<div class="container">
<h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:20028-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-02-03T08:51:43Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">bsc#1012628</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">bsc#1065729</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1141539">bsc#1141539</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1181674">bsc#1181674</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1186716">bsc#1186716</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1187716">bsc#1187716</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193599">bsc#1193599</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195775">bsc#1195775</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1204562">bsc#1204562</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207948">bsc#1207948</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208593">bsc#1208593</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">bsc#1209657</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209834">bsc#1209834</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213573">bsc#1213573</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214683">bsc#1214683</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214852">bsc#1214852</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">bsc#1215199</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215587">bsc#1215587</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216196">bsc#1216196</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216358">bsc#1216358</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216436">bsc#1216436</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216702">bsc#1216702</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217169">bsc#1217169</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217384">bsc#1217384</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217408">bsc#1217408</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217481">bsc#1217481</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217750">bsc#1217750</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217912">bsc#1217912</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218442">bsc#1218442</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218447">bsc#1218447</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">bsc#1218562</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218730">bsc#1218730</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218820">bsc#1218820</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">bsc#1218917</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">bsc#1219104</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">bsc#1219170</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219216">bsc#1219216</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219224">bsc#1219224</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219451">bsc#1219451</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219478">bsc#1219478</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219485">bsc#1219485</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219596">bsc#1219596</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219633">bsc#1219633</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219832">bsc#1219832</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219847">bsc#1219847</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219953">bsc#1219953</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220021">bsc#1220021</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220120">bsc#1220120</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220138">bsc#1220138</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220148">bsc#1220148</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220214">bsc#1220214</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220328">bsc#1220328</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220427">bsc#1220427</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220430">bsc#1220430</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220569">bsc#1220569</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220738">bsc#1220738</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220783">bsc#1220783</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220942">bsc#1220942</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221057">bsc#1221057</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221086">bsc#1221086</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221097">bsc#1221097</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221303">bsc#1221303</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221612">bsc#1221612</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221615">bsc#1221615</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221635">bsc#1221635</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">bsc#1221645</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221647">bsc#1221647</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221649">bsc#1221649</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221654">bsc#1221654</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221656">bsc#1221656</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221659">bsc#1221659</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221765">bsc#1221765</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221777">bsc#1221777</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">bsc#1221816</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221829">bsc#1221829</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221858">bsc#1221858</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221958">bsc#1221958</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222011">bsc#1222011</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222015">bsc#1222015</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222080">bsc#1222080</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222241">bsc#1222241</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222294">bsc#1222294</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222303">bsc#1222303</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222326">bsc#1222326</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222328">bsc#1222328</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222357">bsc#1222357</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222368">bsc#1222368</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222378">bsc#1222378</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222380">bsc#1222380</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222385">bsc#1222385</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222426">bsc#1222426</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222438">bsc#1222438</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222459">bsc#1222459</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222463">bsc#1222463</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222464">bsc#1222464</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222532">bsc#1222532</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">bsc#1222559</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222588">bsc#1222588</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222596">bsc#1222596</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222608">bsc#1222608</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222613">bsc#1222613</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222615">bsc#1222615</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222617">bsc#1222617</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">bsc#1222619</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">bsc#1222624</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222627">bsc#1222627</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222654">bsc#1222654</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222721">bsc#1222721</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222768">bsc#1222768</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222769">bsc#1222769</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222771">bsc#1222771</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222775">bsc#1222775</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222777">bsc#1222777</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222779">bsc#1222779</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222780">bsc#1222780</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222782">bsc#1222782</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222793">bsc#1222793</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222809">bsc#1222809</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222810">bsc#1222810</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222893">bsc#1222893</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223007">bsc#1223007</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223010">bsc#1223010</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223011">bsc#1223011</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">bsc#1223016</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223018">bsc#1223018</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223020">bsc#1223020</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223021">bsc#1223021</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223023">bsc#1223023</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223024">bsc#1223024</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223035">bsc#1223035</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223038">bsc#1223038</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223039">bsc#1223039</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223041">bsc#1223041</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223045">bsc#1223045</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223046">bsc#1223046</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223051">bsc#1223051</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223052">bsc#1223052</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223057">bsc#1223057</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223058">bsc#1223058</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223060">bsc#1223060</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223061">bsc#1223061</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223062">bsc#1223062</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223076">bsc#1223076</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223077">bsc#1223077</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223084">bsc#1223084</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223111">bsc#1223111</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223113">bsc#1223113</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223137">bsc#1223137</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223138">bsc#1223138</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223140">bsc#1223140</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223143">bsc#1223143</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">bsc#1223187</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223188">bsc#1223188</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223189">bsc#1223189</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223190">bsc#1223190</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">bsc#1223191</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223192">bsc#1223192</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223195">bsc#1223195</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223196">bsc#1223196</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223197">bsc#1223197</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223198">bsc#1223198</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223202">bsc#1223202</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223203">bsc#1223203</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223204">bsc#1223204</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223205">bsc#1223205</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223207">bsc#1223207</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223265">bsc#1223265</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223285">bsc#1223285</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223315">bsc#1223315</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223323">bsc#1223323</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223338">bsc#1223338</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223357">bsc#1223357</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223369">bsc#1223369</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223380">bsc#1223380</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223384">bsc#1223384</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223390">bsc#1223390</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223415">bsc#1223415</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223439">bsc#1223439</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223462">bsc#1223462</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223525">bsc#1223525</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223532">bsc#1223532</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223539">bsc#1223539</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223570">bsc#1223570</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223575">bsc#1223575</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223590">bsc#1223590</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223591">bsc#1223591</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223592">bsc#1223592</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223593">bsc#1223593</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223625">bsc#1223625</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223626">bsc#1223626</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223627">bsc#1223627</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223629">bsc#1223629</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223631">bsc#1223631</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223632">bsc#1223632</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223633">bsc#1223633</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223634">bsc#1223634</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223637">bsc#1223637</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223638">bsc#1223638</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223641">bsc#1223641</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223642">bsc#1223642</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223643">bsc#1223643</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223644">bsc#1223644</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223645">bsc#1223645</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223646">bsc#1223646</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223648">bsc#1223648</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223649">bsc#1223649</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223650">bsc#1223650</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223651">bsc#1223651</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223652">bsc#1223652</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223653">bsc#1223653</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223654">bsc#1223654</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223655">bsc#1223655</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223657">bsc#1223657</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223660">bsc#1223660</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223661">bsc#1223661</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223663">bsc#1223663</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223664">bsc#1223664</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223665">bsc#1223665</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223666">bsc#1223666</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223667">bsc#1223667</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223668">bsc#1223668</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223669">bsc#1223669</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223670">bsc#1223670</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223671">bsc#1223671</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223675">bsc#1223675</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223677">bsc#1223677</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223678">bsc#1223678</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223679">bsc#1223679</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223686">bsc#1223686</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223692">bsc#1223692</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223693">bsc#1223693</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223695">bsc#1223695</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223696">bsc#1223696</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223698">bsc#1223698</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223699">bsc#1223699</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223705">bsc#1223705</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223709">bsc#1223709</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223711">bsc#1223711</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223712">bsc#1223712</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223714">bsc#1223714</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223715">bsc#1223715</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223717">bsc#1223717</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223718">bsc#1223718</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223723">bsc#1223723</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223725">bsc#1223725</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223728">bsc#1223728</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223731">bsc#1223731</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223732">bsc#1223732</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223734">bsc#1223734</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223735">bsc#1223735</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223737">bsc#1223737</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223738">bsc#1223738</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223739">bsc#1223739</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223740">bsc#1223740</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223741">bsc#1223741</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223744">bsc#1223744</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223745">bsc#1223745</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223747">bsc#1223747</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223748">bsc#1223748</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223749">bsc#1223749</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223750">bsc#1223750</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223752">bsc#1223752</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223754">bsc#1223754</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223756">bsc#1223756</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223757">bsc#1223757</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223759">bsc#1223759</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223760">bsc#1223760</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223761">bsc#1223761</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223762">bsc#1223762</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223764">bsc#1223764</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223765">bsc#1223765</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223768">bsc#1223768</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223769">bsc#1223769</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223770">bsc#1223770</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223774">bsc#1223774</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223776">bsc#1223776</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223778">bsc#1223778</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223779">bsc#1223779</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223780">bsc#1223780</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223781">bsc#1223781</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223782">bsc#1223782</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223787">bsc#1223787</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223788">bsc#1223788</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223789">bsc#1223789</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223790">bsc#1223790</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223802">bsc#1223802</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223804">bsc#1223804</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223805">bsc#1223805</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223806">bsc#1223806</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223807">bsc#1223807</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223808">bsc#1223808</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223810">bsc#1223810</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223813">bsc#1223813</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223815">bsc#1223815</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223816">bsc#1223816</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223819">bsc#1223819</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223821">bsc#1223821</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223822">bsc#1223822</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223823">bsc#1223823</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">bsc#1223824</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223826">bsc#1223826</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223827">bsc#1223827</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223828">bsc#1223828</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223829">bsc#1223829</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223831">bsc#1223831</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223834">bsc#1223834</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223836">bsc#1223836</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223837">bsc#1223837</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223838">bsc#1223838</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223842">bsc#1223842</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223843">bsc#1223843</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223844">bsc#1223844</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223847">bsc#1223847</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223863">bsc#1223863</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223869">bsc#1223869</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223870">bsc#1223870</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223871">bsc#1223871</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223872">bsc#1223872</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223874">bsc#1223874</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223944">bsc#1223944</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223945">bsc#1223945</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223946">bsc#1223946</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223991">bsc#1223991</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224049">bsc#1224049</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224076">bsc#1224076</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224096">bsc#1224096</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224098">bsc#1224098</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224099">bsc#1224099</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224137">bsc#1224137</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224166">bsc#1224166</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224174">bsc#1224174</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224177">bsc#1224177</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224180">bsc#1224180</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224181">bsc#1224181</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224187">bsc#1224187</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224331">bsc#1224331</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224348">bsc#1224348</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224414">bsc#1224414</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224422">bsc#1224422</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224423">bsc#1224423</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224429">bsc#1224429</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224430">bsc#1224430</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224432">bsc#1224432</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224433">bsc#1224433</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224437">bsc#1224437</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224438">bsc#1224438</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224439">bsc#1224439</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224442">bsc#1224442</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224443">bsc#1224443</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224445">bsc#1224445</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224449">bsc#1224449</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224477">bsc#1224477</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224479">bsc#1224479</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224480">bsc#1224480</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224481">bsc#1224481</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224482">bsc#1224482</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224486">bsc#1224486</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224487">bsc#1224487</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224488">bsc#1224488</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224490">bsc#1224490</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224491">bsc#1224491</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224492">bsc#1224492</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224493">bsc#1224493</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224494">bsc#1224494</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224495">bsc#1224495</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224497">bsc#1224497</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224498">bsc#1224498</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224499">bsc#1224499</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">bsc#1224500</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224501">bsc#1224501</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224502">bsc#1224502</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224504">bsc#1224504</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224505">bsc#1224505</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224506">bsc#1224506</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224507">bsc#1224507</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224508">bsc#1224508</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224509">bsc#1224509</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224511">bsc#1224511</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224512">bsc#1224512</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224513">bsc#1224513</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224515">bsc#1224515</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224516">bsc#1224516</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224517">bsc#1224517</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224519">bsc#1224519</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224520">bsc#1224520</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224521">bsc#1224521</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224523">bsc#1224523</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224524">bsc#1224524</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224525">bsc#1224525</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224526">bsc#1224526</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224530">bsc#1224530</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224531">bsc#1224531</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224534">bsc#1224534</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224537">bsc#1224537</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224539">bsc#1224539</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224540">bsc#1224540</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224541">bsc#1224541</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224542">bsc#1224542</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224543">bsc#1224543</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224544">bsc#1224544</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224545">bsc#1224545</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224546">bsc#1224546</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224549">bsc#1224549</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224550">bsc#1224550</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224552">bsc#1224552</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224553">bsc#1224553</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224555">bsc#1224555</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">bsc#1224557</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224558">bsc#1224558</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224559">bsc#1224559</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224562">bsc#1224562</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224565">bsc#1224565</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224566">bsc#1224566</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224567">bsc#1224567</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224568">bsc#1224568</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224569">bsc#1224569</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224571">bsc#1224571</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224572">bsc#1224572</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224573">bsc#1224573</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224575">bsc#1224575</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224576">bsc#1224576</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224577">bsc#1224577</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224578">bsc#1224578</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224579">bsc#1224579</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224580">bsc#1224580</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224581">bsc#1224581</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224582">bsc#1224582</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224583">bsc#1224583</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224584">bsc#1224584</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224585">bsc#1224585</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224586">bsc#1224586</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224587">bsc#1224587</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224588">bsc#1224588</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224589">bsc#1224589</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224592">bsc#1224592</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224596">bsc#1224596</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224598">bsc#1224598</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224600">bsc#1224600</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224601">bsc#1224601</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224602">bsc#1224602</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224603">bsc#1224603</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224604">bsc#1224604</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224605">bsc#1224605</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224606">bsc#1224606</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224607">bsc#1224607</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224608">bsc#1224608</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224609">bsc#1224609</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224611">bsc#1224611</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224612">bsc#1224612</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224613">bsc#1224613</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224614">bsc#1224614</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224615">bsc#1224615</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224617">bsc#1224617</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224618">bsc#1224618</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224619">bsc#1224619</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224620">bsc#1224620</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224621">bsc#1224621</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224622">bsc#1224622</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224623">bsc#1224623</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224624">bsc#1224624</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224626">bsc#1224626</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224627">bsc#1224627</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224628">bsc#1224628</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224629">bsc#1224629</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224630">bsc#1224630</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224632">bsc#1224632</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224633">bsc#1224633</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224634">bsc#1224634</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">bsc#1224636</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224637">bsc#1224637</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224638">bsc#1224638</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224639">bsc#1224639</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224640">bsc#1224640</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224641">bsc#1224641</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224643">bsc#1224643</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224644">bsc#1224644</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224645">bsc#1224645</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224646">bsc#1224646</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224647">bsc#1224647</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224648">bsc#1224648</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224649">bsc#1224649</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224650">bsc#1224650</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224651">bsc#1224651</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224652">bsc#1224652</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224653">bsc#1224653</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224654">bsc#1224654</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224655">bsc#1224655</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224657">bsc#1224657</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224659">bsc#1224659</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224660">bsc#1224660</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224661">bsc#1224661</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224662">bsc#1224662</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224663">bsc#1224663</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224664">bsc#1224664</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224665">bsc#1224665</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224666">bsc#1224666</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224667">bsc#1224667</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224668">bsc#1224668</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224670">bsc#1224670</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224671">bsc#1224671</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224672">bsc#1224672</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224673">bsc#1224673</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224675">bsc#1224675</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224676">bsc#1224676</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224677">bsc#1224677</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224678">bsc#1224678</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224679">bsc#1224679</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224680">bsc#1224680</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224681">bsc#1224681</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224682">bsc#1224682</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">bsc#1224683</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224685">bsc#1224685</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224686">bsc#1224686</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224687">bsc#1224687</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224688">bsc#1224688</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224692">bsc#1224692</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224696">bsc#1224696</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224697">bsc#1224697</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224698">bsc#1224698</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224699">bsc#1224699</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224701">bsc#1224701</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224703">bsc#1224703</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224704">bsc#1224704</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224705">bsc#1224705</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224706">bsc#1224706</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224707">bsc#1224707</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224709">bsc#1224709</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224710">bsc#1224710</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224712">bsc#1224712</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224714">bsc#1224714</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224716">bsc#1224716</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224717">bsc#1224717</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224718">bsc#1224718</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224719">bsc#1224719</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224720">bsc#1224720</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224721">bsc#1224721</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224722">bsc#1224722</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224723">bsc#1224723</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224725">bsc#1224725</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224727">bsc#1224727</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224728">bsc#1224728</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224729">bsc#1224729</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224730">bsc#1224730</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224731">bsc#1224731</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224732">bsc#1224732</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224733">bsc#1224733</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224735">bsc#1224735</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224736">bsc#1224736</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224738">bsc#1224738</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224739">bsc#1224739</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224740">bsc#1224740</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224741">bsc#1224741</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224742">bsc#1224742</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224743">bsc#1224743</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224747">bsc#1224747</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224749">bsc#1224749</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224751">bsc#1224751</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224763">bsc#1224763</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224764">bsc#1224764</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224765">bsc#1224765</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224766">bsc#1224766</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224767">bsc#1224767</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224790">bsc#1224790</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224792">bsc#1224792</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224793">bsc#1224793</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224803">bsc#1224803</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224804">bsc#1224804</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224866">bsc#1224866</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224928">bsc#1224928</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224930">bsc#1224930</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224932">bsc#1224932</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224933">bsc#1224933</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224935">bsc#1224935</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224936">bsc#1224936</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224937">bsc#1224937</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224939">bsc#1224939</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224941">bsc#1224941</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224944">bsc#1224944</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224946">bsc#1224946</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224947">bsc#1224947</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224949">bsc#1224949</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224951">bsc#1224951</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224988">bsc#1224988</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224989">bsc#1224989</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224992">bsc#1224992</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224998">bsc#1224998</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225000">bsc#1225000</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225001">bsc#1225001</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225004">bsc#1225004</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225006">bsc#1225006</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225007">bsc#1225007</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225008">bsc#1225008</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225009">bsc#1225009</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225014">bsc#1225014</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225015">bsc#1225015</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225022">bsc#1225022</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225025">bsc#1225025</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225028">bsc#1225028</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225029">bsc#1225029</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225031">bsc#1225031</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225036">bsc#1225036</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225041">bsc#1225041</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225044">bsc#1225044</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225049">bsc#1225049</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225050">bsc#1225050</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225053">bsc#1225053</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225076">bsc#1225076</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225077">bsc#1225077</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225078">bsc#1225078</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225081">bsc#1225081</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225085">bsc#1225085</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225086">bsc#1225086</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225088">bsc#1225088</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225090">bsc#1225090</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225092">bsc#1225092</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225096">bsc#1225096</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225097">bsc#1225097</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225098">bsc#1225098</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225101">bsc#1225101</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225103">bsc#1225103</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225104">bsc#1225104</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225105">bsc#1225105</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225106">bsc#1225106</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225108">bsc#1225108</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225120">bsc#1225120</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225132">bsc#1225132</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225133">bsc#1225133</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225134">bsc#1225134</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225136">bsc#1225136</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225172">bsc#1225172</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225180">bsc#1225180</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225272">bsc#1225272</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225300">bsc#1225300</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225391">bsc#1225391</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225472">bsc#1225472</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">bsc#1225475</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225476">bsc#1225476</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225477">bsc#1225477</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225478">bsc#1225478</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225485">bsc#1225485</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225489">bsc#1225489</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225490">bsc#1225490</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225502">bsc#1225502</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225527">bsc#1225527</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225529">bsc#1225529</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225530">bsc#1225530</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225532">bsc#1225532</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225534">bsc#1225534</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225548">bsc#1225548</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225550">bsc#1225550</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225553">bsc#1225553</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225554">bsc#1225554</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225555">bsc#1225555</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225556">bsc#1225556</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225557">bsc#1225557</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225559">bsc#1225559</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225560">bsc#1225560</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225564">bsc#1225564</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225565">bsc#1225565</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225566">bsc#1225566</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225568">bsc#1225568</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225569">bsc#1225569</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225570">bsc#1225570</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225571">bsc#1225571</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225572">bsc#1225572</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225573">bsc#1225573</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225577">bsc#1225577</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225578">bsc#1225578</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225579">bsc#1225579</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225580">bsc#1225580</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225581">bsc#1225581</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225583">bsc#1225583</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225584">bsc#1225584</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225585">bsc#1225585</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225586">bsc#1225586</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225587">bsc#1225587</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225588">bsc#1225588</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225589">bsc#1225589</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225590">bsc#1225590</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225591">bsc#1225591</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225592">bsc#1225592</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225593">bsc#1225593</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225594">bsc#1225594</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225595">bsc#1225595</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225599">bsc#1225599</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225600">bsc#1225600</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225601">bsc#1225601</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225602">bsc#1225602</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225605">bsc#1225605</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225607">bsc#1225607</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225609">bsc#1225609</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225610">bsc#1225610</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225611">bsc#1225611</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225616">bsc#1225616</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225618">bsc#1225618</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225640">bsc#1225640</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225642">bsc#1225642</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225681">bsc#1225681</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225692">bsc#1225692</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225694">bsc#1225694</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225695">bsc#1225695</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225696">bsc#1225696</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225698">bsc#1225698</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225699">bsc#1225699</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225702">bsc#1225702</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225704">bsc#1225704</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225705">bsc#1225705</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225708">bsc#1225708</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225710">bsc#1225710</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225711">bsc#1225711</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225712">bsc#1225712</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225714">bsc#1225714</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225715">bsc#1225715</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225717">bsc#1225717</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225719">bsc#1225719</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225720">bsc#1225720</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225722">bsc#1225722</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225723">bsc#1225723</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225726">bsc#1225726</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225728">bsc#1225728</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225731">bsc#1225731</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225732">bsc#1225732</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225734">bsc#1225734</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225735">bsc#1225735</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225736">bsc#1225736</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225737">bsc#1225737</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225741">bsc#1225741</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225744">bsc#1225744</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225745">bsc#1225745</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225746">bsc#1225746</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225747">bsc#1225747</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225748">bsc#1225748</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225749">bsc#1225749</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225750">bsc#1225750</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225752">bsc#1225752</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225753">bsc#1225753</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225756">bsc#1225756</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225757">bsc#1225757</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225758">bsc#1225758</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225759">bsc#1225759</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225760">bsc#1225760</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225761">bsc#1225761</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225762">bsc#1225762</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225763">bsc#1225763</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225765">bsc#1225765</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225766">bsc#1225766</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225767">bsc#1225767</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225769">bsc#1225769</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225770">bsc#1225770</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225773">bsc#1225773</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225775">bsc#1225775</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225805">bsc#1225805</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225810">bsc#1225810</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225815">bsc#1225815</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">bsc#1225820</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225823">bsc#1225823</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225827">bsc#1225827</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225829">bsc#1225829</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225830">bsc#1225830</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225834">bsc#1225834</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225835">bsc#1225835</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225839">bsc#1225839</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225840">bsc#1225840</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225842">bsc#1225842</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225843">bsc#1225843</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225847">bsc#1225847</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225851">bsc#1225851</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225856">bsc#1225856</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225866">bsc#1225866</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225872">bsc#1225872</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225894">bsc#1225894</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225895">bsc#1225895</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225896">bsc#1225896</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225898">bsc#1225898</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">bsc#1225903</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225945">bsc#1225945</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226022">bsc#1226022</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226131">bsc#1226131</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226145">bsc#1226145</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226149">bsc#1226149</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226155">bsc#1226155</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226158">bsc#1226158</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226163">bsc#1226163</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226202">bsc#1226202</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226211">bsc#1226211</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226212">bsc#1226212</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226213">bsc#1226213</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226226">bsc#1226226</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226457">bsc#1226457</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">bsc#1226502</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226503">bsc#1226503</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226513">bsc#1226513</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226514">bsc#1226514</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226519">bsc#1226519</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226520">bsc#1226520</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226582">bsc#1226582</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226587">bsc#1226587</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">bsc#1226588</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226592">bsc#1226592</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226593">bsc#1226593</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226594">bsc#1226594</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226595">bsc#1226595</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226597">bsc#1226597</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226607">bsc#1226607</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226608">bsc#1226608</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226610">bsc#1226610</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226612">bsc#1226612</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226613">bsc#1226613</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226630">bsc#1226630</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226632">bsc#1226632</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226633">bsc#1226633</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226634">bsc#1226634</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226637">bsc#1226637</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226657">bsc#1226657</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226658">bsc#1226658</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226734">bsc#1226734</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226735">bsc#1226735</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226737">bsc#1226737</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226738">bsc#1226738</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226739">bsc#1226739</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226740">bsc#1226740</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226741">bsc#1226741</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226742">bsc#1226742</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226744">bsc#1226744</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226746">bsc#1226746</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226747">bsc#1226747</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226749">bsc#1226749</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226750">bsc#1226750</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226754">bsc#1226754</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226757">bsc#1226757</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226758">bsc#1226758</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226760">bsc#1226760</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226761">bsc#1226761</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226764">bsc#1226764</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226767">bsc#1226767</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226768">bsc#1226768</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226769">bsc#1226769</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226771">bsc#1226771</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226772">bsc#1226772</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226774">bsc#1226774</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226775">bsc#1226775</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226776">bsc#1226776</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226777">bsc#1226777</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226780">bsc#1226780</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226781">bsc#1226781</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226783">bsc#1226783</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226785">bsc#1226785</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226786">bsc#1226786</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226788">bsc#1226788</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226789">bsc#1226789</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226790">bsc#1226790</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226791">bsc#1226791</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226796">bsc#1226796</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226799">bsc#1226799</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226837">bsc#1226837</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226839">bsc#1226839</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226840">bsc#1226840</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226841">bsc#1226841</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226842">bsc#1226842</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226844">bsc#1226844</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226848">bsc#1226848</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226852">bsc#1226852</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226856">bsc#1226856</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226857">bsc#1226857</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226859">bsc#1226859</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226861">bsc#1226861</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226863">bsc#1226863</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226864">bsc#1226864</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226866">bsc#1226866</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226867">bsc#1226867</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226868">bsc#1226868</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226875">bsc#1226875</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226876">bsc#1226876</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226878">bsc#1226878</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226879">bsc#1226879</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226883">bsc#1226883</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226886">bsc#1226886</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226890">bsc#1226890</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226891">bsc#1226891</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226894">bsc#1226894</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226895">bsc#1226895</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226905">bsc#1226905</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226908">bsc#1226908</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226909">bsc#1226909</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226911">bsc#1226911</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226915">bsc#1226915</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226928">bsc#1226928</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226934">bsc#1226934</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226938">bsc#1226938</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226939">bsc#1226939</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226941">bsc#1226941</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226948">bsc#1226948</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226949">bsc#1226949</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226950">bsc#1226950</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226962">bsc#1226962</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226976">bsc#1226976</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226989">bsc#1226989</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226990">bsc#1226990</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226992">bsc#1226992</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226993">bsc#1226993</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226994">bsc#1226994</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226995">bsc#1226995</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226996">bsc#1226996</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227066">bsc#1227066</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227072">bsc#1227072</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227085">bsc#1227085</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227089">bsc#1227089</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227090">bsc#1227090</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227096">bsc#1227096</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227101">bsc#1227101</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227103">bsc#1227103</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227149">bsc#1227149</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227190">bsc#1227190</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227282">bsc#1227282</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227362">bsc#1227362</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227363">bsc#1227363</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">bsc#1227383</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227432">bsc#1227432</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227433">bsc#1227433</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227434">bsc#1227434</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227435">bsc#1227435</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227443">bsc#1227443</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227446">bsc#1227446</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227447">bsc#1227447</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227487">bsc#1227487</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227573">bsc#1227573</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227626">bsc#1227626</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227716">bsc#1227716</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227719">bsc#1227719</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227723">bsc#1227723</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227730">bsc#1227730</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227736">bsc#1227736</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227755">bsc#1227755</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227757">bsc#1227757</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227762">bsc#1227762</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227763">bsc#1227763</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227779">bsc#1227779</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227780">bsc#1227780</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227783">bsc#1227783</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227786">bsc#1227786</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227788">bsc#1227788</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227789">bsc#1227789</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227797">bsc#1227797</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227800">bsc#1227800</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227801">bsc#1227801</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227803">bsc#1227803</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227806">bsc#1227806</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227813">bsc#1227813</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227814">bsc#1227814</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227836">bsc#1227836</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227855">bsc#1227855</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227862">bsc#1227862</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227866">bsc#1227866</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227886">bsc#1227886</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227899">bsc#1227899</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227910">bsc#1227910</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227913">bsc#1227913</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227926">bsc#1227926</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228090">bsc#1228090</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">bsc#1228114</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228192">bsc#1228192</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228193">bsc#1228193</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228211">bsc#1228211</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228269">bsc#1228269</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228289">bsc#1228289</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228327">bsc#1228327</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228328">bsc#1228328</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228403">bsc#1228403</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228405">bsc#1228405</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228408">bsc#1228408</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228417">bsc#1228417</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229025">bsc#1229025</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-542">jsc#PED-542</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8111">jsc#PED-8111</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8240">jsc#PED-8240</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8491">jsc#PED-8491</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8570">jsc#PED-8570</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8644">jsc#PED-8644</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8645">jsc#PED-8645</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8649">jsc#PED-8649</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8688">jsc#PED-8688</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8701">jsc#PED-8701</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8954">jsc#PED-8954</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47432.html">CVE-2021-47432</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48669.html">CVE-2022-48669</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48772.html">CVE-2022-48772</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-0160.html">CVE-2023-0160</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-38417.html">CVE-2023-38417</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-47210.html">CVE-2023-47210</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-51780.html">CVE-2023-51780</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52434.html">CVE-2023-52434</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52435.html">CVE-2023-52435</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52472.html">CVE-2023-52472</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52483.html">CVE-2023-52483</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52616.html">CVE-2023-52616</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52618.html">CVE-2023-52618</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52622.html">CVE-2023-52622</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52635.html">CVE-2023-52635</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52641.html">CVE-2023-52641</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52647.html">CVE-2023-52647</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52648.html">CVE-2023-52648</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52649.html">CVE-2023-52649</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52650.html">CVE-2023-52650</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52652.html">CVE-2023-52652</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52653.html">CVE-2023-52653</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52654.html">CVE-2023-52654</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52655.html">CVE-2023-52655</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52656.html">CVE-2023-52656</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52657.html">CVE-2023-52657</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52658.html">CVE-2023-52658</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52659.html">CVE-2023-52659</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52660.html">CVE-2023-52660</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52661.html">CVE-2023-52661</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52662.html">CVE-2023-52662</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52663.html">CVE-2023-52663</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52664.html">CVE-2023-52664</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52667.html">CVE-2023-52667</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52669.html">CVE-2023-52669</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52670.html">CVE-2023-52670</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52671.html">CVE-2023-52671</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52672.html">CVE-2023-52672</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52673.html">CVE-2023-52673</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52674.html">CVE-2023-52674</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52675.html">CVE-2023-52675</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52676.html">CVE-2023-52676</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52678.html">CVE-2023-52678</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52679.html">CVE-2023-52679</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52680.html">CVE-2023-52680</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52681.html">CVE-2023-52681</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52683.html">CVE-2023-52683</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52685.html">CVE-2023-52685</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52686.html">CVE-2023-52686</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52687.html">CVE-2023-52687</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52690.html">CVE-2023-52690</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52691.html">CVE-2023-52691</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52692.html">CVE-2023-52692</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52693.html">CVE-2023-52693</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52694.html">CVE-2023-52694</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52695.html">CVE-2023-52695</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52696.html">CVE-2023-52696</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52697.html">CVE-2023-52697</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52698.html">CVE-2023-52698</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52699.html">CVE-2023-52699</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52735.html">CVE-2023-52735</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52749.html">CVE-2023-52749</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52750.html">CVE-2023-52750</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52751.html">CVE-2023-52751</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52753.html">CVE-2023-52753</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52754.html">CVE-2023-52754</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52757.html">CVE-2023-52757</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52759.html">CVE-2023-52759</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52762.html">CVE-2023-52762</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52763.html">CVE-2023-52763</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52764.html">CVE-2023-52764</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52765.html">CVE-2023-52765</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52766.html">CVE-2023-52766</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52767.html">CVE-2023-52767</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52768.html">CVE-2023-52768</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52769.html">CVE-2023-52769</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52771.html">CVE-2023-52771</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52772.html">CVE-2023-52772</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52773.html">CVE-2023-52773</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52774.html">CVE-2023-52774</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52775.html">CVE-2023-52775</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52776.html">CVE-2023-52776</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52777.html">CVE-2023-52777</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52780.html">CVE-2023-52780</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52781.html">CVE-2023-52781</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52782.html">CVE-2023-52782</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52783.html">CVE-2023-52783</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52784.html">CVE-2023-52784</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52786.html">CVE-2023-52786</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52787.html">CVE-2023-52787</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52788.html">CVE-2023-52788</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52789.html">CVE-2023-52789</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52791.html">CVE-2023-52791</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52792.html">CVE-2023-52792</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52794.html">CVE-2023-52794</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52795.html">CVE-2023-52795</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52796.html">CVE-2023-52796</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52798.html">CVE-2023-52798</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52799.html">CVE-2023-52799</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52800.html">CVE-2023-52800</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52801.html">CVE-2023-52801</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52803.html">CVE-2023-52803</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52804.html">CVE-2023-52804</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52805.html">CVE-2023-52805</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52806.html">CVE-2023-52806</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52807.html">CVE-2023-52807</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52808.html">CVE-2023-52808</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52809.html">CVE-2023-52809</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52810.html">CVE-2023-52810</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52811.html">CVE-2023-52811</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52812.html">CVE-2023-52812</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52813.html">CVE-2023-52813</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52814.html">CVE-2023-52814</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52815.html">CVE-2023-52815</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52816.html">CVE-2023-52816</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52817.html">CVE-2023-52817</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52818.html">CVE-2023-52818</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52819.html">CVE-2023-52819</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52821.html">CVE-2023-52821</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52825.html">CVE-2023-52825</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52826.html">CVE-2023-52826</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52827.html">CVE-2023-52827</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52829.html">CVE-2023-52829</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52832.html">CVE-2023-52832</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