">https://www.suse.com/security/cve/CVE-2024-35829.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35830.html">https://www.suse.com/security/cve/CVE-2024-35830.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35833.html">https://www.suse.com/security/cve/CVE-2024-35833.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35834.html">https://www.suse.com/security/cve/CVE-2024-35834.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35835.html">https://www.suse.com/security/cve/CVE-2024-35835.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35836.html">https://www.suse.com/security/cve/CVE-2024-35836.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35837.html">https://www.suse.com/security/cve/CVE-2024-35837.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35838.html">https://www.suse.com/security/cve/CVE-2024-35838.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35841.html">https://www.suse.com/security/cve/CVE-2024-35841.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35842.html">https://www.suse.com/security/cve/CVE-2024-35842.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35845.html">https://www.suse.com/security/cve/CVE-2024-35845.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35847.html">https://www.suse.com/security/cve/CVE-2024-35847.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35849.html">https://www.suse.com/security/cve/CVE-2024-35849.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35850.html">https://www.suse.com/security/cve/CVE-2024-35850.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35851.html">https://www.suse.com/security/cve/CVE-2024-35851.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35852.html">https://www.suse.com/security/cve/CVE-2024-35852.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35854.html">https://www.suse.com/security/cve/CVE-2024-35854.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35860.html">https://www.suse.com/security/cve/CVE-2024-35860.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35861.html">https://www.suse.com/security/cve/CVE-2024-35861.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35862.html">https://www.suse.com/security/cve/CVE-2024-35862.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35863.html">https://www.suse.com/security/cve/CVE-2024-35863.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35864.html">https://www.suse.com/security/cve/CVE-2024-35864.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35865.html">https://www.suse.com/security/cve/CVE-2024-35865.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35866.html">https://www.suse.com/security/cve/CVE-2024-35866.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35867.html">https://www.suse.com/security/cve/CVE-2024-35867.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35868.html">https://www.suse.com/security/cve/CVE-2024-35868.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35869.html">https://www.suse.com/security/cve/CVE-2024-35869.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35870.html">https://www.suse.com/security/cve/CVE-2024-35870.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35872.html">https://www.suse.com/security/cve/CVE-2024-35872.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35875.html">https://www.suse.com/security/cve/CVE-2024-35875.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35877.html">https://www.suse.com/security/cve/CVE-2024-35877.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35878.html">https://www.suse.com/security/cve/CVE-2024-35878.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35879.html">https://www.suse.com/security/cve/CVE-2024-35879.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35883.html">https://www.suse.com/security/cve/CVE-2024-35883.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35885.html">https://www.suse.com/security/cve/CVE-2024-35885.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35887.html">https://www.suse.com/security/cve/CVE-2024-35887.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35889.html">https://www.suse.com/security/cve/CVE-2024-35889.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35891.html">https://www.suse.com/security/cve/CVE-2024-35891.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35895.html">https://www.suse.com/security/cve/CVE-2024-35895.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35901.html">https://www.suse.com/security/cve/CVE-2024-35901.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35903.html">https://www.suse.com/security/cve/CVE-2024-35903.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35904.html">https://www.suse.com/security/cve/CVE-2024-35904.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35905.html">https://www.suse.com/security/cve/CVE-2024-35905.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35907.html">https://www.suse.com/security/cve/CVE-2024-35907.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35909.html">https://www.suse.com/security/cve/CVE-2024-35909.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35911.html">https://www.suse.com/security/cve/CVE-2024-35911.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35912.html">https://www.suse.com/security/cve/CVE-2024-35912.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35914.html">https://www.suse.com/security/cve/CVE-2024-35914.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35915.html">https://www.suse.com/security/cve/CVE-2024-35915.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35916.html">https://www.suse.com/security/cve/CVE-2024-35916.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35917.html">https://www.suse.com/security/cve/CVE-2024-35917.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35921.html">https://www.suse.com/security/cve/CVE-2024-35921.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35922.html">https://www.suse.com/security/cve/CVE-2024-35922.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35924.html">https://www.suse.com/security/cve/CVE-2024-35924.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35927.html">https://www.suse.com/security/cve/CVE-2024-35927.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35928.html">https://www.suse.com/security/cve/CVE-2024-35928.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35930.html">https://www.suse.com/security/cve/CVE-2024-35930.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35931.html">https://www.suse.com/security/cve/CVE-2024-35931.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35932.html">https://www.suse.com/security/cve/CVE-2024-35932.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35933.html">https://www.suse.com/security/cve/CVE-2024-35933.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35935.html">https://www.suse.com/security/cve/CVE-2024-35935.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35936.html">https://www.suse.com/security/cve/CVE-2024-35936.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35937.html">https://www.suse.com/security/cve/CVE-2024-35937.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35938.html">https://www.suse.com/security/cve/CVE-2024-35938.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35940.html">https://www.suse.com/security/cve/CVE-2024-35940.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35943.html">https://www.suse.com/security/cve/CVE-2024-35943.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35944.html">https://www.suse.com/security/cve/CVE-2024-35944.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35945.html">https://www.suse.com/security/cve/CVE-2024-35945.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35946.html">https://www.suse.com/security/cve/CVE-2024-35946.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35947.html">https://www.suse.com/security/cve/CVE-2024-35947.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35950.html">https://www.suse.com/security/cve/CVE-2024-35950.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35951.html">https://www.suse.com/security/cve/CVE-2024-35951.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35952.html">https://www.suse.com/security/cve/CVE-2024-35952.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35953.html">https://www.suse.com/security/cve/CVE-2024-35953.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35954.html">https://www.suse.com/security/cve/CVE-2024-35954.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35955.html">https://www.suse.com/security/cve/CVE-2024-35955.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35956.html">https://www.suse.com/security/cve/CVE-2024-35956.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35958.html">https://www.suse.com/security/cve/CVE-2024-35958.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35959.html">https://www.suse.com/security/cve/CVE-2024-35959.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35960.html">https://www.suse.com/security/cve/CVE-2024-35960.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35961.html">https://www.suse.com/security/cve/CVE-2024-35961.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35963.html">https://www.suse.com/security/cve/CVE-2024-35963.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35964.html">https://www.suse.com/security/cve/CVE-2024-35964.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35965.html">https://www.suse.com/security/cve/CVE-2024-35965.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35966.html">https://www.suse.com/security/cve/CVE-2024-35966.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35967.html">https://www.suse.com/security/cve/CVE-2024-35967.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35969.html">https://www.suse.com/security/cve/CVE-2024-35969.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35971.html">https://www.suse.com/security/cve/CVE-2024-35971.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35972.html">https://www.suse.com/security/cve/CVE-2024-35972.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35973.html">https://www.suse.com/security/cve/CVE-2024-35973.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35974.html">https://www.suse.com/security/cve/CVE-2024-35974.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35975.html">https://www.suse.com/security/cve/CVE-2024-35975.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35977.html">https://www.suse.com/security/cve/CVE-2024-35977.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35978.html">https://www.suse.com/security/cve/CVE-2024-35978.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35981.html">https://www.suse.com/security/cve/CVE-2024-35981.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35982.html">https://www.suse.com/security/cve/CVE-2024-35982.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35984.html">https://www.suse.com/security/cve/CVE-2024-35984.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35986.html">https://www.suse.com/security/cve/CVE-2024-35986.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35989.html">https://www.suse.com/security/cve/CVE-2024-35989.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35990.html">https://www.suse.com/security/cve/CVE-2024-35990.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35991.html">https://www.suse.com/security/cve/CVE-2024-35991.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35992.html">https://www.suse.com/security/cve/CVE-2024-35992.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35995.html">https://www.suse.com/security/cve/CVE-2024-35995.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35997.html">https://www.suse.com/security/cve/CVE-2024-35997.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35999.html">https://www.suse.com/security/cve/CVE-2024-35999.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36002.html">https://www.suse.com/security/cve/CVE-2024-36002.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36006.html">https://www.suse.com/security/cve/CVE-2024-36006.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36007.html">https://www.suse.com/security/cve/CVE-2024-36007.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36009.html">https://www.suse.com/security/cve/CVE-2024-36009.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36011.html">https://www.suse.com/security/cve/CVE-2024-36011.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36012.html">https://www.suse.com/security/cve/CVE-2024-36012.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36013.html">https://www.suse.com/security/cve/CVE-2024-36013.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36014.html">https://www.suse.com/security/cve/CVE-2024-36014.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36015.html">https://www.suse.com/security/cve/CVE-2024-36015.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36016.html">https://www.suse.com/security/cve/CVE-2024-36016.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36018.html">https://www.suse.com/security/cve/CVE-2024-36018.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36019.html">https://www.suse.com/security/cve/CVE-2024-36019.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36020.html">https://www.suse.com/security/cve/CVE-2024-36020.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36021.html">https://www.suse.com/security/cve/CVE-2024-36021.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36025.html">https://www.suse.com/security/cve/CVE-2024-36025.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36026.html">https://www.suse.com/security/cve/CVE-2024-36026.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36029.html">https://www.suse.com/security/cve/CVE-2024-36029.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36030.html">https://www.suse.com/security/cve/CVE-2024-36030.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36032.html">https://www.suse.com/security/cve/CVE-2024-36032.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36880.html">https://www.suse.com/security/cve/CVE-2024-36880.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36885.html">https://www.suse.com/security/cve/CVE-2024-36885.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36890.html">https://www.suse.com/security/cve/CVE-2024-36890.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36891.html">https://www.suse.com/security/cve/CVE-2024-36891.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36893.html">https://www.suse.com/security/cve/CVE-2024-36893.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36894.html">https://www.suse.com/security/cve/CVE-2024-36894.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36895.html">https://www.suse.com/security/cve/CVE-2024-36895.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36896.html">https://www.suse.com/security/cve/CVE-2024-36896.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36897.html">https://www.suse.com/security/cve/CVE-2024-36897.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36898.html">https://www.suse.com/security/cve/CVE-2024-36898.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36906.html">https://www.suse.com/security/cve/CVE-2024-36906.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36918.html">https://www.suse.com/security/cve/CVE-2024-36918.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36921.html">https://www.suse.com/security/cve/CVE-2024-36921.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36922.html">https://www.suse.com/security/cve/CVE-2024-36922.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36928.html">https://www.suse.com/security/cve/CVE-2024-36928.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36930.html">https://www.suse.com/security/cve/CVE-2024-36930.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36931.html">https://www.suse.com/security/cve/CVE-2024-36931.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36936.html">https://www.suse.com/security/cve/CVE-2024-36936.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36940.html">https://www.suse.com/security/cve/CVE-2024-36940.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36941.html">https://www.suse.com/security/cve/CVE-2024-36941.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36942.html">https://www.suse.com/security/cve/CVE-2024-36942.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36944.html">https://www.suse.com/security/cve/CVE-2024-36944.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36947.html">https://www.suse.com/security/cve/CVE-2024-36947.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36949.html">https://www.suse.com/security/cve/CVE-2024-36949.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36950.html">https://www.suse.com/security/cve/CVE-2024-36950.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36951.html">https://www.suse.com/security/cve/CVE-2024-36951.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36955.html">https://www.suse.com/security/cve/CVE-2024-36955.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36959.html">https://www.suse.com/security/cve/CVE-2024-36959.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">https://bugzilla.suse.com/show_bug.cgi?id=1012628</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">https://bugzilla.suse.com/show_bug.cgi?id=1065729</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1181674">https://bugzilla.suse.com/show_bug.cgi?id=1181674</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187716">https://bugzilla.suse.com/show_bug.cgi?id=1187716</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193599">https://bugzilla.suse.com/show_bug.cgi?id=1193599</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207948">https://bugzilla.suse.com/show_bug.cgi?id=1207948</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208593">https://bugzilla.suse.com/show_bug.cgi?id=1208593</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">https://bugzilla.suse.com/show_bug.cgi?id=1209657</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213573">https://bugzilla.suse.com/show_bug.cgi?id=1213573</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1214852">https://bugzilla.suse.com/show_bug.cgi?id=1214852</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">https://bugzilla.suse.com/show_bug.cgi?id=1215199</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216196">https://bugzilla.suse.com/show_bug.cgi?id=1216196</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216358">https://bugzilla.suse.com/show_bug.cgi?id=1216358</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216702">https://bugzilla.suse.com