52833.html">CVE-2023-52833</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52834.html">CVE-2023-52834</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52835.html">CVE-2023-52835</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52836.html">CVE-2023-52836</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52837.html">CVE-2023-52837</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52838.html">CVE-2023-52838</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52840.html">CVE-2023-52840</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52841.html">CVE-2023-52841</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52842.html">CVE-2023-52842</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52843.html">CVE-2023-52843</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52844.html">CVE-2023-52844</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52845.html">CVE-2023-52845</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52846.html">CVE-2023-52846</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52847.html">CVE-2023-52847</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52849.html">CVE-2023-52849</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52850.html">CVE-2023-52850</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52851.html">CVE-2023-52851</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52853.html">CVE-2023-52853</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52854.html">CVE-2023-52854</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52855.html">CVE-2023-52855</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52856.html">CVE-2023-52856</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52857.html">CVE-2023-52857</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52858.html">CVE-2023-52858</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52860.html">CVE-2023-52860</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52861.html">CVE-2023-52861</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52862.html">CVE-2023-52862</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52863.html">CVE-2023-52863</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52864.html">CVE-2023-52864</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52865.html">CVE-2023-52865</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52866.html">CVE-2023-52866</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52867.html">CVE-2023-52867</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52868.html">CVE-2023-52868</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52869.html">CVE-2023-52869</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52870.html">CVE-2023-52870</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52871.html">CVE-2023-52871</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52872.html">CVE-2023-52872</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52873.html">CVE-2023-52873</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52874.html">CVE-2023-52874</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52875.html">CVE-2023-52875</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52876.html">CVE-2023-52876</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52877.html">CVE-2023-52877</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52878.html">CVE-2023-52878</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52879.html">CVE-2023-52879</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52880.html">CVE-2023-52880</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52881.html">CVE-2023-52881</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52882.html">CVE-2023-52882</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52883.html">CVE-2023-52883</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52884.html">CVE-2023-52884</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6238.html">CVE-2023-6238</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0639.html">CVE-2024-0639</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-21823.html">CVE-2024-21823</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23848.html">CVE-2024-23848</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-25741.html">CVE-2024-25741</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26582.html">CVE-2024-26582</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26611.html">CVE-2024-26611</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26615.html">CVE-2024-26615</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26623.html">CVE-2024-26623</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26625.html">CVE-2024-26625</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26632.html">CVE-2024-26632</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26633.html">CVE-2024-26633</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26635.html">CVE-2024-26635</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26636.html">CVE-2024-26636</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26638.html">CVE-2024-26638</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26641.html">CVE-2024-26641</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26643.html">CVE-2024-26643</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26663.html">CVE-2024-26663</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26665.html">CVE-2024-26665</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26671.html">CVE-2024-26671</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26673.html">CVE-2024-26673</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26674.html">CVE-2024-26674</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26676.html">CVE-2024-26676</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26679.html">CVE-2024-26679</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26691.html">CVE-2024-26691</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26692.html">CVE-2024-26692</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26726.html">CVE-2024-26726</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26734.html">CVE-2024-26734</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26739.html">CVE-2024-26739</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26742.html">CVE-2024-26742</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26750.html">CVE-2024-26750</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26758.html">CVE-2024-26758</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26760.html">CVE-2024-26760</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26761.html">CVE-2024-26761</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26767.html">CVE-2024-26767</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26772.html">CVE-2024-26772</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26775.html">CVE-2024-26775</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26780.html">CVE-2024-26780</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26783.html">CVE-2024-26783</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26785.html">CVE-2024-26785</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26786.html">CVE-2024-26786</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26791.html">CVE-2024-26791</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26794.html">CVE-2024-26794</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26813.html">CVE-2024-26813</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26814.html">CVE-2024-26814</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26816.html">CVE-2024-26816</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26822.html">CVE-2024-26822</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26826.html">CVE-2024-26826</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26828.html">CVE-2024-26828</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26832.html">CVE-2024-26832</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26845.html">CVE-2024-26845</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26846.html">CVE-2024-26846</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26852.html">CVE-2024-26852</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26853.html">CVE-2024-26853</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26854.html">CVE-2024-26854</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26855.html">CVE-2024-26855</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26856.html">CVE-2024-26856</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26857.html">CVE-2024-26857</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26858.html">CVE-2024-26858</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26860.html">CVE-2024-26860</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26861.html">CVE-2024-26861</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26862.html">CVE-2024-26862</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26863.html">CVE-2024-26863</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26865.html">CVE-2024-26865</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26866.html">CVE-2024-26866</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26868.html">CVE-2024-26868</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26870.html">CVE-2024-26870</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26877.html">CVE-2024-26877</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26878.html">CVE-2024-26878</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26880.html">CVE-2024-26880</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26881.html">CVE-2024-26881</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26883.html">CVE-2024-26883</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26884.html">CVE-2024-26884</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26885.html">CVE-2024-26885</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26889.html">CVE-2024-26889</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26890.html">CVE-2024-26890</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26892.html">CVE-2024-26892</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26893.html">CVE-2024-26893</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26895.html">CVE-2024-26895</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26897.html">CVE-2024-26897</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26898.html">CVE-2024-26898</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26899.html">CVE-2024-26899</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26900.html">CVE-2024-26900</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26901.html">CVE-2024-26901</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26903.html">CVE-2024-26903</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26906.html">CVE-2024-26906</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26907.html">CVE-2024-26907</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26909.html">CVE-2024-26909</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26913.html">CVE-2024-26913</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26914.html">CVE-2024-26914</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26915.html">CVE-2024-26915</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26916.html">CVE-2024-26916</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26919.html">CVE-2024-26919</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">CVE-2024-26920</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26921.html">CVE-2024-26921</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26922.html">CVE-2024-26922</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26923.html">CVE-2024-26923</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26925.html">CVE-2024-26925</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26927.html">CVE-2024-26927</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26928.html">CVE-2024-26928</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26929.html">CVE-2024-26929</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26930.html">CVE-2024-26930</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26931.html">CVE-2024-26931</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26932.html">CVE-2024-26932</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26933.html">CVE-2024-26933</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26934.html">CVE-2024-26934</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26935.html">CVE-2024-26935</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26937.html">CVE-2024-26937</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26938.html">CVE-2024-26938</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26939.html">CVE-2024-26939</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26940.html">CVE-2024-26940</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26943.html">CVE-2024-26943</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26944.html">CVE-2024-26944</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26945.html">CVE-2024-26945</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26946.html">CVE-2024-26946</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26948.html">CVE-2024-26948</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26949.html">CVE-2024-26949</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26950.html">CVE-2024-26950</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26951.html">CVE-2024-26951</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26955.html">CVE-2024-26955</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26956.html">CVE-2024-26956</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26957.html">CVE-2024-26957</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26958.html">CVE-2024-26958</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26959.html">CVE-2024-26959</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26960.html">CVE-2024-26960</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26961.html">CVE-2024-26961</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26962.html">CVE-2024-26962</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26963.html">CVE-2024-26963</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26964.html">CVE-2024-26964</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26965.html">CVE-2024-26965</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26966.html">CVE-2024-26966</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26968.html">CVE-2024-26968</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26969.html">CVE-2024-26969</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26970.html">CVE-2024-26970</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26972.html">CVE-2024-26972</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26973.html">CVE-2024-26973</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26974.html">CVE-2024-26974</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26975.html">CVE-2024-26975</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26977.html">CVE-2024-26977</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26978.html">CVE-2024-26978</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26981.html">CVE-2024-26981</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26982.html">CVE-2024-26982</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26983.html">CVE-2024-26983</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26984.html">CVE-2024-26984</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26986.html">CVE-2024-26986</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26988.html">CVE-2024-26988</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26989.html">CVE-2024-26989</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26990.html">CVE-2024-26990</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26991.html">CVE-2024-26991</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26992.html">CVE-2024-26992</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26993.html">CVE-2024-26993</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26994.html">CVE-2024-26994</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26995.html">CVE-2024-26995</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26996.html">CVE-2024-26996</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26997.html">CVE-2024-26997</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26999.html">CVE-2024-26999</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27000.html">CVE-2024-27000</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27001.html">CVE-2024-27001</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27002.html">CVE-2024-27002</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27003.html">CVE-2024-27003</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27004.html">CVE-2024-27004</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27008.html">CVE-2024-27008</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27009.html">CVE-2024-27009</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27012.html">CVE-2024-27012</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27013.html">CVE-2024-27013</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27014.html">CVE-2024-27014</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27015.html">CVE-2024-27015</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27016.html">CVE-2024-27016</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27019.html">CVE-2024-27019</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27020.html">CVE-2024-27020</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27022.html">CVE-2024-27022</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27023.html">CVE-2024-27023</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27025.html">CVE-2024-27025</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27027.html">CVE-2024-27027</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27028.html">CVE-2024-27028</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27029.html">CVE-2024-27029</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27030.html">CVE-2024-27030</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27031.html">CVE-2024-27031</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27036.html">CVE-2024-27036</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27037.html">CVE-2024-27037</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27038.html">CVE-2024-27038</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27039.html">CVE-2024-27039</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27040.html">CVE-2024-27040</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27041.html">CVE-2024-27041</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27042.html">CVE-2024-27042</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27043.html">CVE-2024-27043</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27044.html">CVE-2024-27044</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27045.html">CVE-2024-27045</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27046.html">CVE-2024-27046</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27047.html">CVE-2024-27047</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27048.html">CVE-2024-27048</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27051.html">CVE-2024-27051</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27052.html">CVE-2024-27052</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27053.html">CVE-2024-27053</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27054.html">CVE-2024-27054</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27056.html">CVE-2024-27056</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27057.html">CVE-2024-27057</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27059.html">CVE-2024-27059</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27060.html">CVE-2024-27060</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27062.html">CVE-2024-27062</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27064.html">CVE-2024-27064</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27065.html">CVE-2024-27065</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27067.html">CVE-2024-27067</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27068.html">CVE-2024-27068</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27071.html">CVE-2024-27071</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27072.html">CVE-2024-27072</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27073.html">CVE-2024-27073</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27074.html">CVE-2024-27074</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27075.html">CVE-2024-27075</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27076.html">CVE-2024-27076</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27077.html">CVE-2024-27077</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27078.html">CVE-2024-27078</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27080.html">CVE-2024-27080</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27388.html">CVE-2024-27388</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27389.html">CVE-2024-27389</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27391.html">CVE-2024-27391</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27393.html">CVE-2024-27393</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27395.html">CVE-2024-27395</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27396.html">CVE-2024-27396</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27398.html">CVE-2024-27398</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27399.html">CVE-2024-27399</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27400.html">CVE-2024-27400</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27401.html">CVE-2024-27401</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27402.html">CVE-2024-27402</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27404.html">CVE-2024-27404</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27405.html">CVE-2024-27405</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27408.html">CVE-2024-27408</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27410.html">CVE-2024-27410</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27411.html">CVE-2024-27411</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27412.html">CVE-2024-27412</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27413.html">CVE-2024-27413</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27414.html">CVE-2024-27414</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27416.html">CVE-2024-27416</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27417.html">CVE-2024-27417</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27418.html">CVE-2024-27418</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27431.html">CVE-2024-27431</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27432.html">CVE-2024-27432</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27434.html">CVE-2024-27434</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27435.html">CVE-2024-27435</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27436.html">CVE-2024-27436</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-33619.html">CVE-2024-33619</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-34777.html">CVE-2024-34777</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35247.html">CVE-2024-35247</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35784.html">CVE-2024-35784</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35786.html">CVE-2024-35786</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35788.html">CVE-2024-35788</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35789.html">CVE-2024-35789</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35790.html">CVE-2024-35790</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35791.html">CVE-2024-35791</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35794.html">CVE-2024-35794</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35795.html">CVE-2024-35795</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35796.html">CVE-2024-35796</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35799.html">CVE-2024-35799</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35800.html">CVE-2024-35800</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35801.html">CVE-2024-35801</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35803.html">CVE-2024-35803</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35804.html">CVE-2024-35804</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35805.html">CVE-2024-35805</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35806.html">CVE-2024-35806</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35807.html">CVE-2024-35807</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35808.html">CVE-2024-35808</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35809.html">CVE-2024-35809</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35810.html">CVE-2024-35810</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35811.html">CVE-2024-35811</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35812.html">CVE-2024-35812</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35813.html">CVE-2024-35813</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35814.html">CVE-2024-35814</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35815.html">CVE-2024-35815</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35817.html">CVE-2024-35817</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35819.html">CVE-2024-35819</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35821.html">CVE-2024-35821</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35822.html">CVE-2024-35822</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35823.html">CVE-2024-35823</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35824.html">CVE-2024-35824</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35825.html">CVE-2024-35825</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35827.html">CVE-2024-35827</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35828.html">CVE-2024-35828</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35829.html">CVE-2024-35829</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35830.html">CVE-2024-35830</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35831.html">CVE-2024-35831</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35833.html">CVE-2024-35833</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35834.html">CVE-2024-35834</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35835.html">CVE-2024-35835</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35836.html">CVE-2024-35836</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35837.html">CVE-2024-35837</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35838.html">CVE-2024-35838</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35841.html">CVE-2024-35841</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35842.html">CVE-2024-35842</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35843.html">CVE-2024-35843</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35845.html">CVE-2024-35845</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35847.html">CVE-2024-35847</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35848.html">CVE-2024-35848</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35849.html">CVE-2024-35849</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35850.html">CVE-2024-35850</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35851.html">CVE-2024-35851</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35852.html">CVE-2024-35852</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35853.html">CVE-2024-35853</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35854.html">CVE-2024-35854</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35857.html">CVE-2024-35857</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35860.html">CVE-2024-35860</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35861.html">CVE-2024-35861</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35862.html">CVE-2024-35862</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35863.html">CVE-2024-35863</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35864.html">CVE-2024-35864</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35865.html">CVE-2024-35865</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35866.html">CVE-2024-35866</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35867.html">CVE-2024-35867</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35868.html">CVE-2024-35868</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35869.html">CVE-2024-35869</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35870.html">CVE-2024-35870</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35872.html">CVE-2024-35872</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35875.html">CVE-2024-35875</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35877.html">CVE-2024-35877</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35878.html">CVE-2024-35878</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35879.html">CVE-2024-35879</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35880.html">CVE-2024-35880</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35883.html">CVE-2024-35883</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35884.html">CVE-2024-35884</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35885.html">CVE-2024-35885</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35886.html">CVE-2024-35886</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35887.html">CVE-2024-35887</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35889.html">CVE-2024-35889</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35890.html">CVE-2024-35890</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35891.html">CVE-2024-35891</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35892.html">CVE-2024-35892</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35893.html">CVE-2024-35893</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35895.html">CVE-2024-35895</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35896.html">CVE-2024-35896</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35898.html">CVE-2024-35898</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35899.html">CVE-2024-35899</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35900.html">CVE-2024-35900</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35901.html">CVE-2024-35901</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35903.html">CVE-2024-35903</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35904.html">CVE-2024-35904</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35905.html">CVE-2024-35905</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35907.html">CVE-2024-35907</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35908.html">CVE-2024-35908</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35909.html">CVE-2024-35909</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35911.html">CVE-2024-35911</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35912.html">CVE-2024-35912</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35914.html">CVE-2024-35914</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35915.html">CVE-2024-35915</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35916.html">CVE-2024-35916</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35917.html">CVE-2024-35917</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35921.html">CVE-2024-35921</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35922.html">CVE-2024-35922</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35924.html">CVE-2024-35924</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35925.html">CVE-2024-35925</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35926.html">CVE-2024-35926</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35927.html">CVE-2024-35927</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35928.html">CVE-2024-35928</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35930.html">CVE-2024-35930</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35931.html">CVE-2024-35931</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35932.html">CVE-2024-35932</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35933.html">CVE-2024-35933</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35934.html">CVE-2024-35934</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35935.html">CVE-2024-35935</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35936.html">CVE-2024-35936</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35937.html">CVE-2024-35937</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35938.html">CVE-2024-35938</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35940.html">CVE-2024-35940</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35942.html">CVE-2024-35942</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35943.html">CVE-2024-35943</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35944.html">CVE-2024-35944</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35945.html">CVE-2024-35945</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35946.html">CVE-2024-35946</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35947.html">CVE-2024-35947</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35950.html">CVE-2024-35950</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35951.html">CVE-2024-35951</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35952.html">CVE-2024-35952</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35953.html">CVE-2024-35953</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35954.html">CVE-2024-35954</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35955.html">CVE-2024-35955</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35957.html">CVE-2024-35957</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35958.html">CVE-2024-35958</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35959.html">CVE-2024-35959</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35960.html">CVE-2024-35960</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35961.html">CVE-2024-35961</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35962.html">CVE-2024-35962</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35963.html">CVE-2024-35963</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35964.html">CVE-2024-35964</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35965.html">CVE-2024-35965</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35966.html">CVE-2024-35966</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35967.html">CVE-2024-35967</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35969.html">CVE-2024-35969</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35970.html">CVE-2024-35970</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35971.html">CVE-2024-35971</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35972.html">CVE-2024-35972</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35973.html">CVE-2024-35973</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35974.html">CVE-2024-35974</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35975.html">CVE-2024-35975</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35976.html">CVE-2024-35976</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35977.html">CVE-2024-35977</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35978.html">CVE-2024-35978</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35979.html">CVE-2024-35979</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35981.html">CVE-2024-35981</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35982.html">CVE-2024-35982</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35984.html">CVE-2024-35984</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35986.html">CVE-2024-35986</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35989.html">CVE-2024-35989</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35990.html">CVE-2024-35990</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35991.html">CVE-2024-35991</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35992.html">CVE-2024-35992</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35995.html">CVE-2024-35995</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35997.html">CVE-2024-35997</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35998.html">CVE-2024-35998</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35999.html">CVE-2024-35999</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36002.html">CVE-2024-36002</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36003.html">CVE-2024-36003</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36004.html">CVE-2024-36004</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36005.html">CVE-2024-36005</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36006.html">CVE-2024-36006</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36007.html">CVE-2024-36007</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36008.html">CVE-2024-36008</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36009.html">CVE-2024-36009</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36010.html">CVE-2024-36010</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36011.html">CVE-2024-36011</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36012.html">CVE-2024-36012</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36013.html">CVE-2024-36013</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36014.html">CVE-2024-36014</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36015.html">CVE-2024-36015</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36016.html">CVE-2024-36016</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36017.html">CVE-2024-36017</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36018.html">CVE-2024-36018</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36019.html">CVE-2024-36019</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36020.html">CVE-2024-36020</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36021.html">CVE-2024-36021</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36024.html">CVE-2024-36024</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36025.html">CVE-2024-36025</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36026.html">CVE-2024-36026</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36029.html">CVE-2024-36029</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36030.html">CVE-2024-36030</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36032.html">CVE-2024-36032</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36281.html">CVE-2024-36281</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36477.html">CVE-2024-36477</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36478.html">CVE-2024-36478</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36479.html">CVE-2024-36479</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36880.html">CVE-2024-36880</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36882.html">CVE-2024-36882</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36885.html">CVE-2024-36885</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36887.html">CVE-2024-36887</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36889.html">CVE-2024-36889</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36890.html">CVE-2024-36890</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36891.html">CVE-2024-36891</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36893.html">CVE-2024-36893</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36894.html">CVE-2024-36894</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36895.html">CVE-2024-36895</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36896.html">CVE-2024-36896</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36897.html">CVE-2024-36897</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36898.html">CVE-2024-36898</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36899.html">CVE-2024-36899</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36900.html">CVE-2024-36900</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36901.html">CVE-2024-36901</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36902.html">CVE-2024-36902</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36903.html">CVE-2024-36903</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36904.html">CVE-2024-36904</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36906.html">CVE-2024-36906</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36909.html">CVE-2024-36909</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36910.html">CVE-2024-36910</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36911.html">CVE-2024-36911</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36912.html">CVE-2024-36912</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36913.html">CVE-2024-36913</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36914.html">CVE-2024-36914</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36915.html">CVE-2024-36915</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36916.html">CVE-2024-36916</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36917.html">CVE-2024-36917</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36918.html">CVE-2024-36918</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36919.html">CVE-2024-36919</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36921.html">CVE-2024-36921</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36922.html">CVE-2024-36922</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36923.html">CVE-2024-36923</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36924.html">CVE-2024-36924</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36926.html">CVE-2024-36926</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36928.html">CVE-2024-36928</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36930.html">CVE-2024-36930</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36931.html">CVE-2024-36931</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36934.html">CVE-2024-36934</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36935.html">CVE-2024-36935</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36936.html">CVE-2024-36936</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36937.html">CVE-2024-36937</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36938.html">CVE-2024-36938</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36940.html">CVE-2024-36940</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36941.html">CVE-2024-36941</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36942.html">CVE-2024-36942</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36944.html">CVE-2024-36944</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36945.html">CVE-2024-36945</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36946.html">CVE-2024-36946</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36947.html">CVE-2024-36947</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36949.html">CVE-2024-36949</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36950.html">CVE-2024-36950</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36951.html">CVE-2024-36951</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36952.html">CVE-2024-36952</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36955.html">CVE-2024-36955</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36957.html">CVE-2024-36957</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36959.html">CVE-2024-36959</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36960.html">CVE-2024-36960</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36962.html">CVE-2024-36962</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36964.html">CVE-2024-36964</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36965.html">CVE-2024-36965</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36967.html">CVE-2024-36967</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36969.html">CVE-2024-36969</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36971.html">CVE-2024-36971</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36972.html">CVE-2024-36972</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36973.html">CVE-2024-36973</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36974.html">CVE-2024-36974</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36975.html">CVE-2024-36975</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36977.html">CVE-2024-36977</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36978.html">CVE-2024-36978</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-37021.html">CVE-2024-37021</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-37078.html">CVE-2024-37078</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-37353.html">CVE-2024-37353</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-37354.html">CVE-2024-37354</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38381.html">CVE-2024-38381</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38384.html">CVE-2024-38384</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38385.html">CVE-2024-38385</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38388.html">CVE-2024-38388</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38390.html">CVE-2024-38390</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38391.html">CVE-2024-38391</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38539.html">CVE-2024-38539</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38540.html">CVE-2024-38540</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38541.html">CVE-2024-38541</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38543.html">CVE-2024-38543</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38544.html">CVE-2024-38544</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38545.html">CVE-2024-38545</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38546.html">CVE-2024-38546</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38547.html">CVE-2024-38547</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38548.html">CVE-2024-38548</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38549.html">CVE-2024-38549</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38550.html">CVE-2024-38550</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38551.html">CVE-2024-38551</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38552.html">CVE-2024-38552</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38553.html">CVE-2024-38553</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38554.html">CVE-2024-38554</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38555.html">CVE-2024-38555</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38556.html">CVE-2024-38556</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38557.html">CVE-2024-38557</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38558.html">CVE-2024-38558</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38559.html">CVE-2024-38559</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38560.html">CVE-2024-38560</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38562.html">CVE-2024-38562</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38564.html">CVE-2024-38564</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38565.html">CVE-2024-38565</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38566.html">CVE-2024-38566</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38567.html">CVE-2024-38567</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38568.html">CVE-2024-38568</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38569.html">CVE-2024-38569</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38570.html">CVE-2024-38570</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38571.html">CVE-2024-38571</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38572.html">CVE-2024-38572</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38573.html">CVE-2024-38573</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38575.html">CVE-2024-38575</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38578.html">CVE-2024-38578</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38579.html">CVE-2024-38579</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38580.html">CVE-2024-38580</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38581.html">CVE-2024-38581</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38582.html">CVE-2024-38582</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38583.html">CVE-2024-38583</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38586.html">CVE-2024-38586</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38587.html">CVE-2024-38587</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38588.html">CVE-2024-38588</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38590.html">CVE-2024-38590</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38591.html">CVE-2024-38591</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38592.html">CVE-2024-38592</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38594.html">CVE-2024-38594</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38595.html">CVE-2024-38595</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38597.html">CVE-2024-38597</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38598.html">CVE-2024-38598</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38599.html">CVE-2024-38599</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38600.html">CVE-2024-38600</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38601.html">CVE-2024-38601</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38602.html">CVE-2024-38602</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38603.html">CVE-2024-38603</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38604.html">CVE-2024-38604</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38605.html">CVE-2024-38605</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38608.html">CVE-2024-38608</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38610.html">CVE-2024-38610</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38611.html">CVE-2024-38611</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38615.html">CVE-2024-38615</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38616.html">CVE-2024-38616</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38617.html">CVE-2024-38617</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38618.html">CVE-2024-38618</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38619.html">CVE-2024-38619</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38621.html">CVE-2024-38621</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38622.html">CVE-2024-38622</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38627.html">CVE-2024-38627</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38628.html">CVE-2024-38628</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38629.html">CVE-2024-38629</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38630.html">CVE-2024-38630</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38633.html">CVE-2024-38633</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38634.html">CVE-2024-38634</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38635.html">CVE-2024-38635</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38636.html">CVE-2024-38636</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38659.html">CVE-2024-38659</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38661.html">CVE-2024-38661</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38663.html">CVE-2024-38663</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38664.html">CVE-2024-38664</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38780.html">CVE-2024-38780</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39276.html">CVE-2024-39276</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39277.html">CVE-2024-39277</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39291.html">CVE-2024-39291</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39296.html">CVE-2024-39296</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39301.html">CVE-2024-39301</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39362.html">CVE-2024-39362</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39371.html">CVE-2024-39371</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39463.html">CVE-2024-39463</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39466.html">CVE-2024-39466</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39468.html">CVE-2024-39468</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39469.html">CVE-2024-39469</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39471.html">CVE-2024-39471</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39472.html">CVE-2024-39472</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39473.html">CVE-2024-39473</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39474.html">CVE-2024-39474</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39475.html">CVE-2024-39475</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39479.html">CVE-2024-39479</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39481.html">CVE-2024-39481</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39482.html">CVE-2024-39482</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39487.html">CVE-2024-39487</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39490.html">CVE-2024-39490</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39494.html">CVE-2024-39494</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39496.html">CVE-2024-39496</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39498.html">CVE-2024-39498</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39502.html">CVE-2024-39502</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39504.html">CVE-2024-39504</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39507.html">CVE-2024-39507</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40901.html">CVE-2024-40901</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40906.html">CVE-2024-40906</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40908.html">CVE-2024-40908</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40919.html">CVE-2024-40919</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40923.html">CVE-2024-40923</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40925.html">CVE-2024-40925</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40928.html">CVE-2024-40928</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40931.html">CVE-2024-40931</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40935.html">CVE-2024-40935</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40937.html">CVE-2024-40937</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40940.html">CVE-2024-40940</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40947.html">CVE-2024-40947</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40948.html">CVE-2024-40948</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40953.html">CVE-2024-40953</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40960.html">CVE-2024-40960</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40961.html">CVE-2024-40961</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40966.html">CVE-2024-40966</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40970.html">CVE-2024-40970</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40972.html">CVE-2024-40972</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40975.html">CVE-2024-40975</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40979.html">CVE-2024-40979</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40998.html">CVE-2024-40998</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40999.html">CVE-2024-40999</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41006.html">CVE-2024-41006</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">CVE-2024-41011</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41013.html">CVE-2024-41013</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41014.html">CVE-2024-41014</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41017.html">CVE-2024-41017</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41090.html">CVE-2024-41090</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41091.html">CVE-2024-41091</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47432</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47432</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48669</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48669</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48772</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48772</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-0160</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-0160</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-38417</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.3</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-47210</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-51780</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-51780</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52434</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52434</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.0</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52435</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52435</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52472</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52472</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52483</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52483</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52616</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52616</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52618</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52618</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52622</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52635</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52641</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52641</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52647</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52648</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52649</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52649</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52650</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52650</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52652</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52653</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52653</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52654</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52655</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52656</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52657</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52658</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52659</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52660</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52661</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52662</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52662</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52663</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52663</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52664</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52664</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52667</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52667</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52669</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52670</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52670</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52671</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52672</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52672</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52673</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52673</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52674</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52674</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52675</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52676</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52678</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52678</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52679</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52679</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52680</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52681</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52683</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52685</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52686</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52687</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52687</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52690</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52691</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52691</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52692</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52693</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52694</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52695</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52696</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52696</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52697</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52698</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52698</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52699</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52699</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52735</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52735</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52749</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52749</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52750</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52751</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52751</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52753</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52753</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52754</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52757</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52757</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52759</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52762</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52763</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52764</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52765</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52765</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52766</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52766</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52767</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52767</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52768</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52768</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52769</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52769</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52771</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52771</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52772</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52772</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52773</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52773</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52774</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52775</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52776</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52776</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52777</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52777</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52780</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52780</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52781</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.3</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52782</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52782</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52783</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52783</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52784</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52786</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52787</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52788</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52788</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52789</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52789</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52791</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52792</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52794</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52794</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52795</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52795</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52796</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52798</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52798</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52799</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52799</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52800</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52800</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52801</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52801</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52803</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52804</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52805</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52805</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52806</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52806</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52807</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52807</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52808</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52808</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52809</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52809</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52810</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52810</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52811</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52811</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52812</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52812</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52813</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52814</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52814</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52815</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52815</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52816</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52817</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52817</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52818</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52818</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52819</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52819</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52821</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52821</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52825</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52825</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52826</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52826</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52827</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52827</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52829</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52829</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52832</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52832</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52833</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52833</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52834</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52835</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52836</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">0.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52837</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52837</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52838</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52838</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52840</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52840</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52841</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52841</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52842</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52842</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52843</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52844</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52844</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52845</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52845</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52846</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52846</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52847</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52849</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52849</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52850</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52850</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52851</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52851</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52853</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52854</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52854</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52855</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52855</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52856</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.6</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52856</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52857</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52857</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52858</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52858</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52860</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52860</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52861</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.3</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52861</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52862</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52862</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52863</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52863</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52864</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52865</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52865</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52866</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52867</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52868</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52869</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52869</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52870</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52870</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52871</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52872</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52872</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52873</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52873</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52874</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52875</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52875</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52876</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52876</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52877</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52877</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52878</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52879</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52879</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52880</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52881</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52882</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52883</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52883</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52884</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52884</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6238</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6238</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0639</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0639</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-21823</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-23848</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-23848</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-23848</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-25741</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-25741</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-25741</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26582</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26582</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26611</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26611</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26615</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26615</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26623</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26623</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26625</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26625</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26632</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26632</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26633</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26633</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26635</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26636</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26638</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26638</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26641</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26641</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26643</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26643</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26663</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26663</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26665</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26665</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26671</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26673</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26674</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26676</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26676</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26679</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26691</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26691</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26692</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26726</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26734</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26734</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26739</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26739</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26742</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26750</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26750</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26758</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26758</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26760</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26760</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26761</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26767</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26767</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26767</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26772</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26772</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26775</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26775</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26780</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26780</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26783</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26783</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26785</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26785</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26786</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26786</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26791</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26791</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26794</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26794</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26813</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26813</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26814</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26814</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26816</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26816</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26822</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26822</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26826</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26826</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26828</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26828</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26832</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26832</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26845</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26845</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26846</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26846</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26852</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26852</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26853</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26853</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26854</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26854</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26855</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26855</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26856</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26857</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26857</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26858</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26860</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26860</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26861</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26861</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26862</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26863</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26863</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26865</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26865</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26866</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26866</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26868</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26868</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26870</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26870</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26877</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26878</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26878</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26880</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26880</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26881</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26881</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26883</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26883</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26884</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26884</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26884</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26885</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26885</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26889</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26889</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26890</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26890</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26892</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26892</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26893</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26893</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26895</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26895</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26897</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26898</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26898</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26898</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26899</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26899</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26900</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26900</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26901</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26901</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26901</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26903</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26903</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26903</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26906</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26907</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">0.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26907</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26907</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26909</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26909</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26913</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26913</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26914</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26915</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26915</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26916</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26919</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26920</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26921</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26922</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26923</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26925</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26927</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26927</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26928</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26928</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26929</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26929</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26930</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26930</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26931</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26932</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26932</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26932</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26933</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26933</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26934</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26934</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26935</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26937</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26938</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26939</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26939</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26940</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26940</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26943</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26944</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26944</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26945</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26945</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26946</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26948</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26949</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26949</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26950</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26950</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26951</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26955</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26956</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26956</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26957</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26957</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26958</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26958</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26959</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26960</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26960</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26961</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26961</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26962</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26962</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26963</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26964</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26964</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26965</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26966</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26966</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26968</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26968</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26969</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26969</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26970</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26970</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26972</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26973</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26974</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26974</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26975</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26975</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26977</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26977</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26978</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26978</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26981</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26981</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26982</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26982</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26983</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26983</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26984</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26984</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26986</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26986</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26988</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26989</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26989</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26990</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26991</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26991</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26992</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26993</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26993</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26994</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26994</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26995</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26995</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26996</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26996</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26997</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26999</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27000</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27001</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27002</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27002</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27003</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27003</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27004</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27008</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27009</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27012</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27012</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27013</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27013</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27014</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27014</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27015</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27015</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27016</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27016</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27019</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27019</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27020</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27020</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27020</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27022</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27022</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27023</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27025</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27025</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27027</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27028</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27028</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27029</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27029</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27030</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27030</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27031</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27031</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27036</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27037</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27037</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27038</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27038</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27039</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27040</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27040</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27041</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27041</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27042</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27042</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27043</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27043</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27044</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27044</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27045</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27045</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27046</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27046</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27047</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27047</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27048</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27048</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27051</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27051</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27052</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27052</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27053</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27053</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27054</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27054</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27056</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27057</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27059</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27059</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27060</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27060</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27062</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27062</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27064</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27064</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27065</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27067</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27068</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27068</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27071</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27071</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27072</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27072</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27073</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27073</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27074</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27074</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27075</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27076</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27076</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27077</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27077</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27078</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27078</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27080</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27388</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27388</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27389</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27391</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27393</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27393</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27395</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27395</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27396</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27396</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27398</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27399</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27400</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27401</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27402</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27402</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27404</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27405</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27405</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27408</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27410</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27411</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27412</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27412</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27413</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27414</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27416</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27417</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27418</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27431</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27431</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27432</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27434</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27435</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27435</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27436</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27436</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-33619</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-34777</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35247</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35247</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35784</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35784</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35786</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35786</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35788</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35789</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35790</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35790</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35791</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35794</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35795</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35795</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35796</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35796</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35799</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35800</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35801</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35803</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35804</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35805</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35806</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35806</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35807</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35808</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35809</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35809</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35810</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35811</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35811</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35812</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35813</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35814</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35815</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35817</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35819</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35821</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35821</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35822</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35823</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35823</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35824</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35824</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35825</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35827</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35827</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35828</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35828</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35829</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35829</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35830</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35831</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35833</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35833</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35834</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35835</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35835</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35836</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35837</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35838</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35841</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35842</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35843</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35843</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35845</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35845</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35847</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35847</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35848</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35849</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35849</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35850</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35850</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35851</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35851</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35852</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35852</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35853</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35853</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35854</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35854</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35857</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35857</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35860</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35861</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35861</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35862</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35862</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35863</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35863</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35864</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35864</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35865</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35865</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35866</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35866</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35867</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35867</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35868</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35868</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35869</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35869</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35870</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35870</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35872</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35875</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35877</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35877</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35878</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35878</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35879</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35880</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35883</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35883</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35884</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35884</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35885</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35885</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35886</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35887</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35887</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35889</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35889</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35890</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35891</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35891</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35892</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35893</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35895</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35895</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35896</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35896</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35898</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35898</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35899</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35899</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35900</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35901</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35903</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35903</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35904</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35904</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35905</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35905</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35907</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35907</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35908</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35909</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35911</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35912</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35914</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35914</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35915</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35915</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35916</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35916</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35917</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35921</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35921</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35922</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35922</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35924</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35925</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35925</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35926</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35927</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35927</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35928</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35930</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35930</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35931</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35932</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35933</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35933</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35934</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35935</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35936</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35937</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35937</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35938</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35940</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35940</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35942</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35943</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35944</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35945</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35945</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35946</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35946</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35947</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35947</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35950</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35951</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35952</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35953</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35953</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35954</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35955</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35955</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35957</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35957</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35958</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35958</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35959</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35960</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35960</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35961</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35962</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35963</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35964</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35965</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35966</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35967</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35969</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35969</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35970</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35970</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35971</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35972</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35972</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35973</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35973</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35974</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35975</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35975</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35976</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35976</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35977</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35977</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35978</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35978</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35979</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35979</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35981</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35981</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35982</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35982</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35982</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35984</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35984</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35986</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35986</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35989</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35989</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35990</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35990</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35991</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35992</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35992</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35995</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35997</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35997</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35997</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35998</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35998</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35999</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-35999</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36002</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36003</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36003</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36004</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36005</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36006</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36007</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36007</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36008</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36008</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36009</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36010</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36011</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36011</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36011</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36012</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36012</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36013</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36013</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36014</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36014</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36015</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36016</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36016</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36017</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36018</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36019</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36020</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36021</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36024</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36025</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36026</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36029</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36030</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36030</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36032</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36032</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36281</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36281</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36477</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36477</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36478</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36478</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36479</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36479</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36880</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36882</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36882</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36885</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36887</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36889</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36890</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36891</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36891</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36893</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36893</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36894</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36894</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36895</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36896</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36896</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36897</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36897</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36898</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36899</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36899</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36900</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36901</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36901</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36902</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36902</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36903</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36903</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36904</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36906</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">0.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36909</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36910</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36910</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36911</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36912</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36912</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36913</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36913</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36914</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36915</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36916</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36916</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36917</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36918</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36919</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36921</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.0</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36921</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36922</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36923</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36923</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36924</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36924</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36926</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36926</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36928</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36928</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36930</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36930</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36931</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36931</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36934</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36935</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36935</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36936</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36937</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36938</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36938</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36940</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36940</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36941</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36941</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36941</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36942</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36942</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36944</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36944</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36945</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36946</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36947</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36947</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36949</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36950</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36950</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36951</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36952</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36955</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36955</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36957</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36959</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36959</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36960</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36960</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36962</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36962</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36964</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.2</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36965</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36965</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36967</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36967</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36969</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36969</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36971</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36971</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36971</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36972</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36972</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36973</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36973</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36974</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36975</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36977</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36977</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36978</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36978</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-37021</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-37021</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-37078</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-37353</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.9</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-37354</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38381</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38381</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38384</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38384</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38385</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38385</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38388</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38388</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38390</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38390</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38391</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38539</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38539</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38540</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38540</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38541</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38541</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38543</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38543</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38544</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38544</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38545</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38545</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38546</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38546</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38547</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38547</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38548</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38548</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38549</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38549</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38550</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38550</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38551</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38551</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38552</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38552</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38553</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38553</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38554</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38554</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38555</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38555</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38556</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38556</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38557</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38557</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38558</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38559</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38559</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38560</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38560</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38562</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38562</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38562</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38564</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38565</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38565</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38566</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38567</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38568</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38568</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38569</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38569</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38570</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38570</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38571</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38571</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38572</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38573</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38573</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38575</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38575</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38578</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38579</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38580</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38581</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38581</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38582</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38582</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38583</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38583</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38586</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38587</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38587</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38588</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38588</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38588</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38590</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38590</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38591</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38591</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38592</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38594</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38595</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38597</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38597</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38598</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38598</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38599</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38600</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38600</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38601</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38602</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38602</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38603</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38603</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38604</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38605</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38605</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38608</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38608</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38610</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38611</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38615</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38616</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38616</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.2</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38617</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38618</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38618</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38619</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38621</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38622</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38627</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38627</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38628</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38628</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38629</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38630</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38630</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38633</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38633</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38634</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38635</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38636</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38659</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38661</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38661</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38663</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38664</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38664</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38780</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38780</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39276</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39276</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39277</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39277</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39277</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39291</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39291</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39296</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39301</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39301</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39362</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39371</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39371</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39463</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39463</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39463</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39466</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39466</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39468</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39468</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39469</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39471</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39471</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39472</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39472</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39473</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39473</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39474</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39474</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39475</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39475</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39479</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39479</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39479</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39481</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39481</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39482</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">0.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39482</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39487</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39487</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39490</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39490</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39494</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39494</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39496</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39496</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39498</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39498</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39502</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39504</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39504</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39507</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-39507</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40901</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40906</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40906</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40908</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40919</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40919</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40923</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40925</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40928</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40928</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40931</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40931</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40935</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40937</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40940</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40947</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40947</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40948</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40953</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40960</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40960</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40961</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40961</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40966</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40970</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40970</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40972</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40972</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40975</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.1</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40979</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40998</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40999</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41006</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41006</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41011</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41011</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41013</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41014</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41017</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41090</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41091</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Linux Micro 6.0</li>
<li class="list-group-item">SUSE Linux Micro Extras 6.0</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 826 vulnerabilities, contains 11 features and has 148 fixes can now be installed.</p>
<h2>Description:</h2>
<p>The SUSE Linux Enterprise Micro 6.0 RT kernel was updated to receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).</li>
<li>CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).</li>
<li>CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).</li>
<li>CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910).</li>
<li>CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993).</li>
<li>CVE-2024-40925: block: fix request.queuelist usage in flush (bsc#1227789).</li>
<li>CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866).</li>
<li>CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).</li>
<li>CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).</li>
<li>CVE-2024-39496: btrfs: zoned: fix use-after-free due to race with dev replace (bsc#1227719).</li>
<li>CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).</li>
<li>CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).</li>
<li>CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).</li>
<li>CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).</li>
<li>CVE-2024-40975: platform/x86: x86-android-tablets: Unregister devices in reverse order (bsc#1227926).</li>
<li>CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).</li>
<li>CVE-2024-40947: ima: Avoid blocking in RCU read-side critical section (bsc#1227803).</li>
<li>CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783).</li>
<li>CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813).</li>
<li>CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797).</li>
<li>CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814).</li>
<li>CVE-2024-39504: netfilter: nft_inner: validate mandatory meta and payload (bsc#1227757).</li>
<li>CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862).</li>
<li>CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).</li>
<li>CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).</li>
<li>CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800).</li>
<li>CVE-2024-40928: net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool() (bsc#1227788).</li>
<li>CVE-2024-26944: btrfs: zoned: fix lock ordering in btrfs_zone_activate() (bsc#1223731).</li>
<li>CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).</li>
<li>CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780).</li>
<li>CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779).</li>
<li>CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)</li>
<li>CVE-2024-35908: tls: get psock ref after taking rxlock to avoid leak (bsc#1224490)</li>
<li>CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499)</li>
<li>CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)</li>
<li>CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)</li>
<li>CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).</li>
<li>CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432).</li>
<li>CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).</li>
<li>CVE-2024-27404: mptcp: fix data races on remote_id (bsc#1224422)</li>
<li>CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)</li>
<li>CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)</li>
<li>CVE-2024-40948: mm/page_table_check: fix crash on ZONE_DEVICE (bsc#1227801).</li>
<li>CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).</li>
<li>CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).</li>
<li>CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851).</li>
<li>CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750).</li>
<li>CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103).</li>
<li>CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763).</li>
<li>CVE-2024-27012: netfilter: nf_tables: restore set elements when delete set fails (bsc#1223804).</li>
<li>CVE-2024-39498: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 (bsc#1227723)</li>
<li>CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).</li>
<li>CVE-2024-27016: netfilter: flowtable: validate pppoe header (bsc#1223807).</li>
<li>CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)</li>
<li>CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)</li>
<li>CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)</li>
<li>CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604).</li>
<li>CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).</li>
<li>CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).</li>
<li>CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).</li>
<li>CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836).</li>
<li>CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).</li>
<li>CVE-2024-27064: netfilter: nf_tables: Fix a memory leak in nf_tables_updchain (bsc#1223740).</li>
<li>CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).</li>
<li>CVE-2023-47210: wifi: iwlwifi: bump FW API to 90 for BZ/SC devices (bsc#1225601, bsc#1225600).</li>
<li>CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088).</li>
<li>CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).</li>
<li>CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).</li>
<li>CVE-2024-26826: mptcp: fix data re-injection from stale subflow (bsc#1223010).</li>
<li>CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).</li>
<li>CVE-2024-35942: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain (bsc#1224589).</li>
<li>CVE-2024-26691: KVM: arm64: Fix circular locking dependency (bsc#1222463).</li>
<li>CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).</li>
<li>CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).</li>
<li>CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).</li>
<li>CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752).</li>
<li>CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753).</li>
<li>CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328).</li>
<li>CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).</li>
<li>CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489).</li>
<li>CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447).</li>
<li>CVE-2024-39474: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL (bsc#1227434).</li>
<li>CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).</li>
<li>CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).</li>
<li>CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).</li>
<li>CVE-2024-36003: ice: fix LAG and VF lock dependency in ice_reset_vf() (bsc#1224544).</li>
<li>CVE-2024-38604: block: refine the EOF check in blkdev_iomap_begin (bsc#1226866).</li>
<li>CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).</li>
<li>CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).</li>
<li>CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).</li>
<li>CVE-2024-26623: pds_core: Prevent race issues involving the adminq (bsc#1221057).</li>
<li>CVE-2024-26785: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (bsc#1222779).</li>
<li>CVE-2024-26734: devlink: fix possible use-after-free and memory leaks in devlink_init() (bsc#1222438).</li>
<li>CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).</li>
<li>CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990).</li>
<li>CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).</li>
<li>CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() (bsc#1226758).</li>
<li>CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).</li>
<li>CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).</li>
<li>CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).</li>
<li>CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775).</li>
<li>CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).</li>
<li>CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).</li>
<li>CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).</li>
<li>CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).</li>
<li>CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path (bsc#1224751).</li>
<li>CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066).</li>
<li>CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).</li>
<li>CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).</li>
<li>CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).</li>
<li>CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules (bsc#1226799).</li>
<li>CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).</li>
<li>CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841).</li>
<li>CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address (bsc#1226879).</li>
<li>CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).</li>
<li>CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).</li>
<li>CVE-2024-38566: bpf: Fix verifier assumptions about socket->sk (bsc#1226790).</li>
<li>CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).</li>
<li>CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).</li>
<li>CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).</li>
<li>CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).</li>
<li>CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).</li>
<li>CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842).</li>
<li>CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).</li>
<li>CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).</li>
<li>CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774).</li>
<li>CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781).</li>
<li>CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).</li>
<li>CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).</li>
<li>CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734).</li>
<li>CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group (bsc#1226772).</li>
<li>CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771).</li>
<li>CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810).</li>
<li>CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).</li>
<li>CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823).</li>
<li>CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).</li>
<li>CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).</li>
<li>CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (bsc#1224439).</li>
<li>CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497).</li>
<li>CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).</li>
<li>CVE-2024-36024: drm/amd/display: Disable idle reallow as part of command/gpint execution (bsc#1225702).</li>
<li>CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb() (bsc#1225741).</li>
<li>CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757).</li>
<li>CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).</li>
<li>CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).</li>
<li>CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).</li>
<li>CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).</li>
<li>CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498).</li>
<li>CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).</li>
<li>CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681).</li>
<li>CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order() (bsc#1225723).</li>
<li>CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).</li>
<li>CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726).</li>
<li>CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105).</li>
<li>CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).</li>
<li>CVE-2023-52786: ext4: fix racy may inline data check in dio write (bsc#1224939).</li>
<li>CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).</li>
<li>CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763).</li>
<li>CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834).</li>
<li>CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).</li>
<li>CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).</li>
<li>CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539).</li>
<li>CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018).</li>
<li>CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (bsc#1224515).</li>
<li>CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612).</li>
<li>CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520).</li>
<li>CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619).</li>
<li>CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475).</li>
<li>CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).</li>
<li>CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak (bsc#1224655).</li>
<li>CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).</li>
<li>CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).</li>
<li>CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540).</li>
<li>CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549).</li>
<li>CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).</li>
<li>CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762).</li>
<li>CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).</li>
<li>CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)</li>
<li>CVE-2024-36030: Fixed the double free in rvu_npc_freemem() (bsc#1225712)</li>
<li>CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)</li>
<li>CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011).</li>
<li>CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts() (bsc#1220148).</li>
<li>CVE-2024-26860: Fixed a memory leak when rechecking the data (bsc#1223077).</li>
<li>CVE-2023-52772: Fixed use-after-free in unix_stream_read_actor() (bsc#1224989).</li>
<li>CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718).</li>
<li>CVE-2024-35860: Struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531).</li>
<li>CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581).</li>
<li>CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).</li>
<li>CVE-2024-35895: Fixed lock inversion deadlock in map delete elem (bsc#1224511).</li>
<li>CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).</li>
<li>CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).</li>
<li>CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).</li>
<li>CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).</li>
<li>CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).</li>
<li>CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668).</li>
<li>CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).</li>
<li>CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).</li>
<li>CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).</li>
<li>CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).</li>
<li>CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679).</li>
<li>CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).</li>
<li>CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464).</li>
<li>CVE-2024-27036: Fixed writeback data corruption (bsc#1223810).</li>
<li>CVE-2024-35903: Fixed IP after emitting call depth accounting (bsc#1224493).</li>
<li>CVE-2024-35931: Fixed PCI error slot reset during RAS recovery (bsc#1224652).</li>
<li>CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).</li>
<li>CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap (bsc#1224523).</li>
<li>CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map fails (bsc#1224698).</li>
<li>CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).</li>
<li>CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502).</li>
<li>CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541).</li>
<li>CVE-2024-36007: Fixed warning during rehash (bsc#1224543).</li>
<li>CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530).</li>
<li>CVE-2023-52771: Fixed delete_endpoint() vs parent unregistration race (bsc#1225007).</li>
<li>CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (bsc#1224606).</li>
<li>CVE-2024-27408: Fixed race condition in dmaengine w-edma/eDMA (bsc#1224430).</li>
<li>CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649).</li>
<li>CVE-2024-35921: Fixed oops when HEVC init fails (bsc#1224477).</li>
<li>CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).</li>
<li>CVE-2024-35991: Fixed kABI workaround for struct idxd_evl (bsc#1224553).</li>
<li>CVE-2024-27418: Fixed memory leak in mctp_local_output (bsc#1224720)</li>
<li>CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr() (bsc#1224721)</li>
<li>CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).</li>
<li>CVE-2024-35917: Fixed Fix bpf_plt pointer arithmetic (bsc#1224481).</li>
<li>CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727).</li>
<li>CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608).</li>
<li>CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628).</li>
<li>CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).</li>
<li>CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).</li>
<li>CVE-2023-52659: Fixed to pfn_to_kaddr() not treated as a 64-bit type (bsc#1224442).</li>
<li>CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held (bsc#1224659).</li>
<li>CVE-2024-21823: Fixed safety flag to struct ends (bsc#1223625).</li>
<li>CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).</li>
<li>CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).</li>
<li>CVE-2023-52483: mctp: perform route lookups under a RCU read-side lock (bsc#1220738).</li>
<li>CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).</li>
<li>CVE-2024-26632: Fixed iterating over an empty bio with bio_for_each_folio_all (bsc#1221635).</li>
<li>CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).</li>
<li>CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).</li>
<li>CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).</li>
<li>CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829).</li>
<li>CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).</li>
<li>CVE-2023-6238: Fixed kcalloc() arguments order (bsc#1217384).</li>
<li>CVE-2024-26946: Fixed copy_from_kernel_nofault() to read from unsafe address (bsc#1223669).</li>
<li>CVE-2024-26945: Fixed nr_cpus < nr_iaa case (bsc#1223732).</li>
<li>CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385).</li>
<li>CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)</li>
<li>CVE-2023-52641: Fixed NULL ptr dereference checking at the end of attr_allocate_frame() (bsc#1222303)</li>
<li>CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).</li>
<li>CVE-2024-26865: rds: tcp: Fix use-after-free of net in reqsk_timer_handler() (bsc#1223062).</li>
<li>CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).</li>
<li>CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).</li>
<li>CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).</li>
<li>CVE-2024-26726: Fixed invalid drop extent_map for free space inode on write error (bsc#1222532)</li>
<li>CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).</li>
<li>CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).</li>
<li>CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).</li>
<li>CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).</li>
<li>CVE-2024-26991: Fixed overflow lpage_info when checking attributes (bsc#1223695).</li>
<li>CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).</li>
<li>CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).</li>
<li>CVE-2024-27022: Fixed linking file vma until vma is fully initialized (bsc#1223774).</li>
<li>CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).</li>
<li>CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).</li>
<li>CVE-2024-26899: Fixed deadlock between bd_link_disk_holder and partition scan (bsc#1223045).</li>
<li>CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).</li>
<li>CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).</li>
<li>CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).</li>
<li>CVE-2024-26638: Fixed uninitialize struct msghdr completely (bsc#1221649).</li>
<li>CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).</li>
<li>CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057).</li>
<li>CVE-2024-26909: Fixed drm bridge use-after-free (bsc#1223143).</li>
<li>CVE-2024-26674: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups (bsc#1222378).</li>
<li>CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).</li>
<li>CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624).</li>
<li>CVE-2024-26832: Fixed missing folio cleanup in writeback race path (bsc#1223007).</li>
<li>CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).</li>
<li>CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).</li>
<li>CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).</li>
<li>CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).</li>
<li>CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>9p: add missing locking around taking dentry fid list (git-fixes)</li>
<li>ACPI: CPPC: Fix access width used for PCC registers (git-fixes).</li>
<li>ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro (git-fixes).</li>
<li>ACPI: CPPC: Use access_width over bit_width for system memory accesses (stable-fixes).</li>
<li>ACPI: EC: Abort address space access upon error (stable-fixes).</li>
<li>ACPI: EC: Avoid returning AE_OK on errors in address space handler (stable-fixes).</li>
<li>ACPI: EC: Evaluate orphan _REG under EC device (git-fixes).</li>
<li>ACPI: EC: Install address space handler at the namespace root (stable-fixes).</li>
<li>ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).</li>
<li>ACPI: LPSS: Advertise number of chip selects via property (git-fixes).</li>
<li>ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).</li>
<li>ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).</li>
<li>ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-fixes).</li>
<li>ACPI: disable -Wstringop-truncation (git-fixes).</li>
<li>ACPI: processor_idle: Fix invalid comparison with insertion sort for latency (git-fixes).</li>
<li>ACPI: resource: Do IRQ override on TongFang GXxHRXx and GMxHGxx (stable-fixes).</li>
<li>ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (bsc#1217750).</li>
<li>ACPI: x86: Add PNP_UART1_SKIP quirk for Lenovo Blade2 tablets (stable-fixes).</li>
<li>ACPI: x86: Force StorageD3Enable on more products (stable-fixes).</li>
<li>ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." (git-fixes).</li>
<li>ALSA/hda: intel-dsp-config: Document AVS as dsp_driver option (git-fixes).</li>
<li>ALSA/hda: intel-dsp-config: reduce log verbosity (git-fixes).</li>
<li>ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes).</li>
<li>ALSA: PCM: Allow resume only for suspended streams (stable-fixes).</li>
<li>ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).</li>
<li>ALSA: core: Remove debugfs at disconnection (git-fixes).</li>
<li>ALSA: dmaengine: Synchronize dma channel after drop() (stable-fixes).</li>
<li>ALSA: dmaengine_pcm: terminate dmaengine before synchronize (stable-fixes).</li>
<li>ALSA: emux: improve patch ioctl data validation (stable-fixes).</li>
<li>ALSA: hda/conexant: Mute speakers at suspend / shutdown (bsc#1228269).</li>
<li>ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).</li>
<li>ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown (bsc#1228269).</li>
<li>ALSA: hda/realtek - Set GPIO3 to default at S4 state for Thinkpad with ALC1318 (stable-fixes).</li>
<li>ALSA: hda/realtek - fixed headset Mic not show (stable-fixes).</li>
<li>ALSA: hda/realtek: Add more codec ID to no shutup pins list (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14AHP9 (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ARP8 (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for HP Omen models using CS35L41 (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for ASUS Zenbook 2024 HN7306W (stable-fixes).</li>
<li>ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes).</li>
<li>ALSA: hda/realtek: Drop doubly quirk entry for 103c:8a2e (git-fixes).</li>
<li>ALSA: hda/realtek: Enable Mute LED on HP 250 G7 (stable-fixes).</li>
<li>ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897 (stable-fixes).</li>
<li>ALSA: hda/realtek: Enable headset mic on IdeaPad 330-17IKB 81DM (git-fixes).</li>
<li>ALSA: hda/realtek: Enable headset mic on Positivo SU C1400 (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix build error without CONFIG_PM (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix conflicting PCI SSID 17aa:386f for Lenovo Legion models (bsc#1223462).</li>
<li>ALSA: hda/realtek: Fix conflicting quirk for PCI SSID 17aa:3820 (git-fixes).</li>
<li>ALSA: hda/realtek: Fix internal speakers for Legion Y9000X 2022 IAH7 (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (stable-fixes).</li>
<li>ALSA: hda/realtek: Limit mic boost on N14AP7 (stable-fixes).</li>
<li>ALSA: hda/realtek: Limit mic boost on VAIO PRO PX (stable-fixes).</li>
<li>ALSA: hda/realtek: Remove Framework Laptop 16 from quirks (git-fixes).</li>
<li>ALSA: hda/realtek: Support Lenovo Thinkbook 13x Gen 4 (stable-fixes).</li>
<li>ALSA: hda/realtek: Support Lenovo Thinkbook 16P Gen 5 (stable-fixes).</li>
<li>ALSA: hda/realtek: add quirk for Clevo V5[46]0TU (stable-fixes).</li>
<li>ALSA: hda/realtek: cs35l41: Fixup remaining asus strix models (git-fixes).</li>
<li>ALSA: hda/realtek: fix mute/micmute LEDs do not work for EliteBook 645/665 G11 (stable-fixes).</li>
<li>ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes).</li>
<li>ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 445/465 G11 (stable-fixes).</li>
<li>ALSA: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx (stable-fixes).</li>
<li>ALSA: hda/tas2781: Add new quirk for Lenovo Hera2 Laptop (stable-fixes).</li>
<li>ALSA: hda: Add Intel BMG PCI ID and HDMI codec vid (stable-fixes).</li>
<li>ALSA: hda: clarify Copyright information (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Add support for ASUS ROG 2024 Laptops (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Component should be unbound before deconstruction (git-fixes).</li>
<li>ALSA: hda: cs35l41: Fix swapped l/r audio channels for Lenovo ThinBook 13x Gen4 (git-fixes).</li>
<li>ALSA: hda: cs35l41: Ignore errors when configuring IRQs (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Possible null pointer dereference in cs35l41_hda_unbind() (git-fixes).</li>
<li>ALSA: hda: cs35l41: Remove Speaker ID for Lenovo Legion slim 7 16ARHA7 (git-fixes).</li>
<li>ALSA: hda: cs35l41: Remove redundant argument to cs35l41_request_firmware_file() (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Set the max PCM Gain using tuning setting (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Support HP Omen models without _DSD (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Support Lenovo 13X laptop without _DSD (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Support Lenovo Thinkbook 13x Gen 4 (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Support Lenovo Thinkbook 16P Gen 5 (stable-fixes).</li>