/show_bug.cgi?id=1216702</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217169">https://bugzilla.suse.com/show_bug.cgi?id=1217169</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217384">https://bugzilla.suse.com/show_bug.cgi?id=1217384</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217408">https://bugzilla.suse.com/show_bug.cgi?id=1217408</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217489">https://bugzilla.suse.com/show_bug.cgi?id=1217489</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217750">https://bugzilla.suse.com/show_bug.cgi?id=1217750</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217959">https://bugzilla.suse.com/show_bug.cgi?id=1217959</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218205">https://bugzilla.suse.com/show_bug.cgi?id=1218205</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">https://bugzilla.suse.com/show_bug.cgi?id=1218336</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218447">https://bugzilla.suse.com/show_bug.cgi?id=1218447</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">https://bugzilla.suse.com/show_bug.cgi?id=1218562</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218779">https://bugzilla.suse.com/show_bug.cgi?id=1218779</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">https://bugzilla.suse.com/show_bug.cgi?id=1218917</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">https://bugzilla.suse.com/show_bug.cgi?id=1219104</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">https://bugzilla.suse.com/show_bug.cgi?id=1219170</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219596">https://bugzilla.suse.com/show_bug.cgi?id=1219596</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219623">https://bugzilla.suse.com/show_bug.cgi?id=1219623</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219834">https://bugzilla.suse.com/show_bug.cgi?id=1219834</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220021">https://bugzilla.suse.com/show_bug.cgi?id=1220021</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220045">https://bugzilla.suse.com/show_bug.cgi?id=1220045</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220120">https://bugzilla.suse.com/show_bug.cgi?id=1220120</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220148">https://bugzilla.suse.com/show_bug.cgi?id=1220148</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220328">https://bugzilla.suse.com/show_bug.cgi?id=1220328</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220342">https://bugzilla.suse.com/show_bug.cgi?id=1220342</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220428">https://bugzilla.suse.com/show_bug.cgi?id=1220428</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220430">https://bugzilla.suse.com/show_bug.cgi?id=1220430</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220569">https://bugzilla.suse.com/show_bug.cgi?id=1220569</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220587">https://bugzilla.suse.com/show_bug.cgi?id=1220587</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220738">https://bugzilla.suse.com/show_bug.cgi?id=1220738</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220783">https://bugzilla.suse.com/show_bug.cgi?id=1220783</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220915">https://bugzilla.suse.com/show_bug.cgi?id=1220915</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221276">https://bugzilla.suse.com/show_bug.cgi?id=1221276</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">https://bugzilla.suse.com/show_bug.cgi?id=1221293</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221303">https://bugzilla.suse.com/show_bug.cgi?id=1221303</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221375">https://bugzilla.suse.com/show_bug.cgi?id=1221375</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221504">https://bugzilla.suse.com/show_bug.cgi?id=1221504</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221612">https://bugzilla.suse.com/show_bug.cgi?id=1221612</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221615">https://bugzilla.suse.com/show_bug.cgi?id=1221615</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221635">https://bugzilla.suse.com/show_bug.cgi?id=1221635</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">https://bugzilla.suse.com/show_bug.cgi?id=1221645</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221649">https://bugzilla.suse.com/show_bug.cgi?id=1221649</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221765">https://bugzilla.suse.com/show_bug.cgi?id=1221765</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221777">https://bugzilla.suse.com/show_bug.cgi?id=1221777</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221783">https://bugzilla.suse.com/show_bug.cgi?id=1221783</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">https://bugzilla.suse.com/show_bug.cgi?id=1221816</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221829">https://bugzilla.suse.com/show_bug.cgi?id=1221829</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">https://bugzilla.suse.com/show_bug.cgi?id=1221830</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221858">https://bugzilla.suse.com/show_bug.cgi?id=1221858</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222115">https://bugzilla.suse.com/show_bug.cgi?id=1222115</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222173">https://bugzilla.suse.com/show_bug.cgi?id=1222173</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222264">https://bugzilla.suse.com/show_bug.cgi?id=1222264</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222273">https://bugzilla.suse.com/show_bug.cgi?id=1222273</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222294">https://bugzilla.suse.com/show_bug.cgi?id=1222294</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222301">https://bugzilla.suse.com/show_bug.cgi?id=1222301</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222303">https://bugzilla.suse.com/show_bug.cgi?id=1222303</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222304">https://bugzilla.suse.com/show_bug.cgi?id=1222304</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222307">https://bugzilla.suse.com/show_bug.cgi?id=1222307</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222357">https://bugzilla.suse.com/show_bug.cgi?id=1222357</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222366">https://bugzilla.suse.com/show_bug.cgi?id=1222366</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222368">https://bugzilla.suse.com/show_bug.cgi?id=1222368</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222371">https://bugzilla.suse.com/show_bug.cgi?id=1222371</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222378">https://bugzilla.suse.com/show_bug.cgi?id=1222378</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222379">https://bugzilla.suse.com/show_bug.cgi?id=1222379</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222385">https://bugzilla.suse.com/show_bug.cgi?id=1222385</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">https://bugzilla.suse.com/show_bug.cgi?id=1222422</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222426">https://bugzilla.suse.com/show_bug.cgi?id=1222426</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222428">https://bugzilla.suse.com/show_bug.cgi?id=1222428</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222437">https://bugzilla.suse.com/show_bug.cgi?id=1222437</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222445">https://bugzilla.suse.com/show_bug.cgi?id=1222445</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222459">https://bugzilla.suse.com/show_bug.cgi?id=1222459</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222464">https://bugzilla.suse.com/show_bug.cgi?id=1222464</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222489">https://bugzilla.suse.com/show_bug.cgi?id=1222489</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222522">https://bugzilla.suse.com/show_bug.cgi?id=1222522</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222525">https://bugzilla.suse.com/show_bug.cgi?id=1222525</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222527">https://bugzilla.suse.com/show_bug.cgi?id=1222527</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222531">https://bugzilla.suse.com/show_bug.cgi?id=1222531</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222532">https://bugzilla.suse.com/show_bug.cgi?id=1222532</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222549">https://bugzilla.suse.com/show_bug.cgi?id=1222549</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222550">https://bugzilla.suse.com/show_bug.cgi?id=1222550</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222557">https://bugzilla.suse.com/show_bug.cgi?id=1222557</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">https://bugzilla.suse.com/show_bug.cgi?id=1222559</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222563">https://bugzilla.suse.com/show_bug.cgi?id=1222563</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">https://bugzilla.suse.com/show_bug.cgi?id=1222585</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222586">https://bugzilla.suse.com/show_bug.cgi?id=1222586</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222596">https://bugzilla.suse.com/show_bug.cgi?id=1222596</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