<li>ALSA: hda: cs35l41: Update DSP1RX5/6 Sources for DSP config (stable-fixes).</li>
<li>ALSA: hda: cs35l56: Component should be unbound before deconstruction (git-fixes).</li>
<li>ALSA: hda: cs35l56: Exit cache-only after cs35l56_wait_for_firmware_boot() (stable-fixes).</li>
<li>ALSA: hda: cs35l56: Fix lifecycle of codec pointer (stable-fixes).</li>
<li>ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (git-fixes).</li>
<li>ALSA: hda: hda_cs_dsp_ctl: Remove notification of driver write (stable-fixes).</li>
<li>ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes).</li>
<li>ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).</li>
<li>ALSA: hda: tas2781: Component should be unbound before deconstruction (git-fixes).</li>
<li>ALSA: line6: Zero-initialize message buffers (stable-fixes).</li>
<li>ALSA: pcm_dmaengine: Do not synchronize DMA channel when DMA is paused (git-fixes).</li>
<li>ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).</li>
<li>ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).</li>
<li>ALSA: scarlett2: Add correct product series name to messages (stable-fixes).</li>
<li>ALSA: scarlett2: Add missing error check to scarlett2_config_save() (git-fixes).</li>
<li>ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).</li>
<li>ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).</li>
<li>ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).</li>
<li>ALSA: seq: Do not clear bank selection at event -> UMP MIDI2 conversion (git-fixes).</li>
<li>ALSA: seq: Fix incorrect UMP type for system messages (git-fixes).</li>
<li>ALSA: seq: Fix missing MSB in MIDI2 SPP conversion (git-fixes).</li>
<li>ALSA: seq: Fix missing bank setup between MIDI1/MIDI2 UMP conversion (git-fixes).</li>
<li>ALSA: seq: Fix missing channel at encoding RPN/NRPN MIDI2 messages (git-fixes).</li>
<li>ALSA: seq: Fix yet another spot for system message conversion (git-fixes).</li>
<li>ALSA: seq: ump: Fix missing System Reset message handling (git-fixes).</li>
<li>ALSA: seq: ump: Fix swapped song position pointer data (git-fixes).</li>
<li>ALSA: seq: ump: Skip useless ports for static blocks (git-fixes).</li>
<li>ALSA: timer: Set lower bound of start tick time (stable-fixes).</li>
<li>ALSA: ump: Do not accept an invalid UMP protocol number (git-fixes).</li>
<li>ALSA: ump: Do not clear bank selection after sending a program change (git-fixes).</li>
<li>ALSA: ump: Do not update FB name for static blocks (git-fixes).</li>
<li>ALSA: ump: Force 1 Group for MIDI1 FBs (git-fixes).</li>
<li>ALSA: ump: Set default protocol when not given explicitly (git-fixes).</li>
<li>ALSA: usb-audio: Add a quirk for Sonix HD USB Camera (stable-fixes).</li>
<li>ALSA: usb-audio: Add sampling rates support for Mbox3 (stable-fixes).</li>
<li>ALSA: usb-audio: Fix for sampling rates support for Mbox3 (stable-fixes).</li>
<li>ALSA: usb-audio: Fix microphone sound on HD webcam (stable-fixes).</li>
<li>ALSA: usb-audio: Move HD Webcam quirk to the right place (git-fixes).</li>
<li>ARM: 9381/1: kasan: clear stale stack poison (git-fixes).</li>
<li>ARM: OMAP2+: fix N810 MMC gpiod table (git-fixes).</li>
<li>ARM: OMAP2+: fix USB regression on Nokia N8x0 (git-fixes).</li>
<li>ARM: imx: Check return value of devm_kasprintf in imx_mmdc_perf_init (git-fixes).</li>
<li>ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE (git-fixes).</li>
<li>ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 (stable-fixes).</li>
<li>ARM: s5pv210: fix pm.c kernel-doc warning (git-fixes).</li>
<li>ASoC: Intel: Disable route checks for Skylake boards (git-fixes).</li>
<li>ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).</li>
<li>ASoC: Intel: avs: Fix potential integer overflow (git-fixes).</li>
<li>ASoC: Intel: avs: Set name of control as in topology (git-fixes).</li>
<li>ASoC: Intel: avs: Test result of avs_get_module_entry() (git-fixes).</li>
<li>ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).</li>
<li>ASoC: Intel: bytcr_rt5640: Apply Asus T100TA quirk to Asus T100TAM too (git-fixes).</li>
<li>ASoC: Intel: common: add ACPI matching tables for Arrow Lake (stable-fixes).</li>
<li>ASoC: Intel: sof-sdw: really remove FOUR_SPEAKER quirk (git-fixes).</li>
<li>ASoC: Intel: sof_sdw: add JD2 quirk for HP Omen 14 (stable-fixes).</li>
<li>ASoC: Intel: sof_sdw: add quirk for Dell SKU 0C0F (stable-fixes).</li>
<li>ASoC: Intel: use soc_intel_is_byt_cr() only when IOSF_MBI is reachable (git-fixes).</li>
<li>ASoC: SOF: Intel: add default firmware library path for LNL (git-fixes).</li>
<li>ASoC: SOF: Intel: hda-dsp: Skip IMR boot on ACE platforms in case of S3 suspend (stable-fixes).</li>
<li>ASoC: SOF: Intel: hda-pcm: Limit the maximum number of periods by MAX_BDL_ENTRIES (stable-fixes).</li>
<li>ASoC: SOF: Intel: hda: fix null deref on system suspend entry (git-fixes).</li>
<li>ASoC: SOF: Intel: lnl: Correct rom_status_reg (git-fixes).</li>
<li>ASoC: SOF: Intel: mtl: Correct rom_status_reg (git-fixes).</li>
<li>ASoC: SOF: Intel: mtl: Disable interrupts when firmware boot failed (git-fixes).</li>
<li>ASoC: SOF: Intel: mtl: Implement firmware boot state check (git-fixes).</li>
<li>ASoC: SOF: Intel: mtl: call dsp dump when boot retry fails (stable-fixes).</li>
<li>ASoC: SOF: imx8m: Fix DSP control regmap retrieval (git-fixes).</li>
<li>ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (git-fixes).</li>
<li>ASoC: SOF: ipc4-topology: Preserve the DMA Link ID for ChainDMA on unprepare (git-fixes).</li>
<li>ASoC: SOF: ipc4-topology: Use correct queue_id for requesting input pin format (stable-fixes).</li>
<li>ASoC: SOF: pcm: Restrict DSP D0i3 during S0ix to IPC3 (stable-fixes).</li>
<li>ASoC: SOF: sof-audio: Skip unprepare for in-use widgets on error rollback (stable-fixes).</li>
<li>ASoC: TAS2781: Fix tasdev_load_calibrated_data() (git-fixes).</li>
<li>ASoC: acp: Support microphone from device Acer 315-24p (git-fixes).</li>
<li>ASoC: amd: Adjust error handling in case of absent codec device (git-fixes).</li>
<li>ASoC: amd: acp: add a null check for chip_pdev structure (git-fixes).</li>
<li>ASoC: amd: acp: remove i2s configuration check in acp_i2s_probe() (git-fixes).</li>
<li>ASoC: amd: yc: Fix non-functional mic on ASUS M5602RA (stable-fixes).</li>
<li>ASoC: amd: yc: Support mic on Lenovo Thinkpad E16 Gen 2 (bsc#1228269).</li>
<li>ASoC: codecs: wsa881x: set clk_stop_mode1 flag (git-fixes).</li>
<li>ASoC: cs35l41: Update DSP1RX5/6 Sources for DSP config (git-fixes).</li>
<li>ASoC: cs35l56: Accept values greater than 0 as IRQ numbers (git-fixes).</li>
<li>ASoC: cs35l56: Fix unintended bus access while resetting amp (git-fixes).</li>
<li>ASoC: cs35l56: Prevent overwriting firmware ASP config (git-fixes).</li>
<li>ASoC: da7219-aad: fix usage of device_get_named_child_node() (git-fixes).</li>
<li>ASoC: fsl-asoc-card: set priv->pdev before using it (git-fixes).</li>
<li>ASoC: fsl: fsl_qmc_audio: Check devm_kasprintf() returned value (git-fixes).</li>
<li>ASoC: kirkwood: Fix potential NULL dereference (git-fixes).</li>
<li>ASoC: max98088: Check for clk_prepare_enable() error (git-fixes).</li>
<li>ASoC: mediatek: Assign dummy when codec not specified for a DAI link (git-fixes).</li>
<li>ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).</li>
<li>ASoC: meson: axg-card: make links nonatomic (git-fixes).</li>
<li>ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).</li>
<li>ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).</li>
<li>ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).</li>
<li>ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).</li>
<li>ASoC: q6apm-lpass-dai: close graph on prepare errors (git-fixes).</li>
<li>ASoC: qcom: Adjust issues in case of DT error in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).</li>
<li>ASoC: rockchip: i2s-tdm: Fix trcm mode by setting clock on right mclk (git-fixes).</li>
<li>ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (git-fixes).</li>
<li>ASoC: rt711-sdw: add missing readable registers (stable-fixes).</li>
<li>ASoC: rt715-sdca: volume step modification (git-fixes).</li>
<li>ASoC: rt715: add vendor clear control register (git-fixes).</li>
<li>ASoC: rt722-sdca-sdw: add debounce time for type detection (stable-fixes).</li>
<li>ASoC: rt722-sdca-sdw: add silence detection register as volatile (stable-fixes).</li>
<li>ASoC: rt722-sdca: add headset microphone vrefo setting (git-fixes).</li>
<li>ASoC: rt722-sdca: modify channel number to support 4 channels (git-fixes).</li>
<li>ASoC: sof: amd: fix for firmware reload failure in Vangogh platform (git-fixes).</li>
<li>ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).</li>
<li>ASoC: tas2781: Fix a warning reported by robot kernel test (git-fixes).</li>
<li>ASoC: tas2781: Fix wrong loading calibrated data sequence (git-fixes).</li>
<li>ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).</li>
<li>ASoC: ti: Convert Pandora ASoC to GPIO descriptors (stable-fixes).</li>
<li>ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).</li>
<li>ASoC: ti: davinci-mcasp: Set min period size using FIFO config (stable-fixes).</li>
<li>ASoC: ti: omap-hdmi: Fix too long driver name (stable-fixes).</li>
<li>ASoC: topology: Do not assign fields that are already set (stable-fixes).</li>
<li>ASoC: topology: Fix references to freed memory (stable-fixes).</li>
<li>ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).</li>
<li>ASoC: wm_adsp: Add missing MODULE_DESCRIPTION() (git-fixes).</li>
<li>ASoc: tas2781: Enable RCA-based playback without DSP firmware download (git-fixes).</li>
<li>Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).</li>
<li>Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).</li>
<li>Bluetooth: HCI: Fix potential null-ptr-deref (git-fixes).</li>
<li>Bluetooth: ISO: Check socket flag instead of hcon (git-fixes).</li>
<li>Bluetooth: ISO: Fix BIS cleanup (stable-fixes).</li>
<li>Bluetooth: Ignore too large handle values in BIG (git-fixes).</li>
<li>Bluetooth: L2CAP: Fix rejecting L2CAP_CONN_PARAM_UPDATE_REQ (git-fixes).</li>
<li>Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() (git-fixes).</li>
<li>Bluetooth: Remove usage of the deprecated ida_simple_xx() API (stable-fixes).</li>
<li>Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl (stable-fixes).</li>
<li>Bluetooth: btintel: Refactor btintel_set_ppag() (git-fixes).</li>
<li>Bluetooth: btnxpuart: Add handling for boot-signature timeout errors (git-fixes).</li>
<li>Bluetooth: btnxpuart: Enable Power Save feature on startup (stable-fixes).</li>
<li>Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).</li>
<li>Bluetooth: btusb: Fix triggering coredump implementation for QCA (git-fixes).</li>
<li>Bluetooth: hci_bcm4377: Fix msgid release (git-fixes).</li>
<li>Bluetooth: hci_bcm4377: Use correct unit for timeouts (git-fixes).</li>
<li>Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (stable-fixes).</li>
<li>Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).</li>
<li>Bluetooth: hci_event: Fix setting of unicast qos interval (git-fixes).</li>
<li>Bluetooth: hci_event: Remove code to removed CONFIG_BT_HS (stable-fixes).</li>
<li>Bluetooth: hci_event: Set QoS encryption from BIGInfo report (git-fixes).</li>
<li>Bluetooth: hci_sync: Using hci_cmd_sync_submit when removing Adv Monitor (bsc#1219216).</li>
<li>Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).</li>
<li>Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).</li>
<li>Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot (git-fixes).</li>
<li>Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).</li>
<li>Bluetooth: qca: add missing firmware sanity checks (git-fixes).</li>
<li>Bluetooth: qca: fix NULL-deref on non-serdev setup (git-fixes).</li>
<li>Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).</li>
<li>Bluetooth: qca: fix NVM configuration parsing (git-fixes).</li>
<li>Bluetooth: qca: fix firmware check error path (git-fixes).</li>
<li>Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).</li>
<li>Bluetooth: qca: set power_ctrl_enabled on NULL returned by gpiod_get_optional() (git-fixes).</li>
<li>EDAC/synopsys: Fix ECC status and IRQ control race condition (git-fixes).</li>
<li>Enable CONFIG_FIPS_SIGNATURE_SELFTEST (bsc#1222771)</li>
<li>Enable CONFIG_SCHED_CLUSTER=y on arm64 (jsc#PED-8701).</li>
<li>Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_ECDSA.</li>
<li>Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_RSA.</li>
<li>Fix a potential infinite loop in extract_user_to_sg() (git-fixes).</li>
<li>Fix build errors due to new UIO_MEM_DMA_COHERENT mess (git-fixes).</li>
<li>Fix missing CONFIG_SUSE_SUPPORTED for arm64/64kb flavor (bsc#1223357)</li>
<li>HID: Add quirk for Logitech Casa touchpad (stable-fixes).</li>
<li>HID: Ignore battery for ELAN touchscreens 2F2C and 4116 (stable-fixes).</li>
<li>HID: amd_sfh: Handle "no sensors" in PM operations (git-fixes).</li>
<li>HID: core: remove unnecessary WARN_ON() in implement() (git-fixes).</li>
<li>HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up (git-fixes).</li>
<li>HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).</li>
<li>HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes).</li>
<li>HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() (git-fixes).</li>
<li>HID: logitech-dj: allow mice to use all types of reports (git-fixes).</li>
<li>HID: mcp-2221: cancel delayed_work only when CONFIG_IIO is enabled (stable-fixes).</li>
<li>HID: wacom: Modify pen IDs (git-fixes).</li>
<li>IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)</li>
<li>Input: ads7846 - use spi_device_id table (stable-fixes).</li>
<li>Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).</li>
<li>Input: elan_i2c - do not leave interrupt disabled on suspend failure (git-fixes).</li>
<li>Input: elantech - fix touchpad state on resume for Lenovo N24 (stable-fixes).</li>
<li>Input: ff-core - prefer struct_size over open coded arithmetic (stable-fixes).</li>
<li>Input: i8042 - add Ayaneo Kun to i8042 quirk table (stable-fixes).</li>
<li>Input: ili210x - fix ili251x_read_touch_data() return value (git-fixes).</li>
<li>Input: ims-pcu - fix printf string overflow (git-fixes).</li>
<li>Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).</li>
<li>Input: qt1050 - handle CHIP_ID reading error (git-fixes).</li>
<li>Input: silead - Always support 10 fingers (stable-fixes).</li>
<li>Input: xpad - add support for ASUS ROG RAIKIRI (git-fixes).</li>
<li>Input: xpad - add support for ASUS ROG RAIKIRI PRO (stable-fixes).</li>
<li>KEYS: trusted: Do not use WARN when encode fails (git-fixes).</li>
<li>KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).</li>
<li>KVM: SEV-ES: Delegate LBR virtualization to the processor (git-fixes).</li>
<li>KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent (git-fixes).</li>
<li>KVM: SVM: Add support for allowing zero SEV ASIDs (git-fixes).</li>
<li>KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (git-fixes).</li>
<li>KVM: SVM: Use unsigned integers when dealing with ASIDs (git-fixes).</li>
<li>KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (git-fixes).</li>
<li>KVM: VMX: Disable LBR virtualization if the CPU does not support LBR callstacks (git-fixes).</li>
<li>KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes).</li>
<li>KVM: arm64: Use local TLBI on permission relaxation (bsc#1219478).</li>
<li>KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git-fixes).</li>
<li>KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224790).</li>
<li>KVM: x86/mmu: Do not force emulation of L2 accesses to non-APIC internal slots (git-fixes).</li>
<li>KVM: x86/mmu: Move private vs. shared check above slot validity checks (git-fixes).</li>
<li>KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU (git-fixes).</li>
<li>KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (git-fixes).</li>
<li>KVM: x86/pmu: Allow programming events that match unsupported arch events (git-fixes).</li>
<li>KVM: x86/pmu: Always treat Fixed counters as available when supported (git-fixes).</li>
<li>KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs (git-fixes).</li>
<li>KVM: x86/pmu: Disable support for adaptive PEBS (git-fixes).</li>
<li>KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs (git-fixes).</li>
<li>KVM: x86/pmu: Do not ignore bits 31:30 for RDPMC index on AMD (git-fixes).</li>
<li>KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms (git-fixes).</li>
<li>KVM: x86/pmu: Explicitly check NMI from guest to reducee false positives (git-fixes).</li>
<li>KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (bsc#1226158).</li>
<li>KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (git-fixes).</li>
<li>KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET" (git-fixes).</li>
<li>KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled (git-fixes).</li>
<li>KVM: x86/xen: fix recursive deadlock in timer injection (git-fixes).</li>
<li>KVM: x86/xen: improve accuracy of Xen timers (git-fixes).</li>
<li>KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled (git-fixes).</li>
<li>KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery (git-fixes).</li>
<li>KVM: x86: Allow, do not ignore, same-value writes to immutable MSRs (git-fixes).</li>
<li>KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes (git-fixes).</li>
<li>KVM: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID (git-fixes).</li>
<li>KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes).</li>
<li>KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (git-fixes).</li>
<li>KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper (git-fixes).</li>
<li>KVM: x86: Mark target gfn of emulated atomic instruction as dirty (git-fixes).</li>
<li>KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled (git-fixes).</li>
<li>KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible (git-fixes).</li>
<li>KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP (git-fixes).</li>
<li>KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT (git-fixes).</li>
<li>NFC: trf7970a: disable all regulators on removal (git-fixes).</li>
<li>NFS: Fix READ_PLUS when server does not support OP_READ_PLUS (git-fixes).</li>
<li>NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847).</li>
<li>NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).</li>
<li>NFS: add barriers when testing for NFS_FSDATA_BLOCKED (git-fixes).</li>
<li>NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).</li>
<li>NFSD: Fix checksum mismatches in the duplicate reply cache (git-fixes).</li>
<li>NFSv4.1 enforce rootpath check in fs_location query (git-fixes).</li>
<li>NFSv4.x: by default serialize open/close operations (bsc#1223863 bsc#1227362).</li>
<li>NFSv4: Fixup smatch warning for ambiguous return (git-fixes).</li>
<li>Octeontx2-af: fix pause frame configuration in GMP mode (git-fixes).</li>
<li>PCI/ASPM: Update save_state when configuration changes (bsc#1226915)</li>
<li>PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal (git-fixes).</li>
<li>PCI/DPC: Use FIELD_GET() (stable-fixes).</li>
<li>PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).</li>
<li>PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).</li>
<li>PCI/MSI: Fix UAF in msi_capability_init (git-fixes).</li>
<li>PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (stable-fixes).</li>
<li>PCI: Clear Secondary Status errors after enumeration (bsc#1226928)</li>
<li>PCI: Delay after FLR of Solidigm P44 Pro NVMe (stable-fixes).</li>
<li>PCI: Do not wait for disconnected devices when resuming (git-fixes).</li>
<li>PCI: Execute quirk_enable_clear_retrain_link() earlier (stable-fixes).</li>
<li>PCI: Extend ACS configurability (bsc#1228090).</li>
<li>PCI: Fix resource double counting on remove & rescan (git-fixes).</li>
<li>PCI: Fix typos in docs and comments (stable-fixes).</li>
<li>PCI: Introduce cleanup helpers for device reference counts and locks (stable-fixes).</li>
<li>PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word() (stable-fixes).</li>
<li>PCI: dw-rockchip: Fix initial PERST# GPIO value (git-fixes).</li>
<li>PCI: dwc: Fix index 0 incorrectly being interpreted as a free ATU slot (git-fixes).</li>
<li>PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).</li>
<li>PCI: endpoint: Clean up error handling in vpci_scan_bus() (git-fixes).</li>
<li>PCI: endpoint: Fix error handling in epf_ntb_epc_cleanup() (git-fixes).</li>
<li>PCI: endpoint: pci-epf-test: Make use of cached 'epc_features' in pci_epf_test_core_init() (git-fixes).</li>
<li>PCI: keystone: Do not enable BAR 0 for AM654x (git-fixes).</li>
<li>PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs() (git-fixes).</li>
<li>PCI: keystone: Relocate ks_pcie_set/clear_dbi_mode() (git-fixes).</li>
<li>PCI: qcom-ep: Disable resources unconditionally during PERST# assert (git-fixes).</li>
<li>PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup() (git-fixes).</li>
<li>PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).</li>
<li>PCI: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio (git-fixes).</li>
<li>PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).</li>
<li>PCI: switchtec: Add support for PCIe Gen5 devices (stable-fixes).</li>
<li>PCI: switchtec: Use normal comment style (stable-fixes).</li>
<li>PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).</li>
<li>PCI: tegra194: Set EP alignment restriction for inbound ATU (git-fixes).</li>
<li>PCI: vmd: Create domain symlink before pci_bus_add_devices() (bsc#1227363).</li>
<li>PM / devfreq: Synchronize devfreq_monitor_[start/stop] (stable-fixes).</li>
<li>Port "certs: Add ECDSA signature verification self-test".</li>
<li>Port "certs: Move RSA self-test data to separate file".</li>
<li>RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300).</li>
<li>RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300).</li>
<li>RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)</li>
<li>RDMA/bnxt_re: Fix the max msix vectors macro (git-fixes)</li>
<li>RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes)</li>
<li>RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw (git-fixes)</li>
<li>RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)</li>
<li>RDMA/hns: Fix GMV table pagesize (git-fixes)</li>
<li>RDMA/hns: Fix UAF for cq async event (git-fixes)</li>
<li>RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)</li>
<li>RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)</li>
<li>RDMA/hns: Modify the print level of CQE error (git-fixes)</li>
<li>RDMA/hns: Use complete parentheses in macros (git-fixes)</li>
<li>RDMA/mana_ib: Ignore optional access flags for MRs (git-fixes).</li>
<li>RDMA/mlx5: Add check for srq max_sge attribute (git-fixes)</li>
<li>RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)</li>
<li>RDMA/mlx5: Change check for cacheable mkeys (git-fixes)</li>
<li>RDMA/mlx5: Ensure created mkeys always have a populated rb_key (git-fixes)</li>
<li>RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)</li>
<li>RDMA/mlx5: Fix unwind flow as part of mlx5_ib_stage_init_init (git-fixes)</li>
<li>RDMA/mlx5: Follow rb_key.ats when creating new mkeys (git-fixes)</li>
<li>RDMA/mlx5: Remove extra unlock on error path (git-fixes)</li>
<li>RDMA/mlx5: Uncacheable mkey has neither rb_key or cache_ent (git-fixes)</li>
<li>RDMA/restrack: Fix potential invalid address access (git-fixes)</li>
<li>RDMA/rxe: Allow good work requests to be executed (git-fixes)</li>
<li>RDMA/rxe: Fix data copy for IB_SEND_INLINE (git-fixes)</li>
<li>RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)</li>
<li>RDMA/rxe: Fix responder length checking for UD request packets (git-fixes)</li>
<li>RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)</li>
<li>RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes)</li>
<li>SEV: disable SEV-ES DebugSwap by default (git-fixes).</li>
<li>SUNRPC: Fix gss_free_in_token_pages() (git-fixes).</li>
<li>SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-fixes).</li>
<li>SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272).</li>
<li>SUNRPC: return proper error from gss_wrap_req_priv (git-fixes).</li>
<li>USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k (stable-fixes).</li>
<li>USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).</li>
<li>USB: core: Fix access violation during port device removal (git-fixes).</li>
<li>USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor (git-fixes).</li>
<li>USB: serial: mos7840: fix crash on resume (git-fixes).</li>
<li>USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).</li>
<li>USB: serial: option: add Fibocom FM350-GL (stable-fixes).</li>
<li>USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).</li>
<li>USB: serial: option: add Netprisma LCUK54 series modules (stable-fixes).</li>
<li>USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).</li>
<li>USB: serial: option: add Rolling RW350-GL variants (stable-fixes).</li>
<li>USB: serial: option: add Telit FN912 rmnet compositions (stable-fixes).</li>
<li>USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).</li>
<li>USB: serial: option: add Telit generic core-dump composition (stable-fixes).</li>
<li>USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).</li>
<li>USB: serial: option: add support for Foxconn T99W651 (stable-fixes).</li>
<li>USB: serial: option: support Quectel EM060K sub-models (stable-fixes).</li>
<li>USB: xen-hcd: Traverse host/ when CONFIG_USB_XEN_HCD is selected (git-fixes).</li>
<li>VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).</li>
<li>VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).</li>
<li>X.509: Fix the parser of extended key usage for length (bsc#1218820).</li>
<li>admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).</li>
<li>amd/amdkfd: sync all devices to wait all processes being evicted (stable-fixes).</li>
<li>aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts</li>
<li>arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H (git-fixes).</li>
<li>arm64/io: Provide a WC friendly __iowriteXX_copy() (bsc#1226502)</li>
<li>arm64/io: add constant-argument check (bsc#1226502 git-fixes)</li>
<li>arm64: Add the arm64.no32bit_el0 command line option (jsc#PED-3184).</li>
<li>arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes).</li>
<li>arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes)</li>
<li>arm64: dts: allwinner: h616: Fix I2C0 pins (git-fixes)</li>
<li>arm64: dts: freescale: imx8mm-verdin: enable hysteresis on slow input (git-fixes)</li>
<li>arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)</li>
<li>arm64: dts: imx8-ss-conn: fix usb lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)</li>
<li>arm64: dts: imx8-ss-dma: fix adc lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-dma: fix can lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-dma: fix spi lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8-ss-lsio: fix pwm lpcg indices (git-fixes)</li>
<li>arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc (git-fixes)</li>
<li>arm64: dts: imx8qm-ss-dma: fix can lpcg indices (git-fixes)</li>
<li>arm64: dts: imx93-11x11-evk: Remove the 'no-sdio' property (git-fixes)</li>
<li>arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)</li>
<li>arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-fixes)</li>
<li>arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-fixes)</li>
<li>arm64: dts: rockchip: Add mdio and ethernet-phy nodes to (git-fixes)</li>
<li>arm64: dts: rockchip: Add missing power-domains for rk356x vop_mmu (git-fixes)</li>
<li>arm64: dts: rockchip: Add pinctrl for UART0 to rk3308-rock-pi-s (git-fixes)</li>
<li>arm64: dts: rockchip: Add sdmmc related properties on (git-fixes)</li>
<li>arm64: dts: rockchip: Add sound-dai-cells for RK3368 (git-fixes)</li>
<li>arm64: dts: rockchip: Drop invalid mic-in-differential on (git-fixes)</li>
<li>arm64: dts: rockchip: Fix SD NAND and eMMC init on rk3308-rock-pi-s (git-fixes)</li>
<li>arm64: dts: rockchip: Fix mic-in-differential usage on (git-fixes)</li>
<li>arm64: dts: rockchip: Fix mic-in-differential usage on rk3566-roc-pc (git-fixes)</li>
<li>arm64: dts: rockchip: Fix the DCDC_REG2 minimum voltage on Quartz64 (git-fixes)</li>
<li>arm64: dts: rockchip: Fix the value of <code>dlg,jack-det-rate</code> mismatch (git-fixes)</li>
<li>arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)</li>
<li>arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)</li>
<li>arm64: dts: rockchip: Rename LED related pinctrl nodes on (git-fixes)</li>
<li>arm64: dts: rockchip: Update WIFi/BT related nodes on (git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)</li>
<li>arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E (git-fixes)</li>
<li>arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)</li>
<li>arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)</li>
<li>arm64: dts: rockchip: regulator for sd needs to be always on for (git-fixes)</li>
<li>arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f (git-fixes)</li>
<li>arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).</li>
<li>arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8688).</li>
<li>arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8688).</li>
<li>arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8688).</li>
<li>arm64: tegra: Correct Tegra132 I2C alias (git-fixes)</li>
<li>asm-generic: make sparse happy with odd-sized put_unaligned_*() (stable-fixes).</li>
<li>ata,scsi: libata-core: Do not leak memory for ata_port struct members (git-fixes).</li>
<li>ata: ahci: Clean up sysfs file on error (git-fixes).</li>
<li>ata: libata-core: Fix double free on error (git-fixes).</li>
<li>ata: libata-core: Fix null pointer dereference on error (git-fixes).</li>
<li>ata: libata-scsi: Fix offsets for the fixed format sense data (git-fixes).</li>
<li>ata: pata_legacy: make legacy_exit() work again (git-fixes).</li>
<li>ata: sata_gemini: Check clk_enable() result (stable-fixes).</li>
<li>autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).</li>
<li>auxdisplay: ht16k33: Drop reference after LED registration (git-fixes).</li>
<li>ax25: Fix netdev refcount issue (git-fixes).</li>
<li>ax25: Fix refcount imbalance on inbound connections (git-fixes).</li>
<li>ax25: Fix reference count leak issue of net_device (git-fixes).</li>
<li>ax25: Fix reference count leak issues of ax25_dev (git-fixes).</li>
<li>batman-adv: Do not accept TT entries for out-of-spec VIDs (git-fixes).</li>
<li>batman-adv: bypass empty buckets in batadv_purge_orig_ref() (stable-fixes).</li>
<li>bitops: add missing prototype check (git-fixes).</li>
<li>blk-cgroup: fix list corruption from reorder of WRITE ->lqueued (bsc#1225605).</li>
<li>blk-cgroup: fix list corruption from resetting io stat (bsc#1225605).</li>
<li>block: Move checking GENHD_FL_NO_PART to bdev_add_partition() (bsc#1226213).</li>
<li>block: fix q->blkg_list corruption during disk rebind (bsc#1223591).</li>
<li>bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX (git-fixes).</li>
<li>bnxt_en: Fix error recovery for RoCE ulp client (git-fixes).</li>
<li>bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() (git-fixes).</li>
<li>bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).</li>
<li>bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)</li>
<li>bootconfig: Fix the kerneldoc of _xbc_exit() (git-fixes).</li>
<li>bootconfig: use memblock_free_late to free xbc memory to buddy (git-fixes).</li>
<li>bootmem: use kmemleak_free_part_phys in put_page_bootmem (git-fixes).</li>
<li>bpf, arm64: Fix incorrect runtime stats (git-fixes)</li>
<li>bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).</li>
<li>bpf: Remove xdp_do_flush_map() (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>bpf: check bpf_func_state->callback_depth when pruning states (bsc#1225903).</li>
<li>bpf: correct loop detection for iterators convergence (bsc#1225903).</li>
<li>bpf: exact states comparison for iterator convergence checks (bsc#1225903).</li>
<li>bpf: extract __check_reg_arg() utility function (bsc#1225903).</li>
<li>bpf: extract same_callsites() as utility function (bsc#1225903).</li>
<li>bpf: extract setup_func_entry() utility function (bsc#1225903).</li>
<li>bpf: fix precision backtracking instruction iteration (bsc#1225756).</li>
<li>bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).</li>
<li>bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903).</li>
<li>bpf: move explored_state() closer to the beginning of verifier.c (bsc#1225903).</li>
<li>bpf: print full verifier states on infinite loop detection (bsc#1225903).</li>
<li>bpf: verify callbacks as if they are called unknown number of times (bsc#1225903).</li>
<li>bpf: widening for callback iterators (bsc#1225903).</li>
<li>btrfs: add a helper to read the superblock metadata_uuid (git-fixes)</li>
<li>btrfs: add and use helper to check if block group is used (bsc#1220120).</li>
<li>btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)</li>
<li>btrfs: add new unused block groups to the list of unused block groups (bsc#1220120).</li>
<li>btrfs: allow to run delayed refs by bytes to be released instead of count (bsc#1220120).</li>
<li>btrfs: always clear PERTRANS metadata during commit (git-fixes)</li>
<li>btrfs: always print transaction aborted messages with an error level (git-fixes)</li>
<li>btrfs: always reserve space for delayed refs when starting transaction (bsc#1220120).</li>
<li>btrfs: assert correct lock is held at btrfs_select_ref_head() (bsc#1220120).</li>
<li>btrfs: assert delayed node locked when removing delayed item (git-fixes)</li>
<li>btrfs: avoid start and commit empty transaction when flushing qgroups (bsc#1220120).</li>
<li>btrfs: avoid start and commit empty transaction when starting qgroup rescan (bsc#1220120).</li>
<li>btrfs: avoid starting and committing empty transaction when flushing space (bsc#1220120).</li>
<li>btrfs: avoid starting new transaction when flushing delayed items and refs (bsc#1220120).</li>
<li>btrfs: check for BTRFS_FS_ERROR in pending ordered assert (git-fixes)</li>
<li>btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super (git-fixes)</li>
<li>btrfs: defrag: avoid unnecessary defrag caused by incorrect extent size (git-fixes)</li>
<li>btrfs: defrag: reject unknown flags of btrfs_ioctl_defrag_range_args (git-fixes)</li>
<li>btrfs: do not allow non subvolume root targets for snapshot (git-fixes)</li>
<li>btrfs: do not arbitrarily slow down delalloc if we're committing (git-fixes)</li>
<li>btrfs: do not delete unused block group if it may be used soon (bsc#1220120).</li>
<li>btrfs: do not refill whole delayed refs block reserve when starting transaction (bsc#1220120).</li>
<li>btrfs: do not start transaction when joining with TRANS_JOIN_NOSTART (git-fixes)</li>
<li>btrfs: do not steal space from global rsv after a transaction abort (bsc#1220120).</li>
<li>btrfs: do not warn if discard range is not aligned to sector (git-fixes)</li>
<li>btrfs: ensure fiemap does not race with writes when FIEMAP_FLAG_SYNC is given (bsc#1223285).</li>
<li>btrfs: error out when COWing block using a stale transaction (git-fixes)</li>
<li>btrfs: error out when reallocating block for defrag using a stale transaction (git-fixes)</li>
<li>btrfs: error when COWing block from a root that is being deleted (git-fixes)</li>
<li>btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)</li>
<li>btrfs: fail priority metadata ticket with real fs error (bsc#1220120).</li>
<li>btrfs: file_remove_privs needs an exclusive lock in direct io write (git-fixes)</li>
<li>btrfs: fix 64bit compat send ioctl arguments not initializing version member (git-fixes)</li>
<li>btrfs: fix deadlock with fiemap and extent locking (bsc#1223285).</li>
<li>btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)</li>
<li>btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send() (git-fixes)</li>
<li>btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)</li>
<li>btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)</li>
<li>btrfs: fix off-by-one when checking chunk map includes logical address (git-fixes)</li>
<li>btrfs: fix race between ordered extent completion and fiemap (bsc#1223285).</li>
<li>btrfs: fix race when detecting delalloc ranges during fiemap (bsc#1223285).</li>
<li>btrfs: fix race when refilling delayed refs block reserve (git-fixes)</li>
<li>btrfs: fix start transaction qgroup rsv double free (git-fixes)</li>
<li>btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range() (git-fixes)</li>
<li>btrfs: free qgroup rsv on io failure (git-fixes)</li>
<li>btrfs: free the allocated memory if btrfs_alloc_page_array() fails (git-fixes)</li>
<li>btrfs: get rid of label and goto at insert_delayed_ref() (bsc#1220120).</li>
<li>btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)</li>
<li>btrfs: handle errors properly in update_inline_extent_backref() (git-fixes)</li>
<li>btrfs: initialize key where it's used when running delayed data ref (bsc#1220120).</li>
<li>btrfs: log message if extent item not found when running delayed extent op (bsc#1220120).</li>
<li>btrfs: make btrfs_cleanup_fs_roots() static (bsc#1220120).</li>
<li>btrfs: make btrfs_destroy_delayed_refs() return void (bsc#1220120).</li>
<li>btrfs: make btrfs_destroy_marked_extents() return void (bsc#1220120).</li>
<li>btrfs: make btrfs_destroy_pinned_extent() return void (bsc#1220120).</li>
<li>btrfs: make error messages more clear when getting a chunk map (git-fixes)</li>
<li>btrfs: make find_first_extent_bit() return a boolean (bsc#1220120).</li>
<li>btrfs: make find_free_dev_extent() static (bsc#1220120).</li>
<li>btrfs: make insert_delayed_ref() return a bool instead of an int (bsc#1220120).</li>
<li>btrfs: merge find_free_dev_extent() and find_free_dev_extent_start() (bsc#1220120).</li>
<li>btrfs: move btrfs_free_excluded_extents() into block-group.c (bsc#1220120).</li>
<li>btrfs: open code trivial btrfs_add_excluded_extent() (bsc#1220120).</li>
<li>btrfs: output extra debug info if we failed to find an inline backref (git-fixes)</li>
<li>btrfs: pass a space_info argument to btrfs_reserve_metadata_bytes() (bsc#1220120).</li>
<li>btrfs: prevent transaction block reserve underflow when starting transaction (git-fixes)</li>
<li>btrfs: print available space across all block groups when dumping space info (bsc#1220120).</li>
<li>btrfs: print available space for a block group when dumping a space info (bsc#1220120).</li>
<li>btrfs: print block group super and delalloc bytes when dumping space info (bsc#1220120).</li>
<li>btrfs: print target number of bytes when dumping free space (bsc#1220120).</li>
<li>btrfs: qgroup: always free reserved space for extent records (bsc#1216196).</li>
<li>btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans (git-fixes)</li>
<li>btrfs: record delayed inode root in transaction (git-fixes)</li>
<li>btrfs: reject encoded write if inode has nodatasum flag set (git-fixes)</li>
<li>btrfs: release path before inode lookup during the ino lookup ioctl (git-fixes)</li>
<li>btrfs: remove pointless 'ref_root' variable from run_delayed_data_ref() (bsc#1220120).</li>
<li>btrfs: remove pointless in_tree field from struct btrfs_delayed_ref_node (bsc#1220120).</li>
<li>btrfs: remove pointless initialization at btrfs_delayed_refs_rsv_release() (bsc#1220120).</li>
<li>btrfs: remove redundant BUG_ON() from __btrfs_inc_extent_ref() (bsc#1220120).</li>
<li>btrfs: remove refs_to_add argument from __btrfs_inc_extent_ref() (bsc#1220120).</li>
<li>btrfs: remove refs_to_drop argument from __btrfs_free_extent() (bsc#1220120).</li>
<li>btrfs: remove the refcount warning/check at btrfs_put_delayed_ref() (bsc#1220120).</li>
<li>btrfs: remove unnecessary logic when running new delayed references (bsc#1220120).</li>
<li>btrfs: remove unnecessary prototype declarations at disk-io.c (bsc#1220120).</li>
<li>btrfs: remove unused is_head field from struct btrfs_delayed_ref_node (bsc#1220120).</li>
<li>btrfs: rename add_new_free_space() to btrfs_add_new_free_space() (bsc#1220120).</li>
<li>btrfs: reorder some members of struct btrfs_delayed_ref_head (bsc#1220120).</li>
<li>btrfs: reserve space for delayed refs on a per ref basis (bsc#1220120).</li>
<li>btrfs: reset destination buffer when read_extent_buffer() gets invalid range (git-fixes)</li>
<li>btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1 (git-fixes)</li>
<li>btrfs: return -EUCLEAN if extent item is missing when searching inline backref (bsc#1220120).</li>
<li>btrfs: return real error when orphan cleanup fails due to a transaction abort (bsc#1220120).</li>
<li>btrfs: send: do not issue unnecessary zero writes for trailing hole (bsc#1222459).</li>
<li>btrfs: send: ensure send_fd is writable (git-fixes)</li>
<li>btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)</li>
<li>btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)</li>
<li>btrfs: set page extent mapped after read_folio in relocate_one_page (git-fixes)</li>
<li>btrfs: simplify check for extent item overrun at lookup_inline_extent_backref() (bsc#1220120).</li>
<li>btrfs: stop doing excessive space reservation for csum deletion (bsc#1220120).</li>
<li>btrfs: store the error that turned the fs into error state (bsc#1220120).</li>
<li>btrfs: sysfs: validate scrub_speed_max value (git-fixes)</li>
<li>btrfs: tree-checker: fix inline ref size in error messages (git-fixes)</li>
<li>btrfs: update comment for btrfs_join_transaction_nostart() (bsc#1220120).</li>
<li>btrfs: update documentation for add_new_free_space() (bsc#1220120).</li>
<li>btrfs: use a bool to track qgroup record insertion when adding ref head (bsc#1220120).</li>
<li>btrfs: use a single switch statement when initializing delayed ref head (bsc#1220120).</li>
<li>btrfs: use a single variable for return value at lookup_inline_extent_backref() (bsc#1220120).</li>
<li>btrfs: use a single variable for return value at run_delayed_extent_op() (bsc#1220120).</li>
<li>btrfs: use bool type for delayed ref head fields that are used as booleans (bsc#1220120).</li>
<li>btrfs: use the correct superblock to compare fsid in btrfs_validate_super (git-fixes)</li>
<li>btrfs: use u64 for buffer sizes in the tree search ioctls (git-fixes)</li>
<li>btrfs: zoned: do not skip block groups with 100% zone unusable (bsc#1220120).</li>
<li>bus: mhi: host: allow MHI client drivers to provide the firmware via a pointer (bsc#1227149).</li>
<li>bytcr_rt5640 : inverse jack detect for Archos 101 cesium (stable-fixes).</li>
<li>cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd (git-fixes).</li>
<li>cachefiles: remove requests from xarray during flushing requests (bsc#1226588).</li>
<li>can: kvaser_usb: Explicitly initialize family in leafimx driver_info struct (git-fixes).</li>
<li>can: kvaser_usb: fix return value for hif_usb_send_regout (stable-fixes).</li>
<li>can: mcp251xfd: fix infinite loop when xmit fails (git-fixes).</li>
<li>cdrom: rearrange last_media_change check to avoid unintentional overflow (stable-fixes).</li>
<li>ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022).</li>
<li>ceph: always check dir caps asynchronously (bsc#1226022).</li>
<li>ceph: always queue a writeback when revoking the Fb caps (bsc#1226022).</li>
<li>ceph: break the check delayed cap loop every 5s (bsc#1226022).</li>
<li>ceph: fix incorrect kmalloc size of pagevec mempool (bsc#1228417).</li>
<li>ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE (bsc#1224866).</li>
<li>ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022).</li>
<li>certs: Add ECDSA signature verification self-test (bsc#1222777).</li>
<li>certs: Move RSA self-test data to separate file (bsc#1222777).</li>
<li>char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git-fixes).</li>
<li>checkpatch: really skip LONG_LINE_* when LONG_LINE is ignored (git-fixes).</li>
<li>cifs: Add a laundromat thread for cached directories (git-fixes, bsc#1225172).</li>
<li>cifs: Do not use certain unnecessary folio_*() functions (bsc#1225172).</li>
<li>cifs: account for primary channel in the interface list (bsc#1225172).</li>
<li>cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1225172).</li>
<li>cifs: distribute channels across interfaces based on speed (bsc#1225172).</li>
<li>cifs: do not pass cifs_sb when trying to add channels (bsc#1225172).</li>
<li>cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1225172).</li>
<li>cifs: fix charset issue in reconnection (bsc#1225172).</li>
<li>cifs: fix leak of iface for primary channel (git-fixes, bsc#1225172).</li>
<li>cifs: handle cases where a channel is closed (bsc#1225172).</li>
<li>cifs: handle cases where multiple sessions share connection (bsc#1225172).</li>
<li>cifs: reconnect work should have reference on server struct (bsc#1225172).</li>
<li>clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).</li>
<li>clk: Get runtime PM before walking tree during disable_unused (git-fixes).</li>
<li>clk: Get runtime PM before walking tree for clk_summary (git-fixes).</li>
<li>clk: Initialize struct clk_core kref earlier (stable-fixes).</li>
<li>clk: Show active consumers of clocks in debugfs (stable-fixes).</li>
<li>clk: davinci: da8xx-cfgchip: Initialize clk_init_data before use (git-fixes).</li>
<li>clk: mediatek: mt8183: Only enable runtime PM on mt8183-mfgcfg (git-fixes).</li>
<li>clk: mediatek: mt8365-mm: fix DPI0 parent (git-fixes).</li>
<li>clk: mediatek: pllfh: Do not log error for missing fhctl node (git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: fix rate setting for Stromer PLLs (git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: remove invalid Stromer register offset (git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: set ALPHA_EN bit for Stromer Plus PLLs (git-fixes).</li>
<li>clk: qcom: dispcc-sm6350: fix DisplayPort clocks (git-fixes).</li>
<li>clk: qcom: dispcc-sm8450: fix DisplayPort clocks (git-fixes).</li>
<li>clk: qcom: dispcc-sm8550: fix DisplayPort clocks (git-fixes).</li>
<li>clk: qcom: gcc-sm6350: Fix gpll6* & gpll7 parents (git-fixes).</li>
<li>clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).</li>
<li>clk: renesas: r8a779a0: Fix CANFD parent clock (git-fixes).</li>
<li>clk: renesas: r9a07g043: Add clock and reset entry for PLIC (git-fixes).</li>
<li>clk: rs9: fix wrong default value for clock amplitude (git-fixes).</li>
<li>clk: samsung: exynosautov9: fix wrong pll clock id value (git-fixes).</li>
<li>clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (git-fixes).</li>
<li>clkdev: Update clkdev id usage to allow for longer names (stable-fixes).</li>
<li>config/arm64: Enable CoreSight PMU drivers (bsc#1228289 jsc#PED-7859)</li>
<li>counter: linux/counter.h: fix Excess kernel-doc description warning (git-fixes).</li>
<li>counter: ti-eqep: enable clock at probe (git-fixes).</li>
<li>cppc_cpufreq: Fix possible null pointer dereference (git-fixes).</li>
<li>cpufreq/amd-pstate: Fix the scaling_max_freq setting on shared memory CPPC systems (git-fixes).</li>
<li>cpufreq: amd-pstate: Fix the inconsistency in max frequency units (git-fixes).</li>
<li>cpufreq: amd-pstate: fix memory leak on CPU EPP exit (stable-fixes).</li>
<li>cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations (git-fixes).</li>
<li>cpufreq: exit() callback is optional (git-fixes).</li>
<li>cpufreq: ti-cpufreq: Handle deferred probe with dev_err_probe() (git-fixes).</li>
<li>cpumask: Add for_each_cpu_from() (bsc#1225053).</li>
<li>crypto/ecdh: make ecdh_compute_value() to zeroize the public key (bsc#1222768).</li>
<li>crypto/ecdsa: make ecdsa_ecc_ctx_deinit() to zeroize the public key (bsc#1222768).</li>
<li>crypto: aead,cipher - zeroize key buffer after use (stable-fixes).</li>
<li>crypto: bcm - Fix pointer arithmetic (git-fixes).</li>
<li>crypto: ccp - Add support for PCI device 0x156E (bsc#1223338).</li>
<li>crypto: ccp - Add support for PCI device 0x17E0 (bsc#1223338).</li>
<li>crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked (git-fixes).</li>
<li>crypto: ccp - drop platform ifdef checks (git-fixes).</li>
<li>crypto: deflate - Add aliases to deflate (bsc#1227190).</li>
<li>crypto: ecc - update ecc_gen_privkey for FIPS 186-5 (bsc#1222782).</li>
<li>crypto: ecdh - explicitly zeroize private_key (stable-fixes).</li>
<li>crypto: ecdsa - Fix module auto-load on add-key (git-fixes).</li>
<li>crypto: ecdsa - Fix the public key format description (git-fixes).</li>
<li>crypto: ecrdsa - Fix module auto-load on add_key (stable-fixes).</li>
<li>crypto: hisilicon/debugfs - Fix debugfs uninit process issue (stable-fixes).</li>
<li>crypto: hisilicon/qm - Add the err memory release process to qm uninit (stable-fixes).</li>
<li>crypto: hisilicon/sec - Fix memory leak for sec resource release (stable-fixes).</li>
<li>crypto: iaa - Account for cpu-less numa nodes (bsc#1227190).</li>
<li>crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init (git-fixes).</li>
<li>crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (git-fixes).</li>
<li>crypto: qat - extend scope of lock in adf_cfg_add_key_value_param() (git-fixes).</li>
<li>crypto: qat - improve error logging to be consistent across features (git-fixes).</li>
<li>crypto: qat - specify firmware files for 402xx (git-fixes).</li>
<li>crypto: rsa - add a check for allocation failure (bsc#1222775).</li>
<li>crypto: rsa - allow only odd e and restrict value in FIPS mode (bsc#1222775).</li>
<li>crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c (bsc#1222769).</li>
<li>crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).</li>
<li>crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).</li>
<li>crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).</li>
<li>cxgb4: Properly lock TX queue for the selftest (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>cxl/region: Fix cxlr_pmem leaks (git-fixes).</li>
<li>cxl/region: Fix memregion leaks in devm_cxl_add_region() (git-fixes).</li>
<li>cxl/test: Add missing vmalloc.h for tools/testing/cxl/test/mem.c (git-fixes).</li>
<li>cxl/trace: Correct DPA field masks for general_media & dram events (git-fixes).</li>
<li>decompress_bunzip2: fix rare decompression failure (git-fixes).</li>
<li>devres: Fix devm_krealloc() wasting memory (git-fixes).</li>
<li>devres: Fix memory leakage caused by driver API devm_free_percpu() (git-fixes).</li>
<li>dlm: fix user space lock decision to copy lvb (git-fixes).</li>
<li>dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).</li>
<li>dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).</li>
<li>dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (git-fixes).</li>
<li>dma-mapping: benchmark: fix node id validation (git-fixes).</li>
<li>dma-mapping: benchmark: handle NUMA_NO_NODE correctly (git-fixes).</li>
<li>dma: fix call order in dmam_free_coherent (git-fixes).</li>
<li>dma: xilinx_dpdma: Fix locking (git-fixes).</li>
<li>dmaengine: axi-dmac: fix possible race in remove() (git-fixes).</li>
<li>dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).</li>
<li>dmaengine: idxd: Avoid unnecessary destruction of file_ida (git-fixes).</li>
<li>dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).</li>
<li>dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (git-fixes).</li>
<li>dmaengine: ioatdma: Fix error path in ioat3_dma_probe() (git-fixes).</li>
<li>dmaengine: ioatdma: Fix kmemleak in ioat_pci_probe() (git-fixes).</li>
<li>dmaengine: ioatdma: Fix leaking on version mismatch (git-fixes).</li>
<li>dmaengine: ioatdma: Fix missing kmem_cache_destroy() (git-fixes).</li>
<li>dmaengine: owl: fix register access functions (git-fixes).</li>
<li>dmaengine: tegra186: Fix residual calculation (git-fixes).</li>
<li>dmaengine: ti: k3-udma: Fix BCHAN count with UHC and HC channels (git-fixes).</li>
<li>docs: crypto: async-tx-api: fix broken code example (git-fixes).</li>
<li>docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).</li>
<li>docs: netdev: Fix typo in Signed-off-by tag (git-fixes).</li>
<li>dpll: spec: use proper enum for pin capabilities attribute (git-fixes).</li>
<li>driver core: Introduce device_link_wait_removal() (stable-fixes).</li>
<li>drivers/nvme: Add quirks for device 126f:2262 (git-fixes).</li>
<li>drivers/xen: Improve the late XenStore init protocol (git-fixes).</li>
<li>drivers: core: synchronize really_probe() and dev_uevent() (git-fixes).</li>
<li>drivers: soc: xilinx: check return status of get_api_version() (git-fixes).</li>
<li>drm/amd/amdgpu: Fix uninitialized variable warnings (git-fixes).</li>
<li>drm/amd/display: ASSERT when failing to find index by plane/stream id (stable-fixes).</li>
<li>drm/amd/display: Account for cursor prefetch BW in DML1 mode support (stable-fixes).</li>
<li>drm/amd/display: Add VCO speed parameter for DCN31 FPU (stable-fixes).</li>
<li>drm/amd/display: Add dtbclk access to dcn315 (stable-fixes).</li>
<li>drm/amd/display: Add refresh rate range check (stable-fixes).</li>
<li>drm/amd/display: Allocate zero bw after bw alloc enable (stable-fixes).</li>
<li>drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).</li>
<li>drm/amd/display: Check index msg_id before read or write (stable-fixes).</li>
<li>drm/amd/display: Check pipe offset before setting vblank (stable-fixes).</li>
<li>drm/amd/display: Disable seamless boot on 128b/132b encoding (stable-fixes).</li>
<li>drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).</li>
<li>drm/amd/display: Enable colorspace property for MST connectors (git-fixes).</li>
<li>drm/amd/display: Exit idle optimizations before HDCP execution (stable-fixes).</li>
<li>drm/amd/display: Fix DC mode screen flickering on DCN321 (stable-fixes).</li>
<li>drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport (stable-fixes).</li>
<li>drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).</li>
<li>drm/amd/display: Fix incorrect DSC instance for MST (stable-fixes).</li>
<li>drm/amd/display: Fix overlapping copy within dml_core_mode_programming (stable-fixes).</li>
<li>drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).</li>
<li>drm/amd/display: Fix refresh rate range for some panel (stable-fixes).</li>
<li>drm/amd/display: Fix uninitialized variables in DM (stable-fixes).</li>
<li>drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).</li>
<li>drm/amd/display: Move 'struct scaler_data' off stack (git-fixes).</li>
<li>drm/amd/display: Remove pixle rate limit for subvp (stable-fixes).</li>
<li>drm/amd/display: Remove redundant condition in dcn35_calc_blocks_to_gate() (git-fixes).</li>
<li>drm/amd/display: Revert Remove pixle rate limit for subvp (stable-fixes).</li>
<li>drm/amd/display: Send DP_TOTAL_LTTPR_CNT during detection if LTTPR is present (stable-fixes).</li>
<li>drm/amd/display: Set color_mgmt_changed to true on unsuspend (stable-fixes).</li>
<li>drm/amd/display: Skip finding free audio for unknown engine_id (stable-fixes).</li>
<li>drm/amd/display: Skip pipe if the pipe idx not set properly (stable-fixes).</li>
<li>drm/amd/display: Update efficiency bandwidth for dcn351 (stable-fixes).</li>
<li>drm/amd/display: Workaround register access in idle race with cursor (stable-fixes).</li>
<li>drm/amd/display: change dram_clock_latency to 34us for dcn35 (stable-fixes).</li>
<li>drm/amd/display: revert Exit idle optimizations before HDCP execution (stable-fixes).</li>
<li>drm/amd/pm: Fix aldebaran pcie speed reporting (git-fixes).</li>
<li>drm/amd/pm: Restore config space after reset (stable-fixes).</li>
<li>drm/amd/pm: remove logically dead code for renoir (git-fixes).</li>
<li>drm/amd: Fix shutdown (again) on some SMU v13.0.4/11 platforms (git-fixes).</li>
<li>drm/amdgpu/atomfirmware: add intergrated info v2.3 table (stable-fixes).</li>
<li>drm/amdgpu/atomfirmware: fix parsing of vram_info (stable-fixes).</li>
<li>drm/amdgpu/atomfirmware: silence UBSAN warning (stable-fixes).</li>
<li>drm/amdgpu/mes: fix use-after-free issue (stable-fixes).</li>
<li>drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).</li>
<li>drm/amdgpu: Assign correct bits for SDMA HDP flush (stable-fixes).</li>
<li>drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit (git-fixes).</li>
<li>drm/amdgpu: Fix VCN allocation in CPX partition (stable-fixes).</li>
<li>drm/amdgpu: Fix VRAM memory accounting (stable-fixes).</li>
<li>drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode() (git-fixes).</li>
<li>drm/amdgpu: Fix comparison in amdgpu_res_cpu_visible (git-fixes).</li>
<li>drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).</li>
<li>drm/amdgpu: Fix memory range calculation (git-fixes).</li>
<li>drm/amdgpu: Fix pci state save during mode-1 reset (git-fixes).</li>
<li>drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() (git-fixes).</li>
<li>drm/amdgpu: Fix the ring buffer size for queue VM flush (stable-fixes).</li>
<li>drm/amdgpu: Fix uninitialized variable warnings (stable-fixes).</li>
<li>drm/amdgpu: Indicate CU havest info to CP (stable-fixes).</li>
<li>drm/amdgpu: Initialize timestamp for some legacy SOCs (stable-fixes).</li>
<li>drm/amdgpu: Refine IB schedule error logging (stable-fixes).</li>
<li>drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1 (git-fixes).</li>
<li>drm/amdgpu: Update BO eviction priorities (stable-fixes).</li>
<li>drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (stable-fixes).</li>
<li>drm/amdgpu: add error handle to avoid out-of-bounds (stable-fixes).</li>
<li>drm/amdgpu: avoid using null object of framebuffer (stable-fixes).</li>
<li>drm/amdgpu: fix UBSAN warning in kv_dpm.c (stable-fixes).</li>
<li>drm/amdgpu: fix doorbell regression (git-fixes).</li>
<li>drm/amdgpu: fix locking scope when flushing tlb (stable-fixes).</li>
<li>drm/amdgpu: fix the warning about the expression (int)size - len (stable-fixes).</li>
<li>drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes).</li>
<li>drm/amdgpu: implement IRQ_STATE_ENABLE for SDMA v4.4.2 (stable-fixes).</li>
<li>drm/amdgpu: init microcode chip name from ip versions (stable-fixes).</li>
<li>drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).</li>
<li>drm/amdgpu: silence UBSAN warning (stable-fixes).</li>
<li>drm/amdkfd: Add VRAM accounting for SVM migration (stable-fixes).</li>
<li>drm/amdkfd: Check cgroup when returning DMABuf info (stable-fixes).</li>
<li>drm/amdkfd: Fix CU Masking for GFX 9.4.3 (git-fixes).</li>
<li>drm/amdkfd: Flush the process wq before creating a kfd_process (stable-fixes).</li>
<li>drm/amdkfd: Let VRAM allocations go to GTT domain on small APUs (stable-fixes).</li>
<li>drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).</li>
<li>drm/amdkfd: range check cp bad op exception interrupts (stable-fixes).</li>
<li>drm/arm/komeda: Fix komeda probe failing if there are no links in the secondary pipeline (git-fixes).</li>
<li>drm/arm/malidp: fix a possible null pointer dereference (git-fixes).</li>
<li>drm/bridge/panel: Fix runtime warning on panel bridge release (git-fixes).</li>
<li>drm/bridge: Fix improper bridge init order with pre_enable_prev_first (git-fixes).</li>
<li>drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-fixes).</li>
<li>drm/bridge: anx7625: Update audio status while detecting (git-fixes).</li>
<li>drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-fixes).</li>
<li>drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-fixes).</li>
<li>drm/bridge: it6505: fix hibernate to resume no display issue (git-fixes).</li>
<li>drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-fixes).</li>
<li>drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-fixes).</li>
<li>drm/bridge: lt9611uxc: Do not log an error when DSI host can't be found (git-fixes).</li>
<li>drm/bridge: samsung-dsim: Set P divider based on min/max of fin pll (git-fixes).</li>
<li>drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-fixes).</li>
<li>drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).</li>
<li>drm/ci: update device type for volteer devices (git-fixes).</li>
<li>drm/connector: Add \n to message about demoting connector force-probes (git-fixes).</li>
<li>drm/dp_mst: Fix all mstb marked as not probed after suspend/resume (git-fixes).</li>
<li>drm/drm_file: Fix pid refcounting race (git-fixes).</li>
<li>drm/etnaviv: fix DMA direction handling for cached RW buffers (git-fixes).</li>
<li>drm/etnaviv: fix tx clock gating on some GC7000 variants (stable-fixes).</li>
<li>drm/exynos/vidi: fix memory leak in .get_modes() (stable-fixes).</li>
<li>drm/exynos: dp: drop driver owner initialization (stable-fixes).</li>
<li>drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found (git-fixes).</li>
<li>drm/fbdev-dma: Fix framebuffer mode for big endian devices (git-fixes).</li>
<li>drm/fbdev-dma: Only set smem_start is enable per module option (git-fixes).</li>
<li>drm/fbdev-generic: Do not set physical framebuffer address (git-fixes).</li>
<li>drm/fbdev-generic: Fix framebuffer on big endian devices (git-fixes).</li>
<li>drm/gma500: Remove lid code (git-fixes).</li>
<li>drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes (git-fixes).</li>
<li>drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes (git-fixes).</li>
<li>drm/i915/audio: Fix audio time stamp programming for DP (stable-fixes).</li>
<li>drm/i915/bios: Fix parsing backlight BDB data (git-fixes).</li>
<li>drm/i915/dp: Do not switch the LTTPR mode on an active link (git-fixes).</li>
<li>drm/i915/dpt: Make DPT object unshrinkable (git-fixes).</li>
<li>drm/i915/gt: Automate CCS Mode setting during engine resets (git-fixes).</li>
<li>drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes).</li>
<li>drm/i915/gt: Do not consider preemption during execlists_dequeue for gen8 (git-fixes).</li>
<li>drm/i915/gt: Fix CCS id's calculation for CCS mode setting (git-fixes).</li>
<li>drm/i915/gt: Fix potential UAF by revoke of fence registers (git-fixes).</li>
<li>drm/i915/guc: avoid FIELD_PREP warning (git-fixes).</li>
<li>drm/i915/hwmon: Get rid of devm (stable-fixes).</li>
<li>drm/i915/lspcon: Separate lspcon probe and lspcon init (bsc#1193599).</li>
<li>drm/i915/mso: using joiner is not possible with eDP MSO (git-fixes).</li>
<li>drm/i915: Disable live M/N updates when using bigjoiner (stable-fixes).</li>
<li>drm/i915: Fix audio component initialization (git-fixes).</li>
<li>drm/komeda: check for error-valued pointer (git-fixes).</li>
<li>drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).</li>
<li>drm/lima: Mark simple_ondemand governor as softdep (git-fixes).</li>
<li>drm/lima: add mask irq callback to gp and pp (stable-fixes).</li>
<li>drm/lima: fix shared irq handling on driver remove (stable-fixes).</li>
<li>drm/lima: mask irqs in timeout path before hard reset (stable-fixes).</li>
<li>drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).</li>
<li>drm/mediatek: Add DRM_MODE_ROTATE_0 to rotation property (git-fixes).</li>
<li>drm/mediatek: Add OVL compatible name for MT8195 (git-fixes).</li>
<li>drm/mediatek: Add missing plane settings when async update (git-fixes).</li>
<li>drm/mediatek: Call drm_atomic_helper_shutdown() at shutdown time (stable-fixes).</li>
<li>drm/mediatek: Fix XRGB setting error in Mixer (git-fixes).</li>
<li>drm/mediatek: Fix XRGB setting error in OVL (git-fixes).</li>
<li>drm/mediatek: Fix bit depth overwritten for mtk_ovl_set bit_depth() (git-fixes).</li>
<li>drm/mediatek: Fix destination alpha error in OVL (git-fixes).</li>
<li>drm/mediatek: Init <code>ddp_comp</code> with devm_kcalloc() (git-fixes).</li>
<li>drm/mediatek: Remove less-than-zero comparison of an unsigned value (git-fixes).</li>
<li>drm/mediatek: Set DRM mode configs accordingly (git-fixes).</li>
<li>drm/mediatek: Support DRM plane alpha in Mixer (git-fixes).</li>
<li>drm/mediatek: Support DRM plane alpha in OVL (git-fixes).</li>
<li>drm/mediatek: Support RGBA8888 and RGBX8888 in OVL on MT8195 (git-fixes).</li>
<li>drm/mediatek: Turn off the layers with zero width or height (git-fixes).</li>
<li>drm/mediatek: Use 8-bit alpha in ETHDR (git-fixes).</li>
<li>drm/mediatek: dp: Fix mtk_dp_aux_transfer return value (git-fixes).</li>
<li>drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).</li>
<li>drm/meson: dw-hdmi: power up phy on device init (git-fixes).</li>
<li>drm/meson: fix canvas release in bind function (git-fixes).</li>
<li>drm/meson: gate px_clk when setting rate (git-fixes).</li>
<li>drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).</li>
<li>drm/mgag200: Bind I2C lifetime to DRM device (git-fixes).</li>
<li>drm/mgag200: Set DDC timeout in milliseconds (git-fixes).</li>
<li>drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_dcs_write_seq() (git-fixes).</li>
<li>drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_generic_write_seq() (git-fixes).</li>
<li>drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git-fixes).</li>
<li>drm/msm/adreno: fix CP cycles stat retrieval on a7xx (git-fixes).</li>
<li>drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git-fixes).</li>
<li>drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).</li>
<li>drm/msm/dpu: Add callback function pointer check before its call (git-fixes).</li>
<li>drm/msm/dpu: Allow configuring multiple active DSC blocks (git-fixes).</li>
<li>drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).</li>
<li>drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op (git-fixes).</li>
<li>drm/msm/dpu: fix encoder irq wait skip (git-fixes).</li>
<li>drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).</li>
<li>drm/msm/dsi: set VIDEO_COMPRESSION_MODE_CTRL_WC (git-fixes).</li>
<li>drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config (git-fixes).</li>
<li>drm/nouveau/disp: Fix missing backlight control on Macbook 5, 1 (bsc#1223838).</li>
<li>drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (stable-fixes).</li>
<li>drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (stable-fixes).</li>
<li>drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).</li>
<li>drm/nouveau/dp: Fix incorrect return code in r535_dp_aux_xfer() (git-fixes).</li>
<li>drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (stable-fixes).</li>
<li>drm/nouveau: do not attempt to schedule hpd_work on headless cards (git-fixes).</li>
<li>drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (git-fixes).</li>
<li>drm/nouveau: use tile_mode and pte_kind for VM_BIND bo allocations (git-fixes).</li>
<li>drm/omapdrm: Fix console by implementing fb_dirty (git-fixes).</li>
<li>drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare() (git-fixes).</li>
<li>drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before regulators (git-fixes).</li>
<li>drm/panel: himax-hx8394: Handle errors from mipi_dsi_dcs_set_display_on() better (git-fixes).</li>
<li>drm/panel: ili9341: Respect deferred probe (git-fixes).</li>
<li>drm/panel: ili9341: Use predefined error codes (git-fixes).</li>
<li>drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep (stable-fixes).</li>
<li>drm/panel: ilitek-ili9882t: Check for errors on the NOP in prepare() (git-fixes).</li>
<li>drm/panel: ilitek-ili9882t: If prepare fails, disable GPIO before regulators (git-fixes).</li>
<li>drm/panel: ltk050h3146w: add MIPI_DSI_MODE_VIDEO to LTK050H3148W flags (git-fixes).</li>
<li>drm/panel: ltk050h3146w: drop duplicate commands from LTK050H3148W init (git-fixes).</li>
<li>drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes).</li>
<li>drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).</li>
<li>drm/panel: simple: Add missing display timing flags for KOE TX26D202VM0BWA (git-fixes).</li>
<li>drm/panel: sitronix-st7789v: Add check for of_drm_get_panel_orientation (git-fixes).</li>
<li>drm/panel: sitronix-st7789v: fix display size for jt240mhqs_hwt_ek_e3 panel (git-fixes).</li>
<li>drm/panel: sitronix-st7789v: fix timing for jt240mhqs_hwt_ek_e3 panel (git-fixes).</li>
<li>drm/panel: sitronix-st7789v: tweak timing for jt240mhqs_hwt_ek_e3 panel (git-fixes).</li>
<li>drm/panfrost: Mark simple_ondemand governor as softdep (git-fixes).</li>
<li>drm/qxl: Add check for drm_cvt_mode (git-fixes).</li>
<li>drm/radeon/radeon_display: Decrease the size of allocated memory (stable-fixes).</li>
<li>drm/radeon: check bo_va->bo is non-NULL before using it (stable-fixes).</li>
<li>drm/radeon: fix UBSAN warning in kv_dpm.c (stable-fixes).</li>
<li>drm/radeon: make -fstrict-flex-arrays=3 happy (git-fixes).</li>
<li>drm/radeon: silence UBSAN warning (v3) (stable-fixes).</li>
<li>drm/rockchip: vop2: Do not divide height twice for YUV (git-fixes).</li>
<li>drm/rockchip: vop2: Fix the port mux of VP2 (git-fixes).</li>
<li>drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (git-fixes).</li>
<li>drm/sun4i: hdmi: Convert encoder to atomic (stable-fixes).</li>
<li>drm/sun4i: hdmi: Move mode_set into enable (stable-fixes).</li>
<li>drm/ttm: Always take the bo delayed cleanup path for imported bos (git-fixes).</li>
<li>drm/udl: Remove DRM_CONNECTOR_POLL_HPD (git-fixes).</li>
<li>drm/vmwgfx: 3D disabled should not effect STDU memory limits (git-fixes).</li>
<li>drm/vmwgfx: Do not memcmp equivalent pointers (git-fixes).</li>
<li>drm/vmwgfx: Filter modes which exceed graphics memory (git-fixes).</li>
<li>drm/vmwgfx: Fix Legacy Display Unit (git-fixes).</li>
<li>drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).</li>
<li>drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency (stable-fixes).</li>
<li>drm: add drm_gem_object_is_shared_for_memory_stats() helper (stable-fixes).</li>
<li>drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for Valve Galileo (stable-fixes).</li>
<li>drm: vc4: Fix possible null pointer dereference (git-fixes).</li>
<li>drm: zynqmp_dpsub: Always register bridge (git-fixes).</li>
<li>drm: zynqmp_dpsub: Fix an error handling path in zynqmp_dpsub_probe() (git-fixes).</li>
<li>drm: zynqmp_kms: Fix AUX bus not getting unregistered (git-fixes).</li>
<li>dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)</li>
<li>dump_stack: Do not get cpu_sync for panic CPU (bsc#1225607).</li>
<li>dyndbg: fix old BUG_ON in >control parser (stable-fixes).</li>
<li>e1000e: Workaround for sporadic MDI error on Meteor Lake systems (git-fixes).</li>
<li>e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue (git-fixes).</li>
<li>ecryptfs: Fix buffer size for tag 66 packet (git-fixes)</li>
<li>ecryptfs: Reject casefold directory inodes (git-fixes)</li>
<li>eeprom: at24: Probe for DDR3 thermal sensor in the SPD case (stable-fixes).</li>
<li>eeprom: digsy_mtc: Fix 93xx46 driver probe failure (git-fixes).</li>
<li>efi/unaccepted: do not let /proc/vmcore try to access unaccepted memory (git-fixes).</li>
<li>efi/unaccepted: touch soft lockup during memory accept (git-fixes).</li>
<li>efi/x86: Free EFI memory map only when installing a new one (git-fixes).</li>
<li>efi: libstub: only free priv.runtime_map when allocated (git-fixes).</li>
<li>erofs: ensure m_llen is reset to 0 if metadata is invalid (git-fixes).</li>
<li>exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes).</li>
<li>extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).</li>
<li>f2fs: fix error path of __f2fs_build_free_nids (git-fixes).</li>
<li>fast_dput(): handle underflows gracefully (git-fixes)</li>
<li>fat: fix uninitialized field in nostale filehandles (git-fixes)</li>
<li>fbdev: fix incorrect address computation in deferred IO (git-fixes).</li>
<li>fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).</li>
<li>fbdev: sh7760fb: allow modular build (git-fixes).</li>
<li>fbdev: shmobile: fix snprintf truncation (git-fixes).</li>
<li>fbdev: sisfb: hide unused variables (git-fixes).</li>
<li>filelock: fix potential use-after-free in posix_lock_inode (git-fixes).</li>
<li>firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).</li>
<li>firmware: cs_dsp: Fix overflow checking of wmfw header (git-fixes).</li>
<li>firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers (git-fixes).</li>
<li>firmware: cs_dsp: Return error if block header overflows file (git-fixes).</li>
<li>firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (git-fixes).</li>
<li>firmware: cs_dsp: Validate payload length before processing block (git-fixes).</li>
<li>firmware: dmi-id: add a release callback function (git-fixes).</li>
<li>firmware: dmi: Stop decoding on broken entry (stable-fixes).</li>
<li>firmware: psci: Fix return value from psci_system_suspend() (git-fixes).</li>
<li>firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).</li>
<li>firmware: turris-mox-rwtm: Do not complete if there are no waiters (git-fixes).</li>
<li>firmware: turris-mox-rwtm: Fix checking return value of wait_for_completion_timeout() (git-fixes).</li>
<li>firmware: turris-mox-rwtm: Initialize completion before mailbox (git-fixes).</li>
<li>fpga: dfl-pci: add PCI subdevice ID for Intel D5005 card (stable-fixes).</li>
<li>fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes)</li>
<li>fs/9p: translate O_TRUNC into OTRUNC (git-fixes)</li>
<li>fs/file: fix the check in find_next_fd() (git-fixes).</li>
<li>fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes).</li>
<li>fs: Fix error checking for d_hash_and_lookup() (git-fixes)</li>
<li>fs: indicate request originates from old mount API (git-fixes)</li>
<li>fs: relax mount_setattr() permission checks (git-fixes)</li>
<li>fsverity: skip PKCS#7 parser when keyring is empty (git-fixes)</li>
<li>ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes).</li>
<li>fuse: do not unhash root (bsc#1223946).</li>
<li>fuse: fix root lookup with nonzero generation (bsc#1223945).</li>
<li>fuse: verify {g,u}id mount options correctly (bsc#1228193).</li>
<li>geneve: fix header validation in geneve[6]_xmit_skb (git-fixes).</li>
<li>genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after() (git-fixes).</li>
<li>gfs2: Do not forget to complete delayed withdraw (git-fixes).</li>
<li>gfs2: Fix "ignore unlock failures after withdraw" (git-fixes).</li>
<li>gfs2: Fix invalid metadata access in punch_hole (git-fixes).</li>
<li>gfs2: Get rid of gfs2_alloc_blocks generation parameter (git-fixes).</li>
<li>gfs2: Rename gfs2_lookup_{ simple => meta } (git-fixes).</li>
<li>gfs2: Use mapping->gfp_mask for metadata inodes (git-fixes).</li>
<li>gfs2: convert to ctime accessor functions (git-fixes).</li>
<li>gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).</li>
<li>gpio: davinci: Validate the obtained number of IRQs (git-fixes).</li>
<li>gpio: lpc32xx: fix module autoloading (stable-fixes).</li>
<li>gpio: mc33880: Convert comma to semicolon (git-fixes).</li>
<li>gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (stable-fixes).</li>
<li>gpio: tangier: Use correct type for the IRQ chip data (git-fixes).</li>
<li>gpio: tegra186: Fix tegra186_gpio_is_accessible() check (git-fixes).</li>
<li>gpio: tqmx86: fix broken IRQ_TYPE_EDGE_BOTH interrupt type (git-fixes).</li>
<li>gpio: tqmx86: fix typo in Kconfig label (git-fixes).</li>
<li>gpio: tqmx86: introduce shadow register for GPIO output value (git-fixes).</li>
<li>gpio: tqmx86: store IRQ trigger type and unmask status separately (git-fixes).</li>
<li>gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).</li>
<li>gpiolib: cdev: Disallow reconfiguration without direction (uAPI v1) (git-fixes).</li>
<li>gpiolib: cdev: fix uninitialised kfifo (git-fixes).</li>
<li>gpiolib: cdev: relocate debounce_period_us from struct gpio_desc (stable-fixes).</li>
<li>gpiolib: swnode: Remove wrong header inclusion (git-fixes).</li>
<li>gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).</li>
<li>hfsplus: fix to avoid false alarm of circular locking (git-fixes).</li>
<li>hfsplus: fix uninit-value in copy_name (git-fixes).</li>
<li>hpet: Support 32-bit userspace (git-fixes).</li>
<li>hwmon: (adt7475) Fix default duty on fan is disabled (git-fixes).</li>
<li>hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-fixes).</li>
<li>hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).</li>
<li>hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).</li>
<li>hwmon: (intel-m10-bmc-hwmon) Fix multiplier for N6000 board power sensor (git-fixes).</li>
<li>hwmon: (lm70) fix links in doc and comments (git-fixes).</li>
<li>hwmon: (max6697) Fix swapped temp{1,8} critical alarms (git-fixes).</li>
<li>hwmon: (max6697) Fix underflow when writing limit attributes (git-fixes).</li>
<li>hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).</li>
<li>hwmon: (shtc1) Fix property misspelling (git-fixes).</li>
<li>hwrng: amd - Convert PCIBIOS_* return codes to errnos (git-fixes).</li>
<li>hwrng: core - Fix wrong quality calculation at hw rng registration (git-fixes).</li>
<li>i2c: acpi: Unbind mux adapters before delete (git-fixes).</li>
<li>i2c: at91: Fix the functionality flags of the slave-only interface (git-fixes).</li>
<li>i2c: cadence: Avoid fifo clear after start (git-fixes).</li>
<li>i2c: designware: Fix the functionality flags of the slave-only interface (git-fixes).</li>
<li>i2c: i801: Annotate apanel_addr as __ro_after_init (stable-fixes).</li>
<li>i2c: mark HostNotify target address as used (git-fixes).</li>
<li>i2c: ocores: set IACK bit after core is enabled (git-fixes).</li>
<li>i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr (git-fixes).</li>
<li>i2c: pxa: hide unused icr_bits[] variable (git-fixes).</li>
<li>i2c: rcar: bring hardware to known state when probing (git-fixes).</li>
<li>i2c: smbus: fix NULL function pointer dereference (git-fixes).</li>
<li>i2c: synquacer: Fix an error handling path in synquacer_i2c_probe() (git-fixes).</li>
<li>i2c: testunit: avoid re-issued work after read message (git-fixes).</li>
<li>i2c: testunit: correct Kconfig description (git-fixes).</li>
<li>i2c: testunit: discard write requests while old command is running (git-fixes).</li>
<li>i2c: testunit: do not erase registers after STOP (git-fixes).</li>
<li>i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).</li>
<li>i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).</li>
<li>i40e: Enforce software interrupt during busy-poll exit (git-fixes).</li>
<li>i40e: Fix VF MAC filter removal (git-fixes).</li>
<li>i40e: fix i40e_count_filters() to count only active/new filters (git-fixes).</li>
<li>i40e: fix vf may be used uninitialized in this function warning (git-fixes).</li>
<li>i40e: fix: remove needless retries of NVM update (bsc#1227736).</li>
<li>ice: fix enabling RX VLAN filtering (git-fixes).</li>
<li>ida: make 'ida_dump' static (git-fixes).</li>
<li>idma64: Do not try to serve interrupts when device is powered off (git-fixes).</li>
<li>idpf: extend tx watchdog timeout (bsc#1224137).</li>
<li>idpf: fix kernel panic on unknown packet types (git-fixes).</li>
<li>iio: Fix the sorting functionality in iio_gts_build_avail_time_table (git-fixes).</li>
<li>iio: accel: fxls8962af: select IIO_BUFFER & IIO_KFIFO_BUF (git-fixes).</li>
<li>iio: accel: mxc4005: Interrupt handling fixes (git-fixes).</li>
<li>iio: accel: mxc4005: Reset chip on probe() and resume() (stable-fixes).</li>
<li>iio: accel: mxc4005: allow module autoloading via OF compatible (stable-fixes).</li>
<li>iio: adc: ad7266: Fix variable checking bug (git-fixes).</li>
<li>iio: adc: ad9467: fix scan type sign (git-fixes).</li>
<li>iio: adc: ad9467: use chip_info variables instead of array (stable-fixes).</li>
<li>iio: adc: ad9467: use spi_get_device_match_data() (stable-fixes).</li>
<li>iio: adc: stm32: Fixing err code to not indicate success (git-fixes).</li>
<li>iio: chemical: bme680: Fix calibration data variable (git-fixes).</li>
<li>iio: chemical: bme680: Fix overflows in compensate() functions (git-fixes).</li>
<li>iio: chemical: bme680: Fix pressure value output (git-fixes).</li>
<li>iio: chemical: bme680: Fix sensor data read operation (git-fixes).</li>
<li>iio: core: Leave private pointer NULL when no private data supplied (git-fixes).</li>
<li>iio: dac: ad5592r: fix temperature channel scaling value (git-fixes).</li>
<li>iio: frequency: adrf6780: rm clk provider include (git-fixes).</li>
<li>iio: imu: inv_icm42600: delete unneeded update watermark call (git-fixes).</li>
<li>iio: pressure: Fixes BME280 SPI driver data (git-fixes).</li>
<li>iio: pressure: bmp280: Fix BMP580 temperature reading (stable-fixes).</li>
<li>iio: pressure: dps310: support negative temperature values (git-fixes).</li>
<li>iio: pressure: fix some word spelling errors (stable-fixes).</li>
<li>iio: xilinx-ams: Do not include ams_ctrl_channels in scan_mask (git-fixes).</li>
<li>iio:imu: adis16475: Fix sync mode setting (git-fixes).</li>
<li>init/main.c: Fix potential static_command_line memory overflow (git-fixes).</li>
<li>init: open /initrd.image with O_LARGEFILE (stable-fixes).</li>
<li>input: Add event code for accessibility key (stable-fixes).</li>
<li>input: Add support for "Do Not Disturb" (stable-fixes).</li>
<li>intel_th: pci: Add Granite Rapids SOC support (stable-fixes).</li>
<li>intel_th: pci: Add Granite Rapids support (stable-fixes).</li>
<li>intel_th: pci: Add Lunar Lake support (stable-fixes).</li>
<li>intel_th: pci: Add Meteor Lake-S CPU support (stable-fixes).</li>
<li>intel_th: pci: Add Meteor Lake-S support (stable-fixes).</li>
<li>intel_th: pci: Add Sapphire Rapids SOC support (stable-fixes).</li>
<li>interconnect: qcom: qcm2290: Fix mas_snoc_bimc QoS port assignment (git-fixes).</li>
<li>interconnect: qcom: qcm2290: Fix mas_snoc_bimc RPM master ID (git-fixes).</li>
<li>io-wq: write next_work before dropping acct_lock (git-fixes).</li>
<li>io_uring/io-wq: Use set_bit() and test_bit() at worker->flags (git-fixes).</li>
<li>io_uring/io-wq: avoid garbage value of 'match' in io_wq_enqueue() (git-fixes).</li>
<li>io_uring/kbuf: get rid of bl->is_ready (git-fixes).</li>
<li>io_uring/kbuf: get rid of lower BGID lists (git-fixes). Including kabi preservation patch.</li>
<li>io_uring/kbuf: protect io_buffer_list teardown with a reference (git-fixes).</li>
<li>io_uring/kbuf: rename is_mapped (git-fixes).</li>
<li>io_uring/net: correct the type of variable (git-fixes).</li>
<li>io_uring/net: correctly handle multishot recvmsg retry setup (git-fixes).</li>
<li>io_uring/net: fix sendzc lazy wake polling (git-fixes).</li>
<li>io_uring/net: move receive multishot out of the generic msghdr path (git-fixes).</li>
<li>io_uring/net: restore msg_control on sendzc retry (git-fixes).</li>
<li>io_uring/net: unify how recvmsg and sendmsg copy in the msghdr (git-fixes).</li>
<li>io_uring/rsrc: do not lock while !TASK_RUNNING (git-fixes).</li>
<li>io_uring/rsrc: fix incorrect assignment of iter->nr_segs in io_import_fixed (git-fixes).</li>
<li>io_uring/rw: do not allow multishot reads without NOWAIT support (git-fixes).</li>
<li>io_uring/rw: return IOU_ISSUE_SKIP_COMPLETE for multishot retry (git-fixes).</li>
<li>io_uring/sqpoll: work around a potential audit memory leak (git-fixes).</li>
<li>io_uring/unix: drop usage of io_uring socket (git-fixes).</li>
<li>io_uring: Fix io_cqring_wait() not restoring sigmask on get_timespec64() failure (git-fixes).</li>
<li>io_uring: clean rings on NO_MMAP alloc fail (git-fixes).</li>
<li>io_uring: clear opcode specific data for an early failure (git-fixes).</li>
<li>io_uring: do not save/restore iowait state (git-fixes).</li>
<li>io_uring: fail NOP if non-zero op flags is passed in (git-fixes).</li>
<li>io_uring: fix io_queue_proc modifying req->flags (git-fixes).</li>
<li>io_uring: fix mshot io-wq checks (git-fixes).</li>
<li>io_uring: fix mshot read defer taskrun cqe posting (git-fixes).</li>
<li>io_uring: fix poll_remove stalled req completion (git-fixes).</li>
<li>io_uring: kabi cookie remove (bsc#1217384).</li>
<li>io_uring: remove looping around handling traditional task_work (git-fixes).</li>
<li>io_uring: remove unconditional looping in local task_work handling (git-fixes).</li>
<li>io_uring: use private workqueue for exit work (git-fixes).</li>
<li>io_uring: use the right type for work_llist empty check (git-fixes).</li>
<li>iomap: clear the per-folio dirty bits on all writeback failures (git-fixes)</li>
<li>iommu/amd: Enhance def_domain_type to handle untrusted device (git-fixes).</li>
<li>iommu/amd: Fix panic accessing amd_iommu_enable_faulting (bsc#1224767).</li>
<li>iommu/amd: Fix sysfs leak in iommu init (git-fixes).</li>
<li>iommu/arm-smmu-v3: Free MSIs in case of ENOMEM (git-fixes).</li>
<li>iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)</li>
<li>iommu/vt-d: Allocate DMAR fault interrupts locally (bsc#1224767).</li>
<li>iommu/vt-d: Fix WARN_ON in iommu probe path (git-fixes).</li>
<li>iommu/vt-d: Improve ITE fault handling if target device isn't present (git-fixes).</li>
<li>iommu/vt-d: Use rbtree to track iommu probed devices (git-fixes).</li>
<li>iommu: Fix compilation without CONFIG_IOMMU_INTEL (git-fixes).</li>
<li>iommu: Return right value in iommu_sva_bind_device() (git-fixes).</li>
<li>iommu: Undo pasid attachment only for the devices that have succeeded (git-fixes).</li>
<li>iommu: mtk: fix module autoloading (git-fixes).</li>
<li>iommufd: Add missing IOMMUFD_DRIVER kconfig for the selftest (git-fixes).</li>
<li>ipmi: ssif_bmc: prevent integer overflow on 32bit systems (git-fixes).</li>
<li>ipv4: annotate data-races around fi->fib_dead (git-fixes).</li>
<li>ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)</li>
<li>irqchip/alpine-msi: Fix off-by-one in allocation error path (git-fixes).</li>
<li>irqchip/armada-370-xp: Suppress unused-function warning (git-fixes).</li>
<li>irqchip/gic-v3-its: Do not assume vPE tables are preallocated (git-fixes).</li>
<li>irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-fixes).</li>
<li>irqchip/gic-v3-its: Prevent double free on error (git-fixes).</li>
<li>irqchip/loongson-pch-msi: Fix off-by-one on allocation error path (git-fixes).</li>
<li>irqchip/mbigen: Do not use bus_get_dev_root() to find the parent (git-fixes).</li>
<li>irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on register's index (stable-fixes).</li>
<li>irqchip/renesas-rzg2l: Flush posted write in irq_eoi() (git-fixes).</li>
<li>irqchip/renesas-rzg2l: Implement restriction when writing ISCR register (stable-fixes).</li>
<li>irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type (git-fixes).</li>
<li>irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() (stable-fixes).</li>
<li>irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() (stable-fixes).</li>
<li>iwlwifi: fw: fix more kernel-doc warnings (bsc#1227149).</li>
<li>iwlwifi: mvm: Drop unused fw_trips_index[] from iwl_mvm_thermal_device (bsc#1227149).</li>
<li>iwlwifi: mvm: Populate trip table before registering thermal zone (bsc#1227149).</li>
<li>iwlwifi: mvm: Use for_each_thermal_trip() for walking trip points (bsc#1227149).</li>
<li>jffs2: Fix potential illegal address access in jffs2_free_inode (git-fixes).</li>
<li>jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).</li>
<li>jfs: Fix array-index-out-of-bounds in diFree (git-fixes).</li>
<li>jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).</li>
<li>kABI fix of KVM: x86/pmu: Allow programming events that match unsupported arch events (bsc#1225696).</li>
<li>kABI fix of KVM: x86/pmu: Prioritize VMX interception over</li>
<li>kABI fix of KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible (git-fixes).</li>
<li>kABI workaround for cs35l56 (git-fixes).</li>
<li>kABI workaround for of driver changes (git-fixes).</li>
<li>kABI workaround for sof_ipc_pcm_ops (git-fixes).</li>
<li>kABI workaround for wireless updates (bsc#1227149).</li>
<li>kABI: bpf: verifier kABI workaround (bsc#1225903).</li>
<li>kabi fix of perf/x86/intel: Expose existence of callback support to KVM (git fixes).</li>
<li>kabi/severities: Ignore io_uring internal symbols</li>
<li>kabi/severities: Remove mitigation-related symbols Those are used by the core kernel to implement CPU vulnerabilities mitigation and are not expected to be consumed by 3rd party users.</li>
<li>kabi/severities: cleanup and update for WiFi driver entries (bsc#1227149)</li>
<li>kabi/severities: cover all ath/<em> drivers (bsc#1227149) All symbols in ath/</em> network drivers are local and can be ignored</li>
<li>kabi/severities: cover all mt76 modules (bsc#1227149)</li>
<li>kabi/severities: ignore IMS functions They were dropped in previous patches. Noone is supposed to use them.</li>
<li>kabi/severities: ignore TAS2781 symbol drop, it's only locally used</li>
<li>kabi/severities: ignore amd pds internal symbols</li>
<li>kabi/severities: ignore kABI changes Realtek WiFi drivers (bsc#1227149) All those symbols are local and used for its own helpers</li>
<li>kabi/severities: ignore xfrm_bpf_md_dst that depends on CONFIG_DEBUG_* (bsc#1223415)</li>
<li>kabi: Use __iowriteXX_copy_inlined for in-kernel modules (bsc#1226502)</li>
<li>kasan, fortify: properly rename memintrinsics (git-fixes).</li>
<li>kbuild: Fix build target deb-pkg: ln: failed to create hard link (git-fixes).</li>
<li>kbuild: Install dtb files as 0644 in Makefile.dtbinst (git-fixes).</li>
<li>kbuild: avoid build error when single DTB is turned into composite DTB (git-fixes).</li>
<li>kbuild: doc: Update default INSTALL_MOD_DIR from extra to updates (git-fixes).</li>
<li>kconfig: doc: fix a typo in the note about 'imply' (git-fixes).</li>
<li>kconfig: fix comparison to constant symbols, 'm', 'n' (git-fixes).</li>
<li>kconfig: gconf: give a proper initial state to the Save button (stable-fixes).</li>
<li>kconfig: remove wrong expr_trans_bool() (stable-fixes).</li>
<li>kcov: do not lose track of remote references during softirqs (git-fixes).</li>
<li>kernel-binary: vdso: Own module_dir</li>
<li>kernel-doc: fix struct_group_tagged() parsing (git-fixes).</li>
<li>kexec: do syscore_shutdown() in kernel_kexec (git-fixes).</li>
<li>kheaders: explicitly define file modes for archived headers (stable-fixes).</li>
<li>knfsd: LOOKUP can return an illegal error value (git-fixes).</li>
<li>kobject_uevent: Fix OOB access within zap_modalias_env() (git-fixes).</li>
<li>kprobe/ftrace: bail out if ftrace was killed (git-fixes).</li>
<li>kprobe/ftrace: fix build error due to bad function definition (git-fixes).</li>
<li>kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).</li>
<li>kselftest: Add a ksft_perror() helper (stable-fixes).</li>
<li>kunit/fortify: Fix mismatched kvalloc()/vfree() usage (git-fixes).</li>
<li>kunit: Fix checksum tests on big endian CPUs (git-fixed).</li>
<li>leds: flash: leds-qcom-flash: Test the correct variable in init (git-fixes).</li>
<li>leds: mt6360: Fix memory leak in mt6360_init_isnk_properties() (git-fixes).</li>
<li>leds: pwm: Disable PWM when going to suspend (git-fixes).</li>
<li>leds: ss4200: Convert PCIBIOS_* return codes to errnos (git-fixes).</li>
<li>leds: trigger: Unregister sysfs attributes before calling deactivate() (git-fixes).</li>
<li>leds: triggers: Flush pending brightness before activating trigger (git-fixes).</li>
<li>lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (git-fixes).</li>
<li>lib: objagg: Fix general protection fault (git-fixes).</li>
<li>lib: objagg: Fix spelling (git-fixes).</li>
<li>lib: test_objagg: Fix spelling (git-fixes).</li>
<li>libceph: fix race between delayed_work() and ceph_monc_stop() (bsc#1228192).</li>
<li>libperf evlist: Avoid out-of-bounds access (git-fixes).</li>
<li>libsubcmd: Fix parse-options memory leak (git-fixes).</li>
<li>livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).</li>
<li>locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes)</li>
<li>lsm: fix the logic in security_inode_getsecctx() (git-fixes).</li>
<li>mISDN: Fix a use after free in hfcmulti_tx() (git-fixes).</li>
<li>mISDN: fix MISDN_TIME_STAMP handling (git-fixes).</li>
<li>mac802154: fix time calculation in ieee802154_configure_durations() (git-fixes).</li>
<li>mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable() (git-fixes).</li>
<li>maple_tree: fix mas_empty_area_rev() null pointer dereference (git-fixes).</li>
<li>media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).</li>
<li>media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).</li>
<li>media: dvb-frontends: tda10048: Fix integer overflow (stable-fixes).</li>
<li>media: dvb-frontends: tda18271c2dd: Remove casting during div (stable-fixes).</li>
<li>media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control() (git-fixes).</li>
<li>media: dvb-usb: dib0700_devices: Add missing release_firmware() (stable-fixes).</li>
<li>media: dvb: as102-fe: Fix as10x_register_addr packing (stable-fixes).</li>
<li>media: dvbdev: Initialize sbuf (stable-fixes).</li>
<li>media: dw2102: Do not translate i2c read into write (stable-fixes).</li>
<li>media: dw2102: fix a potential buffer overflow (git-fixes).</li>
<li>media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes).</li>
<li>media: i2c: Fix imx412 exposure control (git-fixes).</li>
<li>media: i2c: et8ek8: Do not strip remove function when driver is builtin (git-fixes).</li>
<li>media: imon: Fix race getting ictx->lock (git-fixes).</li>
<li>media: imx-jpeg: Drop initial source change event if capture has been setup (git-fixes).</li>
<li>media: imx-jpeg: Remove some redundant error logs (git-fixes).</li>
<li>media: imx-pxp: Fix ERR_PTR dereference in pxp_probe() (git-fixes).</li>
<li>media: ipu3-cio2: Request IRQ earlier (git-fixes).</li>
<li>media: lgdt3306a: Add a check against null-pointer-def (stable-fixes).</li>
<li>media: mc: Fix graph walk in media_pipeline_start (git-fixes).</li>
<li>media: mc: mark the media devnode as registered from the, start (git-fixes).</li>
<li>media: mxl5xx: Move xpt structures off stack (stable-fixes).</li>
<li>media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).</li>
<li>media: pci: ivtv: Add check for DMA map result (git-fixes).</li>
<li>media: radio-shark2: Avoid led_names truncations (git-fixes).</li>
<li>media: rcar-vin: Fix YUYV8_1X16 handling for CSI-2 (git-fixes).</li>
<li>media: rcar-vin: work around -Wenum-compare-conditional warning (git-fixes).</li>
<li>media: renesas: vsp1: Fix _irqsave and _irq mix (git-fixes).</li>
<li>media: renesas: vsp1: Store RPF partition configuration per RPF instance (git-fixes).</li>
<li>media: s2255: Use refcount_t instead of atomic_t for num_channels (stable-fixes).</li>
<li>media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).</li>
<li>media: sunxi: a83-mips-csi2: also select GENERIC_PHY (git-fixes).</li>
<li>media: uvcvideo: Add quirk for Logitech Rally Bar (git-fixes).</li>
<li>media: uvcvideo: Fix integer overflow calculating timestamp (git-fixes).</li>
<li>media: uvcvideo: Override default flags (git-fixes).</li>
<li>media: v4l2-core: hold videodev_lock until dev reg, finishes (stable-fixes).</li>
<li>media: v4l2-subdev: Fix stream handling for crop API (git-fixes).</li>
<li>media: v4l: Do not turn on privacy LED if streamon fails (git-fixes).</li>
<li>media: v4l: async: Fix NULL pointer dereference in adding ancillary links (git-fixes).</li>
<li>media: v4l: subdev: Fix typo in documentation (git-fixes).</li>
<li>media: venus: fix use after free in vdec_close (git-fixes).</li>
<li>media: venus: flush all buffers in output plane streamoff (git-fixes).</li>
<li>mei: demote client disconnect warning on suspend to debug (stable-fixes).</li>
<li>mei: me: add lunar lake point M DID (stable-fixes).</li>
<li>mei: me: release irq in mei_me_pci_resume error path (git-fixes).</li>
<li>mfd: omap-usb-tll: Use struct_size to allocate tll (git-fixes).</li>
<li>mfd: pm8008: Fix regmap irq chip initialisation (git-fixes).</li>
<li>misc: fastrpc: Avoid updating PD type for capability request (git-fixes).</li>
<li>misc: fastrpc: Copy the complete capability structure to user (git-fixes).</li>
<li>misc: fastrpc: Fix DSP capabilities request (git-fixes).</li>
<li>misc: fastrpc: Fix memory leak in audio daemon attach operation (git-fixes).</li>
<li>misc: fastrpc: Fix ownership reassignment of remote heap (git-fixes).</li>
<li>misc: fastrpc: Restrict untrusted app to attach to privileged PD (git-fixes).</li>
<li>misc: microchip: pci1xxxx: Fix a memory leak in the error handling of gp_aux_bus_probe() (git-fixes).</li>
<li>misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe() (git-fixes).</li>
<li>mlxbf_gige: stop interface during shutdown (git-fixes).</li>
<li>mlxsw: Use refcount_t for reference counting (git-fixes).</li>
<li>mm/slab: make __free(kfree) accept error pointers (git-fixes).</li>
<li>mm: page_owner: fix wrong information in dump_page_owner (git-fixes).</li>
<li>mmc: core: Add HS400 tuning in HS400es initialization (stable-fixes).</li>
<li>mmc: core: Add mmc_gpiod_set_cd_config() function (stable-fixes).</li>
<li>mmc: core: Do not force a retune before RPMB switch (stable-fixes).</li>
<li>mmc: davinci: Do not strip remove function when driver is builtin (git-fixes).</li>
<li>mmc: sdhci-acpi: Add quirk to enable pull-up on the card-detect GPIO on Asus T100TA (git-fixes).</li>
<li>mmc: sdhci-acpi: Disable write protect detection on Toshiba WT10-A (stable-fixes).</li>
<li>mmc: sdhci-acpi: Fix Lenovo Yoga Tablet 2 Pro 1380 sdcard slot not working (stable-fixes).</li>
<li>mmc: sdhci-acpi: Sort DMI quirks alphabetically (stable-fixes).</li>
<li>mmc: sdhci-brcmstb: check R1_STATUS for erase/trim/discard (git-fixes).</li>
<li>mmc: sdhci-msm: pervent access to suspended controller (git-fixes).</li>
<li>mmc: sdhci-pci: Convert PCIBIOS_* return codes to errnos (git-fixes).</li>
<li>mmc: sdhci: Add support for "Tuning Error" interrupts (stable-fixes).</li>
<li>mmc: sdhci: Do not invert write-protect twice (git-fixes).</li>
<li>mmc: sdhci: Do not lock spinlock around mmc_gpio_get_ro() (git-fixes).</li>
<li>mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes).</li>
<li>mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes).</li>
<li>mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).</li>
<li>mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes).</li>
<li>mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).</li>
<li>module: do not ignore sysfs_create_link() failures (git-fixes).</li>
<li>mptcp: Remove unnecessary test for __mptcp_init_sock() (git-fixes).</li>
<li>mptcp: annotate data-races around msk->rmem_fwd_alloc (git-fixes).</li>
<li>mptcp: fix bogus receive window shrinkage with multiple subflows (git-fixes).</li>
<li>mptcp: move __mptcp_error_report in protocol.c (git-fixes).</li>
<li>mptcp: process pending subflow error on close (git-fixes).</li>
<li>mt76: connac: move more mt7921/mt7915 mac shared code in connac lib (bsc#1227149).</li>
<li>mt76: mt7996: rely on mt76_sta_stats in mt76_wcid (bsc#1227149).</li>
<li>mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).</li>
<li>mtd: diskonchip: work around ubsan link failure (stable-fixes).</li>
<li>mtd: partitions: redboot: Added conversion of operands to a larger type (stable-fixes).</li>
<li>mtd: rawnand: Bypass a couple of sanity checks during NAND identification (git-fixes).</li>
<li>mtd: rawnand: Ensure ECC configuration is propagated to upper layers (git-fixes).</li>
<li>mtd: rawnand: Fix the nand_read_data_op() early check (git-fixes).</li>
<li>mtd: rawnand: hynix: fixed typo (git-fixes).</li>
<li>mtd: rawnand: rockchip: ensure NVDDR timings are rejected (git-fixes).</li>
<li>net/dcb: check for detached device before executing callbacks (bsc#1215587).</li>
<li>net/mlx5: Correctly compare pkt reformat ids (git-fixes).</li>
<li>net/mlx5: E-switch, store eswitch pointer before registering devlink_param (git-fixes).</li>
<li>net/mlx5: Fix MTMP register capability offset in MCAM register (git-fixes).</li>
<li>net/mlx5: Fix peer devlink set for SF representor devlink port (git-fixes).</li>
<li>net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes).</li>
<li>net/mlx5: Properly link new fs rules into the tree (git-fixes).</li>
<li>net/mlx5: Register devlink first under devlink lock (git-fixes).</li>
<li>net/mlx5: Restore mistakenly dropped parts in register devlink flow (git-fixes).</li>
<li>net/mlx5: SF, Stop waiting for FW as teardown was called (git-fixes).</li>
<li>net/mlx5: offset comp irq index in name by one (git-fixes).</li>
<li>net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit (git-fixes).</li>
<li>net/mlx5e: Fix mlx5e_priv_init() cleanup flow (git-fixes).</li>
<li>net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).</li>
<li>net/mlx5e: RSS, Block XOR hash with over 128 channels (git-fixes).</li>
<li>net/mlx5e: RSS, Block changing channels number when RXFH is configured (git-fixes).</li>
<li>net/smc: bugfix for smcr v2 server connect success statistic (git-fixes).</li>
<li>net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add (git-fixes).</li>
<li>net: Remove conditional threaded-NAPI wakeup based on task state (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>net: annotate data-races around sk->sk_bind_phc (git-fixes).</li>
<li>net: annotate data-races around sk->sk_forward_alloc (git-fixes).</li>
<li>net: annotate data-races around sk->sk_lingertime (git-fixes).</li>
<li>net: annotate data-races around sk->sk_tsflags (git-fixes).</li>
<li>net: can: j1939: Initialize unused data in j1939_send_one() (git-fixes).</li>
<li>net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new (git-fixes).</li>
<li>net: can: j1939: recover socket queue on CAN bus error during BAM transmission (git-fixes).</li>
<li>net: dsa: mt7530: trap link-local frames regardless of ST Port State (git-fixes).</li>
<li>net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45() (git-fixes).</li>
<li>net: ena: Fix incorrect descriptor free behavior (git-fixes).</li>
<li>net: ena: Fix potential sign extension issue (git-fixes).</li>
<li>net: ena: Fix redundant device NUMA node override (jsc#PED-8688).</li>
<li>net: ena: Move XDP code to its new files (git-fixes).</li>
<li>net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() (git-fixes).</li>
<li>net: ena: Set tx_info->xdpf value to NULL (git-fixes).</li>
<li>net: ena: Use tx_ring instead of xdp_ring for XDP channel TX (git-fixes).</li>
<li>net: ena: Wrong missing IO completions check order (git-fixes).</li>
<li>net: ethernet: mtk_wed: introduce mtk_wed_buf structure (bsc#1227149).</li>
<li>net: ethernet: mtk_wed: rename mtk_rxbm_desc in mtk_wed_bm_desc (bsc#1227149).</li>
<li>net: fec: Set mac_managed_pm during probe (git-fixes).</li>
<li>net: fill in MODULE_DESCRIPTION()s in kuba@'s modules (bsc#1227149).</li>
<li>net: hns3: Remove io_stop_wc() calls after __iowrite64_copy() (bsc#1226502)</li>
<li>net: ks8851: Handle softirqs at the end of IRQ thread to fix hang (git-fixes).</li>
<li>net: ks8851: Inline ks8851_rx_skb() (git-fixes).</li>
<li>net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs (git-fixes).</li>
<li>net: lan743x: Support WOL at both the PHY and MAC appropriately (git-fixes).</li>
<li>net: lan743x: disable WOL upon resume to restore full data path operation (git-fixes).</li>
<li>net: mac802154: Fix racy device stats updates by DEV_STATS_INC() and DEV_STATS_ADD() (stable-fixes).</li>
<li>net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491).</li>
<li>net: mana: Fix possible double free in error handling path (git-fixes).</li>
<li>net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).</li>
<li>net: nfc: remove inappropriate attrs check (stable-fixes).</li>
<li>net: phy: Micrel KSZ8061: fix errata solution not taking effect problem (git-fixes).</li>
<li>net: phy: micrel: add Microchip KSZ 9477 to the device table (git-fixes).</li>
<li>net: phy: micrel: fix KSZ9477 PHY issues after suspend/resume (git-fixes).</li>
<li>net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8061 (git-fixes).</li>
<li>net: phy: microchip: lan87xx: reinit PHY after cable test (git-fixes).</li>
<li>net: phy: mxl-gpy: Remove interrupt mask clearing from config_init (git-fixes).</li>
<li>net: phy: phy_device: Fix PHY LED blinking code comment (git-fixes).</li>
<li>net: ravb: Always process TX descriptor ring (git-fixes).</li>
<li>net: ravb: Always update error counters (git-fixes).</li>
<li>net: sparx5: fix wrong config being used when reconfiguring PCS (git-fixes).</li>
<li>net: sparx5: flower: fix fragment flags handling (git-fixes).</li>
<li>net: stmmac: fix rx queue priority assignment (git-fixes).</li>
<li>net: tls, fix WARNIING in __sk_msg_free (bsc#1221858).</li>
<li>net: tls: fix returned read length with async decrypt (bsc#1221858).</li>
<li>net: tls: fix use-after-free with partial reads and async (bsc#1221858).</li>
<li>net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).</li>
<li>net: usb: ax88179_178a: improve link status logs (git-fixes).</li>
<li>net: usb: ax88179_178a: improve reset check (git-fixes).</li>
<li>net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).</li>
<li>net: usb: qmi_wwan: add Telit FN912 compositions (stable-fixes).</li>
<li>net: usb: qmi_wwan: add Telit FN920C04 compositions (git-fixes).</li>
<li>net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings (git-fixes).</li>
<li>net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-fixes).</li>
<li>net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).</li>
<li>net: usb: sr9700: stop lying about skb->truesize (git-fixes).</li>
<li>net:usb:qmi_wwan: support Rolling modules (stable-fixes).</li>
<li>netfilter: nf_tables: disable toggling dormant table state more than once (git-fixes).</li>
<li>netfilter: nf_tables: uapi: Describe NFTA_RULE_CHAIN_ID (git-fixes).</li>
<li>netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).</li>
<li>netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes).</li>
<li>nfc/nci: Add the inconsistency check between the input data length and count (stable-fixes).</li>
<li>nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).</li>
<li>nfc: nci: Fix kcov check in nci_rx_work() (git-fixes).</li>
<li>nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).</li>
<li>nfs: Avoid flushing many pages with NFS_FILE_SYNC (bsc#1218442).</li>
<li>nfs: Block on write congestion (bsc#1218442).</li>
<li>nfs: Bump default write congestion size (bsc#1218442).</li>
<li>nfs: Drop pointless check from nfs_commit_release_pages() (bsc#1218442).</li>
<li>nfs: Fix up kabi after adding write_congestion_wait (bsc#1218442).</li>
<li>nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes).</li>
<li>nfs: Properly initialize server->writeback (bsc#1218442).</li>
<li>nfs: drop the incorrect assertion in nfs_swap_rw() (git-fixes).</li>
<li>nfs: fix undefined behavior in nfs_block_bits() (git-fixes).</li>
<li>nfs: keep server info for remounts (git-fixes).</li>
<li>nfsd: hold a lighter-weight client reference over CB_RECALL_ANY (git-fixes).</li>
<li>nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).</li>
<li>nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).</li>
<li>nilfs2: add missing check for inode numbers on directory entries (stable-fixes).</li>
<li>nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro (git-fixes).</li>
<li>nilfs2: convert persistent object allocator to use kmap_local (git-fixes).</li>
<li>nilfs2: fix incorrect inode allocation from reserved inodes (git-fixes).</li>
<li>nilfs2: fix inode number range checks (stable-fixes).</li>
<li>nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (git-fixes).</li>
<li>nilfs2: fix out-of-range warning (git-fixes).</li>
<li>nilfs2: fix potential hang in nilfs_detach_log_writer() (git-fixes).</li>
<li>nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).</li>
<li>nilfs2: fix use-after-free of timer for log writer thread (git-fixes).</li>
<li>nilfs2: make superblock data array index computation sparse friendly (git-fixes).</li>
<li>nilfs2: return the mapped address from nilfs_get_page() (stable-fixes).</li>
<li>nouveau: add an ioctl to report vram usage (stable-fixes).</li>
<li>nouveau: add an ioctl to return vram bar size (stable-fixes).</li>
<li>nouveau: report byte usage in VRAM usage (git-fixes).</li>
<li>nvme-fabrics: short-circuit reconnect retries (bsc#1186716).</li>
<li>nvme-multipath: fix io accounting on failover (git-fixes).</li>
<li>nvme-pci: Add quirk for broken MSIs (git-fixes).</li>
<li>nvme-tcp: Export the nvme_tcp_wq to sysfs (bsc#1224049).</li>
<li>nvme-tcp: strict pdu pacing to avoid send stalls on TLS (bsc#1221858).</li>
<li>nvme/tcp: Add wq_unbound modparam for nvme_tcp_wq (bsc#1224049).</li>
<li>nvme: cancel pending I/O if nvme controller is in terminal state (bsc#1226503).</li>
<li>nvme: do not retry authentication failures (bsc#1186716).</li>
<li>nvme: find numa distance only if controller has valid numa id (git-fixes).</li>
<li>nvme: fix multipath batched completion accounting (git-fixes).</li>
<li>nvme: fix nvme_pr_* status code parsing (git-fixes).</li>
<li>nvme: fix warn output about shared namespaces without CONFIG_NVME_MULTIPATH (git-fixes).</li>
<li>nvme: return kernel error codes for admin queue connect (bsc#1186716).</li>
<li>nvmet-auth: replace pr_debug() with pr_err() to report an error (git-fixes).</li>
<li>nvmet-auth: return the error code to the nvmet_auth_host_hash() callers (git-fixes).</li>
<li>nvmet-passthru: propagate status from id override functions (git-fixes).</li>
<li>nvmet-tcp: fix possible memory leak when tearing down a controller (git-fixes).</li>
<li>nvmet: fix ns enable/disable possible hang (git-fixes).</li>
<li>nvmet: fix nvme status code when namespace is disabled (git-fixes).</li>
<li>nvmet: lock config semaphore when accessing DH-HMAC-CHAP key (bsc#1186716).</li>
<li>nvmet: prevent sprintf() overflow in nvmet_subsys_nsid_exists() (git-fixes).</li>
<li>nvmet: return DHCHAP status codes from nvmet_setup_auth() (bsc#1186716).</li>
<li>ocfs2: adjust enabling place for la window (bsc#1219224).</li>
<li>ocfs2: fix DIO failure due to insufficient transaction credits (git-fixes).</li>
<li>ocfs2: fix races between hole punching and AIO+DIO (git-fixes).</li>
<li>ocfs2: fix sparse warnings (bsc#1219224).</li>
<li>ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).</li>
<li>ocfs2: speed up chain-list searching (bsc#1219224).</li>
<li>ocfs2: use coarse time for new created files (git-fixes).</li>
<li>octeontx2-af: Add array index check (git-fixes).</li>
<li>octeontx2-af: Fix NIX SQ mode and BP config (git-fixes).</li>
<li>octeontx2-af: Fix issue with loading coalesced KPU profiles (git-fixes).</li>
<li>octeontx2-pf: Fix transmit scheduler resource leak (git-fixes).</li>
<li>octeontx2-pf: check negative error code in otx2_open() (git-fixes).</li>
<li>octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation (git-fixes).</li>
<li>of: dynamic: Synchronize of_changeset_destroy() with the devlink removals (git-fixes).</li>
<li>of: module: add buffer overflow check in of_modalias() (git-fixes).</li>
<li>of: module: prevent NULL pointer dereference in vsnprintf() (stable-fixes).</li>
<li>of: property: Add in-ports/out-ports support to of_graph_get_port_parent() (stable-fixes).</li>
<li>of: property: Improve finding the consumer of a remote-endpoint property (git-fixes).</li>
<li>of: property: Improve finding the supplier of a remote-endpoint property (git-fixes).</li>
<li>of: property: fix typo in io-channels (git-fixes).</li>
<li>of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing (git-fixes).</li>
<li>of: unittest: Fix compile in the non-dynamic case (git-fixes).</li>
<li>orangefs: fix out-of-bounds fsid access (git-fixes).</li>
<li>pNFS/filelayout: fixup pNfs allocation modes (git-fixes).</li>
<li>perf annotate: Fix annotation_calc_lines() to pass correct address to get_srcline() (git-fixes).</li>
<li>perf annotate: Get rid of duplicate --group option item (git-fixes).</li>
<li>perf auxtrace: Fix multiple use of --itrace option (git-fixes).</li>
<li>perf bench internals inject-build-id: Fix trap divide when collecting just one DSO (git-fixes).</li>
<li>perf bench uprobe: Remove lib64 from libc.so.6 binary path (git-fixes).</li>
<li>perf bpf: Clean up the generated/copied vmlinux.h (git-fixes).</li>
<li>perf daemon: Fix file leak in daemon_session__control (git-fixes).</li>
<li>perf docs: Document bpf event modifier (git-fixes).</li>
<li>perf evsel: Fix duplicate initialization of data->id in evsel__parse_sample() (git-fixes).</li>
<li>perf expr: Fix "has_event" function for metric style events (git-fixes).</li>
<li>perf intel-pt: Fix unassigned instruction op (discovered by MemorySanitizer) (git-fixes).</li>
<li>perf jevents: Drop or simplify small integer values (git-fixes).</li>
<li>perf list: fix short description for some cache events (git-fixes).</li>
<li>perf lock contention: Add a missing NULL check (git-fixes).</li>
<li>perf metric: Do not remove scale from counts (git-fixes).</li>
<li>perf pmu: Count sys and cpuid JSON events separately (git fixes).</li>
<li>perf pmu: Fix a potential memory leak in perf_pmu__lookup() (git-fixes).</li>
<li>perf pmu: Treat the msr pmu as software (git-fixes).</li>
<li>perf print-events: make is_event_supported() more robust (git-fixes).</li>
<li>perf probe: Add missing libgen.h header needed for using basename() (git-fixes).</li>
<li>perf record: Check conflict between '--timestamp-filename' option and pipe mode before recording (git-fixes).</li>
<li>perf record: Delete session after stopping sideband thread (git-fixes).</li>
<li>perf record: Fix debug message placement for test consumption (git-fixes).</li>
<li>perf record: Fix possible incorrect free in record__switch_output() (git-fixes).</li>
<li>perf report: Avoid SEGV in report__setup_sample_type() (git-fixes).</li>
<li>perf sched timehist: Fix -g/--call-graph option failure (git-fixes).</li>
<li>perf script: Show also errors for --insn-trace option (git-fixes).</li>
<li>perf srcline: Add missed addr2line closes (git-fixes).</li>
<li>perf stat: Avoid metric-only segv (git-fixes).</li>
<li>perf stat: Do not display metric header for non-leader uncore events (git-fixes).</li>
<li>perf stat: Do not fail on metrics on s390 z/VM systems (git-fixes).</li>
<li>perf symbols: Fix ownership of string in dso__load_vmlinux() (git-fixes).</li>
<li>perf test shell arm_coresight: Increase buffer size for Coresight basic tests (git-fixes).</li>
<li>perf tests: Apply attributes to all events in object code reading test (git-fixes).</li>
<li>perf tests: Make "test data symbol" more robust on Neoverse N1 (git-fixes).</li>
<li>perf thread: Fixes to thread__new() related to initializing comm (git-fixes).</li>
<li>perf thread_map: Free strlist on normal path in thread_map__new_by_tid_str() (git-fixes).</li>
<li>perf top: Uniform the event name for the hybrid machine (git-fixes).</li>
<li>perf top: Use evsel's cpus to replace user_requested_cpus (git-fixes).</li>
<li>perf ui browser: Avoid SEGV on title (git fixes).</li>
<li>perf ui browser: Do not save pointer to stack memory (git-fixes).</li>
<li>perf vendor events amd: Add Zen 4 memory controller events (git-fixes).</li>
<li>perf vendor events amd: Fix Zen 4 cache latency events (git-fixes).</li>
<li>perf/x86/amd/lbr: Discard erroneous branch entries (git-fixes).</li>
<li>perf/x86/intel/ds: Do not clear ->pebs_data_cfg for the last PEBS event (git-fixes).</li>
<li>perf/x86/intel: Expose existence of callback support to KVM (git-fixes).</li>
<li>perf/x86: Fix out of range data (git-fixes).</li>
<li>perf: Enqueue SIGTRAP always via task_work (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>perf: Move irq_work_queue() where the event is prepared (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>perf: Remove perf_swevent_get_recursion_context() from perf_pending_task() (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>perf: Split __perf_pending_irq() out of perf_pending_irq() (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>phy: cadence-torrent: Check return value on register read (git-fixes).</li>
<li>phy: freescale: imx8m-pcie: fix pcie link-up instability (git-fixes).</li>
<li>phy: marvell: a3700-comphy: Fix hardcoded array size (git-fixes).</li>
<li>phy: marvell: a3700-comphy: Fix out of bounds read (git-fixes).</li>
<li>phy: rockchip-snps-pcie3: fix bifurcation on rk3588 (git-fixes).</li>
<li>phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits (git-fixes).</li>
<li>phy: rockchip: naneng-combphy: Fix mux on rk3588 (git-fixes).</li>
<li>phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered (git-fixes).</li>
<li>pinctrl/meson: fix typo in PDM's pin name (git-fixes).</li>
<li>pinctrl: armada-37xx: remove an unused variable (git-fixes).</li>
<li>pinctrl: baytrail: Fix selecting gpio pinctrl state (git-fixes).</li>
<li>pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).</li>
<li>pinctrl: core: fix possible memory leak when pinctrl_enable() fails (git-fixes).</li>
<li>pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).</li>
<li>pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (git-fixes).</li>
<li>pinctrl: freescale: mxs: Fix refcount of child (git-fixes).</li>
<li>pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback (git-fixes).</li>
<li>pinctrl: mediatek: paris: Rework support for PIN_CONFIG_{INPUT,OUTPUT}_ENABLE (git-fixes).</li>
<li>pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).</li>
<li>pinctrl: qcom: pinctrl-sm7150: Fix sdc1 and ufs special pins regs (git-fixes).</li>
<li>pinctrl: qcom: spmi-gpio: drop broken pm8008 support (git-fixes).</li>
<li>pinctrl: renesas: r8a779g0: FIX PWM suffixes (git-fixes).</li>
<li>pinctrl: renesas: r8a779g0: Fix (H)SCIF1 suffixes (git-fixes).</li>
<li>pinctrl: renesas: r8a779g0: Fix (H)SCIF3 suffixes (git-fixes).</li>
<li>pinctrl: renesas: r8a779g0: Fix CANFD5 suffix (git-fixes).</li>
<li>pinctrl: renesas: r8a779g0: Fix FXR_TXEN[AB] suffixes (git-fixes).</li>
<li>pinctrl: renesas: r8a779g0: Fix IRQ suffixes (git-fixes).</li>
<li>pinctrl: renesas: r8a779g0: Fix TCLK suffixes (git-fixes).</li>
<li>pinctrl: renesas: r8a779g0: Fix TPU suffixes (git-fixes).</li>
<li>pinctrl: rockchip: fix pinmux bits for RK3328 GPIO2-B pins (git-fixes).</li>
<li>pinctrl: rockchip: fix pinmux bits for RK3328 GPIO3-B pins (git-fixes).</li>
<li>pinctrl: rockchip: fix pinmux reset in rockchip_pmx_set (git-fixes).</li>
<li>pinctrl: rockchip: update rk3308 iomux routes (git-fixes).</li>
<li>pinctrl: rockchip: use dedicated pinctrl type for RK3328 (git-fixes).</li>
<li>pinctrl: single: fix possible memory leak when pinctrl_enable() fails (git-fixes).</li>
<li>pinctrl: ti: ti-iodelay: fix possible memory leak when pinctrl_enable() fails (git-fixes).</li>
<li>platform/chrome: cros_ec_debugfs: fix wrong EC message version (git-fixes).</li>
<li>platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes (stable-fixes).</li>
<li>platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).</li>
<li>platform/x86/intel/tpmi: Handle error from tpmi_process_info() (stable-fixes).</li>
<li>platform/x86: ISST: Add Grand Ridge to HPM CPU list (stable-fixes).</li>
<li>platform/x86: ISST: Add Granite Rapids-D to HPM CPU list (stable-fixes).</li>
<li>platform/x86: dell-smbios: Fix wrong token data in sysfs (git-fixes).</li>
<li>platform/x86: lg-laptop: Change ACPI device id (stable-fixes).</li>
<li>platform/x86: lg-laptop: Remove LGEX0815 hotkey handling (stable-fixes).</li>
<li>platform/x86: lg-laptop: Use ACPI device handle when evaluating WMAB/WMBB (stable-fixes).</li>
<li>platform/x86: thinkpad_acpi: Take hotkey_mutex during hotkey_exit() (git-fixes).</li>
<li>platform/x86: toshiba_acpi: Add quirk for buttons on Z830 (stable-fixes).</li>
<li>platform/x86: toshiba_acpi: Fix array out-of-bounds access (git-fixes).</li>
<li>platform/x86: toshiba_acpi: Fix quickstart quirk handling (git-fixes).</li>
<li>platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW 11.6" tablet (stable-fixes).</li>
<li>platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro (stable-fixes).</li>
<li>platform/x86: wireless-hotkey: Add support for LG Airplane Button (stable-fixes).</li>
<li>platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).</li>
<li>power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).</li>
<li>power: supply: ab8500: Fix error handling when calling iio_read_channel_processed() (git-fixes).</li>
<li>power: supply: cros_usbpd: provide ID table for avoiding fallback match (stable-fixes).</li>
<li>power: supply: ingenic: Fix some error handling paths in ingenic_battery_get_property() (git-fixes).</li>
<li>power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator (git-fixes).</li>
<li>powerpc/64s/radix/kfence: map __kfence_pool at page granularity (bsc#1223570 ltc#205770).</li>
<li>powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).</li>
<li>powerpc/prom: Add CPU info to hardware description string later (bsc#1215199).</li>
<li>powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).</li>
<li>powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).</li>
<li>powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).</li>
<li>powerpc/pseries: make max polling consistent for longer H_CALLs (bsc#1215199).</li>
<li>powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).</li>
<li>powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).</li>
<li>powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).</li>
<li>powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).</li>
<li>ppdev: Add an error check in register_device (git-fixes).</li>
<li>prctl: generalize PR_SET_MDWE support check to be per-arch (bsc#1225610).</li>
<li>printk: Add this_cpu_in_panic() (bsc#1225607).</li>
<li>printk: Adjust mapping for 32bit seq macros (bsc#1225607).</li>
<li>printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1225607).</li>
<li>printk: Consolidate console deferred printing (bsc#1225607).</li>
<li>printk: Disable passing console lock owner completely during panic() (bsc#1225607).</li>
<li>printk: Do not take console lock for console_flush_on_panic() (bsc#1225607).</li>
<li>printk: For @suppress_panic_printk check for other CPU in panic (bsc#1225607).</li>
<li>printk: Keep non-panic-CPUs out of console lock (bsc#1225607).</li>
<li>printk: Let no_printk() use _printk() (bsc#1225618).</li>
<li>printk: Reduce console_unblank() usage in unsafe scenarios (bsc#1225607).</li>
<li>printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1225607).</li>
<li>printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).</li>
<li>printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1225607).</li>
<li>printk: Wait for all reserved records with pr_flush() (bsc#1225607).</li>
<li>printk: nbcon: Relocate 32bit seq macros (bsc#1225607).</li>
<li>printk: ringbuffer: Clarify special lpos values (bsc#1225607).</li>
<li>printk: ringbuffer: Cleanup reader terminology (bsc#1225607).</li>
<li>printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1225607).</li>
<li>printk: ringbuffer: Skip non-finalized records in panic (bsc#1225607).</li>
<li>proc/kcore: do not try to access unaccepted memory (git-fixes).</li>
<li>pwm: sti: Prepare removing pwm_chip from driver data (stable-fixes).</li>
<li>pwm: sti: Simplify probe function using devm functions (git-fixes).</li>
<li>pwm: stm32: Always do lazy disabling (git-fixes).</li>
<li>qibfs: fix dentry leak (git-fixes)</li>
<li>regmap-i2c: Subtract reg size from max_write (stable-fixes).</li>
<li>regmap: Add regmap_read_bypassed() (git-fixes).</li>
<li>regulator: bd71815: fix ramp values (git-fixes).</li>
<li>regulator: bd71828: Do not overwrite runtime voltages (git-fixes).</li>
<li>regulator: change devm_regulator_get_enable_optional() stub to return Ok (git-fixes).</li>
<li>regulator: change stubbed devm_regulator_get_enable to return Ok (git-fixes).</li>
<li>regulator: core: Fix modpost error "regulator_get_regmap" undefined (git-fixes).</li>
<li>regulator: core: fix debugfs creation regression (git-fixes).</li>
<li>regulator: irq_helpers: duplicate IRQ name (stable-fixes).</li>
<li>regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).</li>
<li>regulator: tps65132: Add of_match table (stable-fixes).</li>
<li>regulator: vqmmc-ipq4019: fix module autoloading (stable-fixes).</li>
<li>remoteproc: imx_rproc: Fix refcount mistake in imx_rproc_addr_init (git-fixes).</li>
<li>remoteproc: imx_rproc: Skip over memory region when node value is NULL (git-fixes).</li>
<li>remoteproc: k3-r5: Do not allow core1 to power up before core0 via sysfs (git-fixes).</li>
<li>remoteproc: k3-r5: Fix IPC-only mode detection (git-fixes).</li>
<li>remoteproc: k3-r5: Jump to error handling labels in start/stop errors (git-fixes).</li>
<li>remoteproc: k3-r5: Wait for core0 power-up before powering up core1 (git-fixes).</li>
<li>remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).</li>
<li>remoteproc: stm32_rproc: Fix mailbox interrupts queuing (git-fixes).</li>
<li>ring-buffer: Fix a race between readers and resize checks (git-fixes).</li>
<li>ring-buffer: Only update pages_touched when a new page is touched (git-fixes).</li>
<li>ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes).</li>
<li>rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL (git-fixes).</li>
<li>rtc: abx80x: Fix return value of nvmem callback on read (git-fixes).</li>
<li>rtc: cmos: Fix return value of nvmem callbacks (git-fixes).</li>
<li>rtc: interface: Add RTC offset to alarm after fix-up (git-fixes).</li>
<li>rtc: isl1208: Fix return value of nvmem callbacks (git-fixes).</li>
<li>s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224792).</li>
<li>s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223869).</li>
<li>s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224793).</li>
<li>s390/cpacf: Make use of invalid opcode produce a link error (git-fixes bsc#1227072).</li>
<li>s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1225133).</li>
<li>s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224348).</li>
<li>s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225136).</li>
<li>s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225134).</li>
<li>s390/ism: Properly fix receive message buffer allocation (git-fixes bsc#1223590).</li>
<li>s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223871).</li>
<li>s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223872).</li>
<li>s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223874).</li>
<li>s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223870).</li>
<li>s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223593).</li>
<li>s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223592).</li>
<li>s390: Implement __iowrite32_copy() (bsc#1226502)</li>
<li>s390: Stop using weak symbols for __iowrite64_copy() (bsc#1226502)</li>
<li>saa7134: Unchecked i2c_transfer function result fixed (git-fixes).</li>
<li>sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791).</li>
<li>sched/debug: Update stale reference to sched_debug.c (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>sched/topology: Optimize topology_span_sane() (bsc#1225053).</li>
<li>scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).</li>
<li>scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).</li>
<li>scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).</li>
<li>scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).</li>
<li>scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).</li>
<li>scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).</li>
<li>scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).</li>
<li>sctp: annotate data-races around sk->sk_wmem_queued (git-fixes).</li>
<li>selftests/binderfs: use the Makefile's rules, not Make's implicit rules (git-fixes).</li>
<li>selftests/bpf: add edge case backtracking logic test (bsc#1225756).</li>
<li>selftests/bpf: precision tracking test for BPF_NEG and BPF_END (bsc#1225756).</li>
<li>selftests/bpf: test case for callback_depth states pruning logic (bsc#1225903).</li>
<li>selftests/bpf: test if state loops are detected in a tricky case (bsc#1225903).</li>
<li>selftests/bpf: test widening for iterating callbacks (bsc#1225903).</li>
<li>selftests/bpf: tests for iterating callbacks (bsc#1225903).</li>
<li>selftests/bpf: tests with delayed read/precision makrs in loop body (bsc#1225903).</li>
<li>selftests/bpf: track string payload offset as scalar in strobemeta (bsc#1225903).</li>
<li>selftests/bpf: track tcp payload offset as scalar in xdp_synproxy (bsc#1225903).</li>
<li>selftests/ftrace: Fix event filter target_func selection (stable-fixes).</li>
<li>selftests/ftrace: Limit length in subsystem-enable tests (git-fixes).</li>
<li>selftests/kcmp: remove unused open mode (git-fixes).</li>
<li>selftests/mm: compaction_test: fix incorrect write of zero to nr_hugepages (git-fixes).</li>
<li>selftests/mm: fix build warnings on ppc64 (stable-fixes).</li>
<li>selftests/net: convert test_bridge_neigh_suppress.sh to run it in unique namespace (stable-fixes).</li>
<li>selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).</li>
<li>selftests/powerpc/dexcr: Add -no-pie to hashchk tests (git-fixes).</li>
<li>selftests/resctrl: fix clang build failure: use LOCAL_HDRS (git-fixes).</li>
<li>selftests/sigaltstack: Fix ppc64 GCC build (git-fixes).</li>
<li>selftests/timers/posix_timers: Reimplement check_timer_distribution() (git-fixes).</li>
<li>selftests: default to host arch for LLVM builds (git-fixes).</li>
<li>selftests: fix OOM in msg_zerocopy selftest (git-fixes).</li>
<li>selftests: hsr: Extend the testsuite to also cover HSRv1 (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>selftests: hsr: Reorder the testsuite (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>selftests: hsr: Use `let' properly (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>selftests: kselftest: Fix build failure with NOLIBC (git-fixes).</li>
<li>selftests: kselftest: Mark functions that unconditionally call exit() as __noreturn (git-fixes).</li>
<li>selftests: make order checking verbose in msg_zerocopy selftest (git-fixes).</li>
<li>selftests: mptcp: add ms units for tc-netem delay (stable-fixes).</li>
<li>selftests: net: bridge: increase IGMP/MLD exclude timeout membership interval (git-fixes).</li>
<li>selftests: net: kill smcrouted in the cleanup logic in amt.sh (git-fixes).</li>
<li>selftests: net: move amt to socat for better compatibility (git-fixes).</li>
<li>selftests: sud_test: return correct emulated syscall value on RISC-V (stable-fixes).</li>
<li>selftests: test_bridge_neigh_suppress.sh: Fix failures due to duplicate MAC (git-fixes).</li>
<li>selftests: timers: Convert posix_timers test to generate KTAP output (stable-fixes).</li>
<li>selftests: timers: Fix abs() warning in posix_timers test (git-fixes).</li>
<li>selftests: timers: Fix posix_timers ksft_print_msg() warning (git-fixes).</li>
<li>selftests: timers: Fix valid-adjtimex signed left-shift undefined behavior (stable-fixes).</li>
<li>selinux: introduce an initial SID for early boot processes (bsc#1208593).</li>
<li>serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).</li>
<li>serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup (git-fixes).</li>
<li>serial: bcm63xx-uart: fix tx after conversion to uart_port_tx_limited() (git-fixes).</li>
<li>serial: core: introduce uart_port_tx_limited_flags() (git-fixes).</li>
<li>serial: exar: adding missing CTI and Exar PCI ids (stable-fixes).</li>
<li>serial: imx: Introduce timeout when waiting on transmitter empty (stable-fixes).</li>
<li>serial: imx: Raise TX trigger level to 8 (stable-fixes).</li>
<li>serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).</li>
<li>serial: max3100: Fix bitwise types (git-fixes).</li>
<li>serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-fixes).</li>
<li>serial: max3100: Update uart_driver_registered on driver removal (git-fixes).</li>
<li>serial: pch: Do not disable interrupts while acquiring lock in ISR (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>serial: pch: Do not initialize uart_port's spin_lock (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>serial: pch: Invoke handle_rx_to() directly (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>serial: pch: Make push_rx() return void (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
<li>serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).</li>
<li>serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).</li>
<li>serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).</li>
<li>slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).</li>
<li>smb3: allow controlling length of time directory entries are cached with dir leases (git-fixes, bsc#1225172).</li>
<li>smb3: allow controlling maximum number of cached directories (git-fixes, bsc#1225172).</li>
<li>smb3: do not start laundromat thread when dir leases disabled (git-fixes, bsc#1225172).</li>
<li>smb3: show beginning time for per share stats (bsc#1225172).</li>
<li>smb: client: do not start laundromat thread on nohandlecache (git-fixes, bsc#1225172).</li>
<li>smb: client: ensure to try all targets when finding nested links (bsc#1225172).</li>
<li>smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1225172).</li>
<li>smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes, bsc#1225172).</li>
<li>smb: client: get rid of dfs code dep in namespace.c (bsc#1225172).</li>
<li>smb: client: get rid of dfs naming in automount code (bsc#1225172).</li>
<li>smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1225172).</li>
<li>smb: client: make laundromat a delayed worker (git-fixes, bsc#1225172).</li>
<li>smb: client: prevent new fids from being removed by laundromat (git-fixes, bsc#1225172).</li>
<li>smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1225172).</li>
<li>smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1225172).</li>
<li>smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1225172).</li>
<li>soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).</li>
<li>soc: qcom: pdr: fix parsing of domains lists (git-fixes).</li>
<li>soc: qcom: pdr: protect locator_addr with the main mutex (git-fixes).</li>
<li>soc: qcom: pmic_glink: Handle the return value of pmic_glink_init (git-fixes).</li>
<li>soc: qcom: pmic_glink: Make client-lock non-sleeping (git-fixes).</li>
<li>soc: qcom: pmic_glink: do not traverse clients list without a lock (git-fixes).</li>
<li>soc: qcom: pmic_glink: notify clients about the current state (git-fixes).</li>
<li>soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).</li>
<li>soc: qcom: rpmh-rsc: Ensure irqs are not disabled by rpmh_rsc_send_data() callers (git-fixes).</li>
<li>soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer message (stable-fixes).</li>
<li>soc: xilinx: rename cpu_number1 to dummy_cpu_number (git-fixes).</li>
<li>soundwire: amd: fix for wake interrupt handling for clockstop mode (git-fixes).</li>
<li>soundwire: cadence: fix invalid PDI offset (stable-fixes).</li>
<li>speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).</li>
<li>spi: Do not mark message DMA mapped when no transfer in it is (git-fixes).</li>
<li>spi: atmel-quadspi: Add missing check for clk_prepare (git-fixes).</li>
<li>spi: cadence: Ensure data lines set to low during dummy-cycle period (stable-fixes).</li>
<li>spi: fix null pointer dereference within spi_sync (git-fixes).</li>
<li>spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes).</li>
<li>spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices (stable-fixes).</li>
<li>spi: microchip-core-qspi: fix setting spi bus clock rate (git-fixes).</li>
<li>spi: microchip-core: defer asserting chip select until just before write to TX FIFO (git-fixes).</li>
<li>spi: microchip-core: ensure TX and RX FIFOs are empty at start of a transfer (git-fixes).</li>
<li>spi: microchip-core: fix the issues in the isr (git-fixes).</li>
<li>spi: microchip-core: only disable SPI controller when register value change requires it (git-fixes).</li>
<li>spi: mux: set ctlr->bits_per_word_mask (stable-fixes).</li>
<li>spi: spi-microchip-core: Fix the number of chip selects supported (git-fixes).</li>
<li>spi: spidev: add correct compatible for Rohm BH2228FV (git-fixes).</li>
<li>spi: stm32: Do not warn about spurious interrupts (git-fixes).</li>
<li>spi: stm32: qspi: Clamp stm32_qspi_get_mode() output to CCR_BUSWIDTH_4 (git-fixes).</li>
<li>spi: stm32: qspi: Fix dual flash mode sanity test in stm32_qspi_setup() (git-fixes).</li>
<li>spi: xilinx: Fix kernel documentation in the xilinx_spi.h (git-fixes).</li>
<li>spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).</li>
<li>ssb: Fix potential NULL pointer dereference in ssb_device_uevent() (stable-fixes).</li>
<li>staging: vt6655: Remove unused declaration of RFbAL7230SelectChannelPostProcess() (git-fixes).</li>
<li>struct acpi_ec kABI workaround (git-fixes).</li>
<li>sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).</li>
<li>swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)</li>
<li>swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)</li>
<li>swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)</li>
<li>swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331)</li>
<li>tcp: Dump bound-only sockets in inet_diag (bsc#1204562).</li>
<li>thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data (stable-fixes).</li>
<li>thermal/drivers/mediatek/lvts_thermal: Return error in case of invalid efuse data (git-fixes).</li>
<li>thermal/drivers/qcom/lmh: Check for SCM availability at probe (git-fixes).</li>
<li>thermal/drivers/tsens: Fix null pointer dereference (git-fixes).</li>
<li>thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).</li>
<li>thunderbolt: Fix wake configurations after device unplug (stable-fixes).</li>
<li>thunderbolt: Introduce tb_path_deactivate_hop() (stable-fixes).</li>
<li>thunderbolt: Introduce tb_port_reset() (stable-fixes).</li>
<li>thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4 routers (stable-fixes).</li>
<li>thunderbolt: Reset only non-USB4 host routers in resume (git-fixes).</li>
<li>thunderbolt: debugfs: Fix margin debugfs node creation condition (git-fixes).</li>
<li>tls: break out of main loop when PEEK gets a non-data record (bsc#1221858).</li>
<li>tls: do not skip over different type records from the rx_list (bsc#1221858).</li>
<li>tls: fix peeking with sync+async decryption (bsc#1221858).</li>
<li>tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1221858).</li>
<li>tools/arch/x86/intel_sdsi: Fix maximum meter bundle length (git-fixes).</li>
<li>tools/arch/x86/intel_sdsi: Fix meter_certificate decoding (git-fixes).</li>
<li>tools/arch/x86/intel_sdsi: Fix meter_show display (git-fixes).</li>
<li>tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).</li>
<li>tools/memory-model: Fix bug in lock.cat (git-fixes).</li>
<li>tools/power turbostat: Expand probe_intel_uncore_frequency() (bsc#1221765).</li>
<li>tools/power turbostat: Remember global max_die_id (stable-fixes).</li>
<li>tools/power/cpupower: Fix Pstate frequency reporting on AMD Family 1Ah CPUs (stable-fixes).</li>
<li>tools: ynl: do not leak mcast_groups on init error (git-fixes).</li>
<li>tools: ynl: fix handling of multiple mcast groups (git-fixes).</li>
<li>tools: ynl: make sure we always pass yarg to mnl_cb_run (git-fixes).</li>
<li>tpm_tis: Do <em>not</em> flush uninitialized work (git-fixes).</li>
<li>tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).</li>
<li>tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).</li>
<li>tracing/net_sched: NULL pointer dereference in perf_trace_qdisc_reset() (git-fixes).</li>
<li>tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).</li>
<li>tracing: Build event generation tests only as modules (git-fixes).</li>
<li>tracing: hide unused ftrace_event_id_fops (git-fixes).</li>
<li>tty: mcf: MCF54418 has 10 UARTS (git-fixes).</li>
<li>tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).</li>
<li>tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).</li>
<li>tty: n_tty: Fix buffer offsets when lookahead is used (git-fixes).</li>
<li>usb-storage: alauda: Check whether the media is initialized (git-fixes).</li>
<li>usb: Disable USB3 LPM at shutdown (stable-fixes).</li>
<li>usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (bsc#1220569).</li>
<li>usb: aqc111: stop lying about skb->truesize (git-fixes).</li>
<li>usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).</li>
<li>usb: dwc3: Wait unconditionally after issuing EndXfer command (git-fixes).</li>
<li>usb: dwc3: core: Add DWC31 version 2.00a controller (stable-fixes).</li>
<li>usb: dwc3: core: Prevent phy suspend during init (Git-fixes).</li>
<li>usb: dwc3: core: Workaround for CSR read timeout (stable-fixes).</li>
<li>usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock (git-fixes).</li>
<li>usb: dwc3: pci: Do not set "linux,phy_charger_detect" property on Lenovo Yoga Tab2 1380 (stable-fixes).</li>
<li>usb: dwc3: pci: add support for the Intel Panther Lake (stable-fixes).</li>
<li>usb: fotg210: Add missing kernel doc description (git-fixes).</li>
<li>usb: gadget: aspeed_udc: fix device address configuration (git-fixes).</li>
<li>usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).</li>
<li>usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() (stable-fixes).</li>
<li>usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).</li>
<li>usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (git-fixes).</li>
<li>usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).</li>
<li>usb: gadget: function: Remove usage of the deprecated ida_simple_xx() API (stable-fixes).</li>
<li>usb: gadget: printer: SS+ support (stable-fixes).</li>
<li>usb: gadget: printer: fix races against disable (git-fixes).</li>
<li>usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).</li>
<li>usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (git-fixes).</li>
<li>usb: gadget: uvc: configfs: ensure guid to be valid before set (stable-fixes).</li>
<li>usb: gadget: uvc: use correct buffer size when parsing configfs lists (git-fixes).</li>
<li>usb: misc: uss720: check for incompatible versions of the Belkin F5U002 (stable-fixes).</li>
<li>usb: musb: da8xx: fix a resource leak in probe() (git-fixes).</li>
<li>usb: ohci: Prevent missed ohci interrupts (git-fixes).</li>
<li>usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).</li>
<li>usb: typec: tcpm: Ignore received Hard Reset in TOGGLING state (git-fixes).</li>
<li>usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes).</li>
<li>usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (git-fixes).</li>
<li>usb: typec: tcpm: unregister existing source caps before re-registration (git-fixes).</li>
<li>usb: typec: tipd: fix event checking for tps6598x (git-fixes).</li>
<li>usb: typec: ucsi: Ack also failed Get Error commands (git-fixes).</li>
<li>usb: typec: ucsi: Never send a lone connector change ack (stable-fixes).</li>
<li>usb: typec: ucsi: always register a link to USB PD device (git-fixes).</li>
<li>usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).</li>
<li>usb: typec: ucsi: glink: fix child node release in probe function (git-fixes).</li>
<li>usb: typec: ucsi: simplify partner's PD caps registration (git-fixes).</li>
<li>usb: typec: ucsi_glink: drop special handling for CCI_BUSY (stable-fixes).</li>
<li>usb: ucsi: stm32: fix command completion handling (git-fixes).</li>
<li>usb: xhci-plat: Do not include xhci.h (stable-fixes).</li>
<li>usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB (stable-fixes).</li>
<li>vboxsf: explicitly deny setlease attempts (stable-fixes).</li>
<li>vhost: Add smp_rmb() in vhost_enable_notify() (git-fixes).</li>
<li>vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes).</li>
<li>virtio-blk: Ensure no requests in virtqueues before deleting vqs (git-fixes).</li>
<li>virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223944).</li>
<li>virtio_net: Do not send RSS key if it is not supported (git-fixes).</li>
<li>virtio_net: avoid data-races on dev->stats fields (git-fixes).</li>
<li>virtio_net: checksum offloading handling fix (git-fixes).</li>
<li>vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).</li>
<li>vmlinux.lds.h: catch .bss..L* sections into BSS") (git-fixes).</li>
<li>vsock/virtio: fix packet delivery to tap device (git-fixes).</li>
<li>watchdog: bd9576: Drop "always-running" property (git-fixes).</li>
<li>watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).</li>
<li>watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).</li>
<li>watchdog: rzg2l_wdt: Check return status of pm_runtime_put() (git-fixes).</li>
<li>watchdog: rzg2l_wdt: Use pm_runtime_resume_and_get() (git-fixes).</li>
<li>watchdog: rzn1: Convert comma to semicolon (git-fixes).</li>
<li>watchdog: sa1100: Fix PTR_ERR_OR_ZERO() vs NULL check in sa1100dog_probe() (git-fixes).</li>
<li>wifi: add HAS_IOPORT dependencies (bsc#1227149).</li>
<li>wifi: ar5523: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: ar5523: enable proper endpoint verification (git-fixes).</li>
<li>wifi: ath10/11/12k: Use alloc_ordered_workqueue() to create ordered workqueues (bsc#1227149).</li>
<li>wifi: ath10k: Annotate struct ath10k_ce_ring with __counted_by (bsc#1227149).</li>
<li>wifi: ath10k: Convert to platform remove callback returning void (bsc#1227149).</li>
<li>wifi: ath10k: Drop checks that are always false (bsc#1227149).</li>
<li>wifi: ath10k: Drop cleaning of driver data from probe error path and remove (bsc#1227149).</li>
<li>wifi: ath10k: Fix a few spelling errors (bsc#1227149).</li>
<li>wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).</li>
<li>wifi: ath10k: Fix enum ath10k_fw_crash_dump_type kernel-doc (bsc#1227149).</li>
<li>wifi: ath10k: Fix htt_data_tx_completion kernel-doc warning (bsc#1227149).</li>
<li>wifi: ath10k: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: ath10k: Remove unused struct ath10k_htc_frame (bsc#1227149).</li>
<li>wifi: ath10k: Update Qualcomm Innovation Center, Inc. copyrights (bsc#1227149).</li>
<li>wifi: ath10k: Use DECLARE_FLEX_ARRAY() for ath10k_htc_record (bsc#1227149).</li>
<li>wifi: ath10k: Use list_count_nodes() (bsc#1227149).</li>
<li>wifi: ath10k: add missing wmi_10_4_feature_mask documentation (bsc#1227149).</li>
<li>wifi: ath10k: add support to allow broadcast action frame RX (bsc#1227149).</li>
<li>wifi: ath10k: consistently use kstrtoX_from_user() functions (bsc#1227149).</li>
<li>wifi: ath10k: correctly document enum wmi_tlv_tx_pause_id (bsc#1227149).</li>
<li>wifi: ath10k: drop HTT_DATA_TX_STATUS_DOWNLOAD_FAIL (bsc#1227149).</li>
<li>wifi: ath10k: fix QCOM_RPROC_COMMON dependency (git-fixes).</li>
<li>wifi: ath10k: fix Wvoid-pointer-to-enum-cast warning (bsc#1227149).</li>
<li>wifi: ath10k: fix htt_q_state_conf & htt_q_state kernel-doc (bsc#1227149).</li>
<li>wifi: ath10k: improve structure padding (bsc#1227149).</li>
<li>wifi: ath10k: indicate to mac80211 scan complete with aborted flag for ATH10K_SCAN_STARTING state (bsc#1227149).</li>
<li>wifi: ath10k: poll service ready message before failing (git-fixes).</li>
<li>wifi: ath10k: populate board data for WCN3990 (git-fixes).</li>
<li>wifi: ath10k: remove ath10k_htc_record::pauload[] (bsc#1227149).</li>
<li>wifi: ath10k: remove duplicate memset() in 10.4 TDLS peer update (bsc#1227149).</li>
<li>wifi: ath10k: remove struct wmi_pdev_chanlist_update_event (bsc#1227149).</li>
<li>wifi: ath10k: remove unused template structs (bsc#1227149).</li>
<li>wifi: ath10k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).</li>
<li>wifi: ath10k: replace deprecated strncpy with memcpy (bsc#1227149).</li>
<li>wifi: ath10k: simplify __ath10k_htt_tx_txq_recalc() (bsc#1227149).</li>
<li>wifi: ath10k: simplify ath10k_peer_create() (bsc#1227149).</li>
<li>wifi: ath10k: use flexible array in struct wmi_tdls_peer_capabilities (bsc#1227149).</li>
<li>wifi: ath10k: use flexible array in struct wmi_host_mem_chunks (bsc#1227149).</li>
<li>wifi: ath10k: use flexible arrays for WMI start scan TLVs (bsc#1227149).</li>
<li>wifi: ath11k: Add HTT stats for PHY reset case (bsc#1227149).</li>
<li>wifi: ath11k: Add coldboot calibration support for QCN9074 (bsc#1227149).</li>
<li>wifi: ath11k: Allow ath11k to boot without caldata in ftm mode (bsc#1227149).</li>
<li>wifi: ath11k: Consistently use ath11k_vif_to_arvif() (bsc#1227149).</li>
<li>wifi: ath11k: Consolidate WMI peer flags (bsc#1227149).</li>
<li>wifi: ath11k: Convert to platform remove callback returning void (bsc#1227149).</li>
<li>wifi: ath11k: Do not directly use scan_flags in struct scan_req_params (bsc#1227149).</li>
<li>wifi: ath11k: EMA beacon support (bsc#1227149).</li>
<li>wifi: ath11k: Fix a few spelling errors (bsc#1227149).</li>
<li>wifi: ath11k: Fix ath11k_htc_record flexible record (bsc#1227149).</li>
<li>wifi: ath11k: Introduce and use ath11k_sta_to_arsta() (bsc#1227149).</li>
<li>wifi: ath11k: MBSSID beacon support (bsc#1227149).</li>
<li>wifi: ath11k: MBSSID configuration during vdev create/start (bsc#1227149).</li>
<li>wifi: ath11k: MBSSID parameter configuration in AP mode (bsc#1227149).</li>
<li>wifi: ath11k: Really consistently use ath11k_vif_to_arvif() (bsc#1227149).</li>
<li>wifi: ath11k: Relocate the func ath11k_mac_bitrate_mask_num_ht_rates() and change hweight16 to hweight8 (bsc#1227149).</li>
<li>wifi: ath11k: Remove ath11k_base::bd_api (bsc#1227149).</li>
<li>wifi: ath11k: Remove cal_done check during probe (bsc#1227149).</li>
<li>wifi: ath11k: Remove obsolete struct wmi_peer_flags_map *peer_flags (bsc#1227149).</li>
<li>wifi: ath11k: Remove scan_flags union from struct scan_req_params (bsc#1227149).</li>
<li>wifi: ath11k: Remove struct ath11k::ops (bsc#1227149).</li>
<li>wifi: ath11k: Remove unneeded semicolon (bsc#1227149).</li>
<li>wifi: ath11k: Remove unused declarations (bsc#1227149).</li>
<li>wifi: ath11k: Remove unused struct ath11k_htc_frame (bsc#1227149).</li>
<li>wifi: ath11k: Send HT fixed rate in WMI peer fixed param (bsc#1227149).</li>
<li>wifi: ath11k: Split coldboot calibration hw_param (bsc#1227149).</li>
<li>wifi: ath11k: Update Qualcomm Innovation Center, Inc. copyrights (bsc#1227149).</li>
<li>wifi: ath11k: Use device_get_match_data() (bsc#1227149).</li>
<li>wifi: ath11k: Use list_count_nodes() (bsc#1227149).</li>
<li>wifi: ath11k: add WMI event debug messages (bsc#1227149).</li>
<li>wifi: ath11k: add WMI_TLV_SERVICE_EXT_TPC_REG_SUPPORT service bit (bsc#1227149).</li>
<li>wifi: ath11k: add chip id board name while searching board-2.bin for WCN6855 (bsc#1227149).</li>
<li>wifi: ath11k: add firmware-2.bin support (bsc#1227149).</li>
<li>wifi: ath11k: add handler for WMI_VDEV_SET_TPC_POWER_CMDID (bsc#1227149).</li>
<li>wifi: ath11k: add parse of transmit power envelope element (bsc#1227149).</li>
<li>wifi: ath11k: add parsing of phy bitmap for reg rules (bsc#1227149).</li>
<li>wifi: ath11k: add support for QCA2066 (bsc#1227149).</li>
<li>wifi: ath11k: add support to select 6 GHz regulatory type (bsc#1227149).</li>
<li>wifi: ath11k: ath11k_debugfs_register(): fix format-truncation warning (bsc#1227149).</li>
<li>wifi: ath11k: avoid forward declaration of ath11k_mac_start_vdev_delay() (bsc#1227149).</li>
<li>wifi: ath11k: call ath11k_mac_fils_discovery() without condition (bsc#1227149).</li>
<li>wifi: ath11k: constify MHI channel and controller configs (bsc#1227149).</li>
<li>wifi: ath11k: debug: add ATH11K_DBG_CE (bsc#1227149).</li>
<li>wifi: ath11k: debug: remove unused ATH11K_DBG_ANY (bsc#1227149).</li>
<li>wifi: ath11k: debug: use all upper case in ATH11k_DBG_HAL (bsc#1227149).</li>
<li>wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).</li>
<li>wifi: ath11k: do not use %pK (bsc#1227149).</li>
<li>wifi: ath11k: document HAL_RX_BUF_RBM_SW4_BM (bsc#1227149).</li>
<li>wifi: ath11k: dp: cleanup debug message (bsc#1227149).</li>
<li>wifi: ath11k: driver settings for MBSSID and EMA (bsc#1227149).</li>
<li>wifi: ath11k: drop NULL pointer check in ath11k_update_per_peer_tx_stats() (bsc#1227149).</li>
<li>wifi: ath11k: drop redundant check in ath11k_dp_rx_mon_dest_process() (bsc#1227149).</li>
<li>wifi: ath11k: enable 36 bit mask for stream DMA (bsc#1227149).</li>
<li>wifi: ath11k: factory test mode support (bsc#1227149).</li>
<li>wifi: ath11k: fill parameters for vdev set tpc power WMI command (bsc#1227149).</li>
<li>wifi: ath11k: fix CAC running state during virtual interface start (bsc#1227149).</li>
<li>wifi: ath11k: fix IOMMU errors on buffer rings (bsc#1227149).</li>
<li>wifi: ath11k: fix RCU documentation in ath11k_mac_op_ipv6_changed() (git-fixes).</li>
<li>wifi: ath11k: fix WCN6750 firmware crash caused by 17 num_vdevs (bsc#1227149).</li>
<li>wifi: ath11k: fix Wvoid-pointer-to-enum-cast warning (bsc#1227149).</li>
<li>wifi: ath11k: fix a possible dead lock caused by ab->base_lock (bsc#1227149).</li>
<li>wifi: ath11k: fix ath11k_mac_op_remain_on_channel() stack usage (bsc#1227149).</li>
<li>wifi: ath11k: fix connection failure due to unexpected peer delete (bsc#1227149).</li>
<li>wifi: ath11k: fix tid bitmap is 0 in peer rx mu stats (bsc#1227149).</li>
<li>wifi: ath11k: fix wrong definition of CE ring's base address (git-fixes).</li>
<li>wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes).</li>
<li>wifi: ath11k: hal: cleanup debug message (bsc#1227149).</li>
<li>wifi: ath11k: htc: cleanup debug messages (bsc#1227149).</li>
<li>wifi: ath11k: initialize eirp_power before use (bsc#1227149).</li>
<li>wifi: ath11k: mac: fix struct ieee80211_sband_iftype_data handling (bsc#1227149).</li>
<li>wifi: ath11k: mhi: add a warning message for MHI_CB_EE_RDDM crash (bsc#1227149).</li>
<li>wifi: ath11k: move pci.ops registration ahead (bsc#1227149).</li>
<li>wifi: ath11k: move power type check to ASSOC stage when connecting to 6 GHz AP (bsc#1227149).</li>
<li>wifi: ath11k: move references from rsvd2 to info fields (bsc#1227149).</li>
<li>wifi: ath11k: pci: cleanup debug logging (bsc#1227149).</li>
<li>wifi: ath11k: print debug level in debug messages (bsc#1227149).</li>
<li>wifi: ath11k: provide address list if chip supports 2 stations (bsc#1227149).</li>
<li>wifi: ath11k: qmi: refactor ath11k_qmi_m3_load() (bsc#1227149).</li>
<li>wifi: ath11k: refactor ath11k_wmi_tlv_parse_alloc() (bsc#1227149).</li>
<li>wifi: ath11k: refactor setting country code logic (stable-fixes).</li>
<li>wifi: ath11k: refactor vif parameter configurations (bsc#1227149).</li>
<li>wifi: ath11k: rely on mac80211 debugfs handling for vif (bsc#1227149).</li>
<li>wifi: ath11k: remove ath11k_htc_record::pauload[] (bsc#1227149).</li>
<li>wifi: ath11k: remove invalid peer create logic (bsc#1227149).</li>
<li>wifi: ath11k: remove manual mask names from debug messages (bsc#1227149).</li>
<li>wifi: ath11k: remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: ath11k: remove unsupported event handlers (bsc#1227149).</li>
<li>wifi: ath11k: remove unused function ath11k_tm_event_wmi() (bsc#1227149).</li>
<li>wifi: ath11k: remove unused members of 'struct ath11k_base' (bsc#1227149).</li>
<li>wifi: ath11k: remove unused scan_events from struct scan_req_params (bsc#1227149).</li>
<li>wifi: ath11k: rename MBSSID fields in wmi_vdev_up_cmd (bsc#1227149).</li>
<li>wifi: ath11k: rename ath11k_start_vdev_delay() (bsc#1227149).</li>
<li>wifi: ath11k: rename the sc naming convention to ab (bsc#1227149).</li>
<li>wifi: ath11k: rename the wmi_sc naming convention to wmi_ab (bsc#1227149).</li>
<li>wifi: ath11k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).</li>
<li>wifi: ath11k: restore country code during resume (git-fixes).</li>
<li>wifi: ath11k: save max transmit power in vdev start response event from firmware (bsc#1227149).</li>
<li>wifi: ath11k: save power spectral density(PSD) of regulatory rule (bsc#1227149).</li>
<li>wifi: ath11k: simplify ath11k_mac_validate_vht_he_fixed_rate_settings() (bsc#1227149).</li>
<li>wifi: ath11k: simplify the code with module_platform_driver (bsc#1227149).</li>
<li>wifi: ath11k: store cur_regulatory_info for each radio (bsc#1227149).</li>
<li>wifi: ath11k: support 2 station interfaces (bsc#1227149).</li>
<li>wifi: ath11k: update proper pdev/vdev id for testmode command (bsc#1227149).</li>
<li>wifi: ath11k: update regulatory rules when connect to AP on 6 GHz band for station (bsc#1227149).</li>
<li>wifi: ath11k: update regulatory rules when interface added (bsc#1227149).</li>
<li>wifi: ath11k: use RCU when accessing struct inet6_dev::ac_list (bsc#1227149).</li>
<li>wifi: ath11k: use WMI_VDEV_SET_TPC_POWER_CMDID when EXT_TPC_REG_SUPPORT for 6 GHz (bsc#1227149).</li>
<li>wifi: ath11k: use kstrtoul_from_user() where appropriate (bsc#1227149).</li>
<li>wifi: ath11k: use select for CRYPTO_MICHAEL_MIC (bsc#1227149).</li>
<li>wifi: ath11k: wmi: add unified command debug messages (bsc#1227149).</li>
<li>wifi: ath11k: wmi: cleanup error handling in ath11k_wmi_send_init_country_cmd() (bsc#1227149).</li>
<li>wifi: ath11k: wmi: use common error handling style (bsc#1227149).</li>
<li>wifi: ath11k: workaround too long expansion sparse warnings (bsc#1227149).</li>
<li>wifi: ath12k: Add logic to write QRTR node id to scratch (bsc#1227149).</li>
<li>wifi: ath12k: Add missing qmi_txn_cancel() calls (bsc#1227149).</li>
<li>wifi: ath12k: Add support to parse new WMI event for 6 GHz regulatory (bsc#1227149).</li>
<li>wifi: ath12k: Consistently use ath12k_vif_to_arvif() (bsc#1227149).</li>
<li>wifi: ath12k: Consolidate WMI peer flags (bsc#1227149).</li>
<li>wifi: ath12k: Correct 6 GHz frequency value in rx status (git-fixes).</li>
<li>wifi: ath12k: Do not drop tx_status in failure case (git-fixes).</li>
<li>wifi: ath12k: Do not use scan_flags from struct ath12k_wmi_scan_req_arg (bsc#1227149).</li>
<li>wifi: ath12k: Enable Mesh support for QCN9274 (bsc#1227149).</li>
<li>wifi: ath12k: Fix a few spelling errors (bsc#1227149).</li>
<li>wifi: ath12k: Fix tx completion ring (WBM2SW) setup failure (git-fixes).</li>
<li>wifi: ath12k: Fix uninitialized use of ret in ath12k_mac_allocate() (bsc#1227149).</li>
<li>wifi: ath12k: Introduce and use ath12k_sta_to_arsta() (bsc#1227149).</li>
<li>wifi: ath12k: Introduce the container for mac80211 hw (bsc#1227149).</li>
<li>wifi: ath12k: Make QMI message rules const (bsc#1227149).</li>
<li>wifi: ath12k: Optimize the mac80211 hw data access (bsc#1227149).</li>
<li>wifi: ath12k: Read board id to support split-PHY QCN9274 (bsc#1227149).</li>
<li>wifi: ath12k: Refactor the mac80211 hw access from link/radio (bsc#1227149).</li>
<li>wifi: ath12k: Remove ath12k_base::bd_api (bsc#1227149).</li>
<li>wifi: ath12k: Remove obsolete struct wmi_peer_flags_map *peer_flags (bsc#1227149).</li>
<li>wifi: ath12k: Remove some dead code (bsc#1227149).</li>
<li>wifi: ath12k: Remove struct ath12k::ops (bsc#1227149).</li>
<li>wifi: ath12k: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: ath12k: Remove unnecessary struct qmi_txn initializers (bsc#1227149).</li>
<li>wifi: ath12k: Remove unused declarations (bsc#1227149).</li>
<li>wifi: ath12k: Remove unused scan_flags from struct ath12k_wmi_scan_req_arg (bsc#1227149).</li>
<li>wifi: ath12k: Set default beacon mode to burst mode (bsc#1227149).</li>
<li>wifi: ath12k: Use initializers for QMI message buffers (bsc#1227149).</li>
<li>wifi: ath12k: Use msdu_end to check MCBC (bsc#1227149).</li>
<li>wifi: ath12k: Use pdev_id rather than mac_id to get pdev (bsc#1227149).</li>
<li>wifi: ath12k: WMI support to process EHT capabilities (bsc#1227149).</li>
<li>wifi: ath12k: add 320 MHz bandwidth enums (bsc#1227149).</li>
<li>wifi: ath12k: add CE and ext IRQ flag to indicate irq_handler (bsc#1227149).</li>
<li>wifi: ath12k: add EHT PHY modes (bsc#1227149).</li>
<li>wifi: ath12k: add MAC id support in WBM error path (bsc#1227149).</li>
<li>wifi: ath12k: add MLO header in peer association (bsc#1227149).</li>
<li>wifi: ath12k: add P2P IE in beacon template (bsc#1227149).</li>
<li>wifi: ath12k: add QMI PHY capability learn support (bsc#1227149).</li>
<li>wifi: ath12k: add WMI support for EHT peer (bsc#1227149).</li>
<li>wifi: ath12k: add ath12k_qmi_free_resource() for recovery (bsc#1227149).</li>
<li>wifi: ath12k: add fallback board name without variant while searching board-2.bin (bsc#1227149).</li>
<li>wifi: ath12k: add firmware-2.bin support (bsc#1227149).</li>
<li>wifi: ath12k: add handler for scan event WMI_SCAN_EVENT_DEQUEUED (bsc#1227149).</li>
<li>wifi: ath12k: add keep backward compatibility of PHY mode to avoid firmware crash (bsc#1227149).</li>
<li>wifi: ath12k: add msdu_end structure for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: add parsing of phy bitmap for reg rules (bsc#1227149).</li>
<li>wifi: ath12k: add processing for TWT disable event (bsc#1227149).</li>
<li>wifi: ath12k: add processing for TWT enable event (bsc#1227149).</li>
<li>wifi: ath12k: add qmi_cnss_feature_bitmap field to hardware parameters (bsc#1227149).</li>
<li>wifi: ath12k: add rcu lock for ath12k_wmi_p2p_noa_event() (bsc#1227149).</li>
<li>wifi: ath12k: add read variant from SMBIOS for download board data (bsc#1227149).</li>
<li>wifi: ath12k: add string type to search board data in board-2.bin for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: add support for BA1024 (bsc#1227149).</li>
<li>wifi: ath12k: add support for collecting firmware log (bsc#1227149).</li>
<li>wifi: ath12k: add support for hardware rfkill for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: add support for peer meta data version (bsc#1227149).</li>
<li>wifi: ath12k: add support one MSI vector (bsc#1227149).</li>
<li>wifi: ath12k: add support to search regdb data in board-2.bin for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: add wait operation for tx management packets for flush from mac80211 (bsc#1227149).</li>
<li>wifi: ath12k: advertise P2P dev support for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: allow specific mgmt frame tx while vdev is not up (bsc#1227149).</li>
<li>wifi: ath12k: ath12k_start_vdev_delay(): convert to use ar (bsc#1227149).</li>
<li>wifi: ath12k: avoid deadlock by change ieee80211_queue_work for regd_update_work (bsc#1227149).</li>
<li>wifi: ath12k: avoid duplicated vdev stop (git-fixes).</li>
<li>wifi: ath12k: avoid explicit HW conversion argument in Rxdma replenish (bsc#1227149).</li>
<li>wifi: ath12k: avoid explicit RBM id argument in Rxdma replenish (bsc#1227149).</li>
<li>wifi: ath12k: avoid explicit mac id argument in Rxdma replenish (bsc#1227149).</li>
<li>wifi: ath12k: avoid repeated hw access from ar (bsc#1227149).</li>
<li>wifi: ath12k: avoid repeated wiphy access from hw (bsc#1227149).</li>
<li>wifi: ath12k: call ath12k_mac_fils_discovery() without condition (bsc#1227149).</li>
<li>wifi: ath12k: change DMA direction while mapping reinjected packets (git-fixes).</li>
<li>wifi: ath12k: change MAC buffer ring size to 2048 (bsc#1227149).</li>
<li>wifi: ath12k: change WLAN_SCAN_PARAMS_MAX_IE_LEN from 256 to 512 (bsc#1227149).</li>
<li>wifi: ath12k: change interface combination for P2P mode (bsc#1227149).</li>
<li>wifi: ath12k: change to initialize recovery variables earlier in ath12k_core_reset() (bsc#1227149).</li>
<li>wifi: ath12k: change to treat alpha code na as world wide regdomain (bsc#1227149).</li>
<li>wifi: ath12k: change to use dynamic memory for channel list of scan (bsc#1227149).</li>
<li>wifi: ath12k: check M3 buffer size as well whey trying to reuse it (bsc#1227149).</li>
<li>wifi: ath12k: check hardware major version for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: configure RDDM size to MHI for device recovery (bsc#1227149).</li>
<li>wifi: ath12k: configure puncturing bitmap (bsc#1227149).</li>
<li>wifi: ath12k: correct the data_type from QMI_OPT_FLAG to QMI_UNSIGNED_1_BYTE for mlo_capable (bsc#1227149).</li>
<li>wifi: ath12k: delete the timer rx_replenish_retry during rmmod (bsc#1227149).</li>
<li>wifi: ath12k: designating channel frequency for ROC scan (bsc#1227149).</li>
<li>wifi: ath12k: disable QMI PHY capability learn in split-phy QCN9274 (bsc#1227149).</li>
<li>wifi: ath12k: do not drop data frames from unassociated stations (bsc#1227149).</li>
<li>wifi: ath12k: do not restore ASPM in case of single MSI vector (bsc#1227149).</li>
<li>wifi: ath12k: drop NULL pointer check in ath12k_update_per_peer_tx_stats() (bsc#1227149).</li>
<li>wifi: ath12k: drop failed transmitted frames from metric calculation (git-fixes).</li>
<li>wifi: ath12k: enable 320 MHz bandwidth for 6 GHz band in EHT PHY capability for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: enable 802.11 power save mode in station mode (bsc#1227149).</li>
<li>wifi: ath12k: enable IEEE80211_HW_SINGLE_SCAN_ON_ALL_BANDS for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: fetch correct pdev id from WMI_SERVICE_READY_EXT_EVENTID (bsc#1227149).</li>
<li>wifi: ath12k: fix PCI read and write (bsc#1227149).</li>
<li>wifi: ath12k: fix WARN_ON during ath12k_mac_update_vif_chan (bsc#1227149).</li>
<li>wifi: ath12k: fix broken structure wmi_vdev_create_cmd (bsc#1227149).</li>
<li>wifi: ath12k: fix conf_mutex in ath12k_mac_op_unassign_vif_chanctx() (bsc#1227149).</li>
<li>wifi: ath12k: fix debug messages (bsc#1227149).</li>
<li>wifi: ath12k: fix fetching MCBC flag for QCN9274 (bsc#1227149).</li>
<li>wifi: ath12k: fix firmware assert during insmod in memory segment mode (bsc#1227149).</li>
<li>wifi: ath12k: fix firmware crash during reo reinject (git-fixes).</li>
<li>wifi: ath12k: fix invalid m3 buffer address (bsc#1227149).</li>
<li>wifi: ath12k: fix invalid memory access while processing fragmented packets (git-fixes).</li>
<li>wifi: ath12k: fix kernel crash during resume (bsc#1227149).</li>
<li>wifi: ath12k: fix license in p2p.c and p2p.h (bsc#1227149).</li>
<li>wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() (git-fixes).</li>
<li>wifi: ath12k: fix peer metadata parsing (git-fixes).</li>
<li>wifi: ath12k: fix potential wmi_mgmt_tx_queue race condition (bsc#1227149).</li>
<li>wifi: ath12k: fix radar detection in 160 MHz (bsc#1227149).</li>
<li>wifi: ath12k: fix recovery fail while firmware crash when doing channel switch (bsc#1227149).</li>