222606">https://bugzilla.suse.com/show_bug.cgi?id=1222606</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222608">https://bugzilla.suse.com/show_bug.cgi?id=1222608</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222613">https://bugzilla.suse.com/show_bug.cgi?id=1222613</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222615">https://bugzilla.suse.com/show_bug.cgi?id=1222615</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">https://bugzilla.suse.com/show_bug.cgi?id=1222618</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222622">https://bugzilla.suse.com/show_bug.cgi?id=1222622</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">https://bugzilla.suse.com/show_bug.cgi?id=1222624</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222627">https://bugzilla.suse.com/show_bug.cgi?id=1222627</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222630">https://bugzilla.suse.com/show_bug.cgi?id=1222630</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222635">https://bugzilla.suse.com/show_bug.cgi?id=1222635</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222721">https://bugzilla.suse.com/show_bug.cgi?id=1222721</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222727">https://bugzilla.suse.com/show_bug.cgi?id=1222727</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222769">https://bugzilla.suse.com/show_bug.cgi?id=1222769</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222771">https://bugzilla.suse.com/show_bug.cgi?id=1222771</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222772">https://bugzilla.suse.com/show_bug.cgi?id=1222772</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222775">https://bugzilla.suse.com/show_bug.cgi?id=1222775</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222777">https://bugzilla.suse.com/show_bug.cgi?id=1222777</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222780">https://bugzilla.suse.com/show_bug.cgi?id=1222780</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222782">https://bugzilla.suse.com/show_bug.cgi?id=1222782</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222793">https://bugzilla.suse.com/show_bug.cgi?id=1222793</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222799">https://bugzilla.suse.com/show_bug.cgi?id=1222799</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222801">https://bugzilla.suse.com/show_bug.cgi?id=1222801</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222968">https://bugzilla.suse.com/show_bug.cgi?id=1222968</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223007">https://bugzilla.suse.com/show_bug.cgi?id=1223007</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223011">https://bugzilla.suse.com/show_bug.cgi?id=1223011</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223015">https://bugzilla.suse.com/show_bug.cgi?id=1223015</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">https://bugzilla.suse.com/show_bug.cgi?id=1223016</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223020">https://bugzilla.suse.com/show_bug.cgi?id=1223020</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223023">https://bugzilla.suse.com/show_bug.cgi?id=1223023</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223024">https://bugzilla.suse.com/show_bug.cgi?id=1223024</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223030">https://bugzilla.suse.com/show_bug.cgi?id=1223030</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223033">https://bugzilla.suse.com/show_bug.cgi?id=1223033</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223034">https://bugzilla.suse.com/show_bug.cgi?id=1223034</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223035">https://bugzilla.suse.com/show_bug.cgi?id=1223035</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223038">https://bugzilla.suse.com/show_bug.cgi?id=1223038</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223039">https://bugzilla.suse.com/show_bug.cgi?id=1223039</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223041">https://bugzilla.suse.com/show_bug.cgi?id=1223041</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223045">https://bugzilla.suse.com/show_bug.cgi?id=1223045</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223046">https://bugzilla.suse.com/show_bug.cgi?id=1223046</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223051">https://bugzilla.suse.com/show_bug.cgi?id=1223051</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223052">https://bugzilla.suse.com/show_bug.cgi?id=1223052</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223058">https://bugzilla.suse.com/show_bug.cgi?id=1223058</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223060">https://bugzilla.suse.com/show_bug.cgi?id=1223060</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223061">https://bugzilla.suse.com/show_bug.cgi?id=1223061</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223076">https://bugzilla.suse.com/show_bug.cgi?id=1223076</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223077">https://bugzilla.suse.com/show_bug.cgi?id=1223077</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223084">https://bugzilla.suse.com/show_bug.cgi?id=1223084</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223111">https://bugzilla.suse.com/show_bug.cgi?id=1223111</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223113">https://bugzilla.suse.com/show_bug.cgi?id=1223113</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223138">https://bugzilla.suse.com/show_bug.cgi?id=1223138</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223143">https://bugzilla.suse.com/show_bug.cgi?id=1223143</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">https://bugzilla.suse.com/show_bug.cgi?id=1223187</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223189">https://bugzilla.suse.com/show_bug.cgi?id=1223189</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223190">https://bugzilla.suse.com/show_bug.cgi?id=1223190</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">https://bugzilla.suse.com/show_bug.cgi?id=1223191</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223198">https://bugzilla.suse.com/show_bug.cgi?id=1223198</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223202">https://bugzilla.suse.com/show_bug.cgi?id=1223202</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223285">https://bugzilla.suse.com/show_bug.cgi?id=1223285</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223315">https://bugzilla.suse.com/show_bug.cgi?id=1223315</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223338">https://bugzilla.suse.com/show_bug.cgi?id=1223338</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223369">https://bugzilla.suse.com/show_bug.cgi?id=1223369</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223380">https://bugzilla.suse.com/show_bug.cgi?id=1223380</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223384">https://bugzilla.suse.com/show_bug.cgi?id=1223384</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223390">https://bugzilla.suse.com/show_bug.cgi?id=1223390</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223439">https://bugzilla.suse.com/show_bug.cgi?id=1223439</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223462">https://bugzilla.suse.com/show_bug.cgi?id=1223462</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223532">https://bugzilla.suse.com/show_bug.cgi?id=1223532</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223539">https://bugzilla.suse.com/show_bug.cgi?id=1223539</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223575">https://bugzilla.suse.com/show_bug.cgi?id=1223575</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223590">https://bugzilla.suse.com/show_bug.cgi?id=1223590</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223591">https://bugzilla.suse.com/show_bug.cgi?id=1223591</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223592">https://bugzilla.suse.com/show_bug.cgi?id=1223592</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223593">https://bugzilla.suse.com/show_bug.cgi?id=1223593</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223625">https://bugzilla.suse.com/show_bug.cgi?id=1223625</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223628">https://bugzilla.suse.com/show_bug.cgi?id=1223628</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223629">https://bugzilla.suse.com/show_bug.cgi?id=1223629</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223633">https://bugzilla.suse.com/show_bug.cgi?id=1223633</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223634">https://bugzilla.suse.com/show_bug.cgi?id=1223634</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223637">https://bugzilla.suse.com/show_bug.cgi?id=1223637</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223641">https://bugzilla.suse.com/show_bug.cgi?id=1223641</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223643">https://bugzilla.suse.com/show_bug.cgi?id=1223643</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223649">https://bugzilla.suse.com/show_bug.cgi?id=1223649</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223650">https://bugzilla.suse.com/show_bug.cgi?id=1223650</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223651">https://bugzilla.suse.com/show_bug.cgi?id=1223651</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223652">https://bugzilla.suse.com/show_bug.cgi?id=1223652</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223653">https://bugzilla.suse.com/show_bug.cgi?id=1223653</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223654">https://bugzilla.suse.com/show_bug.cgi?id=1223654</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223655">https://bugzilla.suse.com/show_bug.cgi?id=1223655</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223660">https://bugzilla.suse.com/show_bug.cgi?id=1223660</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223661">https://bugzilla.suse.com/show_bug.cgi?id=1223661</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223663">https://bugzilla.suse.com/show_bug.cgi?id=1223663</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223664">https://bugzilla.suse.com/show_bug.cgi?id=1223664</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223665">https://bugzilla.suse.com/show_bug.cgi?id=1223665</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223666">https://bugzilla.suse.com/show_bug.cgi?id=1223666</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223668">https://bugzilla.suse.com/show_bug.cgi?id=1223668</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223669">https://bugzilla.suse.com/show_bug.cgi?id=1223669</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223670">https://bugzilla.suse.com/show_bug.cgi?id=1223670</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223671">https://bugzilla.suse.com/show_bug.cgi?id=1223671</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223675">https://bugzilla.suse.com/show_bug.cgi?id=1223675</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223677">https://bugzilla.suse.com/show_bug.cgi?id=1223677</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223678">https://bugzilla.suse.com/show_bug.cgi?id=1223678</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223686">https://bugzilla.suse.com/show_bug.cgi?id=1223686</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223692">https://bugzilla.suse.com/show_bug.cgi?id=1223692</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223693">https://bugzilla.suse.com/show_bug.cgi?id=1223693</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223695">https://bugzilla.suse.com/show_bug.cgi?id=1223695</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223696">https://bugzilla.suse.com/show_bug.cgi?id=1223696</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223698">https://bugzilla.suse.com/show_bug.cgi?id=1223698</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223705">https://bugzilla.suse.com/show_bug.cgi?id=1223705</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223712">https://bugzilla.suse.com/show_bug.cgi?id=1223712</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223718">https://bugzilla.suse.com/show_bug.cgi?id=1223718</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223728">https://bugzilla.suse.com/show_bug.cgi?id=1223728</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223732">https://bugzilla.suse.com/show_bug.cgi?id=1223732</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223735">https://bugzilla.suse.com/show_bug.cgi?id=1223735</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223739">https://bugzilla.suse.com/show_bug.cgi?id=1223739</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223741">https://bugzilla.suse.com/show_bug.cgi?id=1223741</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223744">https://bugzilla.suse.com/show_bug.cgi?id=1223744</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223745">https://bugzilla.suse.com/show_bug.cgi?id=1223745</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223747">https://bugzilla.suse.com/show_bug.cgi?id=1223747</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223748">https://bugzilla.suse.com/show_bug.cgi?id=1223748</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223749">https://bugzilla.suse.com/show_bug.cgi?id=1223749</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223750">https://bugzilla.suse.com/show_bug.cgi?id=1223750</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223752">https://bugzilla.suse.com/show_bug.cgi?id=1223752</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223754">https://bugzilla.suse.com/show_bug.cgi?id=1223754</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223757">https://bugzilla.suse.com/show_bug.cgi?id=1223757</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223759">https://bugzilla.suse.com/show_bug.cgi?id=1223759</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223761">https://bugzilla.suse.com/show_bug.cgi?id=1223761</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223762">https://bugzilla.suse.com/show_bug.cgi?id=1223762</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223774">https://bugzilla.suse.com/show_bug.cgi?id=1223774</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223782">https://bugzilla.suse.com/show_bug.cgi?id=1223782</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223787">https://bugzilla.suse.com/show_bug.cgi?id=1223787</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223788">https://bugzilla.suse.com/show_bug.cgi?id=1223788</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223789">https://bugzilla.suse.com/show_bug.cgi?id=1223789</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223790">https://bugzilla.suse.com/show_bug.cgi?id=1223790</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223802">https://bugzilla.suse.com/show_bug.cgi?id=1223802</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223805">https://bugzilla.suse.com/show_bug.cgi?id=1223805</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223810">https://bugzilla.suse.com/show_bug.cgi?id=1223810</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223822">https://bugzilla.suse.com/show_bug.cgi?id=1223822</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223827">https://bugzilla.suse.com/show_bug.cgi?id=1223827</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223831">https://bugzilla.suse.com/show_bug.cgi?id=1223831</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223834">https://bugzilla.suse.com/show_bug.cgi?id=1223834</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223838">https://bugzilla.suse.com/show_bug.cgi?id=1223838</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223869">https://bugzilla.suse.com/show_bug.cgi?id=1223869</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223870">https://bugzilla.suse.com/show_bug.cgi?id=1223870</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223871">https://bugzilla.suse.com/show_bug.cgi?id=1223871</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223872">https://bugzilla.suse.com/show_bug.cgi?id=1223872</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223874">https://bugzilla.suse.com/show_bug.cgi?id=1223874</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223944">https://bugzilla.suse.com/show_bug.cgi?id=1223944</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223945">https://bugzilla.suse.com/show_bug.cgi?id=1223945</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223946">https://bugzilla.suse.com/show_bug.cgi?id=1223946</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223991">https://bugzilla.suse.com/show_bug.cgi?id=1223991</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224076">https://bugzilla.suse.com/show_bug.cgi?id=1224076</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224096">https://bugzilla.suse.com/show_bug.cgi?id=1224096</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224098">https://bugzilla.suse.com/show_bug.cgi?id=1224098</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224099">https://bugzilla.suse.com/show_bug.cgi?id=1224099</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224137">https://bugzilla.suse.com/show_bug.cgi?id=1224137</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224166">https://bugzilla.suse.com/show_bug.cgi?id=1224166</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224174">https://bugzilla.suse.com/show_bug.cgi?id=1224174</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224177">https://bugzilla.suse.com/show_bug.cgi?id=1224177</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224180">https://bugzilla.suse.com/show_bug.cgi?id=1224180</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224181">https://bugzilla.suse.com/show_bug.cgi?id=1224181</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224331">https://bugzilla.suse.com/show_bug.cgi?id=1224331</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224348">https://bugzilla.suse.com/show_bug.cgi?id=1224348</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224423">https://bugzilla.suse.com/show_bug.cgi?id=1224423</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224429">https://bugzilla.suse.com/show_bug.cgi?id=1224429</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224430">https://bugzilla.suse.com/show_bug.cgi?id=1224430</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224432">https://bugzilla.suse.com/show_bug.cgi?id=1224432</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224433">https://bugzilla.suse.com/show_bug.cgi?id=1224433</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224437">https://bugzilla.suse.com/show_bug.cgi?id=1224437</