<li>wifi: ath12k: fix the error handler of rfkill config (bsc#1227149).</li>
<li>wifi: ath12k: fix the issue that the multicast/broadcast indicator is not read correctly for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: fix the problem that down grade phy mode operation (bsc#1227149).</li>
<li>wifi: ath12k: fix wrong definition of CE ring's base address (git-fixes).</li>
<li>wifi: ath12k: fix wrong definitions of hal_reo_update_rx_queue (bsc#1227149).</li>
<li>wifi: ath12k: get msi_data again after request_irq is called (bsc#1227149).</li>
<li>wifi: ath12k: implement handling of P2P NoA event (bsc#1227149).</li>
<li>wifi: ath12k: implement remain on channel for P2P mode (bsc#1227149).</li>
<li>wifi: ath12k: increase vdev setup timeout (bsc#1227149).</li>
<li>wifi: ath12k: indicate NON MBSSID vdev by default during vdev start (bsc#1227149).</li>
<li>wifi: ath12k: indicate scan complete for scan canceled when scan running (bsc#1227149).</li>
<li>wifi: ath12k: indicate to mac80211 scan complete with aborted flag for ATH12K_SCAN_STARTING state (bsc#1227149).</li>
<li>wifi: ath12k: move HE capabilities processing to a new function (bsc#1227149).</li>
<li>wifi: ath12k: move peer delete after vdev stop of station for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: parse WMI service ready ext2 event (bsc#1227149).</li>
<li>wifi: ath12k: peer assoc for 320 MHz (bsc#1227149).</li>
<li>wifi: ath12k: prepare EHT peer assoc parameters (bsc#1227149).</li>
<li>wifi: ath12k: propagate EHT capabilities to userspace (bsc#1227149).</li>
<li>wifi: ath12k: refactor DP Rxdma ring structure (bsc#1227149).</li>
<li>wifi: ath12k: refactor QMI MLO host capability helper function (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_bss_assoc() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_mac_allocate() and ath12k_mac_destroy() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_mac_op_ampdu_action() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_mac_op_conf_tx() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_mac_op_config() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_mac_op_configure_filter() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_mac_op_flush() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_mac_op_start() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_mac_op_stop() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_mac_op_update_vif_offload() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_mac_register() and ath12k_mac_unregister() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_mac_setup_channels_rates() (bsc#1227149).</li>
<li>wifi: ath12k: refactor ath12k_wmi_tlv_parse_alloc() (bsc#1227149).</li>
<li>wifi: ath12k: refactor multiple MSI vector implementation (bsc#1227149).</li>
<li>wifi: ath12k: refactor the rfkill worker (bsc#1227149).</li>
<li>wifi: ath12k: register EHT mesh capabilities (bsc#1227149).</li>
<li>wifi: ath12k: relax list iteration in ath12k_mac_vif_unref() (bsc#1227149).</li>
<li>wifi: ath12k: relocate ath12k_dp_pdev_pre_alloc() call (bsc#1227149).</li>
<li>wifi: ath12k: remove hal_desc_sz from hw params (bsc#1227149).</li>
<li>wifi: ath12k: remove redundant memset() in ath12k_hal_reo_qdesc_setup() (bsc#1227149).</li>
<li>wifi: ath12k: remove the unused scan_events from ath12k_wmi_scan_req_arg (bsc#1227149).</li>
<li>wifi: ath12k: remove unused ATH12K_BD_IE_BOARD_EXT (bsc#1227149).</li>
<li>wifi: ath12k: rename HE capabilities setup/copy functions (bsc#1227149).</li>
<li>wifi: ath12k: rename the sc naming convention to ab (bsc#1227149).</li>
<li>wifi: ath12k: rename the wmi_sc naming convention to wmi_ab (bsc#1227149).</li>
<li>wifi: ath12k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).</li>
<li>wifi: ath12k: send WMI_PEER_REORDER_QUEUE_SETUP_CMDID when ADDBA session starts (bsc#1227149).</li>
<li>wifi: ath12k: set IRQ affinity to CPU0 in case of one MSI vector (bsc#1227149).</li>
<li>wifi: ath12k: set PERST pin no pull request for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: split hal_ops to support RX TLVs word mask compaction (bsc#1227149).</li>
<li>wifi: ath12k: subscribe required word mask from rx tlv (bsc#1227149).</li>
<li>wifi: ath12k: support default regdb while searching board-2.bin for WCN7850 (bsc#1227149).</li>
<li>wifi: ath12k: trigger station disconnect on hardware restart (bsc#1227149).</li>
<li>wifi: ath12k: use ATH12K_PCI_IRQ_DP_OFFSET for DP IRQ (bsc#1227149).</li>
<li>wifi: ath12k: use correct flag field for 320 MHz channels (bsc#1227149).</li>
<li>wifi: ath12k: use select for CRYPTO_MICHAEL_MIC (bsc#1227149).</li>
<li>wifi: ath5k: Convert to platform remove callback returning void (bsc#1227149).</li>
<li>wifi: ath5k: Remove redundant dev_err() (bsc#1227149).</li>
<li>wifi: ath5k: ath5k_hw_get_median_noise_floor(): use swap() (bsc#1227149).</li>
<li>wifi: ath5k: remove phydir check from ath5k_debug_init_device() (bsc#1227149).</li>
<li>wifi: ath5k: remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: ath5k: remove unused ath5k_eeprom_info::ee_antenna (bsc#1227149).</li>
<li>wifi: ath5k: replace deprecated strncpy with strscpy (bsc#1227149).</li>
<li>wifi: ath6kl: Remove error checking for debugfs_create_dir() (bsc#1227149).</li>
<li>wifi: ath6kl: remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: ath6kl: replace deprecated strncpy with memcpy (bsc#1227149).</li>
<li>wifi: ath9k: remove redundant assignment to variable ret (bsc#1227149).</li>
<li>wifi: ath9k: Convert to platform remove callback returning void (bsc#1227149).</li>
<li>wifi: ath9k: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: ath9k: Remove unnecessary ternary operators (bsc#1227149).</li>
<li>wifi: ath9k: Remove unused declarations (bsc#1227149).</li>
<li>wifi: ath9k: avoid using uninitialized array (bsc#1227149).</li>
<li>wifi: ath9k: clean up function ath9k_hif_usb_resume (bsc#1227149).</li>
<li>wifi: ath9k: consistently use kstrtoX_from_user() functions (bsc#1227149).</li>
<li>wifi: ath9k: delete some unused/duplicate macros (bsc#1227149).</li>
<li>wifi: ath9k: fix parameter check in ath9k_init_debug() (bsc#1227149).</li>
<li>wifi: ath9k: reset survey of current channel after a scan started (bsc#1227149).</li>
<li>wifi: ath9k: simplify ar9003_hw_process_ini() (bsc#1227149).</li>
<li>wifi: ath9k: use u32 for txgain indexes (bsc#1227149).</li>
<li>wifi: ath9k: work around memset overflow warning (bsc#1227149).</li>
<li>wifi: ath9k_htc: fix format-truncation warning (bsc#1227149).</li>
<li>wifi: ath: Use is_multicast_ether_addr() to check multicast Ether address (bsc#1227149).</li>
<li>wifi: ath: dfs_pattern_detector: Use flex array to simplify code (bsc#1227149).</li>
<li>wifi: ath: remove unused-but-set parameter (bsc#1227149).</li>
<li>wifi: ath: work around false-positive stringop-overread warning (bsc#1227149).</li>
<li>wifi: atk10k: Do not opencode ath10k_pci_priv() in ath10k_ahb_priv() (bsc#1227149).</li>
<li>wifi: atmel: remove unused ioctl function (bsc#1227149).</li>
<li>wifi: b43: silence sparse warnings (bsc#1227149).</li>
<li>wifi: brcm80211: replace deprecated strncpy with strscpy (bsc#1227149).</li>
<li>wifi: brcmfmac: Annotate struct brcmf_gscan_config with __counted_by (bsc#1227149).</li>
<li>wifi: brcmfmac: Detect corner error case earlier with log (bsc#1227149).</li>
<li>wifi: brcmfmac: add linefeed at end of file (bsc#1227149).</li>
<li>wifi: brcmfmac: allow per-vendor event handling (bsc#1227149).</li>
<li>wifi: brcmfmac: do not cast hidden SSID attribute value to boolean (bsc#1227149).</li>
<li>wifi: brcmfmac: do not pass hidden SSID attribute as value directly (bsc#1227149).</li>
<li>wifi: brcmfmac: export firmware interface functions (bsc#1227149).</li>
<li>wifi: brcmfmac: firmware: Annotate struct brcmf_fw_request with __counted_by (bsc#1227149).</li>
<li>wifi: brcmfmac: fix format-truncation warnings (bsc#1227149).</li>
<li>wifi: brcmfmac: fix gnu_printf warnings (bsc#1227149).</li>
<li>wifi: brcmfmac: fweh: Add __counted_by for struct brcmf_fweh_queue_item and use struct_size() (bsc#1227149).</li>
<li>wifi: brcmfmac: fweh: Fix boot crash on Raspberry Pi 4 (bsc#1227149).</li>
<li>wifi: brcmfmac: move feature overrides before feature_disable (bsc#1227149).</li>
<li>wifi: brcmfmac: pcie: handle randbuf allocation failure (git-fixes).</li>
<li>wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device (git-fixes).</li>
<li>wifi: brcmsmac: cleanup SCB-related data types (bsc#1227149).</li>
<li>wifi: brcmsmac: fix gnu_printf warnings (bsc#1227149).</li>
<li>wifi: brcmsmac: phy: Remove unreachable code (bsc#1227149).</li>
<li>wifi: brcmsmac: remove more unused data types (bsc#1227149).</li>
<li>wifi: brcmsmac: remove unused data type (bsc#1227149).</li>
<li>wifi: brcmsmac: replace deprecated strncpy with memcpy (bsc#1227149).</li>
<li>wifi: brcmsmac: silence sparse warnings (bsc#1227149).</li>
<li>wifi: brcmutil: use helper function pktq_empty() instead of open code (bsc#1227149).</li>
<li>wifi: carl9170: Remove redundant assignment to pointer super (bsc#1227149).</li>
<li>wifi: carl9170: add a proper sanity check for endpoints (git-fixes).</li>
<li>wifi: carl9170: re-fix fortified-memset warning (git-fixes).</li>
<li>wifi: carl9170: remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: cfg80211: Add support for setting TID to link mapping (bsc#1227149).</li>
<li>wifi: cfg80211: Allow AP/P2PGO to indicate port authorization to peer STA/P2PClient (bsc#1227149).</li>
<li>wifi: cfg80211: Extend support for scanning while MLO connected (bsc#1227149).</li>
<li>wifi: cfg80211: Fix typo in documentation (bsc#1227149).</li>
<li>wifi: cfg80211: Handle specific BSSID in 6GHz scanning (bsc#1227149).</li>
<li>wifi: cfg80211: Include operating class 137 in 6GHz band (bsc#1227149).</li>
<li>wifi: cfg80211: Lock wiphy in cfg80211_get_station (git-fixes).</li>
<li>wifi: cfg80211: OWE DH IE handling offload (bsc#1227149).</li>
<li>wifi: cfg80211: Replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).</li>
<li>wifi: cfg80211: Schedule regulatory check on BSS STA channel change (bsc#1227149).</li>
<li>wifi: cfg80211: Update the default DSCP-to-UP mapping (bsc#1227149).</li>
<li>wifi: cfg80211: add BSS usage reporting (bsc#1227149).</li>
<li>wifi: cfg80211: add RNR with reporting AP information (bsc#1227149).</li>
<li>wifi: cfg80211: add a flag to disable wireless extensions (bsc#1227149).</li>
<li>wifi: cfg80211: add local_state_change to deauth trace (bsc#1227149).</li>
<li>wifi: cfg80211: add locked debugfs wrappers (bsc#1227149).</li>
<li>wifi: cfg80211: add support for SPP A-MSDUs (bsc#1227149).</li>
<li>wifi: cfg80211: address several kerneldoc warnings (bsc#1227149).</li>
<li>wifi: cfg80211: allow reg update by driver even if wiphy->regd is set (bsc#1227149).</li>
<li>wifi: cfg80211: annotate iftype_data pointer with sparse (bsc#1227149).</li>
<li>wifi: cfg80211: avoid double free if updating BSS fails (bsc#1227149).</li>
<li>wifi: cfg80211: call reg_call_notifier on beacon hints (bsc#1227149).</li>
<li>wifi: cfg80211: check RTNL when iterating devices (bsc#1227149).</li>
<li>wifi: cfg80211: check wiphy mutex is held for wdev mutex (bsc#1227149).</li>
<li>wifi: cfg80211: consume both probe response and beacon IEs (bsc#1227149).</li>
<li>wifi: cfg80211: detect stuck ECSA element in probe resp (bsc#1227149).</li>
<li>wifi: cfg80211: ensure cfg80211_bss_update frees IEs on error (bsc#1227149).</li>
<li>wifi: cfg80211: export DFS CAC time and usable state helper functions (bsc#1227149).</li>
<li>wifi: cfg80211: expose nl80211_chan_width_to_mhz for wide sharing (bsc#1227149).</li>
<li>wifi: cfg80211: fix 6 GHz scan request building (stable-fixes).</li>
<li>wifi: cfg80211: fix CQM for non-range use (bsc#1227149).</li>
<li>wifi: cfg80211: fix header kernel-doc typos (bsc#1227149).</li>
<li>wifi: cfg80211: fix kernel-doc for wiphy_delayed_work_flush() (bsc#1227149).</li>
<li>wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).</li>
<li>wifi: cfg80211: fix spelling & punctutation (bsc#1227149).</li>
<li>wifi: cfg80211: fix the order of arguments for trace events of the tx_rx_evt class (stable-fixes).</li>
<li>wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he() (git-fixes).</li>
<li>wifi: cfg80211: fully move wiphy work to unbound workqueue (git-fixes).</li>
<li>wifi: cfg80211: generate an ML element for per-STA profiles (bsc#1227149).</li>
<li>wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (git-fixes).</li>
<li>wifi: cfg80211: handle UHB AP and STA power type (bsc#1227149).</li>
<li>wifi: cfg80211: hold wiphy lock in cfg80211_any_wiphy_oper_chan() (bsc#1227149).</li>
<li>wifi: cfg80211: hold wiphy mutex for send_interface (bsc#1227149).</li>
<li>wifi: cfg80211: improve documentation for flag fields (bsc#1227149).</li>
<li>wifi: cfg80211: introduce cfg80211_ssid_eq() (bsc#1227149).</li>
<li>wifi: cfg80211: make RX assoc data const (bsc#1227149).</li>
<li>wifi: cfg80211: make read-only array centers_80mhz static const (bsc#1227149).</li>
<li>wifi: cfg80211: modify prototype for change_beacon (bsc#1227149).</li>
<li>wifi: cfg80211: pmsr: use correct nla_get_uX functions (git-fixes).</li>
<li>wifi: cfg80211: reg: Support P2P operation on DFS channels (bsc#1227149).</li>
<li>wifi: cfg80211: reg: describe return values in kernel-doc (bsc#1227149).</li>
<li>wifi: cfg80211: reg: fix various kernel-doc issues (bsc#1227149).</li>
<li>wifi: cfg80211: reg: hold wiphy mutex for wdev iteration (bsc#1227149).</li>
<li>wifi: cfg80211: remove scan_width support (bsc#1227149).</li>
<li>wifi: cfg80211: remove wdev mutex (bsc#1227149).</li>
<li>wifi: cfg80211: rename UHB to 6 GHz (bsc#1227149).</li>
<li>wifi: cfg80211: report per-link errors during association (bsc#1227149).</li>
<li>wifi: cfg80211: report unprotected deauth/disassoc in wowlan (bsc#1227149).</li>
<li>wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (git-fixes).</li>
<li>wifi: cfg80211: save power spectral density(psd) of regulatory rule (bsc#1227149).</li>
<li>wifi: cfg80211: set correct param change count in ML element (bsc#1227149).</li>
<li>wifi: cfg80211: sme: hold wiphy lock for wdev iteration (bsc#1227149).</li>
<li>wifi: cfg80211: sort certificates in build (bsc#1227149).</li>
<li>wifi: cfg80211: split struct cfg80211_ap_settings (bsc#1227149).</li>
<li>wifi: cfg80211: validate HE operation element parsing (bsc#1227149).</li>
<li>wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (stable-fixes).</li>
<li>wifi: cfg80211: wext: convert return value to kernel-doc (bsc#1227149).</li>
<li>wifi: cfg80211: wext: set ssids=NULL for passive scans (git-fixes).</li>
<li>wifi: cw1200: Avoid processing an invalid TIM IE (bsc#1227149).</li>
<li>wifi: cw1200: Convert to GPIO descriptors (bsc#1227149).</li>
<li>wifi: cw1200: fix __le16 sparse warnings (bsc#1227149).</li>
<li>wifi: cw1200: restore endian swapping (bsc#1227149).</li>
<li>wifi: drivers: Explicitly include correct DT includes (bsc#1227149).</li>
<li>wifi: fill in MODULE_DESCRIPTION()s for Broadcom WLAN (bsc#1227149).</li>
<li>wifi: fill in MODULE_DESCRIPTION()s for ar5523 (bsc#1227149).</li>
<li>wifi: fill in MODULE_DESCRIPTION()s for mt76 drivers (bsc#1227149).</li>
<li>wifi: fill in MODULE_DESCRIPTION()s for p54spi (bsc#1227149).</li>
<li>wifi: fill in MODULE_DESCRIPTION()s for wcn36xx (bsc#1227149).</li>
<li>wifi: fill in MODULE_DESCRIPTION()s for wilc1000 (bsc#1227149).</li>
<li>wifi: fill in MODULE_DESCRIPTION()s for wl1251 and wl12xx (bsc#1227149).</li>
<li>wifi: fill in MODULE_DESCRIPTION()s for wl18xx (bsc#1227149).</li>
<li>wifi: fill in MODULE_DESCRIPTION()s for wlcore (bsc#1227149).</li>
<li>wifi: hostap: Add __counted_by for struct prism2_download_data and use struct_size() (bsc#1227149).</li>
<li>wifi: hostap: fix stringop-truncations GCC warning (bsc#1227149).</li>
<li>wifi: hostap: remove unused ioctl function (bsc#1227149).</li>
<li>wifi: ieee80211: add UL-bandwidth definition of trigger frame (bsc#1227149).</li>
<li>wifi: ieee80211: add definitions for negotiated TID to Link map (bsc#1227149).</li>
<li>wifi: ieee80211: check for NULL in ieee80211_mle_size_ok() (stable-fixes).</li>
<li>wifi: ieee80211: fix ieee80211_mle_basic_sta_prof_size_ok() (git-fixes).</li>
<li>wifi: iwlmei: do not send SAP messages if AMT is disabled (bsc#1227149).</li>
<li>wifi: iwlmei: do not send nic info with invalid mac address (bsc#1227149).</li>
<li>wifi: iwlmei: send HOST_GOES_DOWN message even if wiamt is disabled (bsc#1227149).</li>
<li>wifi: iwlmei: send driver down SAP message only if wiamt is enabled (bsc#1227149).</li>
<li>wifi: iwlmvm: fw: Add new OEM vendor to tas approved list (bsc#1227149).</li>
<li>wifi: iwlwifi: Add rf_mapping of new wifi7 devices (bsc#1227149).</li>
<li>wifi: iwlwifi: Add support for PPAG cmd v5 and PPAG revision 3 (bsc#1227149).</li>
<li>wifi: iwlwifi: Add support for new 802.11be device (bsc#1227149).</li>
<li>wifi: iwlwifi: Do not mark DFS channels as NO-IR (bsc#1227149).</li>
<li>wifi: iwlwifi: Extract common prph mac/phy regions data dump logic (bsc#1227149).</li>
<li>wifi: iwlwifi: Fix spelling mistake "SESION" -> "SESSION" (bsc#1227149).</li>
<li>wifi: iwlwifi: Use request_module_nowait (bsc#1227149).</li>
<li>wifi: iwlwifi: abort scan when rfkill on but device enabled (bsc#1227149).</li>
<li>wifi: iwlwifi: add HONOR to PPAG approved list (bsc#1227149).</li>
<li>wifi: iwlwifi: add Razer to ppag approved list (bsc#1227149).</li>
<li>wifi: iwlwifi: add mapping of a periphery register crf for WH RF (bsc#1227149).</li>
<li>wifi: iwlwifi: add new RF support for wifi7 (bsc#1227149).</li>
<li>wifi: iwlwifi: add support for SNPS DPHYIP region type (bsc#1227149).</li>
<li>wifi: iwlwifi: add support for a wiphy_work rx handler (bsc#1227149).</li>
<li>wifi: iwlwifi: add support for activating UNII-1 in WW via BIOS (bsc#1227149).</li>
<li>wifi: iwlwifi: add support for new ini region types (bsc#1227149).</li>
<li>wifi: iwlwifi: adjust rx_phyinfo debugfs to MLO (bsc#1227149).</li>
<li>wifi: iwlwifi: always have 'uats_enabled' (bsc#1227149).</li>
<li>wifi: iwlwifi: api: clean up some kernel-doc/typos (bsc#1227149).</li>
<li>wifi: iwlwifi: api: dbg-tlv: fix up kernel-doc (bsc#1227149).</li>
<li>wifi: iwlwifi: api: fix a small upper/lower-case typo (bsc#1227149).</li>
<li>wifi: iwlwifi: api: fix center_freq label in PHY diagram (bsc#1227149).</li>
<li>wifi: iwlwifi: api: fix constant version to match FW (bsc#1227149).</li>
<li>wifi: iwlwifi: api: fix kernel-doc reference (bsc#1227149).</li>
<li>wifi: iwlwifi: bump FW API to 84 for AX/BZ/SC devices (bsc#1227149).</li>
<li>wifi: iwlwifi: bump FW API to 86 for AX/BZ/SC devices (bsc#1227149).</li>
<li>wifi: iwlwifi: bump FW API to 87 for AX/BZ/SC devices (bsc#1227149).</li>
<li>wifi: iwlwifi: bump FW API to 88 for AX/BZ/SC devices (bsc#1227149).</li>
<li>wifi: iwlwifi: cancel session protection only if there is one (bsc#1227149).</li>
<li>wifi: iwlwifi: change link id in time event to s8 (bsc#1227149).</li>
<li>wifi: iwlwifi: check for kmemdup() return value in iwl_parse_tlv_firmware() (bsc#1227149).</li>
<li>wifi: iwlwifi: cleanup BT Shared Single Antenna code (bsc#1227149).</li>
<li>wifi: iwlwifi: cleanup sending PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1227149).</li>
<li>wifi: iwlwifi: cleanup uefi variables loading (bsc#1227149).</li>
<li>wifi: iwlwifi: clear link_id in time_event (bsc#1227149).</li>
<li>wifi: iwlwifi: dbg-tlv: avoid extra allocation/copy (bsc#1227149).</li>
<li>wifi: iwlwifi: dbg-tlv: use struct_size() for allocation (bsc#1227149).</li>
<li>wifi: iwlwifi: dbg_ini: move iwl_dbg_tlv_free outside of debugfs ifdef (git-fixes).</li>
<li>wifi: iwlwifi: disable 160 MHz based on subsystem device ID (bsc#1227149).</li>
<li>wifi: iwlwifi: disable eSR when BT is active (bsc#1227149).</li>
<li>wifi: iwlwifi: disable multi rx queue for 9000 (bsc#1227149).</li>
<li>wifi: iwlwifi: do not check TAS block list size twice (bsc#1227149).</li>
<li>wifi: iwlwifi: do not use TRUE/FALSE with bool (bsc#1227149).</li>
<li>wifi: iwlwifi: drop NULL pointer check in iwl_mvm_tzone_set_trip_temp() (bsc#1227149).</li>
<li>wifi: iwlwifi: dvm: remove kernel-doc warnings (bsc#1227149).</li>
<li>wifi: iwlwifi: error-dump: fix kernel-doc issues (bsc#1227149).</li>
<li>wifi: iwlwifi: fail NIC access fast on dead NIC (bsc#1227149).</li>
<li>wifi: iwlwifi: fix #ifdef CONFIG_ACPI check (bsc#1227149).</li>
<li>wifi: iwlwifi: fix iwl_mvm_get_valid_rx_ant() (git-fixes).</li>
<li>wifi: iwlwifi: fix opmode start/stop race (bsc#1227149).</li>
<li>wifi: iwlwifi: fix some kernel-doc issues (bsc#1227149).</li>
<li>wifi: iwlwifi: fix some kernel-doc issues (bsc#1227149).</li>
<li>wifi: iwlwifi: fix system commands group ordering (bsc#1227149).</li>
<li>wifi: iwlwifi: fix the rf step and flavor bits range (bsc#1227149).</li>
<li>wifi: iwlwifi: fw: Add support for UATS table in UHB (bsc#1227149).</li>
<li>wifi: iwlwifi: fw: Fix debugfs command sending (bsc#1227149).</li>
<li>wifi: iwlwifi: fw: allow vmalloc for PNVM image (bsc#1227149).</li>
<li>wifi: iwlwifi: fw: dbg: ensure correct config name sizes (bsc#1227149).</li>
<li>wifi: iwlwifi: fw: disable firmware debug asserts (bsc#1227149).</li>
<li>wifi: iwlwifi: fw: file: clean up kernel-doc (bsc#1227149).</li>
<li>wifi: iwlwifi: fw: file: do not use [0] for variable arrays (bsc#1227149).</li>
<li>wifi: iwlwifi: fw: fix compiler warning for NULL string print (bsc#1227149).</li>
<li>wifi: iwlwifi: fw: increase fw_version string size (bsc#1227149).</li>
<li>wifi: iwlwifi: fw: reconstruct the API/CAPA enum number (bsc#1227149).</li>
<li>wifi: iwlwifi: fw: replace deprecated strncpy with strscpy_pad (bsc#1227149).</li>
<li>wifi: iwlwifi: handle per-phy statistics from fw (bsc#1227149).</li>
<li>wifi: iwlwifi: implement GLAI ACPI table loading (bsc#1227149).</li>
<li>wifi: iwlwifi: implement can_activate_links callback (bsc#1227149).</li>
<li>wifi: iwlwifi: implement enable/disable for China 2022 regulatory (bsc#1227149).</li>
<li>wifi: iwlwifi: iwl-fh.h: fix kernel-doc issues (bsc#1227149).</li>
<li>wifi: iwlwifi: iwl-trans.h: clean up kernel-doc (bsc#1227149).</li>
<li>wifi: iwlwifi: iwlmvm: handle unprotected deauth/disassoc in d3 (bsc#1227149).</li>
<li>wifi: iwlwifi: load b0 version of ucode for HR1/HR2 (bsc#1227149).</li>
<li>wifi: iwlwifi: make TB reallocation a debug message (bsc#1227149).</li>
<li>wifi: iwlwifi: make time_events MLO aware (bsc#1227149).</li>
<li>wifi: iwlwifi: mei: return error from register when not built (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Add basic link selection logic (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Add support for removing responder TKs (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Allow DFS concurrent operation (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Configure the link mapping for non-MLD FW (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Correctly report TSF data in scan complete (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Declare support for secure LTF measurement (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Do not warn if valid link pair was not found (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Do not warn on invalid link on scan complete (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Extend support for P2P service discovery (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Fix FTM initiator flags (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Fix scan abort handling with HW rfkill (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: Fix unreachable code path (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: Keep connection in case of missed beacons during RX (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Return success if link could not be removed (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: Use the link ID provided in scan request (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: add US/Canada MCC to API (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: add a debug print when we get a BAR (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: add a debugfs hook to clear the monitor data (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: add a per-link debugfs (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: add a print when sending RLC command (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: add start mac ctdp sum calculation debugfs handler (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: add support for TID to link mapping neg request (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: add support for new wowlan_info_notif (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: advertise MLO only if EHT is enabled (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: advertise support for SCS traffic description (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: advertise support for protected ranging negotiation (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: allocate STA links only for active links (git-fixes).</li>
<li>wifi: iwlwifi: mvm: always update keys in D3 exit (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: avoid garbage iPN (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: calculate EMLSR mode after connection (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: check AP supports EMLSR (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: check for iwl_mvm_mld_update_sta() errors (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: check link more carefully (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (git-fixes).</li>
<li>wifi: iwlwifi: mvm: check own capabilities for EMLSR (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: cleanup MLO and non-MLO unification code (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: combine condition/warning (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: consider having one active link (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: const-ify chandef pointers (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: cycle FW link on chanctx removal (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: d3: avoid intermediate/early mutex unlock (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: d3: disconnect on GTK rekey failure (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: d3: implement suspend with MLO (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: debugfs for fw system stats (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: define RX queue sync timeout as a macro (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: disable MLO for the time being (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: disallow puncturing in US/Canada (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: disconnect long CSA only w/o alternative (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: do not abort queue sync in CT-kill (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: do not add dummy phy context (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: do not always disable EMLSR due to BT coex (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: do not do duplicate detection for nullfunc packets (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: do not initialize csa_work twice (git-fixes).</li>
<li>wifi: iwlwifi: mvm: do not limit VLP/AFC to UATS-enabled (git-fixes).</li>
<li>wifi: iwlwifi: mvm: do not read past the mfuart notifcation (git-fixes).</li>
<li>wifi: iwlwifi: mvm: do not send BT_COEX_CI command on new devices (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: do not send NDPs for new tx devices (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: do not send STA_DISABLE_TX_CMD for newer firmware (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: do not send the smart fifo command if not needed (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: do not set trigger frame padding in AP mode (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: do not support reduced tx power on ack for new devices (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: do not wake up rx_sync_waitq upon RFKILL (git-fixes).</li>
<li>wifi: iwlwifi: mvm: enable FILS DF Tx on non-PSC channel (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: enable HE TX/RX <242 tone RU on new RFs (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: expand queue sync warning messages (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: extend alive timeout to 2 seconds (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix ROC version check (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix SB CFG check (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix a battery life regression (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix a crash on 7265 (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix active link counting during recovery (git-fixes).</li>
<li>wifi: iwlwifi: mvm: fix check in iwl_mvm_sta_fw_id_mask (git-fixes).</li>
<li>wifi: iwlwifi: mvm: fix kernel-doc (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix link ID management (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix recovery flow in CSA (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix regdb initialization (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix the PHY context resolution for p2p device (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix the TXF mapping for BZ devices (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix the key PN index (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fix thermal kernel-doc (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: fold the ref++ into iwl_mvm_phy_ctxt_add (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: guard against invalid STA ID on removal (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: handle BA session teardown in RF-kill (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: handle debugfs names more carefully (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: handle link-STA allocation in restart (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: implement ROC version 3 (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: implement new firmware API for statistics (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: increase session protection after CSA (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: init vif works only once (git-fixes).</li>
<li>wifi: iwlwifi: mvm: introduce PHY_CONTEXT_CMD_API_VER_5 (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: introduce esr_disable_reason (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: iterate active links for STA queues (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: limit EHT 320 MHz MCS for STEP URM (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: limit pseudo-D3 to 60 seconds (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: log dropped frames (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: log dropped packets due to MIC error (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: make "pldr_sync" mode effective (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: make functions public (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: make pldr_sync AX210 specific (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: move BA notif messages before action (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: move RU alloc B2 placement (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: move listen interval to constants (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: offload IGTK in AP if BIGTK is supported (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: partially support PHY context version 6 (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: reduce maximum RX A-MPDU size (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: refactor TX rate handling (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: refactor duplicate chanctx condition (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: remove EHT code from mac80211.c (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: remove IWL_MVM_STATUS_NEED_FLUSH_P2P (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: remove flags for enable/disable beacon filter (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).</li>
<li>wifi: iwlwifi: mvm: remove one queue sync on BA session stop (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: remove set_tim callback for MLD ops (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: remove stale STA link data during restart (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).</li>
<li>wifi: iwlwifi: mvm: revert gen2 TX A-MPDU size to 64 (git-fixes).</li>
<li>wifi: iwlwifi: mvm: rework debugfs handling (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: select STA mask only for active links (git-fixes).</li>
<li>wifi: iwlwifi: mvm: set properly mac header (git-fixes).</li>
<li>wifi: iwlwifi: mvm: show dump even for pldr_sync (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: show skb_mac_gso_segment() failure reason (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: simplify the reorder buffer (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: skip adding debugfs symlink for reconfig (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: support CSA with MLD (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: support SPP A-MSDUs (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: support flush on AP interfaces (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: support injection antenna control (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: support iwl_dev_tx_power_cmd_v8 (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: support set_antenna() (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: unlock mvm if there is no primary link (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: use fast balance scan in case of an active P2P GO (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: use the new command to clear the internal buffer (bsc#1227149).</li>
<li>wifi: iwlwifi: mvm: work around A-MSDU size problem (bsc#1227149).</li>
<li>wifi: iwlwifi: no power save during transition to D3 (bsc#1227149).</li>
<li>wifi: iwlwifi: nvm-parse: advertise common packet padding (bsc#1227149).</li>
<li>wifi: iwlwifi: nvm: parse the VLP/AFC bit from regulatory (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: (re-)assign BAR0 on driver bind (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: Add new PCI device id and CNVI (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: clean up WFPM control bits (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: clean up device removal work (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: clean up gen1/gen2 TFD unmap (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: do not allow hw-rfkill to stop device on gen2 (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: dump CSRs before removal (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: enable TOP fatal error interrupt (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: fix kernel-doc issues (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: get_crf_id() can be void (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: give up mem read if HW is dead (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: move gen1 TB handling to header (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: point invalid TFDs to invalid data (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: propagate iwl_pcie_gen2_apm_init() error (bsc#1227149).</li>
<li>wifi: iwlwifi: pcie: rescan bus if no parent (bsc#1227149).</li>
<li>wifi: iwlwifi: prepare for reading DSM from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: prepare for reading PPAG table from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: prepare for reading SAR tables from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: prepare for reading SPLC from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: prepare for reading TAS table from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: properly check if link is active (bsc#1227149).</li>
<li>wifi: iwlwifi: properly set WIPHY_FLAG_SUPPORTS_EXT_KEK_KCK (stable-fixes).</li>
<li>wifi: iwlwifi: queue: fix kernel-doc (bsc#1227149).</li>
<li>wifi: iwlwifi: queue: improve warning for no skb in reclaim (bsc#1227149).</li>
<li>wifi: iwlwifi: queue: move iwl_txq_gen2_set_tb() up (bsc#1227149).</li>
<li>wifi: iwlwifi: read DSM func 2 for specific RF types (bsc#1227149).</li>
<li>wifi: iwlwifi: read DSM functions from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: read ECKV table from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: read PPAG table from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: read SAR tables from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: read SPLC from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: read WRDD table from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: read WTAS table from UEFI (bsc#1227149).</li>
<li>wifi: iwlwifi: read mac step from aux register (bsc#1227149).</li>
<li>wifi: iwlwifi: read txq->read_ptr under lock (stable-fixes).</li>
<li>wifi: iwlwifi: reconfigure TLC during HW restart (git-fixes).</li>
<li>wifi: iwlwifi: refactor RX tracing (bsc#1227149).</li>
<li>wifi: iwlwifi: remove 'def_rx_queue' struct member (bsc#1227149).</li>
<li>wifi: iwlwifi: remove Gl A-step remnants (bsc#1227149).</li>
<li>wifi: iwlwifi: remove WARN from read_mem32() (bsc#1227149).</li>
<li>wifi: iwlwifi: remove async command callback (bsc#1227149).</li>
<li>wifi: iwlwifi: remove dead-code (bsc#1227149).</li>
<li>wifi: iwlwifi: remove extra kernel-doc (bsc#1227149).</li>
<li>wifi: iwlwifi: remove memory check for LMAC error address (bsc#1227149).</li>
<li>wifi: iwlwifi: remove retry loops in start (bsc#1227149).</li>
<li>wifi: iwlwifi: remove unused function prototype (bsc#1227149).</li>
<li>wifi: iwlwifi: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).</li>
<li>wifi: iwlwifi: return negative -EINVAL instead of positive EINVAL (bsc#1227149).</li>
<li>wifi: iwlwifi: rfi: use a single DSM function for all RFI configurations (bsc#1227149).</li>
<li>wifi: iwlwifi: send EDT table to FW (bsc#1227149).</li>
<li>wifi: iwlwifi: separate TAS 'read-from-BIOS' and 'send-to-FW' flows (bsc#1227149).</li>
<li>wifi: iwlwifi: simplify getting DSM from ACPI (bsc#1227149).</li>
<li>wifi: iwlwifi: skip affinity setting on non-SMP (bsc#1227149).</li>
<li>wifi: iwlwifi: skip opmode start retries on dead transport (bsc#1227149).</li>
<li>wifi: iwlwifi: small cleanups in PPAG table flows (bsc#1227149).</li>
<li>wifi: iwlwifi: support link command version 2 (bsc#1227149).</li>
<li>wifi: iwlwifi: support link id in SESSION_PROTECTION_NOTIF (bsc#1227149).</li>
<li>wifi: iwlwifi: support link_id in SESSION_PROTECTION cmd (bsc#1227149).</li>
<li>wifi: iwlwifi: take SGOM and UATS code out of ACPI ifdef (bsc#1227149).</li>
<li>wifi: iwlwifi: take send-DSM-to-FW flows out of ACPI ifdef (bsc#1227149).</li>
<li>wifi: iwlwifi: trace full frames with TX status request (bsc#1227149).</li>
<li>wifi: iwlwifi: update context info structure definitions (bsc#1227149).</li>
<li>wifi: iwlwifi: use system_unbound_wq for debug dump (bsc#1227149).</li>
<li>wifi: iwlwifi: validate PPAG table when sent to FW (bsc#1227149).</li>
<li>wifi: lib80211: remove unused variables iv32 and iv16 (bsc#1227149).</li>
<li>wifi: libertas: Follow renaming of SPI "master" to "controller" (bsc#1227149).</li>
<li>wifi: libertas: add missing calls to cancel_work_sync() (bsc#1227149).</li>
<li>wifi: libertas: cleanup SDIO reset (bsc#1227149).</li>
<li>wifi: libertas: handle possible spu_write_u16() errors (bsc#1227149).</li>
<li>wifi: libertas: prefer kstrtoX() for simple integer conversions (bsc#1227149).</li>
<li>wifi: libertas: simplify list operations in free_if_spi_card() (bsc#1227149).</li>
<li>wifi: libertas: use convenient lists to manage SDIO packets (bsc#1227149).</li>
<li>wifi: mac80211: Add __counted_by for struct ieee802_11_elems and use struct_size() (bsc#1227149).</li>
<li>wifi: mac80211: Avoid address calculations via out of bounds array indexing (stable-fixes).</li>
<li>wifi: mac80211: Check if we had first beacon with relevant links (bsc#1227149).</li>
<li>wifi: mac80211: Do not force off-channel for management Tx with MLO (bsc#1227149).</li>
<li>wifi: mac80211: Do not include crypto/algapi.h (bsc#1227149).</li>
<li>wifi: mac80211: Extend support for scanning while MLO connected (bsc#1227149).</li>
<li>wifi: mac80211: Fix SMPS handling in the context of MLO (bsc#1227149).</li>
<li>wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (git-fixes).</li>
<li>wifi: mac80211: Notify the low level driver on change in MLO valid links (bsc#1227149).</li>
<li>wifi: mac80211: Print local link address during authentication (bsc#1227149).</li>
<li>wifi: mac80211: Recalc offload when monitor stop (git-fixes).</li>
<li>wifi: mac80211: Remove unused function declarations (bsc#1227149).</li>
<li>wifi: mac80211: Rename and update IEEE80211_VIF_DISABLE_SMPS_OVERRIDE (bsc#1227149).</li>
<li>wifi: mac80211: Replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).</li>
<li>wifi: mac80211: Sanity check tx bitrate if not provided by driver (bsc#1227149).</li>
<li>wifi: mac80211: Schedule regulatory channels check on bandwith change (bsc#1227149).</li>
<li>wifi: mac80211: Skip association timeout update after comeback rejection (bsc#1227149).</li>
<li>wifi: mac80211: add a driver callback to add vif debugfs (bsc#1227149).</li>
<li>wifi: mac80211: add a driver callback to check active_links (bsc#1227149).</li>
<li>wifi: mac80211: add a flag to disallow puncturing (bsc#1227149).</li>
<li>wifi: mac80211: add back SPDX identifier (bsc#1227149).</li>
<li>wifi: mac80211: add ieee80211_tdls_sta_link_id() (stable-fixes).</li>
<li>wifi: mac80211: add link id to ieee80211_gtk_rekey_add() (bsc#1227149).</li>
<li>wifi: mac80211: add link id to mgd_prepare_tx() (bsc#1227149).</li>
<li>wifi: mac80211: add more ops assertions (bsc#1227149).</li>
<li>wifi: mac80211: add more warnings about inserting sta info (bsc#1227149).</li>
<li>wifi: mac80211: add support for SPP A-MSDUs (bsc#1227149).</li>
<li>wifi: mac80211: add support for mld in ieee80211_chswitch_done (bsc#1227149).</li>
<li>wifi: mac80211: add support for parsing TID to Link mapping element (bsc#1227149).</li>
<li>wifi: mac80211: add/remove driver debugfs entries as appropriate (bsc#1227149).</li>
<li>wifi: mac80211: additions to change_beacon() (bsc#1227149).</li>
<li>wifi: mac80211: address some kerneldoc warnings (bsc#1227149).</li>
<li>wifi: mac80211: allow 64-bit radiotap timestamps (bsc#1227149).</li>
<li>wifi: mac80211: allow for_each_sta_active_link() under RCU (bsc#1227149).</li>
<li>wifi: mac80211: apply mcast rate only if interface is up (stable-fixes).</li>
<li>wifi: mac80211: cancel multi-link reconf work on disconnect (git-fixes).</li>
<li>wifi: mac80211: chanctx emulation set CHANGE_CHANNEL when in_reconfig (git-fixes).</li>
<li>wifi: mac80211: check EHT/TTLM action frame length (bsc#1227149).</li>
<li>wifi: mac80211: check wiphy mutex in ops (bsc#1227149).</li>
<li>wifi: mac80211: clean up assignments to pointer cache (stable-fixes).</li>
<li>wifi: mac80211: cleanup airtime arithmetic with ieee80211_sta_keep_active() (bsc#1227149).</li>
<li>wifi: mac80211: cleanup auth_data only if association continues (bsc#1227149).</li>
<li>wifi: mac80211: convert A-MPDU work to wiphy work (bsc#1227149).</li>
<li>wifi: mac80211: correctly parse Spatial Reuse Parameter Set element (git-fixes).</li>
<li>wifi: mac80211: correctly set active links upon TTLM (bsc#1227149).</li>
<li>wifi: mac80211: correcty limit wider BW TDLS STAs (git-fixes).</li>
<li>wifi: mac80211: debugfs: lock wiphy instead of RTNL (bsc#1227149).</li>
<li>wifi: mac80211: describe return values in kernel-doc (bsc#1227149).</li>
<li>wifi: mac80211: disable softirqs for queued frame handling (git-fixes).</li>
<li>wifi: mac80211: do not connect to an AP while it's in a CSA process (bsc#1227149).</li>
<li>wifi: mac80211: do not re-add debugfs entries during resume (bsc#1227149).</li>
<li>wifi: mac80211: do not select link ID if not provided in scan request (bsc#1227149).</li>
<li>wifi: mac80211: do not set ESS capab bit in assoc request (bsc#1227149).</li>
<li>wifi: mac80211: do not use rate mask for scanning (stable-fixes).</li>
<li>wifi: mac80211: drop robust action frames before assoc (bsc#1227149).</li>
<li>wifi: mac80211: drop spurious WARN_ON() in ieee80211_ibss_csa_beacon() (bsc#1227149).</li>
<li>wifi: mac80211: ensure beacon is non-S1G prior to extracting the beacon timestamp field (stable-fixes).</li>
<li>wifi: mac80211: ethtool: always hold wiphy mutex (bsc#1227149).</li>
<li>wifi: mac80211: ethtool: hold wiphy mutex (bsc#1227149).</li>
<li>wifi: mac80211: expand __ieee80211_data_to_8023() status (bsc#1227149).</li>
<li>wifi: mac80211: extend wiphy lock in interface removal (bsc#1227149).</li>
<li>wifi: mac80211: fix BA session teardown race (bsc#1227149).</li>
<li>wifi: mac80211: fix BSS_CHANGED_UNSOL_BCAST_PROBE_RESP (bsc#1227149).</li>
<li>wifi: mac80211: fix SMPS status handling (bsc#1227149).</li>
<li>wifi: mac80211: fix TXQ error path and cleanup (bsc#1227149).</li>
<li>wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan() (stable-fixes).</li>
<li>wifi: mac80211: fix a expired vs. cancel race in roc (bsc#1227149).</li>
<li>wifi: mac80211: fix advertised TTLM scheduling (bsc#1227149).</li>
<li>wifi: mac80211: fix another key installation error path (bsc#1227149).</li>
<li>wifi: mac80211: fix change_address deadlock during unregister (bsc#1227149).</li>
<li>wifi: mac80211: fix channel switch link data (bsc#1227149).</li>
<li>wifi: mac80211: fix driver debugfs for vif type change (bsc#1227149).</li>
<li>wifi: mac80211: fix error path key leak (bsc#1227149).</li>
<li>wifi: mac80211: fix header kernel-doc typos (bsc#1227149).</li>
<li>wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).</li>
<li>wifi: mac80211: fix ieee80211_drop_unencrypted_mgmt return type/value (bsc#1227149).</li>
<li>wifi: mac80211: fix monitor channel with chanctx emulation (bsc#1227149).</li>
<li>wifi: mac80211: fix potential key leak (bsc#1227149).</li>
<li>wifi: mac80211: fix prep_connection error path (stable-fixes).</li>
<li>wifi: mac80211: fix spelling typo in comment (bsc#1227149).</li>
<li>wifi: mac80211: fix unaligned le16 access (git-fixes).</li>
<li>wifi: mac80211: fix unsolicited broadcast probe config (bsc#1227149).</li>
<li>wifi: mac80211: fix various kernel-doc issues (bsc#1227149).</li>
<li>wifi: mac80211: fixes in FILS discovery updates (bsc#1227149).</li>
<li>wifi: mac80211: flush STA queues on unauthorization (bsc#1227149).</li>
<li>wifi: mac80211: flush wiphy work where appropriate (bsc#1227149).</li>
<li>wifi: mac80211: handle debugfs when switching to/from MLO (bsc#1227149).</li>
<li>wifi: mac80211: handle tasklet frames before stopping (stable-fixes).</li>
<li>wifi: mac80211: hold wiphy lock in netdev/link debugfs (bsc#1227149).</li>
<li>wifi: mac80211: hold wiphy_lock around concurrency checks (bsc#1227149).</li>
<li>wifi: mac80211: improve CSA/ECSA connection refusal (bsc#1227149).</li>
<li>wifi: mac80211: initialize SMPS mode correctly (bsc#1227149).</li>
<li>wifi: mac80211: lock wiphy for aggregation debugfs (bsc#1227149).</li>
<li>wifi: mac80211: lock wiphy in IP address notifier (bsc#1227149).</li>
<li>wifi: mac80211: make mgd_protect_tdls_discover MLO-aware (bsc#1227149).</li>
<li>wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (git-fixes).</li>
<li>wifi: mac80211: mesh: Remove unused function declaration mesh_ids_set_default() (bsc#1227149).</li>
<li>wifi: mac80211: mesh: fix some kdoc warnings (bsc#1227149).</li>
<li>wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh sdata (stable-fixes).</li>
<li>wifi: mac80211: move CSA finalize to wiphy work (bsc#1227149).</li>
<li>wifi: mac80211: move DFS CAC work to wiphy work (bsc#1227149).</li>
<li>wifi: mac80211: move TDLS work to wiphy work (bsc#1227149).</li>
<li>wifi: mac80211: move color change finalize to wiphy work (bsc#1227149).</li>
<li>wifi: mac80211: move dynamic PS to wiphy work (bsc#1227149).</li>
<li>wifi: mac80211: move filter reconfig to wiphy work (bsc#1227149).</li>
<li>wifi: mac80211: move key tailroom work to wiphy work (bsc#1227149).</li>
<li>wifi: mac80211: move link activation work to wiphy work (bsc#1227149).</li>
<li>wifi: mac80211: move monitor work to wiphy work (bsc#1227149).</li>
<li>wifi: mac80211: move tspec work to wiphy work (bsc#1227149).</li>
<li>wifi: mac80211: process and save negotiated TID to Link mapping request (bsc#1227149).</li>
<li>wifi: mac80211: purge TX queues in flush_queues flow (bsc#1227149).</li>
<li>wifi: mac80211: reduce iflist_mtx (bsc#1227149).</li>
<li>wifi: mac80211: reject MLO channel configuration if not supported (bsc#1227149).</li>
<li>wifi: mac80211: relax RCU check in for_each_vif_active_link() (bsc#1227149).</li>
<li>wifi: mac80211: remove RX_DROP_UNUSABLE (bsc#1227149).</li>
<li>wifi: mac80211: remove ampdu_mlme.mtx (bsc#1227149).</li>
<li>wifi: mac80211: remove chanctx_mtx (bsc#1227149).</li>
<li>wifi: mac80211: remove key_mtx (bsc#1227149).</li>
<li>wifi: mac80211: remove link before AP (git-fixes).</li>
<li>wifi: mac80211: remove local->mtx (bsc#1227149).</li>
<li>wifi: mac80211: remove redundant ML element check (bsc#1227149).</li>
<li>wifi: mac80211: remove shifted rate support (bsc#1227149).</li>
<li>wifi: mac80211: remove sta_mtx (bsc#1227149).</li>
<li>wifi: mac80211: remove unnecessary struct forward declaration (bsc#1227149).</li>
<li>wifi: mac80211: rename ieee80211_tx_status() to ieee80211_tx_status_skb() (bsc#1227149).</li>
<li>wifi: mac80211: rename struct cfg80211_rx_assoc_resp to cfg80211_rx_assoc_resp_data (bsc#1227149).</li>
<li>wifi: mac80211: report per-link error during association (bsc#1227149).</li>
<li>wifi: mac80211: reset negotiated TTLM on disconnect (git-fixes).</li>
<li>wifi: mac80211: rework RX timestamp flags (bsc#1227149).</li>
<li>wifi: mac80211: rework ack_frame_id handling a bit (bsc#1227149).</li>
<li>wifi: mac80211: rx.c: fix sentence grammar (bsc#1227149).</li>
<li>wifi: mac80211: set wiphy for virtual monitors (bsc#1227149).</li>
<li>wifi: mac80211: simplify non-chanctx drivers (bsc#1227149).</li>
<li>wifi: mac80211: split ieee80211_drop_unencrypted_mgmt() return value (bsc#1227149).</li>
<li>wifi: mac80211: sta_info.c: fix sentence grammar (bsc#1227149).</li>
<li>wifi: mac80211: support antenna control in injection (bsc#1227149).</li>
<li>wifi: mac80211: support handling of advertised TID-to-link mapping (bsc#1227149).</li>
<li>wifi: mac80211: take MBSSID/EHT data also from probe resp (bsc#1227149).</li>
<li>wifi: mac80211: take wiphy lock for MAC addr change (bsc#1227149).</li>
<li>wifi: mac80211: tx: clarify conditions in if statement (bsc#1227149).</li>
<li>wifi: mac80211: update beacon counters per link basis (bsc#1227149).</li>
<li>wifi: mac80211: update some locking documentation (bsc#1227149).</li>
<li>wifi: mac80211: update the rx_chains after set_antenna() (bsc#1227149).</li>
<li>wifi: mac80211: use bandwidth indication element for CSA (bsc#1227149).</li>
<li>wifi: mac80211: use deflink and fix typo in link ID check (bsc#1227149).</li>
<li>wifi: mac80211: use wiphy locked debugfs for sdata/link (bsc#1227149).</li>
<li>wifi: mac80211: use wiphy locked debugfs helpers for agg_status (bsc#1227149).</li>
<li>wifi: mac80211_hwsim: init peer measurement result (git-fixes).</li>
<li>wifi: mt7601u: delete dead code checking debugfs returns (bsc#1227149).</li>
<li>wifi: mt7601u: replace strlcpy() with strscpy() (bsc#1227149).</li>
<li>wifi: mt76: Annotate struct mt76_rx_tid with __counted_by (bsc#1227149).</li>
<li>wifi: mt76: Convert to platform remove callback returning void (bsc#1227149).</li>
<li>wifi: mt76: Remove redundant assignment to variable tidno (bsc#1227149).</li>
<li>wifi: mt76: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: mt76: Replace strlcpy() with strscpy() (bsc#1227149).</li>
<li>wifi: mt76: Use PTR_ERR_OR_ZERO() to simplify code (bsc#1227149).</li>
<li>wifi: mt76: add DMA mapping error check in mt76_alloc_txwi() (bsc#1227149).</li>
<li>wifi: mt76: add ability to explicitly forbid LED registration with DT (bsc#1227149).</li>
<li>wifi: mt76: add support for providing eeprom in nvmem cells (bsc#1227149).</li>
<li>wifi: mt76: add tx_nss histogram to ethtool stats (bsc#1227149).</li>
<li>wifi: mt76: change txpower init to per-phy (bsc#1227149).</li>
<li>wifi: mt76: check sta rx control frame to multibss capability (bsc#1227149).</li>
<li>wifi: mt76: check txs format before getting skb by pid (bsc#1227149).</li>
<li>wifi: mt76: check vif type before reporting cca and csa (bsc#1227149).</li>
<li>wifi: mt76: connac: add MBSSID support for mt7996 (bsc#1227149).</li>
<li>wifi: mt76: connac: add beacon duplicate TX mode support for mt7996 (bsc#1227149).</li>
<li>wifi: mt76: connac: add beacon protection support for mt7996 (bsc#1227149).</li>
<li>wifi: mt76: connac: add connac3 mac library (bsc#1227149).</li>
<li>wifi: mt76: connac: add data field in struct tlv (bsc#1227149).</li>
<li>wifi: mt76: connac: add eht support for phy mode config (bsc#1227149).</li>
<li>wifi: mt76: connac: add eht support for tx power (bsc#1227149).</li>
<li>wifi: mt76: connac: add firmware support for mt7992 (bsc#1227149).</li>
<li>wifi: mt76: connac: add more unified command IDs (bsc#1227149).</li>
<li>wifi: mt76: connac: add more unified event IDs (bsc#1227149).</li>
<li>wifi: mt76: connac: add new definition of tx descriptor (bsc#1227149).</li>
<li>wifi: mt76: connac: add support for dsp firmware download (bsc#1227149).</li>
<li>wifi: mt76: connac: add support to set ifs time by mcu command (bsc#1227149).</li>
<li>wifi: mt76: connac: add thermal protection support for mt7996 (bsc#1227149).</li>
<li>wifi: mt76: connac: check for null before dereferencing (bsc#1227149).</li>
<li>wifi: mt76: connac: export functions for mt7925 (bsc#1227149).</li>
<li>wifi: mt76: connac: introduce helper for mt7925 chipset (bsc#1227149).</li>
<li>wifi: mt76: connac: set correct muar_idx for mt799x chipsets (bsc#1227149).</li>
<li>wifi: mt76: connac: set fixed_bw bit in TX descriptor for fixed rate frames (bsc#1227149).</li>
<li>wifi: mt76: connac: use muar idx 0xe for non-mt799x as well (bsc#1227149).</li>
<li>wifi: mt76: disable HW AMSDU when using fixed rate (bsc#1227149).</li>
<li>wifi: mt76: dma: introduce __mt76_dma_queue_reset utility routine (bsc#1227149).</li>
<li>wifi: mt76: enable UNII-4 channel 177 support (bsc#1227149).</li>
<li>wifi: mt76: fix race condition related to checking tx queue fill status (bsc#1227149).</li>
<li>wifi: mt76: fix the issue of missing txpwr settings from ch153 to ch177 (bsc#1227149).</li>
<li>wifi: mt76: fix typo in mt76_get_of_eeprom_from_nvmem function (bsc#1227149).</li>
<li>wifi: mt76: increase MT_QFLAG_WED_TYPE size (bsc#1227149).</li>
<li>wifi: mt76: introduce mt76_queue_is_wed_tx_free utility routine (bsc#1227149).</li>
<li>wifi: mt76: introduce wed pointer in mt76_queue (bsc#1227149).</li>
<li>wifi: mt76: limit support of precal loading for mt7915 to MTD only (bsc#1227149).</li>
<li>wifi: mt76: make mt76_get_of_eeprom static again (bsc#1227149).</li>
<li>wifi: mt76: mmio: move mt76_mmio_wed_{init,release}_rx_buf in common code (bsc#1227149).</li>
<li>wifi: mt76: move ampdu_state in mt76_wcid (bsc#1227149).</li>
<li>wifi: mt76: move mt76_mmio_wed_offload_{enable,disable} in common code (bsc#1227149).</li>
<li>wifi: mt76: move mt76_net_setup_tc in common code (bsc#1227149).</li>
<li>wifi: mt76: move rate info in mt76_vif (bsc#1227149).</li>
<li>wifi: mt76: move wed reset common code in mt76 module (bsc#1227149).</li>
<li>wifi: mt76: mt7603: add missing register initialization for MT7628 (bsc#1227149).</li>
<li>wifi: mt76: mt7603: add wpdma tx eof flag for PSE client reset (git-fixes).</li>
<li>wifi: mt76: mt7603: disable A-MSDU tx support on MT7628 (bsc#1227149).</li>
<li>wifi: mt76: mt7603: fix beacon interval after disabling a single vif (bsc#1227149).</li>
<li>wifi: mt76: mt7603: fix tx filter/flush function (bsc#1227149).</li>
<li>wifi: mt76: mt7603: fix tx queue of loopback packets (git-fixes).</li>
<li>wifi: mt76: mt7603: rely on shared poll_list field (bsc#1227149).</li>
<li>wifi: mt76: mt7603: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149).</li>
<li>wifi: mt76: mt7615: add missing chanctx ops (bsc#1227149).</li>
<li>wifi: mt76: mt7615: enable BSS_CHANGED_MU_GROUPS support (bsc#1227149).</li>
<li>wifi: mt76: mt7615: rely on shared poll_list field (bsc#1227149).</li>
<li>wifi: mt76: mt7615: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149).</li>
<li>wifi: mt76: mt76_connac3: move lmac queue enumeration in mt76_connac3_mac.h (bsc#1227149).</li>
<li>wifi: mt76: mt76x02: fix return value check in mt76x02_mac_process_rx (bsc#1227149).</li>
<li>wifi: mt76: mt76x2u: add netgear wdna3100v3 to device table (bsc#1227149).</li>
<li>wifi: mt76: mt7915 add tc offloading support (bsc#1227149).</li>
<li>wifi: mt76: mt7915: accumulate mu-mimo ofdma muru stats (bsc#1227149).</li>
<li>wifi: mt76: mt7915: add locking for accessing mapped registers (bsc#1227149).</li>
<li>wifi: mt76: mt7915: add missing chanctx ops (bsc#1227149).</li>
<li>wifi: mt76: mt7915: add support for MT7981 (bsc#1227149).</li>
<li>wifi: mt76: mt7915: also MT7981 is 3T3R but nss2 on 5 GHz band (bsc#1227149).</li>
<li>wifi: mt76: mt7915: disable WFDMA Tx/Rx during SER recovery (bsc#1227149).</li>
<li>wifi: mt76: mt7915: drop return in mt7915_sta_statistics (bsc#1227149).</li>
<li>wifi: mt76: mt7915: fix EEPROM offset of TSSI flag on MT7981 (bsc#1227149).</li>
<li>wifi: mt76: mt7915: fix error recovery with WED enabled (bsc#1227149).</li>
<li>wifi: mt76: mt7915: fix monitor mode issues (bsc#1227149).</li>
<li>wifi: mt76: mt7915: move mib_stats structure in mt76.h (bsc#1227149).</li>
<li>wifi: mt76: mt7915: move poll_list in mt76_wcid (bsc#1227149).</li>
<li>wifi: mt76: mt7915: move sta_poll_list and sta_poll_lock in mt76_dev (bsc#1227149).</li>
<li>wifi: mt76: mt7915: report tx retries/failed counts for non-WED path (bsc#1227149).</li>
<li>wifi: mt76: mt7915: update mpdu density capability (bsc#1227149).</li>
<li>wifi: mt76: mt7915: update mt798x_wmac_adie_patch_7976 (bsc#1227149).</li>
<li>wifi: mt76: mt7915: workaround too long expansion sparse warnings (git-fixes).</li>
<li>wifi: mt76: mt7921: Support temp sensor (bsc#1227149).</li>
<li>wifi: mt76: mt7921: add 6GHz power type support for clc (bsc#1227149).</li>
<li>wifi: mt76: mt7921: convert acpisar and clc pointers to void (bsc#1227149).</li>
<li>wifi: mt76: mt7921: enable set txpower for UNII-4 (bsc#1227149).</li>
<li>wifi: mt76: mt7921: fix 6GHz disabled by the missing default CLC config (bsc#1227149).</li>
<li>wifi: mt76: mt7921: fix CLC command timeout when suspend/resume (bsc#1227149).</li>
<li>wifi: mt76: mt7921: fix a potential association failure upon resuming (bsc#1227149).</li>
<li>wifi: mt76: mt7921: fix kernel panic by accessing invalid 6GHz channel info (bsc#1227149).</li>
<li>wifi: mt76: mt7921: fix suspend issue on MediaTek COB platform (bsc#1227149).</li>
<li>wifi: mt76: mt7921: fix the unfinished command of regd_notifier before suspend (bsc#1227149).</li>
<li>wifi: mt76: mt7921: fix wrong 6Ghz power type (bsc#1227149).</li>
<li>wifi: mt76: mt7921: get regulatory information from the clc event (bsc#1227149).</li>
<li>wifi: mt76: mt7921: get rid of MT7921_RESET_TIMEOUT marco (bsc#1227149).</li>
<li>wifi: mt76: mt7921: make mt7921_mac_sta_poll static (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move acpi_sar code in mt792x-lib module (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move common register definition in mt792x_regs.h (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move connac nic capability handling to mt7921 (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move debugfs shared code in mt792x-lib module (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move dma shared code in mt792x-lib module (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move hif_ops macro in mt792x.h (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move init shared code in mt792x-lib module (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move mac shared code in mt792x-lib module (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move mt7921_dma_init in pci.c (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move mt7921u_disconnect mt792x-lib (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move mt792x_hw_dev in mt792x.h (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move mt792x_mutex_{acquire/release} in mt792x.h (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move runtime-pm pci code in mt792x-lib (bsc#1227149).</li>
<li>wifi: mt76: mt7921: move shared runtime-pm code on mt792x-lib (bsc#1227149).</li>
<li>wifi: mt76: mt7921: reduce the size of MCU firmware download Rx queue (bsc#1227149).</li>
<li>wifi: mt76: mt7921: rely on mib_stats shared definition (bsc#1227149).</li>
<li>wifi: mt76: mt7921: rely on shared poll_list field (bsc#1227149).</li>
<li>wifi: mt76: mt7921: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149).</li>
<li>wifi: mt76: mt7921: remove macro duplication in regs.h (bsc#1227149).</li>
<li>wifi: mt76: mt7921: rename mt7921_dev in mt792x_dev (bsc#1227149).</li>
<li>wifi: mt76: mt7921: rename mt7921_hif_ops in mt792x_hif_ops (bsc#1227149).</li>
<li>wifi: mt76: mt7921: rename mt7921_phy in mt792x_phy (bsc#1227149).</li>
<li>wifi: mt76: mt7921: rename mt7921_sta in mt792x_sta (bsc#1227149).</li>
<li>wifi: mt76: mt7921: rename mt7921_vif in mt792x_vif (bsc#1227149).</li>
<li>wifi: mt76: mt7921: support 5.9/6GHz channel config in acpi (bsc#1227149).</li>
<li>wifi: mt76: mt7921: update the channel usage when the regd domain changed (bsc#1227149).</li>
<li>wifi: mt76: mt7921e: report tx retries/failed counts in tx free event (bsc#1227149).</li>
<li>wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (stable-fixes).</li>
<li>wifi: mt76: mt7925: add Mediatek Wi-Fi7 driver for mt7925 chips (bsc#1227149).</li>
<li>wifi: mt76: mt7925: add flow to avoid chip bt function fail (bsc#1227149).</li>
<li>wifi: mt76: mt7925: add support to set ifs time by mcu command (bsc#1227149).</li>
<li>wifi: mt76: mt7925: ensure 4-byte alignment for suspend & wow command (bsc#1227149).</li>
<li>wifi: mt76: mt7925: fix SAP no beacon issue in 5Ghz and 6Ghz band (bsc#1227149).</li>
<li>wifi: mt76: mt7925: fix WoW failed in encrypted mode (bsc#1227149).</li>
<li>wifi: mt76: mt7925: fix connect to 80211b mode fail in 2Ghz band (bsc#1227149).</li>
<li>wifi: mt76: mt7925: fix fw download fail (bsc#1227149).</li>
<li>wifi: mt76: mt7925: fix mcu query command fail (bsc#1227149).</li>
<li>wifi: mt76: mt7925: fix the wrong data type for scan command (bsc#1227149).</li>
<li>wifi: mt76: mt7925: fix the wrong header translation config (bsc#1227149).</li>
<li>wifi: mt76: mt7925: fix typo in mt7925_init_he_caps (bsc#1227149).</li>
<li>wifi: mt76: mt7925: fix wmm queue mapping (bsc#1227149).</li>
<li>wifi: mt76: mt7925: remove iftype from mt7925_init_eht_caps signature (bsc#1227149).</li>
<li>wifi: mt76: mt7925: support temperature sensor (bsc#1227149).</li>
<li>wifi: mt76: mt7925: update PCIe DMA settings (bsc#1227149).</li>
<li>wifi: mt76: mt7925e: fix use-after-free in free_irq() (bsc#1227149).</li>
<li>wifi: mt76: mt792x: add the illegal value check for mtcl table of acpi (bsc#1227149).</li>
<li>wifi: mt76: mt792x: fix ethtool warning (bsc#1227149).</li>
<li>wifi: mt76: mt792x: introduce mt792x-lib module (bsc#1227149).</li>
<li>wifi: mt76: mt792x: introduce mt792x-usb module (bsc#1227149).</li>
<li>wifi: mt76: mt792x: introduce mt792x_irq_map (bsc#1227149).</li>
<li>wifi: mt76: mt792x: move MT7921_PM_TIMEOUT and MT7921_HW_SCAN_TIMEOUT in common code (bsc#1227149).</li>
<li>wifi: mt76: mt792x: move more dma shared code in mt792x_dma (bsc#1227149).</li>
<li>wifi: mt76: mt792x: move mt7921_load_firmware in mt792x-lib module (bsc#1227149).</li>
<li>wifi: mt76: mt792x: move mt7921_skb_add_usb_sdio_hdr in mt792x module (bsc#1227149).</li>
<li>wifi: mt76: mt792x: move shared structure definition in mt792x.h (bsc#1227149).</li>
<li>wifi: mt76: mt792x: move some common usb code in mt792x module (bsc#1227149).</li>
<li>wifi: mt76: mt792x: support mt7925 chip init (bsc#1227149).</li>
<li>wifi: mt76: mt792x: update the country list of EU for ACPI SAR (bsc#1227149).</li>
<li>wifi: mt76: mt792xu: enable dmashdl support (bsc#1227149).</li>
<li>wifi: mt76: mt7996: Add mcu commands for getting sta tx statistic (bsc#1227149).</li>
<li>wifi: mt76: mt7996: Use DECLARE_FLEX_ARRAY() and fix -Warray-bounds warnings (bsc#1227149).</li>
<li>wifi: mt76: mt7996: add DMA support for mt7992 (bsc#1227149).</li>
<li>wifi: mt76: mt7996: add TX statistics for EHT mode in debugfs (bsc#1227149).</li>
<li>wifi: mt76: mt7996: add muru support (bsc#1227149).</li>
<li>wifi: mt76: mt7996: add sanity checks for background radar trigger (stable-fixes).</li>
<li>wifi: mt76: mt7996: add support for variants with auxiliary RX path (bsc#1227149).</li>
<li>wifi: mt76: mt7996: add thermal sensor device support (bsc#1227149).</li>
<li>wifi: mt76: mt7996: add txpower setting support (bsc#1227149).</li>
<li>wifi: mt76: mt7996: adjust WFDMA settings to improve performance (bsc#1227149).</li>
<li>wifi: mt76: mt7996: adjust interface num and wtbl size for mt7992 (bsc#1227149).</li>
<li>wifi: mt76: mt7996: align the format of fixed rate command (bsc#1227149).</li>
<li>wifi: mt76: mt7996: check txs format before getting skb by pid (bsc#1227149).</li>
<li>wifi: mt76: mt7996: disable WFDMA Tx/Rx during SER recovery (bsc#1227149).</li>
<li>wifi: mt76: mt7996: drop return in mt7996_sta_statistics (bsc#1227149).</li>
<li>wifi: mt76: mt7996: enable BSS_CHANGED_MU_GROUPS support (bsc#1227149).</li>
<li>wifi: mt76: mt7996: enable PPDU-TxS to host (bsc#1227149).</li>
<li>wifi: mt76: mt7996: enable VHT extended NSS BW feature (bsc#1227149).</li>
<li>wifi: mt76: mt7996: ensure 4-byte alignment for beacon commands (bsc#1227149).</li>
<li>wifi: mt76: mt7996: fix alignment of sta info event (bsc#1227149).</li>
<li>wifi: mt76: mt7996: fix fortify warning (bsc#1227149).</li>
<li>wifi: mt76: mt7996: fix fw loading timeout (bsc#1227149).</li>
<li>wifi: mt76: mt7996: fix mt7996_mcu_all_sta_info_event struct packing (bsc#1227149).</li>
<li>wifi: mt76: mt7996: fix potential memory leakage when reading chip temperature (bsc#1227149).</li>
<li>wifi: mt76: mt7996: fix size of txpower MCU command (bsc#1227149).</li>
<li>wifi: mt76: mt7996: fix uninitialized variable in mt7996_irq_tasklet() (bsc#1227149).</li>
<li>wifi: mt76: mt7996: fix uninitialized variable in parsing txfree (bsc#1227149).</li>
<li>wifi: mt76: mt7996: get tx_retries and tx_failed from txfree (bsc#1227149).</li>
<li>wifi: mt76: mt7996: handle IEEE80211_RC_SMPS_CHANGED (bsc#1227149).</li>
<li>wifi: mt76: mt7996: increase tx token size (bsc#1227149).</li>
<li>wifi: mt76: mt7996: introduce mt7996_band_valid() (bsc#1227149).</li>
<li>wifi: mt76: mt7996: mark GCMP IGTK unsupported (bsc#1227149).</li>
<li>wifi: mt76: mt7996: move radio ctrl commands to proper functions (bsc#1227149).</li>
<li>wifi: mt76: mt7996: only set vif teardown cmds at remove interface (bsc#1227149).</li>
<li>wifi: mt76: mt7996: rely on mib_stats shared definition (bsc#1227149).</li>
<li>wifi: mt76: mt7996: rely on shared poll_list field (bsc#1227149).</li>
<li>wifi: mt76: mt7996: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149).</li>
<li>wifi: mt76: mt7996: remove TXS queue setting (bsc#1227149).</li>
<li>wifi: mt76: mt7996: remove periodic MPDU TXS request (bsc#1227149).</li>
<li>wifi: mt76: mt7996: rework ampdu params setting (bsc#1227149).</li>
<li>wifi: mt76: mt7996: rework register offsets for mt7992 (bsc#1227149).</li>
<li>wifi: mt76: mt7996: set DMA mask to 36 bits for boards with more than 4GB of RAM (bsc#1227149).</li>
<li>wifi: mt76: mt7996: support more options for mt7996_set_bitrate_mask() (bsc#1227149).</li>
<li>wifi: mt76: mt7996: support mt7992 eeprom loading (bsc#1227149).</li>
<li>wifi: mt76: mt7996: support per-band LED control (bsc#1227149).</li>
<li>wifi: mt76: mt7996: switch to mcu command for TX GI report (bsc#1227149).</li>
<li>wifi: mt76: mt7996: use u16 for val field in mt7996_mcu_set_rro signature (bsc#1227149).</li>
<li>wifi: mt76: permit to load precal from NVMEM cell for mt7915 (bsc#1227149).</li>
<li>wifi: mt76: permit to use alternative cell name to eeprom NVMEM load (bsc#1227149).</li>
<li>wifi: mt76: reduce spin_lock_bh held up in mt76_dma_rx_cleanup (bsc#1227149).</li>
<li>wifi: mt76: replace skb_put with skb_put_zero (stable-fixes).</li>
<li>wifi: mt76: report non-binding skb tx rate when WED is active (bsc#1227149).</li>
<li>wifi: mt76: set page_pool napi pointer for mmio devices (bsc#1227149).</li>
<li>wifi: mt76: split get_of_eeprom in subfunction (bsc#1227149).</li>
<li>wifi: mt76: usb: create a dedicated queue for psd traffic (bsc#1227149).</li>
<li>wifi: mt76: usb: store usb endpoint in mt76_queue (bsc#1227149).</li>
<li>wifi: mt76: use atomic iface iteration for pre-TBTT work (bsc#1227149).</li>
<li>wifi: mt76: use chainmask for power delta calculation (bsc#1227149).</li>
<li>wifi: mwifiex: Drop unused headers (bsc#1227149).</li>
<li>wifi: mwifiex: Fix interface type change (git-fixes).</li>
<li>wifi: mwifiex: Refactor 1-element array into flexible array in struct mwifiex_ie_types_chan_list_param_set (bsc#1227149).</li>
<li>wifi: mwifiex: Replace one-element array with flexible-array member in struct mwifiex_ie_types_rxba_sync (bsc#1227149).</li>
<li>wifi: mwifiex: Set WIPHY_FLAG_NETNS_OK flag (bsc#1227149).</li>
<li>wifi: mwifiex: Use default @max_active for workqueues (bsc#1227149).</li>
<li>wifi: mwifiex: Use helpers to check multicast addresses (bsc#1227149).</li>
<li>wifi: mwifiex: Use list_count_nodes() (bsc#1227149).</li>
<li>wifi: mwifiex: cleanup adapter data (bsc#1227149).</li>
<li>wifi: mwifiex: cleanup private data structures (bsc#1227149).</li>
<li>wifi: mwifiex: cleanup struct mwifiex_sdio_mpa_rx (bsc#1227149).</li>
<li>wifi: mwifiex: drop BUG_ON from TX paths (bsc#1227149).</li>
<li>wifi: mwifiex: fix comment typos in SDIO module (bsc#1227149).</li>
<li>wifi: mwifiex: followup PCIE and related cleanups (bsc#1227149).</li>
<li>wifi: mwifiex: handle possible mwifiex_write_reg() errors (bsc#1227149).</li>
<li>wifi: mwifiex: handle possible sscanf() errors (bsc#1227149).</li>
<li>wifi: mwifiex: mwifiex_process_sleep_confirm_resp(): remove unused priv variable (bsc#1227149).</li>
<li>wifi: mwifiex: prefer strscpy() over strlcpy() (bsc#1227149).</li>
<li>wifi: mwifiex: simplify PCIE write operations (bsc#1227149).</li>
<li>wifi: mwifiex: use MODULE_FIRMWARE to add firmware files metadata (bsc#1227149).</li>
<li>wifi: mwifiex: use cfg80211_ssid_eq() instead of mwifiex_ssid_cmp() (bsc#1227149).</li>
<li>wifi: mwifiex: use is_zero_ether_addr() instead of ether_addr_equal() (bsc#1227149).</li>
<li>wifi: mwifiex: use kstrtoX_from_user() in debugfs handlers (bsc#1227149).</li>
<li>wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).</li>
<li>wifi: nl80211: Avoid address calculations via out of bounds array indexing (git-fixes).</li>
<li>wifi: nl80211: Extend del pmksa support for SAE and OWE security (bsc#1227149).</li>
<li>wifi: nl80211: Remove unused declaration nl80211_pmsr_dump_results() (bsc#1227149).</li>
<li>wifi: nl80211: additions to NL80211_CMD_SET_BEACON (bsc#1227149).</li>
<li>wifi: nl80211: allow reporting wakeup for unprot deauth/disassoc (bsc#1227149).</li>
<li>wifi: nl80211: do not free NULL coalescing rule (git-fixes).</li>
<li>wifi: nl80211: fixes to FILS discovery updates (bsc#1227149).</li>
<li>wifi: nl80211: refactor nl80211_send_mlme_event() arguments (bsc#1227149).</li>
<li>wifi: p54: Add missing MODULE_FIRMWARE macro (bsc#1227149).</li>
<li>wifi: p54: Annotate struct p54_cal_database with __counted_by (bsc#1227149).</li>
<li>wifi: p54: fix GCC format truncation warning with wiphy->fw_version (bsc#1227149).</li>
<li>wifi: plfxlc: Drop unused include (bsc#1227149).</li>
<li>wifi: radiotap: add bandwidth definition of EHT U-SIG (bsc#1227149).</li>
<li>wifi: remove unused argument of ieee80211_get_tdls_action() (bsc#1227149).</li>
<li>wifi: rsi: fix restricted __le32 degrades to integer sparse warnings (bsc#1227149).</li>
<li>wifi: rsi: rsi_91x_coex: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: rsi: rsi_91x_debugfs: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: rsi: rsi_91x_hal: Remove unnecessary conversions (bsc#1227149).</li>
<li>wifi: rsi: rsi_91x_mac80211: Remove unnecessary conversions (bsc#1227149).</li>
<li>wifi: rsi: rsi_91x_main: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: rsi: rsi_91x_sdio: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: rsi: rsi_91x_sdio_ops: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: rsi: rsi_91x_usb: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: rsi: rsi_91x_usb_ops: Remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: rt2x00: Simplify bool conversion (bsc#1227149).</li>
<li>wifi: rt2x00: correct MAC_SYS_CTRL register RX mask in R-Calibration (bsc#1227149).</li>
<li>wifi: rt2x00: disable RTS threshold for rt2800 by default (bsc#1227149).</li>
<li>wifi: rt2x00: fix MT7620 low RSSI issue (bsc#1227149).</li>
<li>wifi: rt2x00: fix rt2800 watchdog function (bsc#1227149).</li>
<li>wifi: rt2x00: fix the typo in comments (bsc#1227149).</li>
<li>wifi: rt2x00: improve MT7620 register initialization (bsc#1227149).</li>
<li>wifi: rt2x00: introduce DMA busy check watchdog for rt2800 (bsc#1227149).</li>
<li>wifi: rt2x00: limit MT7620 TX power based on eeprom calibration (bsc#1227149).</li>
<li>wifi: rt2x00: make watchdog param per device (bsc#1227149).</li>
<li>wifi: rt2x00: remove redundant check if u8 array element is less than zero (bsc#1227149).</li>
<li>wifi: rt2x00: remove useless code in rt2x00queue_create_tx_descriptor() (bsc#1227149).</li>
<li>wifi: rt2x00: rework MT7620 PA/LNA RF calibration (bsc#1227149).</li>
<li>wifi: rt2x00: rework MT7620 channel config function (bsc#1227149).</li>
<li>wifi: rt2x00: silence sparse warnings (bsc#1227149).</li>
<li>wifi: rt2x00: simplify rt2x00crypto_rx_insert_iv() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: 8188e: convert usage of priv->vif to priv->vifs[0] (bsc#1227149).</li>
<li>wifi: rtl8xxxu: 8188f: Limit TX power index (git-fixes).</li>
<li>wifi: rtl8xxxu: Actually use macid in rtl8xxxu_gen2_report_connect (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Add TP-Link TL-WN823N V2 (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Add a description about the device ID 0x7392:0xb722 (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Add beacon functions (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Add parameter force to rtl8xxxu_refresh_rate_mask (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Add parameter macid to update_rate_mask (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Add parameter role to report_connect (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Add set_tim() callback (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Add sta_add() and sta_remove() callbacks (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Add start_ap() callback (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Allow creating interface in AP mode (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Allow setting rts threshold to -1 (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Clean up filter configuration (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Declare AP mode support for 8188f (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Enable AP mode for RTL8192EU (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Enable AP mode for RTL8192FU (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Enable AP mode for RTL8710BU (RTL8188GU) (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Enable AP mode for RTL8723BU (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Enable hw seq for mgmt/non-QoS data frames (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Fix LED control code of RTL8192FU (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Fix off by one initial RTS rate (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Fix the TX power of RTL8192CU, RTL8723AU (stable-fixes).</li>
<li>wifi: rtl8xxxu: Put the macid in txdesc (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Remove usage of ieee80211_get_tx_rate() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Remove usage of tx_info->control.rates[0].flags (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Rename some registers (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Select correct queue for beacon frames (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Set maximum number of supported stations (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Support USB RX aggregation for the newer chips (bsc#1227149).</li>
<li>wifi: rtl8xxxu: Support new chip RTL8192FU (bsc#1227149).</li>
<li>wifi: rtl8xxxu: add hw crypto support for AP mode (bsc#1227149).</li>
<li>wifi: rtl8xxxu: add macids for STA mode (bsc#1227149).</li>
<li>wifi: rtl8xxxu: add missing number of sec cam entries for all variants (bsc#1227149).</li>
<li>wifi: rtl8xxxu: check vif before using in rtl8xxxu_tx() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: convert EN_DESC_ID of TX descriptor to le32 type (bsc#1227149).</li>
<li>wifi: rtl8xxxu: declare concurrent mode support for 8188f (bsc#1227149).</li>
<li>wifi: rtl8xxxu: do not parse CFO, if both interfaces are connected in STA mode (bsc#1227149).</li>
<li>wifi: rtl8xxxu: enable MFP support with security flag of RX descriptor (bsc#1227149).</li>
<li>wifi: rtl8xxxu: enable channel switch support (bsc#1227149).</li>
<li>wifi: rtl8xxxu: extend check for matching bssid to both interfaces (bsc#1227149).</li>
<li>wifi: rtl8xxxu: extend wifi connected check to both interfaces (bsc#1227149).</li>
<li>wifi: rtl8xxxu: fix error messages (bsc#1227149).</li>
<li>wifi: rtl8xxxu: fix mixed declarations in rtl8xxxu_set_aifs() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: make instances of iface limit and combination to be static const (bsc#1227149).</li>
<li>wifi: rtl8xxxu: make supporting AP mode only on port 0 transparent (bsc#1227149).</li>
<li>wifi: rtl8xxxu: mark TOTOLINK N150UA V5/N150UA-B as tested (bsc#1227149).</li>
<li>wifi: rtl8xxxu: prepare supporting two virtual interfaces (bsc#1227149).</li>
<li>wifi: rtl8xxxu: remove assignment of priv->vif in rtl8xxxu_bss_info_changed() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: remove obsolete priv->vif (bsc#1227149).</li>
<li>wifi: rtl8xxxu: rtl8xxxu_rx_complete(): remove unnecessary return (bsc#1227149).</li>
<li>wifi: rtl8xxxu: support multiple interface in start_ap() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: support multiple interfaces in bss_info_changed() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: support multiple interfaces in configure_filter() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: support multiple interfaces in update_beacon_work_callback() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: support multiple interfaces in watchdog_callback() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: support multiple interfaces in {add,remove}_interface() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: support multiple interfaces in set_aifs() (bsc#1227149).</li>
<li>wifi: rtl8xxxu: support setting bssid register for multiple interfaces (bsc#1227149).</li>
<li>wifi: rtl8xxxu: support setting linktype for both interfaces (bsc#1227149).</li>
<li>wifi: rtl8xxxu: support setting mac address register for both interfaces (bsc#1227149).</li>
<li>wifi: rtl8xxxu: update rate mask per sta (bsc#1227149).</li>
<li>wifi: rtlwifi: Convert to use PCIe capability accessors (bsc#1227149).</li>
<li>wifi: rtlwifi: Ignore IEEE80211_CONF_CHANGE_RETRY_LIMITS (bsc#1227149).</li>
<li>wifi: rtlwifi: Remove bridge vendor/device ids (bsc#1227149).</li>
<li>wifi: rtlwifi: Remove rtl_intf_ops.read_efuse_byte (bsc#1227149).</li>
<li>wifi: rtlwifi: Remove unused PCI related defines and struct (bsc#1227149).</li>
<li>wifi: rtlwifi: Speed up firmware loading for USB (bsc#1227149).</li>
<li>wifi: rtlwifi: cleanup USB interface (bsc#1227149).</li>
<li>wifi: rtlwifi: cleanup few rtlxxx_tx_fill_desc() routines (bsc#1227149).</li>
<li>wifi: rtlwifi: cleanup few rtlxxxx_set_hw_reg() routines (bsc#1227149).</li>
<li>wifi: rtlwifi: cleanup struct rtl_hal (bsc#1227149).</li>
<li>wifi: rtlwifi: cleanup struct rtl_phy (bsc#1227149).</li>
<li>wifi: rtlwifi: cleanup struct rtl_ps_ctl (bsc#1227149).</li>
<li>wifi: rtlwifi: drop chk_switch_dmdp() from HAL interface (bsc#1227149).</li>
<li>wifi: rtlwifi: drop fill_fake_txdesc() from HAL interface (bsc#1227149).</li>
<li>wifi: rtlwifi: drop pre_fill_tx_bd_desc() from HAL interface (bsc#1227149).</li>
<li>wifi: rtlwifi: drop unused const_amdpci_aspm (bsc#1227149).</li>
<li>wifi: rtlwifi: remove misused flag from HAL data (bsc#1227149).</li>
<li>wifi: rtlwifi: remove unreachable code in rtl92d_dm_check_edca_turbo() (bsc#1227149).</li>
<li>wifi: rtlwifi: remove unused dualmac control leftovers (bsc#1227149).</li>
<li>wifi: rtlwifi: remove unused timer and related code (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl8192cu: Fix 2T2R chip type detection (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl8192cu: Fix TX aggregation (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl8192de: Do not read register in _rtl92de_query_rxphystatus (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl8192de: Fix 5 GHz TX power (stable-fixes).</li>
<li>wifi: rtlwifi: rtl8192de: Fix endianness issue in RX path (stable-fixes).</li>
<li>wifi: rtlwifi: rtl8192de: Fix low speed with WPA3-SAE (stable-fixes).</li>
<li>wifi: rtlwifi: rtl8723: Remove unused function rtl8723_cmd_send_packet() (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl8821ae: Access full PMCS reg and use pci_regs.h (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl8821ae: Add pdev into _rtl8821ae_clear_pci_pme_status() (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl8821ae: Remove unnecessary PME_Status bit set (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl8821ae: Reverse PM Capability exists check (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl8821ae: Use pci_find_capability() (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl8821ae: phy: remove some useless code (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl8821ae: phy: using calculate_bit_shift() (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl92ee_dm_dynamic_primary_cca_check(): fix typo in function name (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl_usb: Store the endpoint addresses (bsc#1227149).</li>
<li>wifi: rtlwifi: rtl_usb: Use sync register writes (bsc#1227149).</li>
<li>wifi: rtlwifi: set initial values for unexpected cases of USB endpoint priority (bsc#1227149).</li>
<li>wifi: rtlwifi: simplify LED management (bsc#1227149).</li>
<li>wifi: rtlwifi: simplify TX command fill callbacks (bsc#1227149).</li>
<li>wifi: rtlwifi: simplify rtl_action_proc() and rtl_tx_agg_start() (bsc#1227149).</li>
<li>wifi: rtlwifi: use convenient list_count_nodes() (bsc#1227149).</li>
<li>wifi: rtlwifi: use eth_broadcast_addr() to assign broadcast address (bsc#1227149).</li>
<li>wifi: rtlwifi: use helper function rtl_get_hdr() (bsc#1227149).</li>
<li>wifi: rtlwifi: use unsigned long for bt_coexist_8723 timestamp (bsc#1227149).</li>
<li>wifi: rtlwifi: use unsigned long for rtl_bssid_entry timestamp (bsc#1227149).</li>
<li>wifi: rtw88: 8821c: tweak CCK TX filter setting for SRRC regulation (bsc#1227149).</li>
<li>wifi: rtw88: 8821c: update TX power limit to V67 (bsc#1227149).</li>
<li>wifi: rtw88: 8822c: update TX power limit to V70 (bsc#1227149).</li>
<li>wifi: rtw88: 8822ce: refine power parameters for RFE type 5 (bsc#1227149).</li>
<li>wifi: rtw88: Add support for the SDIO based RTL8723DS chipset (bsc#1227149).</li>
<li>wifi: rtw88: Fix AP mode incorrect DTIM behavior (bsc#1227149).</li>
<li>wifi: rtw88: Fix action frame transmission fail before association (bsc#1227149).</li>
<li>wifi: rtw88: Skip high queue in hci_flush (bsc#1227149).</li>
<li>wifi: rtw88: Stop high queue during scan (bsc#1227149).</li>
<li>wifi: rtw88: Use random MAC when efuse MAC invalid (bsc#1227149).</li>
<li>wifi: rtw88: add missing unwind goto for __rtw_download_firmware() (bsc#1227149).</li>
<li>wifi: rtw88: debug: add to check if debug mask is enabled (bsc#1227149).</li>
<li>wifi: rtw88: debug: remove wrapper of rtw_dbg() (bsc#1227149).</li>
<li>wifi: rtw88: dump firmware debug information in abnormal state (bsc#1227149).</li>
<li>wifi: rtw88: fix incorrect error codes in rtw_debugfs_copy_from_user (bsc#1227149).</li>
<li>wifi: rtw88: fix incorrect error codes in rtw_debugfs_set_* (bsc#1227149).</li>
<li>wifi: rtw88: fix not entering PS mode after AP stops (bsc#1227149).</li>
<li>wifi: rtw88: fix typo rtw8822cu_probe (bsc#1227149).</li>
<li>wifi: rtw88: process VO packets without workqueue to avoid PTK rekey failed (bsc#1227149).</li>
<li>wifi: rtw88: refine register based H2C command (bsc#1227149).</li>
<li>wifi: rtw88: regd: configure QATAR and UK (bsc#1227149).</li>
<li>wifi: rtw88: regd: update regulatory map to R64-R42 (bsc#1227149).</li>
<li>wifi: rtw88: remove unused USB bulkout size set (bsc#1227149).</li>
<li>wifi: rtw88: remove unused and set but unused leftovers (bsc#1227149).</li>
<li>wifi: rtw88: rtw8723d: Implement RTL8723DS (SDIO) efuse parsing (bsc#1227149).</li>
<li>wifi: rtw88: simplify __rtw_tx_work() (bsc#1227149).</li>
<li>wifi: rtw88: simplify vif iterators (bsc#1227149).</li>
<li>wifi: rtw88: use cfg80211_ssid_eq() instead of rtw_ssid_equal() (bsc#1227149).</li>
<li>wifi: rtw88: use kstrtoX_from_user() in debugfs handlers (bsc#1227149).</li>
<li>wifi: rtw88: use struct instead of macros to set TX desc (bsc#1227149).</li>
<li>wifi: rtw89: 52c: rfk: disable DPK during MCC (bsc#1227149).</li>
<li>wifi: rtw89: 52c: rfk: refine MCC channel info notification (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add 8851B basic chip_info (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add 8851be to Makefile and Kconfig (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add BT coexistence support function (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add DLE mem and HFC quota (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add MAC configurations to chip_info (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add NCTL post table (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add RF configurations (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add TX power related functions (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add basic power on function (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add set channel function (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add set_channel_rf() (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add support WoWLAN to 8851B (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add to parse efuse content (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: add to read efuse version to recognize hardware version B (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: configure CRASH_TRIGGER feature for 8851B (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: configure GPIO according to RFE type (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: configure to force 1 TX power value (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: enable hw_scan support (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: fill BB related capabilities to chip_info (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: rfk: Fix spelling mistake KIP_RESOTRE -> KIP_RESTORE (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: rfk: add AACK (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: rfk: add DACK (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: rfk: add DPK (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: rfk: add IQK (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: rfk: add LCK track (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: rfk: add RCK (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: rfk: add RX DCK (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: rfk: add TSSI (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: rfk: update IQK to version 0x8 (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: update RF radio A parameters to R28 (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: update TX power tables to R28 (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: update TX power tables to R34 (bsc#1227149).</li>
<li>wifi: rtw89: 8851b: update TX power tables to R37 (bsc#1227149).</li>
<li>wifi: rtw89: 8851be: add 8851BE PCI entry and fill PCI capabilities (bsc#1227149).</li>
<li>wifi: rtw89: 8852b: fix definition of KIP register number (git-fixes).</li>
<li>wifi: rtw89: 8852b: update TX power tables to R35 (bsc#1227149).</li>
<li>wifi: rtw89: 8852b: update TX power tables to R36 (bsc#1227149).</li>
<li>wifi: rtw89: 8852c: Fix TSSI causes transmit power inaccuracy (bsc#1227149).</li>
<li>wifi: rtw89: 8852c: Update bandedge parameters for better performance (bsc#1227149).</li>
<li>wifi: rtw89: 8852c: add quirk to set PCI BER for certain platforms (bsc#1227149).</li>
<li>wifi: rtw89: 8852c: declare to support two chanctx (bsc#1227149).</li>
<li>wifi: rtw89: 8852c: read RX gain offset from efuse for 6GHz channels (bsc#1227149).</li>
<li>wifi: rtw89: 8852c: update RF radio A/B parameters to R63 (bsc#1227149).</li>
<li>wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (1 of 3) (bsc#1227149).</li>
<li>wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (2 of 3) (bsc#1227149).</li>
<li>wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (3 of 3) (bsc#1227149).</li>
<li>wifi: rtw89: 8852c: update TX power tables to R67 (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add 8922A basic chip info (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add BTG functions to assist BT coexistence to control TX/RX (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add NCTL pre-settings for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add RF read/write v2 (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add SER IMR tables (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add TX power related ops (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add chip_ops related to BB init (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add chip_ops to get thermal value (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add chip_ops::bb_preinit to enable BB before downloading firmware (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add chip_ops::cfg_txrx_path (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add chip_ops::rfk_hw_init (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add chip_ops::rfk_init_late to do initial RF calibrations later (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add chip_ops::{enable,disable}_bb_rf (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add coexistence helpers of SW grant (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add helper of set_channel (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add ieee80211_ops::hw_scan (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add more fields to beacon H2C command to support multi-links (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add power on/off functions (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add register definitions of H2C, C2H, page, RRSR and EDCCA (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add set_channel BB part (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add set_channel MAC part (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: add set_channel RF part (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: configure CRASH_TRIGGER FW feature (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: correct register definition and merge IO for ctrl_nbtg_bt_tx() (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: declare to support two chanctx (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: dump MAC registers when SER occurs (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: extend and add quota number (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: hook handlers of TX/RX descriptors to chip_ops (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: implement AP mode related reg for BE generation (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: implement {stop,resume}_sch_tx and cfg_ppdu (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: read efuse content from physical map (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: read efuse content via efuse map struct from logic map (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: rfk: implement chip_ops to call RF calibrations (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: set RX gain along with set_channel operation (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: set chip_ops FEM and GPIO to NULL (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: set memory heap address for secure firmware (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: update BA CAM number to 24 (bsc#1227149).</li>
<li>wifi: rtw89: 8922a: update the register used in DIG and the DIG flow (bsc#1227149).</li>
<li>wifi: rtw89: 8922ae: add 8922AE PCI entry and basic info (bsc#1227149).</li>
<li>wifi: rtw89: 8922ae: add v2 interrupt handlers for 8922AE (bsc#1227149).</li>
<li>wifi: rtw89: Add EHT rate mask as parameters of RA H2C command (bsc#1227149).</li>
<li>wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (git-fixes).</li>
<li>wifi: rtw89: Fix clang -Wimplicit-fallthrough in rtw89_query_sar() (bsc#1227149).</li>
<li>wifi: rtw89: Introduce Time Averaged SAR (TAS) feature (bsc#1227149).</li>
<li>wifi: rtw89: Refine active scan behavior in 6 GHz (bsc#1227149).</li>
<li>wifi: rtw89: Set default CQM config if not present (bsc#1227149).</li>
<li>wifi: rtw89: TX power stuffs replace confusing naming of _max with _num (bsc#1227149).</li>
<li>wifi: rtw89: Update EHT PHY beamforming capability (bsc#1227149).</li>
<li>wifi: rtw89: acpi: process 6 GHz band policy from DSM (bsc#1227149).</li>
<li>wifi: rtw89: add C2H RA event V1 to support WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: add C2H event handlers of RFK log and report (bsc#1227149).</li>
<li>wifi: rtw89: add CFO XTAL registers field to support 8851B (bsc#1227149).</li>
<li>wifi: rtw89: add DBCC H2C to notify firmware the status (bsc#1227149).</li>
<li>wifi: rtw89: add EHT capabilities for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: add EHT radiotap in monitor mode (bsc#1227149).</li>
<li>wifi: rtw89: add EVM and SNR statistics to debugfs (bsc#1227149).</li>
<li>wifi: rtw89: add EVM for antenna diversity (bsc#1227149).</li>
<li>wifi: rtw89: add H2C RA command V1 to support WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: add H2C command to download beacon frame for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: add RSSI based antenna diversity (bsc#1227149).</li>
<li>wifi: rtw89: add RSSI statistics for the case of antenna diversity to debugfs (bsc#1227149).</li>
<li>wifi: rtw89: add XTAL SI for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: add chip_info::chip_gen to determine chip generation (bsc#1227149).</li>
<li>wifi: rtw89: add chip_info::txwd_info size to generalize TX WD submit (bsc#1227149).</li>
<li>wifi: rtw89: add chip_ops::h2c_ba_cam() to configure BA CAM (bsc#1227149).</li>
<li>wifi: rtw89: add chip_ops::query_rxdesc() and rxd_len as helpers to support newer chips (bsc#1227149).</li>
<li>wifi: rtw89: add chip_ops::update_beacon to abstract update beacon operation (bsc#1227149).</li>
<li>wifi: rtw89: add firmware H2C command of BA CAM V1 (bsc#1227149).</li>
<li>wifi: rtw89: add firmware parser for v1 format (bsc#1227149).</li>
<li>wifi: rtw89: add firmware suit for BB MCU 0/1 (bsc#1227149).</li>
<li>wifi: rtw89: add function prototype for coex request duration (bsc#1227149).</li>
<li>wifi: rtw89: add mac_gen pointer to access mac port registers (bsc#1227149).</li>
<li>wifi: rtw89: add mlo_dbcc_mode for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: add new H2C command to pause/sleep transmitting by MAC ID (bsc#1227149).</li>
<li>wifi: rtw89: add new H2C for PS mode in 802.11be chip (bsc#1227149).</li>
<li>wifi: rtw89: add reserved size as factor of DLE used size (bsc#1227149).</li>
<li>wifi: rtw89: add subband index of primary channel to struct rtw89_chan (bsc#1227149).</li>
<li>wifi: rtw89: add to display hardware rates v1 histogram in debugfs (bsc#1227149).</li>
<li>wifi: rtw89: add to fill TX descriptor for firmware command v2 (bsc#1227149).</li>
<li>wifi: rtw89: add to fill TX descriptor v2 (bsc#1227149).</li>
<li>wifi: rtw89: add to parse firmware elements of BB and RF tables (bsc#1227149).</li>
<li>wifi: rtw89: add to query RX descriptor format v2 (bsc#1227149).</li>
<li>wifi: rtw89: add tx_wake notify for 8851B (bsc#1227149).</li>
<li>wifi: rtw89: add wait/completion for abort scan (bsc#1227149).</li>
<li>wifi: rtw89: adjust init_he_cap() to add EHT cap into iftype_data (bsc#1227149).</li>
<li>wifi: rtw89: advertise missing extended scan feature (bsc#1227149).</li>
<li>wifi: rtw89: avoid stringop-overflow warning (bsc#1227149).</li>
<li>wifi: rtw89: call rtw89_chan_get() by vif chanctx if aware of vif (bsc#1227149).</li>
<li>wifi: rtw89: chan: MCC take reconfig into account (bsc#1227149).</li>
<li>wifi: rtw89: chan: add sub-entity swap function to cover replacing (bsc#1227149).</li>
<li>wifi: rtw89: chan: move handling from add/remove to assign/unassign for MLO (bsc#1227149).</li>
<li>wifi: rtw89: chan: support MCC on Wi-Fi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: chan: tweak bitmap recalc ahead before MLO (bsc#1227149).</li>
<li>wifi: rtw89: chan: tweak weight recalc ahead before MLO (bsc#1227149).</li>
<li>wifi: rtw89: change naming of BA CAM from V1 to V0_EXT (bsc#1227149).</li>
<li>wifi: rtw89: change qutoa to DBCC by default for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: change supported bandwidths of chip_info to bit mask (bsc#1227149).</li>
<li>wifi: rtw89: cleanup firmware elements parsing (bsc#1227149).</li>
<li>wifi: rtw89: cleanup private data structures (bsc#1227149).</li>
<li>wifi: rtw89: cleanup rtw89_iqk_info and related code (bsc#1227149).</li>
<li>wifi: rtw89: coex: Add Bluetooth RSSI level information (bsc#1227149).</li>
<li>wifi: rtw89: coex: Add Pre-AGC control to enhance Wi-Fi RX performance (bsc#1227149).</li>
<li>wifi: rtw89: coex: Add coexistence policy to decrease WiFi packet CRC-ERR (bsc#1227149).</li>
<li>wifi: rtw89: coex: Fix wrong Wi-Fi role info and FDDT parameter members (bsc#1227149).</li>
<li>wifi: rtw89: coex: Record down Wi-Fi initial mode information (bsc#1227149).</li>
<li>wifi: rtw89: coex: Reorder H2C command index to align with firmware (bsc#1227149).</li>
<li>wifi: rtw89: coex: Set Bluetooth scan low-priority when Wi-Fi link/scan (bsc#1227149).</li>
<li>wifi: rtw89: coex: Still show hardware grant signal info even Wi-Fi is PS (bsc#1227149).</li>
<li>wifi: rtw89: coex: To improve Wi-Fi performance while BT is idle (bsc#1227149).</li>
<li>wifi: rtw89: coex: Translate antenna configuration from ID to string (bsc#1227149).</li>
<li>wifi: rtw89: coex: Update BTG control related logic (bsc#1227149).</li>
<li>wifi: rtw89: coex: Update RF parameter control setting logic (bsc#1227149).</li>
<li>wifi: rtw89: coex: Update coexistence policy for Wi-Fi LPS (bsc#1227149).</li>
<li>wifi: rtw89: coex: When Bluetooth not available do not set power/gain (bsc#1227149).</li>
<li>wifi: rtw89: coex: add BTC ctrl_info version 7 and related logic (bsc#1227149).</li>
<li>wifi: rtw89: coex: add annotation __counted_by() for struct rtw89_btc_btf_set_slot_table (bsc#1227149).</li>
<li>wifi: rtw89: coex: add annotation __counted_by() to struct rtw89_btc_btf_set_mon_reg (bsc#1227149).</li>
<li>wifi: rtw89: coex: add init_info H2C command format version 7 (bsc#1227149).</li>
<li>wifi: rtw89: coex: add return value to ensure H2C command is success or not (bsc#1227149).</li>
<li>wifi: rtw89: coex: fix configuration for shared antenna for 8922A (bsc#1227149).</li>
<li>wifi: rtw89: coex: use struct assignment to replace memcpy() to append TDMA content (bsc#1227149).</li>
<li>wifi: rtw89: configure PPDU max user by chip (bsc#1227149).</li>
<li>wifi: rtw89: consider RX info for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: consolidate registers of mac port to struct (bsc#1227149).</li>
<li>wifi: rtw89: correct PHY register offset for PHY-1 (bsc#1227149).</li>
<li>wifi: rtw89: correct aSIFSTime for 6GHz band (stable-fixes).</li>
<li>wifi: rtw89: correct the DCFO tracking flow to improve CFO compensation (bsc#1227149).</li>
<li>wifi: rtw89: debug: add FW log component for scan (bsc#1227149).</li>
<li>wifi: rtw89: debug: add debugfs entry to disable dynamic mechanism (bsc#1227149).</li>
<li>wifi: rtw89: debug: add to check if debug mask is enabled (bsc#1227149).</li>
<li>wifi: rtw89: debug: remove wrapper of rtw89_debug() (bsc#1227149).</li>
<li>wifi: rtw89: debug: show txpwr table according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: debug: txpwr table access only valid page according to chip (bsc#1227149).</li>
<li>wifi: rtw89: debug: txpwr table supports Wi-Fi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: declare EXT NSS BW of VHT capability (bsc#1227149).</li>
<li>wifi: rtw89: declare MCC in interface combination (bsc#1227149).</li>
<li>wifi: rtw89: define hardware rate v1 for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: differentiate narrow_bw_ru_dis setting according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: disable RTS when broadcast/multicast (bsc#1227149).</li>
<li>wifi: rtw89: download firmware with five times retry (bsc#1227149).</li>
<li>wifi: rtw89: drop TIMING_BEACON_ONLY and sync beacon TSF by self (bsc#1227149).</li>
<li>wifi: rtw89: enlarge supported length of read_reg debugfs entry (bsc#1227149).</li>
<li>wifi: rtw89: extend PHY status parser to support WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: fix HW scan not aborting properly (git-fixes).</li>
<li>wifi: rtw89: fix HW scan timeout due to TSF sync issue (bsc#1227149).</li>
<li>wifi: rtw89: fix a width vs precision bug (bsc#1227149).</li>
<li>wifi: rtw89: fix disabling concurrent mode TX hang issue (bsc#1227149).</li>
<li>wifi: rtw89: fix misbehavior of TX beacon in concurrent mode (bsc#1227149).</li>
<li>wifi: rtw89: fix not entering PS mode after AP stops (bsc#1227149).</li>
<li>wifi: rtw89: fix spelling typo of IQK debug messages (bsc#1227149).</li>
<li>wifi: rtw89: fix typo of rtw89_fw_h2c_mcc_macid_bitmap() (bsc#1227149).</li>
<li>wifi: rtw89: fw: add H2C command to reset CMAC table for WiFi 7 (bsc#1227149).</li>
<li>wifi: rtw89: fw: add H2C command to reset DMAC table for WiFi 7 (bsc#1227149).</li>
<li>wifi: rtw89: fw: add H2C command to update security CAM v2 (bsc#1227149).</li>
<li>wifi: rtw89: fw: add checking type for variant type of firmware (bsc#1227149).</li>
<li>wifi: rtw89: fw: add chip_ops to update CMAC table to associated station (bsc#1227149).</li>
<li>wifi: rtw89: fw: add definition of H2C command and C2H event for MRC series (bsc#1227149).</li>
<li>wifi: rtw89: fw: add version field to BB MCU firmware element (bsc#1227149).</li>
<li>wifi: rtw89: fw: consider checksum length of security data (bsc#1227149).</li>
<li>wifi: rtw89: fw: download firmware with key data for secure boot (bsc#1227149).</li>
<li>wifi: rtw89: fw: extend JOIN H2C command to support WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: fw: extend program counter dump for Wi-Fi 7 chip (bsc#1227149).</li>
<li>wifi: rtw89: fw: fill CMAC table to associated station for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: fw: generalize download firmware flow by mac_gen pointers (bsc#1227149).</li>
<li>wifi: rtw89: fw: implement MRC H2C command functions (bsc#1227149).</li>
<li>wifi: rtw89: fw: implement supported functions of download firmware for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: fw: load TX power track tables from fw_element (bsc#1227149).</li>
<li>wifi: rtw89: fw: move polling function of firmware path ready to an individual function (bsc#1227149).</li>
<li>wifi: rtw89: fw: parse secure section from firmware file (bsc#1227149).</li>
<li>wifi: rtw89: fw: propagate an argument include_bb for BB MCU firmware (bsc#1227149).</li>
<li>wifi: rtw89: fw: read firmware secure information from efuse (bsc#1227149).</li>
<li>wifi: rtw89: fw: refine download flow to support variant firmware suits (bsc#1227149).</li>
<li>wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband (bsc#1227149).</li>
<li>wifi: rtw89: fw: update TX AMPDU parameter to CMAC table (bsc#1227149).</li>
<li>wifi: rtw89: fw: use struct to fill BA CAM H2C commands (bsc#1227149).</li>
<li>wifi: rtw89: fw: use struct to fill JOIN H2C command (bsc#1227149).</li>
<li>wifi: rtw89: get data rate mode/NSS/MCS v1 from RX descriptor (bsc#1227149).</li>
<li>wifi: rtw89: indicate TX power by rate table inside RFE parameter (bsc#1227149).</li>
<li>wifi: rtw89: indicate TX shape table inside RFE parameter (bsc#1227149).</li>
<li>wifi: rtw89: initialize antenna for antenna diversity (bsc#1227149).</li>
<li>wifi: rtw89: initialize multi-channel handling (bsc#1227149).</li>
<li>wifi: rtw89: introduce infrastructure of firmware elements (bsc#1227149).</li>
<li>wifi: rtw89: introduce realtek ACPI DSM method (bsc#1227149).</li>
<li>wifi: rtw89: introduce v1 format of firmware header (bsc#1227149).</li>
<li>wifi: rtw89: load BB parameters to PHY-1 (bsc#1227149).</li>
<li>wifi: rtw89: load RFK log format string from firmware file (bsc#1227149).</li>
<li>wifi: rtw89: load TX power by rate when RFE parms setup (bsc#1227149).</li>
<li>wifi: rtw89: load TX power related tables from FW elements (bsc#1227149).</li>
<li>wifi: rtw89: mac: Fix spelling mistakes "notfify" -> "notify" (bsc#1227149).</li>
<li>wifi: rtw89: mac: add coexistence helpers {cfg/get}_plt (bsc#1227149).</li>
<li>wifi: rtw89: mac: add feature_init to initialize BA CAM V1 (bsc#1227149).</li>
<li>wifi: rtw89: mac: add flags to check if CMAC and DMAC are enabled (bsc#1227149).</li>
<li>wifi: rtw89: mac: add mac_gen_def::band1_offset to map MAC band1 register address (bsc#1227149).</li>
<li>wifi: rtw89: mac: add registers of MU-EDCA parameters for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: mac: add suffix _ax to MAC functions (bsc#1227149).</li>
<li>wifi: rtw89: mac: add sys_init and filter option for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: mac: add to access efuse for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: mac: add to get DLE reserved quota (bsc#1227149).</li>
<li>wifi: rtw89: mac: check queue empty according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: mac: correct MUEDCA setting for MAC-1 (bsc#1227149).</li>
<li>wifi: rtw89: mac: define internal memory address for WiFi 7 chip (bsc#1227149).</li>
<li>wifi: rtw89: mac: define register address of rx_filter to generalize code (bsc#1227149).</li>
<li>wifi: rtw89: mac: do bf_monitor only if WiFi 6 chips (bsc#1227149).</li>
<li>wifi: rtw89: mac: functions to configure hardware engine and quota for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: mac: generalize code to indirectly access WiFi internal memory (bsc#1227149).</li>
<li>wifi: rtw89: mac: generalize register of MU-EDCA switch according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: mac: get TX power control register according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: mac: handle C2H receive/done ACK in interrupt context (bsc#1227149).</li>
<li>wifi: rtw89: mac: implement MRC C2H event handling (bsc#1227149).</li>
<li>wifi: rtw89: mac: implement to configure TX/RX engines for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: mac: move code related to hardware engine to individual functions (bsc#1227149).</li>
<li>wifi: rtw89: mac: refine SER setting during WiFi CPU power on (bsc#1227149).</li>
<li>wifi: rtw89: mac: reset PHY-1 hardware when going to enable/disable (bsc#1227149).</li>
<li>wifi: rtw89: mac: return held quota of DLE when changing MAC-1 (bsc#1227149).</li>
<li>wifi: rtw89: mac: set bf_assoc capabilities according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: mac: set bfee_ctrl() according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: mac: update RTS threshold according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: mac: use mac_gen pointer to access about efuse (bsc#1227149).</li>
<li>wifi: rtw89: mac: use pointer to access functions of hardware engine and quota (bsc#1227149).</li>
<li>wifi: rtw89: mcc: consider and determine BT duration (bsc#1227149).</li>
<li>wifi: rtw89: mcc: deal with BT slot change (bsc#1227149).</li>
<li>wifi: rtw89: mcc: deal with P2P PS change (bsc#1227149).</li>
<li>wifi: rtw89: mcc: deal with beacon NoA if GO exists (bsc#1227149).</li>
<li>wifi: rtw89: mcc: decide pattern and calculate parameters (bsc#1227149).</li>
<li>wifi: rtw89: mcc: fill fundamental configurations (bsc#1227149).</li>
<li>wifi: rtw89: mcc: fix NoA start time when GO is auxiliary (bsc#1227149).</li>
<li>wifi: rtw89: mcc: initialize start flow (bsc#1227149).</li>
<li>wifi: rtw89: mcc: track beacon offset and update when needed (bsc#1227149).</li>
<li>wifi: rtw89: mcc: trigger FW to start/stop MCC (bsc#1227149).</li>
<li>wifi: rtw89: mcc: update role bitmap when changed (bsc#1227149).</li>
<li>wifi: rtw89: modify the register setting and the flow of CFO tracking (bsc#1227149).</li>
<li>wifi: rtw89: move software DCFO compensation setting to proper position (bsc#1227149).</li>
<li>wifi: rtw89: only reset BB/RF for existing WiFi 6 chips while starting up (bsc#1227149).</li>
<li>wifi: rtw89: packet offload wait for FW response (bsc#1227149).</li>
<li>wifi: rtw89: parse EHT information from RX descriptor and PPDU status packet (bsc#1227149).</li>
<li>wifi: rtw89: parse TX EHT rate selected by firmware from RA C2H report (bsc#1227149).</li>
<li>wifi: rtw89: parse and print out RFK log from C2H events (bsc#1227149).</li>
<li>wifi: rtw89: pause/proceed MCC for ROC and HW scan (bsc#1227149).</li>
<li>wifi: rtw89: pci: add LTR v2 for WiFi 7 chip (bsc#1227149).</li>
<li>wifi: rtw89: pci: add PCI generation information to pci_info for each chip (bsc#1227149).</li>
<li>wifi: rtw89: pci: add new RX ring design to determine full RX ring efficiently (bsc#1227149).</li>
<li>wifi: rtw89: pci: add pre_deinit to be called after probe complete (bsc#1227149).</li>
<li>wifi: rtw89: pci: correct TX resource checking for PCI DMA channel of firmware command (git-fixes).</li>
<li>wifi: rtw89: pci: correct interrupt mitigation register for 8852CE (bsc#1227149).</li>
<li>wifi: rtw89: pci: define PCI ring address for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: pci: fix interrupt enable mask for HALT C2H of RTL8851B (bsc#1227149).</li>
<li>wifi: rtw89: pci: generalize code of PCI control DMA IO for WiFi 7 (bsc#1227149).</li>
<li>wifi: rtw89: pci: generalize interrupt status bits of interrupt handlers (bsc#1227149).</li>
<li>wifi: rtw89: pci: implement PCI CLK/ASPM/L1SS for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: pci: implement PCI mac_post_init for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: pci: implement PCI mac_pre_init for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: pci: interrupt v2 refine IMR for SER (bsc#1227149).</li>
<li>wifi: rtw89: pci: reset BDRAM according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: pci: stop/start DMA for level 1 recovery according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: pci: update SER timer unit and timeout time (bsc#1227149).</li>
<li>wifi: rtw89: pci: update interrupt mitigation register for 8922AE (bsc#1227149).</li>
<li>wifi: rtw89: pci: use DBI function for 8852AE/8852BE/8851BE (bsc#1227149).</li>
<li>wifi: rtw89: pci: use gen_def pointer to configure mac_{pre,post}_init and clear PCI ring index (bsc#1227149).</li>
<li>wifi: rtw89: pci: validate RX tag for RXQ and RPQ (bsc#1227149).</li>
<li>wifi: rtw89: phy: add BB wrapper of TX power for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: phy: add parser to support RX gain dynamic setting flow (bsc#1227149).</li>
<li>wifi: rtw89: phy: add phy_gen_def::cr_base to support WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: phy: change naming related BT coexistence functions (bsc#1227149).</li>
<li>wifi: rtw89: phy: dynamically adjust EDCCA threshold (bsc#1227149).</li>
<li>wifi: rtw89: phy: extend TX power common stuffs for Wi-Fi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: phy: generalize valid bit of BSS color (bsc#1227149).</li>
<li>wifi: rtw89: phy: ignore special data from BB parameter file (bsc#1227149).</li>
<li>wifi: rtw89: phy: modify register setting of ENV_MNTR, PHYSTS and DIG (bsc#1227149).</li>
<li>wifi: rtw89: phy: move bb_gain_info used by WiFi 6 chips to union (bsc#1227149).</li>
<li>wifi: rtw89: phy: print out RFK log with formatted string (bsc#1227149).</li>
<li>wifi: rtw89: phy: rate pattern handles HW rate by chip gen (bsc#1227149).</li>
<li>wifi: rtw89: phy: refine helpers used for raw TX power (bsc#1227149).</li>
<li>wifi: rtw89: phy: set TX power RU limit according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: phy: set TX power by rate according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: phy: set TX power limit according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: phy: set TX power offset according to chip gen (bsc#1227149).</li>
<li>wifi: rtw89: phy: set channel_info for WiFi 7 chips (bsc#1227149).</li>
<li>wifi: rtw89: prepare scan leaf functions for wifi 7 ICs (bsc#1227149).</li>
<li>wifi: rtw89: process regulatory for 6 GHz power type (bsc#1227149).</li>
<li>wifi: rtw89: provide functions to configure NoA for beacon update (bsc#1227149).</li>
<li>wifi: rtw89: recognize log format from firmware file (bsc#1227149).</li>
<li>wifi: rtw89: reference quota mode when setting Tx power (bsc#1227149).</li>
<li>wifi: rtw89: refine H2C command that pause transmitting by MAC ID (bsc#1227149).</li>
<li>wifi: rtw89: refine add_chan H2C command to encode_bits (bsc#1227149).</li>
<li>wifi: rtw89: refine bandwidth 160MHz uplink OFDMA performance (bsc#1227149).</li>
<li>wifi: rtw89: refine clearing supported bands to check 2/5 GHz first (bsc#1227149).</li>
<li>wifi: rtw89: refine element naming used by queue empty check (bsc#1227149).</li>
<li>wifi: rtw89: refine hardware scan C2H events (bsc#1227149).</li>
<li>wifi: rtw89: refine packet offload delete flow of 6 GHz probe (bsc#1227149).</li>
<li>wifi: rtw89: refine packet offload handling under SER (bsc#1227149).</li>
<li>wifi: rtw89: refine remain on channel flow to improve P2P connection (bsc#1227149).</li>
<li>wifi: rtw89: refine rtw89_correct_cck_chan() by rtw89_hw_to_nl80211_band() (bsc#1227149).</li>
<li>wifi: rtw89: refine uplink trigger based control mechanism (bsc#1227149).</li>
<li>wifi: rtw89: regd: configure Thailand in regulation type (bsc#1227149).</li>
<li>wifi: rtw89: regd: handle policy of 6 GHz according to BIOS (bsc#1227149).</li>
<li>wifi: rtw89: regd: judge 6 GHz according to chip and BIOS (bsc#1227149).</li>
<li>wifi: rtw89: regd: judge UNII-4 according to BIOS and chip (bsc#1227149).</li>
<li>wifi: rtw89: regd: update regulatory map to R64-R40 (bsc#1227149).</li>
<li>wifi: rtw89: regd: update regulatory map to R64-R43 (bsc#1227149).</li>
<li>wifi: rtw89: regd: update regulatory map to R65-R44 (bsc#1227149).</li>
<li>wifi: rtw89: release bit in rtw89_fw_h2c_del_pkt_offload() (bsc#1227149).</li>
<li>wifi: rtw89: return failure if needed firmware elements are not recognized (bsc#1227149).</li>
<li>wifi: rtw89: rfk: add H2C command to trigger DACK (bsc#1227149).</li>
<li>wifi: rtw89: rfk: add H2C command to trigger DPK (bsc#1227149).</li>
<li>wifi: rtw89: rfk: add H2C command to trigger IQK (bsc#1227149).</li>
<li>wifi: rtw89: rfk: add H2C command to trigger RX DCK (bsc#1227149).</li>
<li>wifi: rtw89: rfk: add H2C command to trigger TSSI (bsc#1227149).</li>
<li>wifi: rtw89: rfk: add H2C command to trigger TXGAPK (bsc#1227149).</li>
<li>wifi: rtw89: rfk: add a completion to wait RF calibration report from C2H event (bsc#1227149).</li>
<li>wifi: rtw89: rfk: disable driver tracking during MCC (bsc#1227149).</li>
<li>wifi: rtw89: rfk: send channel information to firmware for RF calibrations (bsc#1227149).</li>
<li>wifi: rtw89: sar: let caller decide the center frequency to query (bsc#1227149).</li>
<li>wifi: rtw89: scan offload wait for FW done ACK (bsc#1227149).</li>
<li>wifi: rtw89: ser: L1 add pre-M0 and post-M0 states (bsc#1227149).</li>
<li>wifi: rtw89: ser: reset total_sta_assoc and tdls_peer when L2 (bsc#1227149).</li>
<li>wifi: rtw89: set TX power without precondition during setting channel (bsc#1227149).</li>
<li>wifi: rtw89: set capability of TX antenna diversity (bsc#1227149).</li>
<li>wifi: rtw89: set entry size of address CAM to H2C field by chip (bsc#1227149).</li>
<li>wifi: rtw89: show EHT rate in debugfs (bsc#1227149).</li>
<li>wifi: rtw89: support U-NII-4 channels on 5GHz band (bsc#1227149).</li>
<li>wifi: rtw89: support firmware log with formatted text (bsc#1227149).</li>
<li>wifi: rtw89: suppress the log for specific SER called CMDPSR_FRZTO (bsc#1227149).</li>
<li>wifi: rtw89: tweak H2C TX waiting function for SER (bsc#1227149).</li>
<li>wifi: rtw89: update DMA function with different generation (bsc#1227149).</li>
<li>wifi: rtw89: update ps_state register for chips with different generation (bsc#1227149).</li>
<li>wifi: rtw89: update scan C2H messages for wifi 7 IC (bsc#1227149).</li>
<li>wifi: rtw89: update suspend/resume for different generation (bsc#1227149).</li>
<li>wifi: rtw89: use PLCP information to match BSS_COLOR and AID (bsc#1227149).</li>
<li>wifi: rtw89: use chip_info::small_fifo_size to choose debug_mask (bsc#1227149).</li>
<li>wifi: rtw89: use flexible array member in rtw89_btc_btf_tlv (bsc#1227149).</li>
<li>wifi: rtw89: use struct and le32_get_bits to access RX info (bsc#1227149).</li>
<li>wifi: rtw89: use struct and le32_get_bits() to access RX descriptor (bsc#1227149).</li>
<li>wifi: rtw89: use struct and le32_get_bits() to access received PHY status IEs (bsc#1227149).</li>
<li>wifi: rtw89: use struct rtw89_phy_sts_ie0 instead of macro to access PHY IE0 status (bsc#1227149).</li>
<li>wifi: rtw89: use struct to access RA report (bsc#1227149).</li>
<li>wifi: rtw89: use struct to access firmware C2H event header (bsc#1227149).</li>
<li>wifi: rtw89: use struct to access register-based H2C/C2H (bsc#1227149).</li>
<li>wifi: rtw89: use struct to fill H2C command to download beacon frame (bsc#1227149).</li>
<li>wifi: rtw89: use struct to parse firmware header (bsc#1227149).</li>
<li>wifi: rtw89: use struct to set RA H2C command (bsc#1227149).</li>
<li>wifi: rtw89: wow: move release offload packet earlier for WoWLAN mode (bsc#1227149).</li>
<li>wifi: rtw89: wow: refine WoWLAN flows of HCI interrupts and low power mode (bsc#1227149).</li>
<li>wifi: rtw89: wow: set security engine options for 802.11ax chips only (bsc#1227149).</li>
<li>wifi: rtw89: wow: update WoWLAN reason register for different chips (bsc#1227149).</li>
<li>wifi: rtw89: wow: update WoWLAN status register for different generation (bsc#1227149).</li>
<li>wifi: rtw89: wow: update config mac function with different generation (bsc#1227149).</li>
<li>wifi: ti: wlcore: sdio: Drop unused include (bsc#1227149).</li>
<li>wifi: virt_wifi: avoid reporting connection success with wrong SSID (git-fixes).</li>
<li>wifi: virt_wifi: do not use strlen() in const context (git-fixes).</li>
<li>wifi: wcn36xx: Annotate struct wcn36xx_hal_ind_msg with __counted_by (bsc#1227149).</li>
<li>wifi: wcn36xx: Convert to platform remove callback returning void (bsc#1227149).</li>
<li>wifi: wcn36xx: remove unnecessary (void*) conversions (bsc#1227149).</li>
<li>wifi: wext: avoid extra calls to strlen() in ieee80211_bss() (bsc#1227149).</li>
<li>wifi: wfx: Use devm_kmemdup to replace devm_kmalloc + memcpy (bsc#1227149).</li>
<li>wifi: wfx: allow to send frames during ROC (bsc#1227149).</li>
<li>wifi: wfx: fix power_save setting when AP is stopped (bsc#1227149).</li>
<li>wifi: wfx: implement wfx_remain_on_channel() (bsc#1227149).</li>
<li>wifi: wfx: introduce hif_scan_uniq() (bsc#1227149).</li>
<li>wifi: wfx: move wfx_skb_*() out of the header file (bsc#1227149).</li>
<li>wifi: wfx: relocate wfx_rate_mask_to_hw() (bsc#1227149).</li>
<li>wifi: wfx: scan_lock is global to the device (bsc#1227149).</li>
<li>wifi: wfx: simplify exclusion between scan and Rx filters (bsc#1227149).</li>
<li>wifi: wil6210: fw: Replace zero-length arrays with DECLARE_FLEX_ARRAY() helper (bsc#1227149).</li>
<li>wifi: wil6210: wmi: Replace zero-length array with DECLARE_FLEX_ARRAY() helper (bsc#1227149).</li>
<li>wifi: wilc1000: Increase ASSOC response buffer (bsc#1227149).</li>
<li>wifi: wilc1000: Remove unused declarations (bsc#1227149).</li>
<li>wifi: wilc1000: add SPI commands retry mechanism (bsc#1227149).</li>
<li>wifi: wilc1000: add back-off algorithm to balance tx queue packets (bsc#1227149).</li>
<li>wifi: wilc1000: add missing read critical sections around vif list traversal (bsc#1227149).</li>
<li>wifi: wilc1000: always release SDIO host in wilc_sdio_cmd53() (bsc#1227149).</li>
<li>wifi: wilc1000: cleanup struct wilc_conn_info (bsc#1227149).</li>
<li>wifi: wilc1000: correct CRC7 calculation (bsc#1227149).</li>
<li>wifi: wilc1000: fix declarations ordering (bsc#1227149).</li>
<li>wifi: wilc1000: fix driver_handler when committing initial configuration (bsc#1227149).</li>
<li>wifi: wilc1000: fix ies_len type in connect path (git-fixes).</li>
<li>wifi: wilc1000: fix incorrect power down sequence (bsc#1227149).</li>
<li>wifi: wilc1000: remove AKM suite be32 conversion for external auth request (bsc#1227149).</li>
<li>wifi: wilc1000: remove setting msg.spi (bsc#1227149).</li>
<li>wifi: wilc1000: remove use of has_thrpt_enh3 flag (bsc#1227149).</li>
<li>wifi: wilc1000: set preamble size to auto as default in wilc_init_fw_config() (bsc#1227149).</li>
<li>wifi: wilc1000: simplify remain on channel support (bsc#1227149).</li>
<li>wifi: wilc1000: simplify wilc_scan() (bsc#1227149).</li>
<li>wifi: wilc1000: split deeply nested RCU list traversal in dedicated helper (bsc#1227149).</li>
<li>wifi: wilc1000: use SRCU instead of RCU for vif list traversal (bsc#1227149).</li>
<li>wifi: wilc1000: validate chip id during bus probe (bsc#1227149).</li>
<li>wifi: wl1251: replace deprecated strncpy with strscpy (bsc#1227149).</li>
<li>wifi: wl18xx: replace deprecated strncpy with strscpy (bsc#1227149).</li>
<li>wifi: wlcore: boot: replace deprecated strncpy with strscpy (bsc#1227149).</li>
<li>wifi: wlcore: main: replace deprecated strncpy with strscpy (bsc#1227149).</li>
<li>wifi: wlcore: sdio: Rate limit wl12xx_sdio_raw_{read,write}() failures warns (bsc#1227149).</li>
<li>wifi: wlcore: sdio: Use module_sdio_driver macro to simplify the code (bsc#1227149).</li>
<li>wifi: zd1211rw: fix typo "tranmits" (bsc#1227149).</li>
<li>wifi: zd1211rw: remove __nocast from zd_addr_t (bsc#1227149).</li>
<li>wifi: zd1211rw: silence sparse warnings (bsc#1227149).</li>
<li>wlcore: spi: Remove redundant of_match_ptr() (bsc#1227149).</li>
<li>work around gcc bugs with 'asm goto' with outputs (git-fixes).</li>
<li>x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (git-fixes).</li>
<li>x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (git-fixes).</li>
<li>x86/amd_nb: Check for invalid SMN reads (git-fixes).</li>
<li>x86/apic: Force native_apic_mem_read() to use the MOV instruction (git-fixes).</li>
<li>x86/asm: Fix build of UML with KASAN (git-fixes).</li>
<li>x86/asm: Remove the __iomem annotation of movdir64b()'s dst argument (git-fixes).</li>
<li>x86/bhi: Avoid warning in #DB handler due to BHI mitigation :(git-fixes).</li>
<li>x86/boot: Ignore NMIs during very early boot (git-fixes).</li>
<li>x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).</li>
<li>x86/bugs: Remove default case for fully switched enums (git-fixes).</li>
<li>x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (git-fixes).</li>
<li>x86/coco: Require seeding RNG with RDRAND on CoCo systems (git-fixes).</li>
<li>x86/cpu: Add model number for Intel Arrow Lake mobile processor (git-fixes).</li>
<li>x86/cpu: Provide default cache line size if not enumerated (git-fixes).</li>
<li>x86/csum: Fix clang -Wuninitialized in csum_partial() (git-fixes).</li>
<li>x86/csum: Improve performance of <code>csum_partial</code> (git-fixes).</li>
<li>x86/csum: Remove unnecessary odd handling (git-fixes).</li>
<li>x86/csum: clean up `csum_partial' further (git-fixes).</li>
<li>x86/efistub: Add missing boot_params for mixed mode compat entry (git-fixes).</li>
<li>x86/efistub: Call mixed mode boot services on the firmware's stack (git-fixes).</li>
<li>x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes).</li>
<li>x86/head/64: Move the __head definition to <asm/init.h> (git-fixes).</li>
<li>x86/insn: Add VEX versions of VPDPBUSD, VPDPBUSDS, VPDPWSSD and VPDPWSSDS (git-fixes).</li>
<li>x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git-fixes).</li>
<li>x86/kconfig: Add as-instr64 macro to properly evaluate AS_WRUSS (git-fixes).</li>
<li>x86/kconfig: Select ARCH_WANT_FRAME_POINTERS again when UNWINDER_FRAME_POINTER=y (git-fixes).</li>
<li>x86/kexec: Fix bug with call depth tracking (git-fixes).</li>
<li>x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (git-fixes).</li>
<li>x86/mce: Dynamically size space for machine check records (bsc#1222241).</li>
<li>x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).</li>
<li>x86/mce: Mark fatal MCE's page as poison to avoid panic in the kdump kernel (git-fixes).</li>
<li>x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).</li>
<li>x86/nmi: Fix the inverse "in NMI handler" check (git-fixes).</li>
<li>x86/nospec: Refactor UNTRAIN_RET[_*] (git-fixes).</li>
<li>x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes).</li>
<li>x86/purgatory: Switch to the position-independent small code model (git-fixes).</li>
<li>x86/resctrl: Read supported bandwidth sources from CPUID (git-fixes).</li>
<li>x86/resctrl: Remove redundant variable in mbm_config_write_domain() (git-fixes).</li>
<li>x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (git-fixes).</li>
<li>x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk (git-fixes).</li>
<li>x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).</li>
<li>x86/sev: Fix position dependent variable references in startup code (git-fixes).</li>
<li>x86/shstk: Make return uprobe work with shadow stack (git-fixes).</li>
<li>x86/speculation, objtool: Use absolute relocations for annotations (git-fixes).</li>
<li>x86/srso: Disentangle rethunk-dependent options (git-fixes).</li>
<li>x86/srso: Fix unret validation dependencies (git-fixes).</li>
<li>x86/srso: Improve i-cache locality for alias mitigation (git-fixes).</li>
<li>x86/srso: Print actual mitigation if requested mitigation isn't possible (git-fixes).</li>
<li>x86/srso: Remove 'pred_cmd' label (git-fixes).</li>
<li>x86/srso: Unexport untraining functions (git-fixes).</li>
<li>x86/tdx: Preserve shared bit on mprotect() (git-fixes).</li>
<li>x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).</li>
<li>x86/uaccess: Fix missed zeroing of ia32 u64 get_user() range checking (git-fixes).</li>
<li>x86: Stop using weak symbols for __iowrite32_copy() (bsc#1226502)</li>
<li>xen/x86: add extra pages to unpopulated-alloc if available (git-fixes).</li>
<li>xfs: Add cond_resched to block unmap range and reflink remap path (bsc#1228211).</li>
<li>xfs: add lock protection when remove perag from radix tree (git-fixes).</li>
<li>xfs: fix perag leak when growfs fails (git-fixes).</li>
<li>xfs: force all buffers to be written during btree bulk load (git-fixes).</li>
<li>xfs: make xchk_iget safer in the presence of corrupt inode btrees (git-fixes).</li>
<li>xfs: pass the xfs_defer_pending object to iop_recover (git-fixes).</li>
<li>xfs: recompute growfsrtfree transaction reservation while growing rt volume (git-fixes).</li>
<li>xfs: transfer recovered intent item ownership in ->iop_recover (git-fixes).</li>
<li>xfs: use roundup_pow_of_two instead of ffs during xlog_find_tail (git-fixes).</li>
<li>xfs: use xfs_defer_pending objects to recover intent items (git-fixes).</li>
<li>xhci: Apply broken streams quirk to Etron EJ188 xHCI host (stable-fixes).</li>
<li>xhci: Apply reset resume quirk to Etron EJ188 xHCI host (stable-fixes).</li>
<li>xhci: Handle TD clearing for multiple streams case (git-fixes).</li>
<li>xhci: Set correct transferred length for cancelled bulk transfers (stable-fixes).</li>
<li>xhci: always resume roothubs if xHC was reset during resume (stable-fixes).</li>
<li>xsk: Add truesize to skb_add_rx_frag() (bsc#1214683 (PREEMPT_RT prerequisite backports)).</li>
</ul>
<h2>Special Instructions and Notes:</h2>
<ul>
<li>Please reboot the system after installing this update.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Linux Micro 6.0
<br/>
<code>zypper in -t patch SUSE-SLE-Micro-6.0-19=1</code>
</li>
<li class="list-group-item">
SUSE Linux Micro Extras 6.0
<br/>
<code>zypper in -t patch SUSE-SLE-Micro-6.0-19=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Linux Micro 6.0 (noarch)
<ul>
<li>kernel-source-rt-6.4.0-9.1</li>
<li>kernel-devel-rt-6.4.0-9.1</li>
</ul>
</li>
<li>
SUSE Linux Micro 6.0 (nosrc x86_64)
<ul>
<li>kernel-rt-6.4.0-9.1</li>
</ul>
</li>
<li>
SUSE Linux Micro 6.0 (x86_64)
<ul>
<li>kernel-rt-debuginfo-6.4.0-9.1</li>
<li>kernel-rt-debugsource-6.4.0-9.1</li>
</ul>
</li>
<li>
SUSE Linux Micro Extras 6.0 (nosrc)
<ul>
<li>kernel-rt-6.4.0-9.1</li>
</ul>
</li>
<li>
SUSE Linux Micro Extras 6.0 (x86_64)
<ul>
<li>kernel-rt-devel-6.4.0-9.1</li>
<li>kernel-rt-devel-debuginfo-6.4.0-9.1</li>
<li>kernel-rt-debugsource-6.4.0-9.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47432.html">https://www.suse.com/security/cve/CVE-2021-47432.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48669.html">https://www.suse.com/security/cve/CVE-2022-48669.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48772.html">https://www.suse.com/security/cve/CVE-2022-48772.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-0160.html">https://www.suse.com/security/cve/CVE-2023-0160.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-38417.html">https://www.suse.com/security/cve/CVE-2023-38417.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-47210.html">https://www.suse.com/security/cve/CVE-2023-47210.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-51780.html">https://www.suse.com/security/cve/CVE-2023-51780.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52434.html">https://www.suse.com/security/cve/CVE-2023-52434.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52435.html">https://www.suse.com/security/cve/CVE-2023-52435.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52472.html">https://www.suse.com/security/cve/CVE-2023-52472.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52483.html">https://www.suse.com/security/cve/CVE-2023-52483.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52616.html">https://www.suse.com/security/cve/CVE-2023-52616.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52618.html">https://www.suse.com/security/cve/CVE-2023-52618.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52622.html">https://www.suse.com/security/cve/CVE-2023-52622.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52635.html">https://www.suse.com/security/cve/CVE-2023-52635.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52641.html">https://www.suse.com/security/cve/CVE-2023-52641.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52647.html">https://www.suse.com/security/cve/CVE-2023-52647.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52648.html">https://www.suse.com/security/cve/CVE-2023-52648.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52649.html">https://www.suse.com/security/cve/CVE-2023-52649.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52650.html">https://www.suse.com/security/cve/CVE-2023-52650.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52652.html">https://www.suse.com/security/cve/CVE-2023-52652.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52653.html">https://www.suse.com/security/cve/CVE-2023-52653.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52654.html">https://www.suse.com/security/cve/CVE-2023-52654.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52655.html">https://www.suse.com/security/cve/CVE-2023-52655.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52656.html">https://www.suse.com/security/cve/CVE-2023-52656.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52657.html">https://www.suse.com/security/cve/CVE-2023-52657.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52658.html">https://www.suse.com/security/cve/CVE-2023-52658.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52659.html">https://www.suse.com/security/cve/CVE-2023-52659.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52660.html">https://www.suse.com/security/cve/CVE-2023-52660.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52661.html">https://www.suse.com/security/cve/CVE-2023-52661.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52662.html">https://www.suse.com/security/cve/CVE-2023-52662.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52663.html">https://www.suse.com/security/cve/CVE-2023-52663.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52664.html">https://www.suse.com/security/cve/CVE-2023-52664.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52667.html">https://www.suse.com/security/cve/CVE-2023-52667.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52669.html">https://www.suse.com/security/cve/CVE-2023-52669.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52670.html">https://www.suse.com/security/cve/CVE-2023-52670.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52671.html">https://www.suse.com/security/cve/CVE-2023-52671.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52672.html">https://www.suse.com/security/cve/CVE-2023-52672.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52673.html">https://www.suse.com/security/cve/CVE-2023-52673.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52674.html">https://www.suse.com/security/cve/CVE-2023-52674.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52675.html">https://www.suse.com/security/cve/CVE-2023-52675.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52676.html">https://www.suse.com/security/cve/CVE-2023-52676.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52678.html">https://www.suse.com/security/cve/CVE-2023-52678.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52679.html">https://www.suse.com/security/cve/CVE-2023-52679.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52680.html">https://www.suse.com/security/cve/CVE-2023-52680.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52681.html">https://www.suse.com/security/cve/CVE-2023-52681.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52683.html">https://www.suse.com/security/cve/CVE-2023-52683.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52685.html">https://www.suse.com/security/cve/CVE-2023-52685.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52686.html">https://www.suse.com/security/cve/CVE-2023-52686.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52687.html">https://www.suse.com/security/cve/CVE-2023-52687.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52690.html">https://www.suse.com/security/cve/CVE-2023-52690.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52691.html">https://www.suse.com/security/cve/CVE-2023-52691.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52692.html">https://www.suse.com/security/cve/CVE-2023-52692.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52693.html">https://www.suse.com/security/cve/CVE-2023-52693.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52694.html">https://www.suse.com/security/cve/CVE-2023-52694.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52695.html">https://www.suse.com/security/cve/CVE-2023-52695.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52696.html">https://www.suse.com/security/cve/CVE-2023-52696.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52697.html">https://www.suse.com/security/cve/CVE-2023-52697.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52698.html">https://www.suse.com/security/cve/CVE-2023-52698.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52699.html">https://www.suse.com/security/cve/CVE-2023-52699.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52735.html">https://www.suse.com/security/cve/CVE-2023-52735.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52749.html">https://www.suse.com/security/cve/CVE-2023-52749.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52750.html">https://www.suse.com/security/cve/CVE-2023-52750.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52751.html">https://www.suse.com/security/cve/CVE-2023-52751.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52753.html">https://www.suse.com/security/cve/CVE-2023-52753.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52754.html">https://www.suse.com/security/cve/CVE-2023-52754.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52757.html">https://www.suse.com/security/cve/CVE-2023-52757.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52759.html">https://www.suse.com/security/cve/CVE-2023-52759.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52762.html">https://www.suse.com/security/cve/CVE-2023-52762.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52763.html">https://www.suse.com/security/cve/CVE-2023-52763.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52764.html">https://www.suse.com/security/cve/CVE-2023-52764.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52765.html">https://www.suse.com/security/cve/CVE-2023-52765.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52766.html">https://www.suse.com/security/cve/CVE-2023-52766.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52767.html">https://www.suse.com/security/cve/CVE-2023-52767.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52768.html">https://www.suse.com/security/cve/CVE-2023-52768.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52769.html">https://www.suse.com/security/cve/CVE-2023-52769.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52771.html">https://www.suse.com/security/cve/CVE-2023-52771.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52772.html">https://www.suse.com/security/cve/CVE-2023-52772.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52773.html">https://www.suse.com/security/cve/CVE-2023-52773.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52774.html">https://www.suse.com/security/cve/CVE-2023-52774.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52775.html">https://www.suse.com/security/cve/CVE-2023-52775.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52776.html">https://www.suse.com/security/cve/CVE-2023-52776.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52777.html">https://www.suse.com/security/cve/CVE-2023-52777.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52780.html">https://www.suse.com/security/cve/CVE-2023-52780.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52781.html">https://www.suse.com/security/cve/CVE-2023-52781.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52782.html">https://www.suse.com/security/cve/CVE-2023-52782.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52783.html">https://www.suse.com/security/cve/CVE-2023-52783.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52784.html">https://www.suse.com/security/cve/CVE-2023-52784.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52786.html">https://www.suse.com/security/cve/CVE-2023-52786.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52787.html">https://www.suse.com/security/cve/CVE-2023-52787.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52788.html">https://www.suse.com/security/cve/CVE-2023-52788.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52789.html">https://www.suse.com/security/cve/CVE-2023-52789.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52791.html">https://www.suse.com/security/cve/CVE-2023-52791.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52792.html">https://www.suse.com/security/cve/CVE-2023-52792.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52794.html">https://www.suse.com/security/cve/CVE-2023-52794.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52795.html">https://www.suse.com/security/cve/CVE-2023-52795.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52796.html">https://www.suse.com/security/cve/CVE-2023-52796.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52798.html">https://www.suse.com/security/cve/CVE-2023-52798.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52799.html">https://www.suse.com/security/cve/CVE-2023-52799.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52800.html">https://www.suse.com/security/cve/CVE-2023-52800.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52801.html">https://www.suse.com/security/cve/CVE-2023-52801.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52803.html">https://www.suse.com/security/cve/CVE-2023-52803.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52804.html">https://www.suse.com/security/cve/CVE-2023-52804.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52805.html">https://www.suse.com/security/cve/CVE-2023-52805.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52806.html">https://www.suse.com/security/cve/CVE-2023-52806.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52807.html">https://www.suse.com/security/cve/CVE-2023-52807.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52808.html">https://www.suse.com/security/cve/CVE-2023-52808.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52809.html">https://www.suse.com/security/cve/CVE-2023-52809.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52810.html">https://www.suse.com/security/cve/CVE-2023-52810.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52811.html">https://www.suse.com/security/cve/CVE-2023-52811.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52812.html">https://www.suse.com/security/cve/CVE-2023-52812.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52813.html">https://www.suse.com/security/cve/CVE-2023-52813.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52814.html">https://www.suse.com/security/cve/CVE-2023-52814.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52815.html">https://www.suse.com/security/cve/CVE-2023-52815.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52816.html">https://www.suse.com/security/cve/CVE-2023-52816.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52817.html">https://www.suse.com/security/cve/CVE-2023-52817.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52818.html">https://www.suse.com/security/cve/CVE-2023-52818.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52819.html">https://www.suse.com/security/cve/CVE-2023-52819.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52821.html">https://www.suse.com/security/cve/CVE-2023-52821.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52825.html">https://www.suse.com/security/cve/CVE-2023-52825.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52826.html">https://www.suse.com/security/cve/CVE-2023-52826.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52827.html">https://www.suse.com/security/cve/CVE-2023-52827.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52829.html">https://www.suse.com/security/cve/CVE-2023-52829.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52832.html">https://www.suse.com/security/cve/CVE-2023-52832.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52833.html">https://www.suse.com/security/cve/CVE-2023-52833.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52834.html">https://www.suse.com/security/cve/CVE-2023-52834.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52835.html">https://www.suse.com/security/cve/CVE-2023-52835.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52836.html">https://www.suse.com/security/cve/CVE-2023-52836.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52837.html">https://www.suse.com/security/cve/CVE-2023-52837.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52838.html">https://www.suse.com/security/cve/CVE-2023-52838.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52840.html">https://www.suse.com/security/cve/CVE-2023-52840.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52841.html">https://www.suse.com/security/cve/CVE-2023-52841.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52842.html">https://www.suse.com/security/cve/CVE-2023-52842.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52843.html">https://www.suse.com/security/cve/CVE-2023-52843.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52844.html">https://www.suse.com/security/cve/CVE-2023-52844.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52845.html">https://www.suse.com/security/cve/CVE-2023-52845.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52846.html">https://www.suse.com/security/cve/CVE-2023-52846.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52847.html">https://www.suse.com/security/cve/CVE-2023-52847.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52849.html">https://www.suse.com/security/cve/CVE-2023-52849.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52850.html">https://www.suse.com/security/cve/CVE-2023-52850.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52851.html">https://www.suse.com/security/cve/CVE-2023-52851.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52853.html">https://www.suse.com/security/cve/CVE-2023-52853.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52854.html">https://www.suse.com/security/cve/CVE-2023-52854.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52855.html">https://www.suse.com/security/cve/CVE-2023-52855.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52856.html">https://www.suse.com/security/cve/CVE-2023-52856.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52857.html">https://www.suse.com/security/cve/CVE-2023-52857.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52858.html">https://www.suse.com/security/cve/CVE-2023-52858.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52860.html">https://www.suse.com/security/cve/CVE-2023-52860.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52861.html">https://www.suse.com/security/cve/CVE-2023-52861.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52862.html">https://www.suse.com/security/cve/CVE-2023-52862.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52863.html">https://www.suse.com/security/cve/CVE-2023-52863.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52864.html">https://www.suse.com/security/cve/CVE-2023-52864.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52865.html">https://www.suse.com/security/cve/CVE-2023-52865.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52866.html">https://www.suse.com/security/cve/CVE-2023-52866.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52867.html">https://www.suse.com/security/cve/CVE-2023-52867.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52868.html">https://www.suse.com/security/cve/CVE-2023-52868.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52869.html">https://www.suse.com/security/cve/CVE-2023-52869.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52870.html">https://www.suse.com/security/cve/CVE-2023-52870.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52871.html">https://www.suse.com/security/cve/CVE-2023-52871.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52872.html">https://www.suse.com/security/cve/CVE-2023-52872.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52873.html">https://www.suse.com/security/cve/CVE-2023-52873.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52874.html">https://www.suse.com/security/cve/CVE-2023-52874.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52875.html">https://www.suse.com/security/cve/CVE-2023-52875.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52876.html">https://www.suse.com/security/cve/CVE-2023-52876.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52877.html">https://www.suse.com/security/cve/CVE-2023-52877.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52878.html">https://www.suse.com/security/cve/CVE-2023-52878.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52879.html">https://www.suse.com/security/cve/CVE-2023-52879.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52880.html">https://www.suse.com/security/cve/CVE-2023-52880.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52881.html">https://www.suse.com/security/cve/CVE-2023-52881.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52882.html">https://www.suse.com/security/cve/CVE-2023-52882.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52883.html">https://www.suse.com/security/cve/CVE-2023-52883.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52884.html">https://www.suse.com/security/cve/CVE-2023-52884.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6238.html">https://www.suse.com/security/cve/CVE-2023-6238.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0639.html">https://www.suse.com/security/cve/CVE-2024-0639.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-21823.html">https://www.suse.com/security/cve/CVE-2024-21823.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23848.html">https://www.suse.com/security/cve/CVE-2024-23848.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-25741.html">https://www.suse.com/security/cve/CVE-2024-25741.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26582.html">https://www.suse.com/security/cve/CVE-2024-26582.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26611.html">https://www.suse.com/security/cve/CVE-2024-26611.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26615.html">https://www.suse.com/security/cve/CVE-2024-26615.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26623.html">https://www.suse.com/security/cve/CVE-2024-26623.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26625.html">https://www.suse.com/security/cve/CVE-2024-26625.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26632.html">https://www.suse.com/security/cve/CVE-2024-26632.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26633.html">https://www.suse.com/security/cve/CVE-2024-26633.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26635.html">https://www.suse.com/security/cve/CVE-2024-26635.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26636.html">https://www.suse.com/security/cve/CVE-2024-26636.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26638.html">https://www.suse.com/security/cve/CVE-2024-26638.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26641.html">https://www.suse.com/security/cve/CVE-2024-26641.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26643.html">https://www.suse.com/security/cve/CVE-2024-26643.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26663.html">https://www.suse.com/security/cve/CVE-2024-26663.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26665.html">https://www.suse.com/security/cve/CVE-2024-26665.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26671.html">https://www.suse.com/security/cve/CVE-2024-26671.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26673.html">https://www.suse.com/security/cve/CVE-2024-26673.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26674.html">https://www.suse.com/security/cve/CVE-2024-26674.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26676.html">https://www.suse.com/security/cve/CVE-2024-26676.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26679.html">https://www.suse.com/security/cve/CVE-2024-26679.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26691.html">https://www.suse.com/security/cve/CVE-2024-26691.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26692.html">https://www.suse.com/security/cve/CVE-2024-26692.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26726.html">https://www.suse.com/security/cve/CVE-2024-26726.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26734.html">https://www.suse.com/security/cve/CVE-2024-26734.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26739.html">https://www.suse.com/security/cve/CVE-2024-26739.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26742.html">https://www.suse.com/security/cve/CVE-2024-26742.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26750.html">https://www.suse.com/security/cve/CVE-2024-26750.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26758.html">https://www.suse.com/security/cve/CVE-2024-26758.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26760.html">https://www.suse.com/security/cve/CVE-2024-26760.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26761.html">https://www.suse.com/security/cve/CVE-2024-26761.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26767.html">https://www.suse.com/security/cve/CVE-2024-26767.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26772.html">https://www.suse.com/security/cve/CVE-2024-26772.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26775.html">https://www.suse.com/security/cve/CVE-2024-26775.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26780.html">https://www.suse.com/security/cve/CVE-2024-26780.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26783.html">https://www.suse.com/security/cve/CVE-2024-26783.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26785.html">https://www.suse.com/security/cve/CVE-2024-26785.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26786.html">https://www.suse.com/security/cve/CVE-2024-26786.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26791.html">https://www.suse.com/security/cve/CVE-2024-26791.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26794.html">https://www.suse.com/security/cve/CVE-2024-26794.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26813.html">https://www.suse.com/security/cve/CVE-2024-26813.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26814.html">https://www.suse.com/security/cve/CVE-2024-26814.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26816.html">https://www.suse.com/security/cve/CVE-2024-26816.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26822.html">https://www.suse.com/security/cve/CVE-2024-26822.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26826.html">https://www.suse.com/security/cve/CVE-2024-26826.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26828.html">https://www.suse.com/security/cve/CVE-2024-26828.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26832.html">https://www.suse.com/security/cve/CVE-2024-26832.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26845.html">https://www.suse.com/security/cve/CVE-2024-26845.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26846.html">https://www.suse.com/security/cve/CVE-2024-26846.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26852.html">https://www.suse.com/security/cve/CVE-2024-26852.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26853.html">https://www.suse.com/security/cve/CVE-2024-26853.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26854.html">https://www.suse.com/security/cve/CVE-2024-26854.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26855.html">https://www.suse.com/security/cve/CVE-2024-26855.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26856.html">https://www.suse.com/security/cve/CVE-2024-26856.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26857.html">https://www.suse.com/security/cve/CVE-2024-26857.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26858.html">https://www.suse.com/security/cve/CVE-2024-26858.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26860.html">https://www.suse.com/security/cve/CVE-2024-26860.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26861.html">https://www.suse.com/security/cve/CVE-2024-26861.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26862.html">https://www.suse.com/security/cve/CVE-2024-26862.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26863.html">https://www.suse.com/security/cve/CVE-2024-26863.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26865.html">https://www.suse.com/security/cve/CVE-2024-26865.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26866.html">https://www.suse.com/security/cve/CVE-2024-26866.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26868.html">https://www.suse.com/security/cve/CVE-2024-26868.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26870.html">https://www.suse.com/security/cve/CVE-2024-26870.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26877.html">https://www.suse.com/security/cve/CVE-2024-26877.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26878.html">https://www.suse.com/security/cve/CVE-2024-26878.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26880.html">https://www.suse.com/security/cve/CVE-2024-26880.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26881.html">https://www.suse.com/security/cve/CVE-2024-26881.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26883.html">https://www.suse.com/security/cve/CVE-2024-26883.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26884.html">https://www.suse.com/security/cve/CVE-2024-26884.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26885.html">https://www.suse.com/security/cve/CVE-2024-26885.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26889.html">https://www.suse.com/security/cve/CVE-2024-26889.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26890.html">https://www.suse.com/security/cve/CVE-2024-26890.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26892.html">https://www.suse.com/security/cve/CVE-2024-26892.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26893.html">https://www.suse.com/security/cve/CVE-2024-26893.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26895.html">https://www.suse.com/security/cve/CVE-2024-26895.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26897.html">https://www.suse.com/security/cve/CVE-2024-26897.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26898.html">https://www.suse.com/security/cve/CVE-2024-26898.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26899.html">https://www.suse.com/security/cve/CVE-2024-26899.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26900.html">https://www.suse.com/security/cve/CVE-2024-26900.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26901.html">https://www.suse.com/security/cve/CVE-2024-26901.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26903.html">https://www.suse.com/security/cve/CVE-2024-26903.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26906.html">https://www.suse.com/security/cve/CVE-2024-26906.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26907.html">https://www.suse.com/security/cve/CVE-2024-26907.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26909.html">https://www.suse.com/security/cve/CVE-2024-26909.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26913.html">https://www.suse.com/security/cve/CVE-2024-26913.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26914.html">https://www.suse.com/security/cve/CVE-2024-26914.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26915.html">https://www.suse.com/security/cve/CVE-2024-26915.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26916.html">https://www.suse.com/security/cve/CVE-2024-26916.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26919.html">https://www.suse.com/security/cve/CVE-2024-26919.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">https://www.suse.com/security/cve/CVE-2024-26920.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26921.html">https://www.suse.com/security/cve/CVE-2024-26921.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26922.html">https://www.suse.com/security/cve/CVE-2024-26922.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26923.html">https://www.suse.com/security/cve/CVE-2024-26923.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26925.html">https://www.suse.com/security/cve/CVE-2024-26925.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26927.html">https://www.suse.com/security/cve/CVE-2024-26927.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26928.html">https://www.suse.com/security/cve/CVE-2024-26928.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26929.html">https://www.suse.com/security/cve/CVE-2024-26929.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26930.html">https://www.suse.com/security/cve/CVE-2024-26930.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26931.html">https://www.suse.com/security/cve/CVE-2024-26931.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26932.html">https://www.suse.com/security/cve/CVE-2024-26932.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26933.html">https://www.suse.com/security/cve/CVE-2024-26933.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26934.html">https://www.suse.com/security/cve/CVE-2024-26934.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26935.html">https://www.suse.com/security/cve/CVE-2024-26935.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26937.html">https://www.suse.com/security/cve/CVE-2024-26937.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26938.html">https://www.suse.com/security/cve/CVE-2024-26938.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26939.html">https://www.suse.com/security/cve/CVE-2024-26939.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26940.html">https://www.suse.com/security/cve/CVE-2024-26940.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26943.html">https://www.suse.com/security/cve/CVE-2024-26943.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26944.html">https://www.suse.com/security/cve/CVE-2024-26944.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26945.html">https://www.suse.com/security/cve/CVE-2024-26945.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26946.html">https://www.suse.com/security/cve/CVE-2024-26946.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26948.html">https://www.suse.com/security/cve/CVE-2024-26948.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26949.html">https://www.suse.com/security/cve/CVE-2024-26949.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26950.html">https://www.suse.com/security/cve/CVE-2024-26950.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26951.html">https://www.suse.com/security/cve/CVE-2024-26951.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26955.html">https://www.suse.com/security/cve/CVE-2024-26955.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26956.html">https://www.suse.com/security/cve/CVE-2024-26956.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26957.html">https://www.suse.com/security/cve/CVE-2024-26957.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26958.html">https://www.suse.com/security/cve/CVE-2024-26958.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26959.html">https://www.suse.com/security/cve/CVE-2024-26959.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26960.html">https://www.suse.com/security/cve/CVE-2024-26960.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26961.html">https://www.suse.com/security/cve/CVE-2024-26961.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26962.html">https://www.suse.com/security/cve/CVE-2024-26962.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26963.html">https://www.suse.com/security/cve/CVE-2024-26963.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26964.html">https://www.suse.com/security/cve/CVE-2024-26964.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26965.html">https://www.suse.com/security/cve/CVE-2024-26965.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26966.html">https://www.suse.com/security/cve/CVE-2024-26966.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26968.html">https://www.suse.com/security/cve/CVE-2024-26968.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26969.html">https://www.suse.com/security/cve/CVE-2024-26969.