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224438">https://bugzilla.suse.com/show_bug.cgi?id=1224438</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224442">https://bugzilla.suse.com/show_bug.cgi?id=1224442</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224443">https://bugzilla.suse.com/show_bug.cgi?id=1224443</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224445">https://bugzilla.suse.com/show_bug.cgi?id=1224445</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224449">https://bugzilla.suse.com/show_bug.cgi?id=1224449</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224477">https://bugzilla.suse.com/show_bug.cgi?id=1224477</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224479">https://bugzilla.suse.com/show_bug.cgi?id=1224479</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224480">https://bugzilla.suse.com/show_bug.cgi?id=1224480</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224481">https://bugzilla.suse.com/show_bug.cgi?id=1224481</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224482">https://bugzilla.suse.com/show_bug.cgi?id=1224482</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224486">https://bugzilla.suse.com/show_bug.cgi?id=1224486</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224487">https://bugzilla.suse.com/show_bug.cgi?id=1224487</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224488">https://bugzilla.suse.com/show_bug.cgi?id=1224488</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224491">https://bugzilla.suse.com/show_bug.cgi?id=1224491</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224492">https://bugzilla.suse.com/show_bug.cgi?id=1224492</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224493">https://bugzilla.suse.com/show_bug.cgi?id=1224493</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224494">https://bugzilla.suse.com/show_bug.cgi?id=1224494</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224495">https://bugzilla.suse.com/show_bug.cgi?id=1224495</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">https://bugzilla.suse.com/show_bug.cgi?id=1224500</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224501">https://bugzilla.suse.com/show_bug.cgi?id=1224501</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224502">https://bugzilla.suse.com/show_bug.cgi?id=1224502</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224504">https://bugzilla.suse.com/show_bug.cgi?id=1224504</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224505">https://bugzilla.suse.com/show_bug.cgi?id=1224505</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224506">https://bugzilla.suse.com/show_bug.cgi?id=1224506</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224507">https://bugzilla.suse.com/show_bug.cgi?id=1224507</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224508">https://bugzilla.suse.com/show_bug.cgi?id=1224508</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224509">https://bugzilla.suse.com/show_bug.cgi?id=1224509</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224511">https://bugzilla.suse.com/show_bug.cgi?id=1224511</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224513">https://bugzilla.suse.com/show_bug.cgi?id=1224513</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224517">https://bugzilla.suse.com/show_bug.cgi?id=1224517</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224519">https://bugzilla.suse.com/show_bug.cgi?id=1224519</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224521">https://bugzilla.suse.com/show_bug.cgi?id=1224521</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224524">https://bugzilla.suse.com/show_bug.cgi?id=1224524</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224525">https://bugzilla.suse.com/show_bug.cgi?id=1224525</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224526">https://bugzilla.suse.com/show_bug.cgi?id=1224526</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224530">https://bugzilla.suse.com/show_bug.cgi?id=1224530</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224531">https://bugzilla.suse.com/show_bug.cgi?id=1224531</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224534">https://bugzilla.suse.com/show_bug.cgi?id=1224534</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224537">https://bugzilla.suse.com/show_bug.cgi?id=1224537</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224541">https://bugzilla.suse.com/show_bug.cgi?id=1224541</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224542">https://bugzilla.suse.com/show_bug.cgi?id=1224542</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224543">https://bugzilla.suse.com/show_bug.cgi?id=1224543</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224546">https://bugzilla.suse.com/show_bug.cgi?id=1224546</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224550">https://bugzilla.suse.com/show_bug.cgi?id=1224550</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224552">https://bugzilla.suse.com/show_bug.cgi?id=1224552</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224553">https://bugzilla.suse.com/show_bug.cgi?id=1224553</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224555">https://bugzilla.suse.com/show_bug.cgi?id=1224555</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">https://bugzilla.suse.com/show_bug.cgi?id=1224557</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224558">https://bugzilla.suse.com/show_bug.cgi?id=1224558</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224559">https://bugzilla.suse.com/show_bug.cgi?id=1224559</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224562">https://bugzilla.suse.com/show_bug.cgi?id=1224562</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224565">https://bugzilla.suse.com/show_bug.cgi?id=1224565</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224566">https://bugzilla.suse.com/show_bug.cgi?id=1224566</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224567">https://bugzilla.suse.com/show_bug.cgi?id=1224567</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224568">https://bugzilla.suse.com/show_bug.cgi?id=1224568</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224569">https://bugzilla.suse.com/show_bug.cgi?id=1224569</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224571">https://bugzilla.suse.com/show_bug.cgi?id=1224571</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224573">https://bugzilla.suse.com/show_bug.cgi?id=1224573</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224576">https://bugzilla.suse.com/show_bug.cgi?id=1224576</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224577">https://bugzilla.suse.com/show_bug.cgi?id=1224577</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224578">https://bugzilla.suse.com/show_bug.cgi?id=1224578</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224579">https://bugzilla.suse.com/show_bug.cgi?id=1224579</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224580">https://bugzilla.suse.com/show_bug.cgi?id=1224580</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224581">https://bugzilla.suse.com/show_bug.cgi?id=1224581</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224582">https://bugzilla.suse.com/show_bug.cgi?id=1224582</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224585">https://bugzilla.suse.com/show_bug.cgi?id=1224585</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224586">https://bugzilla.suse.com/show_bug.cgi?id=1224586</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224587">https://bugzilla.suse.com/show_bug.cgi?id=1224587</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224588">https://bugzilla.suse.com/show_bug.cgi?id=1224588</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224592">https://bugzilla.suse.com/show_bug.cgi?id=1224592</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224596">https://bugzilla.suse.com/show_bug.cgi?id=1224596</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224598">https://bugzilla.suse.com/show_bug.cgi?id=1224598</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224600">https://bugzilla.suse.com/show_bug.cgi?id=1224600</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224601">https://bugzilla.suse.com/show_bug.cgi?id=1224601</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224602">https://bugzilla.suse.com/show_bug.cgi?id=1224602</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224603">https://bugzilla.suse.com/show_bug.cgi?id=1224603</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224605">https://bugzilla.suse.com/show_bug.cgi?id=1224605</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224607">https://bugzilla.suse.com/show_bug.cgi?id=1224607</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224608">https://bugzilla.suse.com/show_bug.cgi?id=1224608</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224609">https://bugzilla.suse.com/show_bug.cgi?id=1224609</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224611">https://bugzilla.suse.com/show_bug.cgi?id=1224611</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224613">https://bugzilla.suse.com/show_bug.cgi?id=1224613</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224615">https://bugzilla.suse.com/show_bug.cgi?id=1224615</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224617">https://bugzilla.suse.com/show_bug.cgi?id=1224617</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224618">https://bugzilla.suse.com/show_bug.cgi?id=1224618</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224620">https://bugzilla.suse.com/show_bug.cgi?id=1224620</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224621">https://bugzilla.suse.com/show_bug.cgi?id=1224621</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224622">https://bugzilla.suse.com/show_bug.cgi?id=1224622</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224623">https://bugzilla.suse.com/show_bug.cgi?id=1224623</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224624">https://bugzilla.suse.com/show_bug.cgi?id=1224624</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224626">https://bugzilla.suse.com/show_bug.cgi?id=1224626</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224627">https://bugzilla.suse.com/show_bug.cgi?id=1224627</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224628">https://bugzilla.suse.com/show_bug.cgi?id=1224628</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224629">https://bugzilla.suse.com/show_bug.cgi?id=1224629</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224630">https://bugzilla.suse.com/show_bug.cgi?id=1224630</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224632">https://bugzilla.suse.com/show_bug.cgi?id=1224632</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224633">https://bugzilla.suse.com/show_bug.cgi?id=1224633</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224634">https://bugzilla.suse.com/show_bug.cgi?id=1224634</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">https://bugzilla.suse.com/show_bug.cgi?id=1224636</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224637">https://bugzilla.suse.com/show_bug.cgi?id=1224637</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224638">https://bugzilla.suse.com/show_bug.cgi?id=1224638</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224639">https://bugzilla.suse.com/show_bug.cgi?id=1224639</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224640">https://bugzilla.suse.com/show_bug.cgi?id=1224640</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224643">https://bugzilla.suse.com/show_bug.cgi?id=1224643</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224644">https://bugzilla.suse.com/show_bug.cgi?id=1224644</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224645">https://bugzilla.suse.com/show_bug.cgi?id=1224645</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224646">https://bugzilla.suse.com/show_bug.cgi?id=1224646</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224647">https://bugzilla.suse.com/show_bug.cgi?id=1224647</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224648">https://bugzilla.suse.com/show_bug.cgi?id=1224648</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224649">https://bugzilla.suse.com/show_bug.cgi?id=1224649</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224650">https://bugzilla.suse.com/show_bug.cgi?id=1224650</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224651">https://bugzilla.suse.com/show_bug.cgi?id=1224651</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224652">https://bugzilla.suse.com/show_bug.cgi?id=1224652</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224653">https://bugzilla.suse.com/show_bug.cgi?id=1224653</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224654">https://bugzilla.suse.com/show_bug.cgi?id=1224654</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224657">https://bugzilla.suse.com/show_bug.cgi?id=1224657</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224660">https://bugzilla.suse.com/show_bug.cgi?id=1224660</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224663">https://bugzilla.suse.com/show_bug.cgi?id=1224663</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224664">https://bugzilla.suse.com/show_bug.cgi?id=1224664</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224665">https://bugzilla.suse.com/show_bug.cgi?id=1224665</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224666">https://bugzilla.suse.com/show_bug.cgi?id=1224666</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224667">https://bugzilla.suse.com/show_bug.cgi?id=1224667</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224668">https://bugzilla.suse.com/show_bug.cgi?id=1224668</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224671">https://bugzilla.suse.com/show_bug.cgi?id=1224671</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224672">https://bugzilla.suse.com/show_bug.cgi?id=1224672</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224674">https://bugzilla.suse.com/show_bug.cgi?id=1224674</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224675">https://bugzilla.suse.com/show_bug.cgi?id=1224675</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224676">https://bugzilla.suse.com/show_bug.cgi?id=1224676</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224677">https://bugzilla.suse.com/show_bug.cgi?id=1224677</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224678">https://bugzilla.suse.com/show_bug.cgi?id=1224678</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224679">https://bugzilla.suse.com/show_bug.cgi?id=1224679</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224680">https://bugzilla.suse.com/show_bug.cgi?id=1224680</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224681">https://bugzilla.suse.com/show_bug.cgi?id=1224681</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224682">https://bugzilla.suse.com/show_bug.cgi?id=1224682</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">https://bugzilla.suse.com/show_bug.cgi?id=1224683</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224685">https://bugzilla.suse.com/show_bug.cgi?id=1224685</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224686">https://bugzilla.suse.com/show_bug.cgi?id=1224686</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224687">https://bugzilla.suse.com/show_bug.cgi?id=1224687</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224688">https://bugzilla.suse.com/show_bug.cgi?id=1224688</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224692">https://bugzilla.suse.com/show_bug.cgi?id=1224692</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224696">https://bugzilla.suse.com/show_bug.cgi?id=1224696</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224697">https://bugzilla.suse.com/show_bug.cgi?id=1224697</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224699">https://bugzilla.suse.com/show_bug.cgi?id=1224699</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224701">https://bugzilla.suse.com/show_bug.cgi?id=1224701</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224703">https://bugzilla.suse.com/show_bug.cgi?id=1224703</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224704">https://bugzilla.suse.com/show_bug.cgi?id=1224704</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224705">https://bugzilla.suse.com/show_bug.cgi?id=1224705</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224706">https://bugzilla.suse.com/show_bug.cgi?id=1224706</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224707">https://bugzilla.suse.com/show_bug.cgi?id=1224707</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224709">https://bugzilla.suse.com/show_bug.cgi?id=1224709</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224710">https://bugzilla.suse.com/show_bug.cgi?id=1224710</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224712">https://bugzilla.suse.com/show_bug.cgi?id=1224712</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224714">https://bugzilla.suse.com/show_bug.cgi?id=1224714</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224716">https://bugzilla.suse.com/show_bug.cgi?id=1224716</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224717">https://bugzilla.suse.com/show_bug.cgi?id=1224717</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224718">https://bugzilla.suse.com/show_bug.cgi?id=1224718</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224719">https://bugzilla.suse.com/show_bug.cgi?id=1224719</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224720">https://bugzilla.suse.com/show_bug.cgi?id=1224720</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224721">https://bugzilla.suse.com/show_bug.cgi?id=1224721</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224722">https://bugzilla.suse.com/show_bug.cgi?id=1224722</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224723">https://bugzilla.suse.com/show_bug.cgi?id=1224723</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224725">https://bugzilla.suse.com/show_bug.cgi?id=1224725</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224727">https://bugzilla.suse.com/show_bug.cgi?id=1224727</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224728">https://bugzilla.suse.com/show_bug.cgi?id=1224728</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224729">https://bugzilla.suse.com/show_bug.cgi?id=1224729</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224730">https://bugzilla.suse.com/show_bug.cgi?id=1224730</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224731">https://bugzilla.suse.com/show_bug.cgi?id=1224731</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224732">https://bugzilla.suse.com/show_bug.cgi?id=1224732</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224733">https://bugzilla.suse.com/show_bug.cgi?id=1224733</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224736">https://bugzilla.suse.com/show_bug.cgi?id=1224736</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224738">https://bugzilla.suse.com/show_bug.cgi?id=1224738</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224739">https://bugzilla.suse.com/show_bug.cgi?id=1224739</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224740">https://bugzilla.suse.com/show_bug.cgi?id=1224740</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224741">https://bugzilla.suse.com/show_bug.cgi?id=1224741</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224742">https://bugzilla.suse.com/show_bug.cgi?id=1224742</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224747">https://bugzilla.suse.com/show_bug.cgi?id=1224747</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224749">https://bugzilla.suse.com/show_bug.cgi?id=1224749</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224763">https://bugzilla.suse.com/show_bug.cgi?id=1224763</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224764">https://bugzilla.suse.com/show_bug.cgi?id=1224764</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224765">https://bugzilla.suse.com/show_bug.cgi?id=1224765</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224766">https://bugzilla.suse.com/show_bug.cgi?id=1224766</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224790">https://bugzilla.suse.com/show_bug.cgi?id=1224790</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224792">https://bugzilla.suse.com/show_bug.cgi?id=1224792</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224793">https://bugzilla.suse.com/show_bug.cgi?id=1224793</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224803">https://bugzilla.suse.com/show_bug.cgi?id=1224803</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224804">https://bugzilla.suse.com/show_bug.cgi?id=1224804</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224866">https://bugzilla.suse.com/show_bug.cgi?id=1224866</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224936">https://bugzilla.suse.com/show_bug.cgi?id=1224936</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224989">https://bugzilla.suse.com/show_bug.cgi?id=1224989</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225007">https://bugzilla.suse.com/show_bug.cgi?id=1225007</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225053">https://bugzilla.suse.com/show_bug.cgi?id=1225053</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225133">https://bugzilla.suse.com/show_bug.cgi?id=1225133</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225134">https://bugzilla.suse.com/show_bug.cgi?id=1225134</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225136">https://bugzilla.suse.com/show_bug.cgi?id=1225136</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225172">https://bugzilla.suse.com/show_bug.cgi?id=1225172</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225502">https://bugzilla.suse.com/show_bug.cgi?id=1225502</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225578">https://bugzilla.suse.com/show_bug.cgi?id=1225578</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225579">https://bugzilla.suse.com/show_bug.cgi?id=1225579</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225580">https://bugzilla.suse.com/show_bug.cgi?id=1225580</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225593">https://bugzilla.suse.com/show_bug.cgi?id=1225593</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225605">https://bugzilla.suse.com/show_bug.cgi?id=1225605</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225607">https://bugzilla.suse.com/show_bug.cgi?id=1225607</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225610">https://bugzilla.suse.com/show_bug.cgi?id=1225610</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225616">https://bugzilla.suse.com/show_bug.cgi?id=1225616</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225618">https://bugzilla.suse.com/show_bug.cgi?id=1225618</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225640">https://bugzilla.suse.com/show_bug.cgi?id=1225640</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225642">https://bugzilla.suse.com/show_bug.cgi?id=1225642</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225692">https://bugzilla.suse.com/show_bug.cgi?id=1225692</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225694">https://bugzilla.suse.com/show_bug.cgi?id=1225694</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225695">https://bugzilla.suse.com/show_bug.cgi?id=1225695</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225696">https://bugzilla.suse.com/show_bug.cgi?id=1225696</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225698">https://bugzilla.suse.com/show_bug.cgi?id=1225698</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225699">https://bugzilla.suse.com/show_bug.cgi?id=1225699</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225704">https://bugzilla.suse.com/show_bug.cgi?id=1225704</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225705">https://bugzilla.suse.com/show_bug.cgi?id=1225705</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225708">https://bugzilla.suse.com/show_bug.cgi?id=1225708</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225710">https://bugzilla.suse.com/show_bug.cgi?id=1225710</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225712">https://bugzilla.suse.com/show_bug.cgi?id=1225712</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225714">https://bugzilla.suse.com/show_bug.cgi?id=1225714</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225715">https://bugzilla.suse.com/show_bug.cgi?id=1225715</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225720">https://bugzilla.suse.com/show_bug.cgi?id=1225720</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225722">https://bugzilla.suse.com/show_bug.cgi?id=1225722</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225728">https://bugzilla.suse.com/show_bug.cgi?id=1225728</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225734">https://bugzilla.suse.com/show_bug.cgi?id=1225734</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225735">https://bugzilla.suse.com/show_bug.cgi?id=1225735</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225736">https://bugzilla.suse.com/show_bug.cgi?id=1225736</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225747">https://bugzilla.suse.com/show_bug.cgi?id=1225747</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225748">https://bugzilla.suse.com/show_bug.cgi?id=1225748</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225749">https://bugzilla.suse.com/show_bug.cgi?id=1225749</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225750">https://bugzilla.suse.com/show_bug.cgi?id=1225750</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225756">https://bugzilla.suse.com/show_bug.cgi?id=1225756</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225765">https://bugzilla.suse.com/show_bug.cgi?id=1225765</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225766">https://bugzilla.suse.com/show_bug.cgi?id=1225766</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225769">https://bugzilla.suse.com/show_bug.cgi?id=1225769</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225773">https://bugzilla.suse.com/show_bug.cgi?id=1225773</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225775">https://bugzilla.suse.com/show_bug.cgi?id=1225775</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225842">https://bugzilla.suse.com/show_bug.cgi?id=1225842</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225945">https://bugzilla.suse.com/show_bug.cgi?id=1225945</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-3184">https://jira.suse.com/browse/PED-3184</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-3311">https://jira.suse.com/browse/PED-3311</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-3535">https://jira.suse.com/browse/PED-3535</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-4486">https://jira.suse.com/browse/PED-4486</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-4593">https://jira.suse.com/browse/PED-4593</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-5062">https://jira.suse.com/browse/PED-5062</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-542">https://jira.suse.com/browse/PED-542</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-5728">https://jira.suse.com/browse/PED-5728</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-5853">https://jira.suse.com/browse/PED-5853</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-6079">https://jira.suse.com/browse/PED-6079</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-6252">https://jira.suse.com/browse/PED-6252</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-7542">https://jira.suse.com/browse/PED-7542</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-7619">https://jira.suse.com/browse/PED-7619</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-8111">https://jira.suse.com/browse/PED-8111</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-8240">https://jira.suse.com/browse/PED-8240</a>
                    </li>
                
            
        </ul>
    
</div>