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26970.html">https://www.suse.com/security/cve/CVE-2024-26970.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26972.html">https://www.suse.com/security/cve/CVE-2024-26972.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26973.html">https://www.suse.com/security/cve/CVE-2024-26973.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26974.html">https://www.suse.com/security/cve/CVE-2024-26974.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26975.html">https://www.suse.com/security/cve/CVE-2024-26975.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26977.html">https://www.suse.com/security/cve/CVE-2024-26977.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26978.html">https://www.suse.com/security/cve/CVE-2024-26978.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26981.html">https://www.suse.com/security/cve/CVE-2024-26981.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26982.html">https://www.suse.com/security/cve/CVE-2024-26982.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26983.html">https://www.suse.com/security/cve/CVE-2024-26983.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26984.html">https://www.suse.com/security/cve/CVE-2024-26984.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26986.html">https://www.suse.com/security/cve/CVE-2024-26986.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26988.html">https://www.suse.com/security/cve/CVE-2024-26988.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26989.html">https://www.suse.com/security/cve/CVE-2024-26989.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26990.html">https://www.suse.com/security/cve/CVE-2024-26990.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26991.html">https://www.suse.com/security/cve/CVE-2024-26991.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26992.html">https://www.suse.com/security/cve/CVE-2024-26992.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26993.html">https://www.suse.com/security/cve/CVE-2024-26993.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26994.html">https://www.suse.com/security/cve/CVE-2024-26994.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26995.html">https://www.suse.com/security/cve/CVE-2024-26995.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26996.html">https://www.suse.com/security/cve/CVE-2024-26996.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26997.html">https://www.suse.com/security/cve/CVE-2024-26997.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26999.html">https://www.suse.com/security/cve/CVE-2024-26999.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27000.html">https://www.suse.com/security/cve/CVE-2024-27000.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27001.html">https://www.suse.com/security/cve/CVE-2024-27001.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27002.html">https://www.suse.com/security/cve/CVE-2024-27002.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27003.html">https://www.suse.com/security/cve/CVE-2024-27003.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27004.html">https://www.suse.com/security/cve/CVE-2024-27004.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27008.html">https://www.suse.com/security/cve/CVE-2024-27008.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27009.html">https://www.suse.com/security/cve/CVE-2024-27009.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27012.html">https://www.suse.com/security/cve/CVE-2024-27012.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27013.html">https://www.suse.com/security/cve/CVE-2024-27013.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27014.html">https://www.suse.com/security/cve/CVE-2024-27014.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27015.html">https://www.suse.com/security/cve/CVE-2024-27015.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27016.html">https://www.suse.com/security/cve/CVE-2024-27016.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27019.html">https://www.suse.com/security/cve/CVE-2024-27019.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27020.html">https://www.suse.com/security/cve/CVE-2024-27020.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27022.html">https://www.suse.com/security/cve/CVE-2024-27022.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27023.html">https://www.suse.com/security/cve/CVE-2024-27023.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27025.html">https://www.suse.com/security/cve/CVE-2024-27025.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27027.html">https://www.suse.com/security/cve/CVE-2024-27027.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27028.html">https://www.suse.com/security/cve/CVE-2024-27028.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27029.html">https://www.suse.com/security/cve/CVE-2024-27029.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27030.html">https://www.suse.com/security/cve/CVE-2024-27030.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27031.html">https://www.suse.com/security/cve/CVE-2024-27031.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27036.html">https://www.suse.com/security/cve/CVE-2024-27036.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27037.html">https://www.suse.com/security/cve/CVE-2024-27037.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27038.html">https://www.suse.com/security/cve/CVE-2024-27038.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27039.html">https://www.suse.com/security/cve/CVE-2024-27039.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27040.html">https://www.suse.com/security/cve/CVE-2024-27040.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27041.html">https://www.suse.com/security/cve/CVE-2024-27041.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27042.html">https://www.suse.com/security/cve/CVE-2024-27042.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27043.html">https://www.suse.com/security/cve/CVE-2024-27043.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27044.html">https://www.suse.com/security/cve/CVE-2024-27044.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27045.html">https://www.suse.com/security/cve/CVE-2024-27045.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27046.html">https://www.suse.com/security/cve/CVE-2024-27046.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27047.html">https://www.suse.com/security/cve/CVE-2024-27047.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27048.html">https://www.suse.com/security/cve/CVE-2024-27048.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27051.html">https://www.suse.com/security/cve/CVE-2024-27051.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27052.html">https://www.suse.com/security/cve/CVE-2024-27052.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27053.html">https://www.suse.com/security/cve/CVE-2024-27053.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27054.html">https://www.suse.com/security/cve/CVE-2024-27054.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27056.html">https://www.suse.com/security/cve/CVE-2024-27056.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27057.html">https://www.suse.com/security/cve/CVE-2024-27057.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27059.html">https://www.suse.com/security/cve/CVE-2024-27059.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27060.html">https://www.suse.com/security/cve/CVE-2024-27060.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27062.html">https://www.suse.com/security/cve/CVE-2024-27062.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27064.html">https://www.suse.com/security/cve/CVE-2024-27064.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27065.html">https://www.suse.com/security/cve/CVE-2024-27065.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27067.html">https://www.suse.com/security/cve/CVE-2024-27067.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27068.html">https://www.suse.com/security/cve/CVE-2024-27068.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27071.html">https://www.suse.com/security/cve/CVE-2024-27071.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27072.html">https://www.suse.com/security/cve/CVE-2024-27072.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27073.html">https://www.suse.com/security/cve/CVE-2024-27073.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27074.html">https://www.suse.com/security/cve/CVE-2024-27074.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27075.html">https://www.suse.com/security/cve/CVE-2024-27075.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27076.html">https://www.suse.com/security/cve/CVE-2024-27076.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27077.html">https://www.suse.com/security/cve/CVE-2024-27077.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27078.html">https://www.suse.com/security/cve/CVE-2024-27078.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27080.html">https://www.suse.com/security/cve/CVE-2024-27080.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27388.html">https://www.suse.com/security/cve/CVE-2024-27388.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27389.html">https://www.suse.com/security/cve/CVE-2024-27389.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27391.html">https://www.suse.com/security/cve/CVE-2024-27391.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27393.html">https://www.suse.com/security/cve/CVE-2024-27393.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27395.html">https://www.suse.com/security/cve/CVE-2024-27395.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27396.html">https://www.suse.com/security/cve/CVE-2024-27396.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27398.html">https://www.suse.com/security/cve/CVE-2024-27398.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27399.html">https://www.suse.com/security/cve/CVE-2024-27399.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27400.html">https://www.suse.com/security/cve/CVE-2024-27400.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27401.html">https://www.suse.com/security/cve/CVE-2024-27401.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27402.html">https://www.suse.com/security/cve/CVE-2024-27402.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27404.html">https://www.suse.com/security/cve/CVE-2024-27404.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27405.html">https://www.suse.com/security/cve/CVE-2024-27405.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27408.html">https://www.suse.com/security/cve/CVE-2024-27408.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27410.html">https://www.suse.com/security/cve/CVE-2024-27410.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27411.html">https://www.suse.com/security/cve/CVE-2024-27411.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27412.html">https://www.suse.com/security/cve/CVE-2024-27412.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27413.html">https://www.suse.com/security/cve/CVE-2024-27413.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27414.html">https://www.suse.com/security/cve/CVE-2024-27414.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27416.html">https://www.suse.com/security/cve/CVE-2024-27416.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27417.html">https://www.suse.com/security/cve/CVE-2024-27417.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27418.html">https://www.suse.com/security/cve/CVE-2024-27418.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27431.html">https://www.suse.com/security/cve/CVE-2024-27431.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27432.html">https://www.suse.com/security/cve/CVE-2024-27432.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27434.html">https://www.suse.com/security/cve/CVE-2024-27434.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27435.html">https://www.suse.com/security/cve/CVE-2024-27435.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27436.html">https://www.suse.com/security/cve/CVE-2024-27436.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-33619.html">https://www.suse.com/security/cve/CVE-2024-33619.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-34777.html">https://www.suse.com/security/cve/CVE-2024-34777.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35247.html">https://www.suse.com/security/cve/CVE-2024-35247.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35784.html">https://www.suse.com/security/cve/CVE-2024-35784.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35786.html">https://www.suse.com/security/cve/CVE-2024-35786.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35788.html">https://www.suse.com/security/cve/CVE-2024-35788.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35789.html">https://www.suse.com/security/cve/CVE-2024-35789.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35790.html">https://www.suse.com/security/cve/CVE-2024-35790.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35791.html">https://www.suse.com/security/cve/CVE-2024-35791.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35794.html">https://www.suse.com/security/cve/CVE-2024-35794.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35795.html">https://www.suse.com/security/cve/CVE-2024-35795.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35796.html">https://www.suse.com/security/cve/CVE-2024-35796.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35799.html">https://www.suse.com/security/cve/CVE-2024-35799.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35800.html">https://www.suse.com/security/cve/CVE-2024-35800.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35801.html">https://www.suse.com/security/cve/CVE-2024-35801.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35803.html">https://www.suse.com/security/cve/CVE-2024-35803.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35804.html">https://www.suse.com/security/cve/CVE-2024-35804.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35805.html">https://www.suse.com/security/cve/CVE-2024-35805.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35806.html">https://www.suse.com/security/cve/CVE-2024-35806.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35807.html">https://www.suse.com/security/cve/CVE-2024-35807.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35808.html">https://www.suse.com/security/cve/CVE-2024-35808.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35809.html">https://www.suse.com/security/cve/CVE-2024-35809.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35810.html">https://www.suse.com/security/cve/CVE-2024-35810.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35811.html">https://www.suse.com/security/cve/CVE-2024-35811.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35812.html">https://www.suse.com/security/cve/CVE-2024-35812.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35813.html">https://www.suse.com/security/cve/CVE-2024-35813.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35814.html">https://www.suse.com/security/cve/CVE-2024-35814.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35815.html">https://www.suse.com/security/cve/CVE-2024-35815.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35817.html">https://www.suse.com/security/cve/CVE-2024-35817.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35819.html">https://www.suse.com/security/cve/CVE-2024-35819.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35821.html">https://www.suse.com/security/cve/CVE-2024-35821.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35822.html">https://www.suse.com/security/cve/CVE-2024-35822.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35823.html">https://www.suse.com/security/cve/CVE-2024-35823.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35824.html">https://www.suse.com/security/cve/CVE-2024-35824.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35825.html">https://www.suse.com/security/cve/CVE-2024-35825.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35827.html">https://www.suse.com/security/cve/CVE-2024-35827.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35828.html">https://www.suse.com/security/cve/CVE-2024-35828.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35829.html">https://www.suse.com/security/cve/CVE-2024-35829.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35830.html">https://www.suse.com/security/cve/CVE-2024-35830.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35831.html">https://www.suse.com/security/cve/CVE-2024-35831.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35833.html">https://www.suse.com/security/cve/CVE-2024-35833.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35834.html">https://www.suse.com/security/cve/CVE-2024-35834.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35835.html">https://www.suse.com/security/cve/CVE-2024-35835.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35836.html">https://www.suse.com/security/cve/CVE-2024-35836.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35837.html">https://www.suse.com/security/cve/CVE-2024-35837.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35838.html">https://www.suse.com/security/cve/CVE-2024-35838.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35841.html">https://www.suse.com/security/cve/CVE-2024-35841.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35842.html">https://www.suse.com/security/cve/CVE-2024-35842.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35843.html">https://www.suse.com/security/cve/CVE-2024-35843.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35845.html">https://www.suse.com/security/cve/CVE-2024-35845.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35847.html">https://www.suse.com/security/cve/CVE-2024-35847.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35848.html">https://www.suse.com/security/cve/CVE-2024-35848.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35849.html">https://www.suse.com/security/cve/CVE-2024-35849.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35850.html">https://www.suse.com/security/cve/CVE-2024-35850.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35851.html">https://www.suse.com/security/cve/CVE-2024-35851.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35852.html">https://www.suse.com/security/cve/CVE-2024-35852.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35853.html">https://www.suse.com/security/cve/CVE-2024-35853.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35854.html">https://www.suse.com/security/cve/CVE-2024-35854.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35857.html">https://www.suse.com/security/cve/CVE-2024-35857.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35860.html">https://www.suse.com/security/cve/CVE-2024-35860.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35861.html">https://www.suse.com/security/cve/CVE-2024-35861.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35862.html">https://www.suse.com/security/cve/CVE-2024-35862.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35863.html">https://www.suse.com/security/cve/CVE-2024-35863.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35864.html">https://www.suse.com/security/cve/CVE-2024-35864.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35865.html">https://www.suse.com/security/cve/CVE-2024-35865.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35866.html">https://www.suse.com/security/cve/CVE-2024-35866.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35867.html">https://www.suse.com/security/cve/CVE-2024-35867.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35868.html">https://www.suse.com/security/cve/CVE-2024-35868.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35869.html">https://www.suse.com/security/cve/CVE-2024-35869.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35870.html">https://www.suse.com/security/cve/CVE-2024-35870.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35872.html">https://www.suse.com/security/cve/CVE-2024-35872.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35875.html">https://www.suse.com/security/cve/CVE-2024-35875.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35877.html">https://www.suse.com/security/cve/CVE-2024-35877.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35878.html">https://www.suse.com/security/cve/CVE-2024-35878.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35879.html">https://www.suse.com/security/cve/CVE-2024-35879.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35880.html">https://www.suse.com/security/cve/CVE-2024-35880.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35883.html">https://www.suse.com/security/cve/CVE-2024-35883.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35884.html">https://www.suse.com/security/cve/CVE-2024-35884.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35885.html">https://www.suse.com/security/cve/CVE-2024-35885.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35886.html">https://www.suse.com/security/cve/CVE-2024-35886.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35887.html">https://www.suse.com/security/cve/CVE-2024-35887.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35889.html">https://www.suse.com/security/cve/CVE-2024-35889.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35890.html">https://www.suse.com/security/cve/CVE-2024-35890.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35891.html">https://www.suse.com/security/cve/CVE-2024-35891.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35892.html">https://www.suse.com/security/cve/CVE-2024-35892.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35893.html">https://www.suse.com/security/cve/CVE-2024-35893.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35895.html">https://www.suse.com/security/cve/CVE-2024-35895.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35896.html">https://www.suse.com/security/cve/CVE-2024-35896.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35898.html">https://www.suse.com/security/cve/CVE-2024-35898.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35899.html">https://www.suse.com/security/cve/CVE-2024-35899.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35900.html">https://www.suse.com/security/cve/CVE-2024-35900.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35901.html">https://www.suse.com/security/cve/CVE-2024-35901.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35903.html">https://www.suse.com/security/cve/CVE-2024-35903.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35904.html">https://www.suse.com/security/cve/CVE-2024-35904.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35905.html">https://www.suse.com/security/cve/CVE-2024-35905.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35907.html">https://www.suse.com/security/cve/CVE-2024-35907.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35908.html">https://www.suse.com/security/cve/CVE-2024-35908.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35909.html">https://www.suse.com/security/cve/CVE-2024-35909.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35911.html">https://www.suse.com/security/cve/CVE-2024-35911.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35912.html">https://www.suse.com/security/cve/CVE-2024-35912.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35914.html">https://www.suse.com/security/cve/CVE-2024-35914.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35915.html">https://www.suse.com/security/cve/CVE-2024-35915.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35916.html">https://www.suse.com/security/cve/CVE-2024-35916.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35917.html">https://www.suse.com/security/cve/CVE-2024-35917.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35921.html">https://www.suse.com/security/cve/CVE-2024-35921.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35922.html">https://www.suse.com/security/cve/CVE-2024-35922.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35924.html">https://www.suse.com/security/cve/CVE-2024-35924.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35925.html">https://www.suse.com/security/cve/CVE-2024-35925.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35926.html">https://www.suse.com/security/cve/CVE-2024-35926.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35927.html">https://www.suse.com/security/cve/CVE-2024-35927.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35928.html">https://www.suse.com/security/cve/CVE-2024-35928.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35930.html">https://www.suse.com/security/cve/CVE-2024-35930.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35931.html">https://www.suse.com/security/cve/CVE-2024-35931.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35932.html">https://www.suse.com/security/cve/CVE-2024-35932.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35933.html">https://www.suse.com/security/cve/CVE-2024-35933.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35934.html">https://www.suse.com/security/cve/CVE-2024-35934.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35935.html">https://www.suse.com/security/cve/CVE-2024-35935.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35936.html">https://www.suse.com/security/cve/CVE-2024-35936.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35937.html">https://www.suse.com/security/cve/CVE-2024-35937.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35938.html">https://www.suse.com/security/cve/CVE-2024-35938.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35940.html">https://www.suse.com/security/cve/CVE-2024-35940.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35942.html">https://www.suse.com/security/cve/CVE-2024-35942.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35943.html">https://www.suse.com/security/cve/CVE-2024-35943.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35944.html">https://www.suse.com/security/cve/CVE-2024-35944.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35945.html">https://www.suse.com/security/cve/CVE-2024-35945.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35946.html">https://www.suse.com/security/cve/CVE-2024-35946.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35947.html">https://www.suse.com/security/cve/CVE-2024-35947.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35950.html">https://www.suse.com/security/cve/CVE-2024-35950.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35951.html">https://www.suse.com/security/cve/CVE-2024-35951.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35952.html">https://www.suse.com/security/cve/CVE-2024-35952.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35953.html">https://www.suse.com/security/cve/CVE-2024-35953.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35954.html">https://www.suse.com/security/cve/CVE-2024-35954.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35955.html">https://www.suse.com/security/cve/CVE-2024-35955.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35957.html">https://www.suse.com/security/cve/CVE-2024-35957.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35958.html">https://www.suse.com/security/cve/CVE-2024-35958.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35959.html">https://www.suse.com/security/cve/CVE-2024-35959.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35960.html">https://www.suse.com/security/cve/CVE-2024-35960.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35961.html">https://www.suse.com/security/cve/CVE-2024-35961.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35962.html">https://www.suse.com/security/cve/CVE-2024-35962.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35963.html">https://www.suse.com/security/cve/CVE-2024-35963.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35964.html">https://www.suse.com/security/cve/CVE-2024-35964.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35965.html">https://www.suse.com/security/cve/CVE-2024-35965.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35966.html">https://www.suse.com/security/cve/CVE-2024-35966.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35967.html">https://www.suse.com/security/cve/CVE-2024-35967.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35969.html">https://www.suse.com/security/cve/CVE-2024-35969.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35970.html">https://www.suse.com/security/cve/CVE-2024-35970.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35971.html">https://www.suse.com/security/cve/CVE-2024-35971.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35972.html">https://www.suse.com/security/cve/CVE-2024-35972.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35973.html">https://www.suse.com/security/cve/CVE-2024-35973.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35974.html">https://www.suse.com/security/cve/CVE-2024-35974.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35975.html">https://www.suse.com/security/cve/CVE-2024-35975.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35976.html">https://www.suse.com/security/cve/CVE-2024-35976.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35977.html">https://www.suse.com/security/cve/CVE-2024-35977.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35978.html">https://www.suse.com/security/cve/CVE-2024-35978.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35979.html">https://www.suse.com/security/cve/CVE-2024-35979.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35981.html">https://www.suse.com/security/cve/CVE-2024-35981.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35982.html">https://www.suse.com/security/cve/CVE-2024-35982.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35984.html">https://www.suse.com/security/cve/CVE-2024-35984.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35986.html">https://www.suse.com/security/cve/CVE-2024-35986.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35989.html">https://www.suse.com/security/cve/CVE-2024-35989.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35990.html">https://www.suse.com/security/cve/CVE-2024-35990.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35991.html">https://www.suse.com/security/cve/CVE-2024-35991.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35992.html">https://www.suse.com/security/cve/CVE-2024-35992.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35995.html">https://www.suse.com/security/cve/CVE-2024-35995.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35997.html">https://www.suse.com/security/cve/CVE-2024-35997.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35998.html">https://www.suse.com/security/cve/CVE-2024-35998.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35999.html">https://www.suse.com/security/cve/CVE-2024-35999.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36002.html">https://www.suse.com/security/cve/CVE-2024-36002.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36003.html">https://www.suse.com/security/cve/CVE-2024-36003.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36004.html">https://www.suse.com/security/cve/CVE-2024-36004.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36005.html">https://www.suse.com/security/cve/CVE-2024-36005.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36006.html">https://www.suse.com/security/cve/CVE-2024-36006.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36007.html">https://www.suse.com/security/cve/CVE-2024-36007.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36008.html">https://www.suse.com/security/cve/CVE-2024-36008.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36009.html">https://www.suse.com/security/cve/CVE-2024-36009.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36010.html">https://www.suse.com/security/cve/CVE-2024-36010.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36011.html">https://www.suse.com/security/cve/CVE-2024-36011.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36012.html">https://www.suse.com/security/cve/CVE-2024-36012.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36013.html">https://www.suse.com/security/cve/CVE-2024-36013.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36014.html">https://www.suse.com/security/cve/CVE-2024-36014.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36015.html">https://www.suse.com/security/cve/CVE-2024-36015.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36016.html">https://www.suse.com/security/cve/CVE-2024-36016.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36017.html">https://www.suse.com/security/cve/CVE-2024-36017.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36018.html">https://www.suse.com/security/cve/CVE-2024-36018.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36019.html">https://www.suse.com/security/cve/CVE-2024-36019.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36020.html">https://www.suse.com/security/cve/CVE-2024-36020.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36021.html">https://www.suse.com/security/cve/CVE-2024-36021.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36024.html">https://www.suse.com/security/cve/CVE-2024-36024.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36025.html">https://www.suse.com/security/cve/CVE-2024-36025.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36026.html">https://www.suse.com/security/cve/CVE-2024-36026.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36029.html">https://www.suse.com/security/cve/CVE-2024-36029.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36030.html">https://www.suse.com/security/cve/CVE-2024-36030.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36032.html">https://www.suse.com/security/cve/CVE-2024-36032.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36281.html">https://www.suse.com/security/cve/CVE-2024-36281.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36477.html">https://www.suse.com/security/cve/CVE-2024-36477.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36478.html">https://www.suse.com/security/cve/CVE-2024-36478.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36479.html">https://www.suse.com/security/cve/CVE-2024-36479.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36880.html">https://www.suse.com/security/cve/CVE-2024-36880.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36882.html">https://www.suse.com/security/cve/CVE-2024-36882.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36885.html">https://www.suse.com/security/cve/CVE-2024-36885.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36887.html">https://www.suse.com/security/cve/CVE-2024-36887.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36889.html">https://www.suse.com/security/cve/CVE-2024-36889.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36890.html">https://www.suse.com/security/cve/CVE-2024-36890.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36891.html">https://www.suse.com/security/cve/CVE-2024-36891.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36893.html">https://www.suse.com/security/cve/CVE-2024-36893.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36894.html">https://www.suse.com/security/cve/CVE-2024-36894.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36895.html">https://www.suse.com/security/cve/CVE-2024-36895.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36896.html">https://www.suse.com/security/cve/CVE-2024-36896.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36897.html">https://www.suse.com/security/cve/CVE-2024-36897.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36898.html">https://www.suse.com/security/cve/CVE-2024-36898.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36899.html">https://www.suse.com/security/cve/CVE-2024-36899.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36900.html">https://www.suse.com/security/cve/CVE-2024-36900.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36901.html">https://www.suse.com/security/cve/CVE-2024-36901.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36902.html">https://www.suse.com/security/cve/CVE-2024-36902.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36903.html">https://www.suse.com/security/cve/CVE-2024-36903.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36904.html">https://www.suse.com/security/cve/CVE-2024-36904.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36906.html">https://www.suse.com/security/cve/CVE-2024-36906.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36909.html">https://www.suse.com/security/cve/CVE-2024-36909.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36910.html">https://www.suse.com/security/cve/CVE-2024-36910.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36911.html">https://www.suse.com/security/cve/CVE-2024-36911.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36912.html">https://www.suse.com/security/cve/CVE-2024-36912.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36913.html">https://www.suse.com/security/cve/CVE-2024-36913.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36914.html">https://www.suse.com/security/cve/CVE-2024-36914.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36915.html">https://www.suse.com/security/cve/CVE-2024-36915.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36916.html">https://www.suse.com/security/cve/CVE-2024-36916.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36917.html">https://www.suse.com/security/cve/CVE-2024-36917.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36918.html">https://www.suse.com/security/cve/CVE-2024-36918.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36919.html">https://www.suse.com/security/cve/CVE-2024-36919.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36921.html">https://www.suse.com/security/cve/CVE-2024-36921.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36922.html">https://www.suse.com/security/cve/CVE-2024-36922.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36923.html">https://www.suse.com/security/cve/CVE-2024-36923.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36924.html">https://www.suse.com/security/cve/CVE-2024-36924.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36926.html">https://www.suse.com/security/cve/CVE-2024-36926.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36928.html">https://www.suse.com/security/cve/CVE-2024-36928.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36930.html">https://www.suse.com/security/cve/CVE-2024-36930.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36931.html">https://www.suse.com/security/cve/CVE-2024-36931.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36934.html">https://www.suse.com/security/cve/CVE-2024-36934.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36935.html">https://www.suse.com/security/cve/CVE-2024-36935.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36936.html">https://www.suse.com/security/cve/CVE-2024-36936.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36937.html">https://www.suse.com/security/cve/CVE-2024-36937.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36938.html">https://www.suse.com/security/cve/CVE-2024-36938.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36940.html">https://www.suse.com/security/cve/CVE-2024-36940.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36941.html">https://www.suse.com/security/cve/CVE-2024-36941.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36942.html">https://www.suse.com/security/cve/CVE-2024-36942.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36944.html">https://www.suse.com/security/cve/CVE-2024-36944.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36945.html">https://www.suse.com/security/cve/CVE-2024-36945.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36946.html">https://www.suse.com/security/cve/CVE-2024-36946.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36947.html">https://www.suse.com/security/cve/CVE-2024-36947.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36949.html">https://www.suse.com/security/cve/CVE-2024-36949.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36950.html">https://www.suse.com/security/cve/CVE-2024-36950.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36951.html">https://www.suse.com/security/cve/CVE-2024-36951.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36952.html">https://www.suse.com/security/cve/CVE-2024-36952.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36955.html">https://www.suse.com/security/cve/CVE-2024-36955.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36957.html">https://www.suse.com/security/cve/CVE-2024-36957.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36959.html">https://www.suse.com/security/cve/CVE-2024-36959.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36960.html">https://www.suse.com/security/cve/CVE-2024-36960.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36962.html">https://www.suse.com/security/cve/CVE-2024-36962.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36964.html">https://www.suse.com/security/cve/CVE-2024-36964.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36965.html">https://www.suse.com/security/cve/CVE-2024-36965.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36967.html">https://www.suse.com/security/cve/CVE-2024-36967.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36969.html">https://www.suse.com/security/cve/CVE-2024-36969.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36971.html">https://www.suse.com/security/cve/CVE-2024-36971.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36972.html">https://www.suse.com/security/cve/CVE-2024-36972.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36973.html">https://www.suse.com/security/cve/CVE-2024-36973.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36974.html">https://www.suse.com/security/cve/CVE-2024-36974.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36975.html">https://www.suse.com/security/cve/CVE-2024-36975.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36977.html">https://www.suse.com/security/cve/CVE-2024-36977.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36978.html">https://www.suse.com/security/cve/CVE-2024-36978.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-37021.html">https://www.suse.com/security/cve/CVE-2024-37021.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-37078.html">https://www.suse.com/security/cve/CVE-2024-37078.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-37353.html">https://www.suse.com/security/cve/CVE-2024-37353.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-37354.html">https://www.suse.com/security/cve/CVE-2024-37354.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38381.html">https://www.suse.com/security/cve/CVE-2024-38381.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38384.html">https://www.suse.com/security/cve/CVE-2024-38384.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38385.html">https://www.suse.com/security/cve/CVE-2024-38385.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38388.html">https://www.suse.com/security/cve/CVE-2024-38388.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38390.html">https://www.suse.com/security/cve/CVE-2024-38390.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38391.html">https://www.suse.com/security/cve/CVE-2024-38391.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38539.html">https://www.suse.com/security/cve/CVE-2024-38539.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38540.html">https://www.suse.com/security/cve/CVE-2024-38540.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38541.html">https://www.suse.com/security/cve/CVE-2024-38541.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38543.html">https://www.suse.com/security/cve/CVE-2024-38543.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38544.html">https://www.suse.com/security/cve/CVE-2024-38544.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38545.html">https://www.suse.com/security/cve/CVE-2024-38545.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38546.html">https://www.suse.com/security/cve/CVE-2024-38546.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38547.html">https://www.suse.com/security/cve/CVE-2024-38547.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38548.html">https://www.suse.com/security/cve/CVE-2024-38548.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38549.html">https://www.suse.com/security/cve/CVE-2024-38549.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38550.html">https://www.suse.com/security/cve/CVE-2024-38550.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38551.html">https://www.suse.com/security/cve/CVE-2024-38551.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38552.html">https://www.suse.com/security/cve/CVE-2024-38552.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38553.html">https://www.suse.com/security/cve/CVE-2024-38553.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38554.html">https://www.suse.com/security/cve/CVE-2024-38554.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38555.html">https://www.suse.com/security/cve/CVE-2024-38555.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38556.html">https://www.suse.com/security/cve/CVE-2024-38556.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38557.html">https://www.suse.com/security/cve/CVE-2024-38557.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38558.html">https://www.suse.com/security/cve/CVE-2024-38558.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38559.html">https://www.suse.com/security/cve/CVE-2024-38559.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38560.html">https://www.suse.com/security/cve/CVE-2024-38560.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38562.html">https://www.suse.com/security/cve/CVE-2024-38562.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38564.html">https://www.suse.com/security/cve/CVE-2024-38564.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38565.html">https://www.suse.com/security/cve/CVE-2024-38565.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38566.html">https://www.suse.com/security/cve/CVE-2024-38566.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38567.html">https://www.suse.com/security/cve/CVE-2024-38567.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38568.html">https://www.suse.com/security/cve/CVE-2024-38568.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38569.html">https://www.suse.com/security/cve/CVE-2024-38569.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38570.html">https://www.suse.com/security/cve/CVE-2024-38570.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38571.html">https://www.suse.com/security/cve/CVE-2024-38571.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38572.html">https://www.suse.com/security/cve/CVE-2024-38572.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38573.html">https://www.suse.com/security/cve/CVE-2024-38573.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38575.html">https://www.suse.com/security/cve/CVE-2024-38575.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38578.html">https://www.suse.com/security/cve/CVE-2024-38578.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38579.html">https://www.suse.com/security/cve/CVE-2024-38579.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38580.html">https://www.suse.com/security/cve/CVE-2024-38580.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38581.html">https://www.suse.com/security/cve/CVE-2024-38581.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38582.html">https://www.suse.com/security/cve/CVE-2024-38582.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38583.html">https://www.suse.com/security/cve/CVE-2024-38583.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38586.html">https://www.suse.com/security/cve/CVE-2024-38586.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38587.html">https://www.suse.com/security/cve/CVE-2024-38587.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38588.html">https://www.suse.com/security/cve/CVE-2024-38588.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38590.html">https://www.suse.com/security/cve/CVE-2024-38590.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38591.html">https://www.suse.com/security/cve/CVE-2024-38591.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38592.html">https://www.suse.com/security/cve/CVE-2024-38592.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38594.html">https://www.suse.com/security/cve/CVE-2024-38594.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38595.html">https://www.suse.com/security/cve/CVE-2024-38595.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38597.html">https://www.suse.com/security/cve/CVE-2024-38597.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38598.html">https://www.suse.com/security/cve/CVE-2024-38598.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38599.html">https://www.suse.com/security/cve/CVE-2024-38599.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38600.html">https://www.suse.com/security/cve/CVE-2024-38600.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38601.html">https://www.suse.com/security/cve/CVE-2024-38601.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38602.html">https://www.suse.com/security/cve/CVE-2024-38602.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38603.html">https://www.suse.com/security/cve/CVE-2024-38603.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38604.html">https://www.suse.com/security/cve/CVE-2024-38604.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38605.html">https://www.suse.com/security/cve/CVE-2024-38605.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38608.html">https://www.suse.com/security/cve/CVE-2024-38608.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38610.html">https://www.suse.com/security/cve/CVE-2024-38610.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38611.html">https://www.suse.com/security/cve/CVE-2024-38611.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38615.html">https://www.suse.com/security/cve/CVE-2024-38615.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38616.html">https://www.suse.com/security/cve/CVE-2024-38616.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38617.html">https://www.suse.com/security/cve/CVE-2024-38617.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38618.html">https://www.suse.com/security/cve/CVE-2024-38618.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38619.html">https://www.suse.com/security/cve/CVE-2024-38619.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38621.html">https://www.suse.com/security/cve/CVE-2024-38621.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38622.html">https://www.suse.com/security/cve/CVE-2024-38622.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38627.html">https://www.suse.com/security/cve/CVE-2024-38627.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38628.html">https://www.suse.com/security/cve/CVE-2024-38628.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38629.html">https://www.suse.com/security/cve/CVE-2024-38629.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38630.html">https://www.suse.com/security/cve/CVE-2024-38630.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38633.html">https://www.suse.com/security/cve/CVE-2024-38633.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38634.html">https://www.suse.com/security/cve/CVE-2024-38634.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38635.html">https://www.suse.com/security/cve/CVE-2024-38635.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38636.html">https://www.suse.com/security/cve/CVE-2024-38636.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38659.html">https://www.suse.com/security/cve/CVE-2024-38659.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38661.html">https://www.suse.com/security/cve/CVE-2024-38661.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38663.html">https://www.suse.com/security/cve/CVE-2024-38663.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38664.html">https://www.suse.com/security/cve/CVE-2024-38664.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38780.html">https://www.suse.com/security/cve/CVE-2024-38780.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39276.html">https://www.suse.com/security/cve/CVE-2024-39276.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39277.html">https://www.suse.com/security/cve/CVE-2024-39277.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39291.html">https://www.suse.com/security/cve/CVE-2024-39291.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39296.html">https://www.suse.com/security/cve/CVE-2024-39296.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39301.html">https://www.suse.com/security/cve/CVE-2024-39301.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39362.html">https://www.suse.com/security/cve/CVE-2024-39362.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39371.html">https://www.suse.com/security/cve/CVE-2024-39371.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39463.html">https://www.suse.com/security/cve/CVE-2024-39463.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39466.html">https://www.suse.com/security/cve/CVE-2024-39466.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39468.html">https://www.suse.com/security/cve/CVE-2024-39468.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39469.html">https://www.suse.com/security/cve/CVE-2024-39469.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39471.html">https://www.suse.com/security/cve/CVE-2024-39471.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39472.html">https://www.suse.com/security/cve/CVE-2024-39472.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39473.html">https://www.suse.com/security/cve/CVE-2024-39473.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39474.html">https://www.suse.com/security/cve/CVE-2024-39474.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39475.html">https://www.suse.com/security/cve/CVE-2024-39475.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39479.html">https://www.suse.com/security/cve/CVE-2024-39479.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39481.html">https://www.suse.com/security/cve/CVE-2024-39481.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39482.html">https://www.suse.com/security/cve/CVE-2024-39482.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39487.html">https://www.suse.com/security/cve/CVE-2024-39487.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39490.html">https://www.suse.com/security/cve/CVE-2024-39490.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39494.html">https://www.suse.com/security/cve/CVE-2024-39494.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39496.html">https://www.suse.com/security/cve/CVE-2024-39496.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39498.html">https://www.suse.com/security/cve/CVE-2024-39498.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39502.html">https://www.suse.com/security/cve/CVE-2024-39502.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39504.html">https://www.suse.com/security/cve/CVE-2024-39504.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39507.html">https://www.suse.com/security/cve/CVE-2024-39507.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40901.html">https://www.suse.com/security/cve/CVE-2024-40901.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40906.html">https://www.suse.com/security/cve/CVE-2024-40906.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40908.html">https://www.suse.com/security/cve/CVE-2024-40908.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40919.html">https://www.suse.com/security/cve/CVE-2024-40919.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40923.html">https://www.suse.com/security/cve/CVE-2024-40923.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40925.html">https://www.suse.com/security/cve/CVE-2024-40925.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40928.html">https://www.suse.com/security/cve/CVE-2024-40928.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40931.html">https://www.suse.com/security/cve/CVE-2024-40931.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40935.html">https://www.suse.com/security/cve/CVE-2024-40935.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40937.html">https://www.suse.com/security/cve/CVE-2024-40937.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40940.html">https://www.suse.com/security/cve/CVE-2024-40940.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40947.html">https://www.suse.com/security/cve/CVE-2024-40947.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40948.html">https://www.suse.com/security/cve/CVE-2024-40948.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40953.html">https://www.suse.com/security/cve/CVE-2024-40953.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40960.html">https://www.suse.com/security/cve/CVE-2024-40960.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40961.html">https://www.suse.com/security/cve/CVE-2024-40961.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40966.html">https://www.suse.com/security/cve/CVE-2024-40966.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40970.html">https://www.suse.com/security/cve/CVE-2024-40970.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40972.html">https://www.suse.com/security/cve/CVE-2024-40972.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40975.html">https://www.suse.com/security/cve/CVE-2024-40975.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40979.html">https://www.suse.com/security/cve/CVE-2024-40979.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40998.html">https://www.suse.com/security/cve/CVE-2024-40998.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40999.html">https://www.suse.com/security/cve/CVE-2024-40999.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41006.html">https://www.suse.com/security/cve/CVE-2024-41006.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">https://www.suse.com/security/cve/CVE-2024-41011.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41013.html">https://www.suse.com/security/cve/CVE-2024-41013.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41014.html">https://www.suse.com/security/cve/CVE-2024-41014.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41017.html">https://www.suse.com/security/cve/CVE-2024-41017.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41090.html">https://www.suse.com/security/cve/CVE-2024-41090.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41091.html">https://www.suse.com/security/cve/CVE-2024-41091.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">https://bugzilla.suse.com/show_bug.cgi?id=1012628</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">https://bugzilla.suse.com/show_bug.cgi?id=1065729</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1141539">https://bugzilla.suse.com/show_bug.cgi?id=1141539</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1181674">https://bugzilla.suse.com/show_bug.cgi?id=1181674</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1186716">https://bugzilla.suse.com/show_bug.cgi?id=1186716</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1187716">https://bugzilla.suse.com/show_bug.cgi?id=1187716</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193599">https://bugzilla.suse.com/show_bug.cgi?id=1193599</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195775">https://bugzilla.suse.com/show_bug.cgi?id=1195775</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1204562">https://bugzilla.suse.com/show_bug.cgi?id=1204562</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207948">https://bugzilla.suse.com/show_bug.cgi?id=1207948</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208593">https://bugzilla.suse.com/show_bug.cgi?id=1208593</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">https://bugzilla.suse.com/show_bug.cgi?id=1209657</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209834">https://bugzilla.suse.com/show_bug.cgi?id=1209834</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213573">https://bugzilla.suse.com/show_bug.cgi?id=1213573</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214683">https://bugzilla.suse.com/show_bug.cgi?id=1214683</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214852">https://bugzilla.suse.com/show_bug.cgi?id=1214852</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">https://bugzilla.suse.com/show_bug.cgi?id=1215199</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215587">https://bugzilla.suse.com/show_bug.cgi?id=1215587</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216196">https://bugzilla.suse.com/show_bug.cgi?id=1216196</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216358">https://bugzilla.suse.com/show_bug.cgi?id=1216358</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216436">https://bugzilla.suse.com/show_bug.cgi?id=1216436</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216702">https://bugzilla.suse.com/show_bug.cgi?id=1216702</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217169">https://bugzilla.suse.com/show_bug.cgi?id=1217169</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217384">https://bugzilla.suse.com/show_bug.cgi?id=1217384</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217408">https://bugzilla.suse.com/show_bug.cgi?id=1217408</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217481">https://bugzilla.suse.com/show_bug.cgi?id=1217481</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217750">https://bugzilla.suse.com/show_bug.cgi?id=1217750</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217912">https://bugzilla.suse.com/show_bug.cgi?id=1217912</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218442">https://bugzilla.suse.com/show_bug.cgi?id=1218442</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218447">https://bugzilla.suse.com/show_bug.cgi?id=1218447</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">https://bugzilla.suse.com/show_bug.cgi?id=1218562</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218730">https://bugzilla.suse.com/show_bug.cgi?id=1218730</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218820">https://bugzilla.suse.com/show_bug.cgi?id=1218820</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">https://bugzilla.suse.com/show_bug.cgi?id=1218917</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">https://bugzilla.suse.com/show_bug.cgi?id=1219104</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">https://bugzilla.suse.com/show_bug.cgi?id=1219170</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219216">https://bugzilla.suse.com/show_bug.cgi?id=1219216</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219224">https://bugzilla.suse.com/show_bug.cgi?id=1219224</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219451">https://bugzilla.suse.com/show_bug.cgi?id=1219451</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219478">https://bugzilla.suse.com/show_bug.cgi?id=1219478</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219485">https://bugzilla.suse.com/show_bug.cgi?id=1219485</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219596">https://bugzilla.suse.com/show_bug.cgi?id=1219596</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219633">https://bugzilla.suse.com/show_bug.cgi?id=1219633</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219832">https://bugzilla.suse.com/show_bug.cgi?id=1219832</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219847">https://bugzilla.suse.com/show_bug.cgi?id=1219847</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219953">https://bugzilla.suse.com/show_bug.cgi?id=1219953</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220021">https://bugzilla.suse.com/show_bug.cgi?id=1220021</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220120">https://bugzilla.suse.com/show_bug.cgi?id=1220120</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220138">https://bugzilla.suse.com/show_bug.cgi?id=1220138</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220148">https://bugzilla.suse.com/show_bug.cgi?id=1220148</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220214">https://bugzilla.suse.com/show_bug.cgi?id=1220214</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220328">https://bugzilla.suse.com/show_bug.cgi?id=1220328</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220427">https://bugzilla.suse.com/show_bug.cgi?id=1220427</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220430">https://bugzilla.suse.com/show_bug.cgi?id=1220430</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220569">https://bugzilla.suse.com/show_bug.cgi?id=1220569</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220738">https://bugzilla.suse.com/show_bug.cgi?id=1220738</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220783">https://bugzilla.suse.com/show_bug.cgi?id=1220783</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220942">https://bugzilla.suse.com/show_bug.cgi?id=1220942</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221057">https://bugzilla.suse.com/show_bug.cgi?id=1221057</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221086">https://bugzilla.suse.com/show_bug.cgi?id=1221086</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221097">https://bugzilla.suse.com/show_bug.cgi?id=1221097</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221303">https://bugzilla.suse.com/show_bug.cgi?id=1221303</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221612">https://bugzilla.suse.com/show_bug.cgi?id=1221612</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221615">https://bugzilla.suse.com/show_bug.cgi?id=1221615</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221635">https://bugzilla.suse.com/show_bug.cgi?id=1221635</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">https://bugzilla.suse.com/show_bug.cgi?id=1221645</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221647">https://bugzilla.suse.com/show_bug.cgi?id=1221647</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221649">https://bugzilla.suse.com/show_bug.cgi?id=1221649</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221654">https://bugzilla.suse.com/show_bug.cgi?id=1221654</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221656">https://bugzilla.suse.com/show_bug.cgi?id=1221656</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221659">https://bugzilla.suse.com/show_bug.cgi?id=1221659</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221765">https://bugzilla.suse.com/show_bug.cgi?id=1221765</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221777">https://bugzilla.suse.com/show_bug.cgi?id=1221777</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">https://bugzilla.suse.com/show_bug.cgi?id=1221816</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221829">https://bugzilla.suse.com/show_bug.cgi?id=1221829</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221858">https://bugzilla.suse.com/show_bug.cgi?id=1221858</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221958">https://bugzilla.suse.com/show_bug.cgi?id=1221958</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222011">https://bugzilla.suse.com/show_bug.cgi?id=1222011</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222015">https://bugzilla.suse.com/show_bug.cgi?id=1222015</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222080">https://bugzilla.suse.com/show_bug.cgi?id=1222080</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222241">https://bugzilla.suse.com/show_bug.cgi?id=1222241</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222294">https://bugzilla.suse.com/show_bug.cgi?id=1222294</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222303">https://bugzilla.suse.com/show_bug.cgi?id=1222303</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222326">https://bugzilla.suse.com/show_bug.cgi?id=1222326</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222328">https://bugzilla.suse.com/show_bug.cgi?id=1222328</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222357">https://bugzilla.suse.com/show_bug.cgi?id=1222357</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222368">https://bugzilla.suse.com/show_bug.cgi?id=1222368</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222378">https://bugzilla.suse.com/show_bug.cgi?id=1222378</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222380">https://bugzilla.suse.com/show_bug.cgi?id=1222380</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222385">https://bugzilla.suse.com/show_bug.cgi?id=1222385</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222426">https://bugzilla.suse.com/show_bug.cgi?id=1222426</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222438">https://bugzilla.suse.com/show_bug.cgi?id=1222438</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222459">https://bugzilla.suse.com/show_bug.cgi?id=1222459</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222463">https://bugzilla.suse.com/show_bug.cgi?id=1222463</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222464">https://bugzilla.suse.com/show_bug.cgi?id=1222464</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222532">https://bugzilla.suse.com/show_bug.cgi?id=1222532</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">https://bugzilla.suse.com/show_bug.cgi?id=1222559</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222588">https://bugzilla.suse.com/show_bug.cgi?id=1222588</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222596">https://bugzilla.suse.com/show_bug.cgi?id=1222596</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222608">https://bugzilla.suse.com/show_bug.cgi?id=1222608</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222613">https://bugzilla.suse.com/show_bug.cgi?id=1222613</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222615">https://bugzilla.suse.com/show_bug.cgi?id=1222615</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222617">https://bugzilla.suse.com/show_bug.cgi?id=1222617</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">https://bugzilla.suse.com/show_bug.cgi?id=1222619</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">https://bugzilla.suse.com/show_bug.cgi?id=1222624</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222627">https://bugzilla.suse.com/show_bug.cgi?id=1222627</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222654">https://bugzilla.suse.com/show_bug.cgi?id=1222654</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222721">https://bugzilla.suse.com/show_bug.cgi?id=1222721</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222768">https://bugzilla.suse.com/show_bug.cgi?id=1222768</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222769">https://bugzilla.suse.com/show_bug.cgi?id=1222769</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222771">https://bugzilla.suse.com/show_bug.cgi?id=1222771</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222775">https://bugzilla.suse.com/show_bug.cgi?id=1222775</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222777">https://bugzilla.suse.com/show_bug.cgi?id=1222777</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222779">https://bugzilla.suse.com/show_bug.cgi?id=1222779</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222780">https://bugzilla.suse.com/show_bug.cgi?id=1222780</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222782">https://bugzilla.suse.com/show_bug.cgi?id=1222782</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222793">https://bugzilla.suse.com/show_bug.cgi?id=1222793</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222809">https://bugzilla.suse.com/show_bug.cgi?id=1222809</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222810">https://bugzilla.suse.com/show_bug.cgi?id=1222810</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222893">https://bugzilla.suse.com/show_bug.cgi?id=1222893</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223007">https://bugzilla.suse.com/show_bug.cgi?id=1223007</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223010">https://bugzilla.suse.com/show_bug.cgi?id=1223010</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223011">https://bugzilla.suse.com/show_bug.cgi?id=1223011</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">https://bugzilla.suse.com/show_bug.cgi?id=1223016</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223018">https://bugzilla.suse.com/show_bug.cgi?id=1223018</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223020">https://bugzilla.suse.com/show_bug.cgi?id=1223020</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223021">https://bugzilla.suse.com/show_bug.cgi?id=1223021</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223023">https://bugzilla.suse.com/show_bug.cgi?id=1223023</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223024">https://bugzilla.suse.com/show_bug.cgi?id=1223024</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223035">https://bugzilla.suse.com/show_bug.cgi?id=1223035</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223038">https://bugzilla.suse.com/show_bug.cgi?id=1223038</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223039">https://bugzilla.suse.com/show_bug.cgi?id=1223039</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223041">https://bugzilla.suse.com/show_bug.cgi?id=1223041</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223045">https://bugzilla.suse.com/show_bug.cgi?id=1223045</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223046">https://bugzilla.suse.com/show_bug.cgi?id=1223046</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223051">https://bugzilla.suse.com/show_bug.cgi?id=1223051</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223052">https://bugzilla.suse.com/show_bug.cgi?id=1223052</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223057">https://bugzilla.suse.com/show_bug.cgi?id=1223057</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223058">https://bugzilla.suse.com/show_bug.cgi?id=1223058</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223060">https://bugzilla.suse.com/show_bug.cgi?id=1223060</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223061">https://bugzilla.suse.com/show_bug.cgi?id=1223061</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223062">https://bugzilla.suse.com/show_bug.cgi?id=1223062</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223076">https://bugzilla.suse.com/show_bug.cgi?id=1223076</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223077">https://bugzilla.suse.com/show_bug.cgi?id=1223077</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223084">https://bugzilla.suse.com/show_bug.cgi?id=1223084</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223111">https://bugzilla.suse.com/show_bug.cgi?id=1223111</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223113">https://bugzilla.suse.com/show_bug.cgi?id=1223113</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223137">https://bugzilla.suse.com/show_bug.cgi?id=1223137</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223138">https://bugzilla.suse.com/show_bug.cgi?id=1223138</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223140">https://bugzilla.suse.com/show_bug.cgi?id=1223140</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223143">https://bugzilla.suse.com/show_bug.cgi?id=1223143</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">https://bugzilla.suse.com/show_bug.cgi?id=1223187</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223188">https://bugzilla.suse.com/show_bug.cgi?id=1223188</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223189">https://bugzilla.suse.com/show_bug.cgi?id=1223189</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223190">https://bugzilla.suse.com/show_bug.cgi?id=1223190</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">https://bugzilla.suse.com/show_bug.cgi?id=1223191</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223192">https://bugzilla.suse.com/show_bug.cgi?id=1223192</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223195">https://bugzilla.suse.com/show_bug.cgi?id=1223195</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223196">https://bugzilla.suse.com/show_bug.cgi?id=1223196</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223197">https://bugzilla.suse.com/show_bug.cgi?id=1223197</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223198">https://bugzilla.suse.com/show_bug.cgi?id=1223198</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223202">https://bugzilla.suse.com/show_bug.cgi?id=1223202</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223203">https://bugzilla.suse.com/show_bug.cgi?id=1223203</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223204">https://bugzilla.suse.com/show_bug.cgi?id=1223204</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223205">https://bugzilla.suse.com/show_bug.cgi?id=1223205</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223207">https://bugzilla.suse.com/show_bug.cgi?id=1223207</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223265">https://bugzilla.suse.com/show_bug.cgi?id=1223265</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223285">https://bugzilla.suse.com/show_bug.cgi?id=1223285</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223315">https://bugzilla.suse.com/show_bug.cgi?id=1223315</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223323">https://bugzilla.suse.com/show_bug.cgi?id=1223323</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223338">https://bugzilla.suse.com/show_bug.cgi?id=1223338</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223357">https://bugzilla.suse.com/show_bug.cgi?id=1223357</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223369">https://bugzilla.suse.com/show_bug.cgi?id=1223369</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223380">https://bugzilla.suse.com/show_bug.cgi?id=1223380</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223384">https://bugzilla.suse.com/show_bug.cgi?id=1223384</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223390">https://bugzilla.suse.com/show_bug.cgi?id=1223390</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223415">https://bugzilla.suse.com/show_bug.cgi?id=1223415</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223439">https://bugzilla.suse.com/show_bug.cgi?id=1223439</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223462">https://bugzilla.suse.com/show_bug.cgi?id=1223462</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223525">https://bugzilla.suse.com/show_bug.cgi?id=1223525</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223532">https://bugzilla.suse.com/show_bug.cgi?id=1223532</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223539">https://bugzilla.suse.com/show_bug.cgi?id=1223539</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223570">https://bugzilla.suse.com/show_bug.cgi?id=1223570</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223575">https://bugzilla.suse.com/show_bug.cgi?id=1223575</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223590">https://bugzilla.suse.com/show_bug.cgi?id=1223590</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223591">https://bugzilla.suse.com/show_bug.cgi?id=1223591</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223592">https://bugzilla.suse.com/show_bug.cgi?id=1223592</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223593">https://bugzilla.suse.com/show_bug.cgi?id=1223593</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223625">https://bugzilla.suse.com/show_bug.cgi?id=1223625</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223626">https://bugzilla.suse.com/show_bug.cgi?id=1223626</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223627">https://bugzilla.suse.com/show_bug.cgi?id=1223627</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223629">https://bugzilla.suse.com/show_bug.cgi?id=1223629</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223631">https://bugzilla.suse.com/show_bug.cgi?id=1223631</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223632">https://bugzilla.suse.com/show_bug.cgi?id=1223632</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223633">https://bugzilla.suse.com/show_bug.cgi?id=1223633</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223634">https://bugzilla.suse.com/show_bug.cgi?id=1223634</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223637">https://bugzilla.suse.com/show_bug.cgi?id=1223637</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223638">https://bugzilla.suse.com/show_bug.cgi?id=1223638</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223641">https://bugzilla.suse.com/show_bug.cgi?id=1223641</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223642">https://bugzilla.suse.com/show_bug.cgi?id=1223642</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223643">https://bugzilla.suse.com/show_bug.cgi?id=1223643</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223644">https://bugzilla.suse.com/show_bug.cgi?id=1223644</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223645">https://bugzilla.suse.com/show_bug.cgi?id=1223645</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223646">https://bugzilla.suse.com/show_bug.cgi?id=1223646</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223648">https://bugzilla.suse.com/show_bug.cgi?id=1223648</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223649">https://bugzilla.suse.com/show_bug.cgi?id=1223649</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223650">https://bugzilla.suse.com/show_bug.cgi?id=1223650</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223651">https://bugzilla.suse.com/show_bug.cgi?id=1223651</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223652">https://bugzilla.suse.com/show_bug.cgi?id=1223652</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223653">https://bugzilla.suse.com/show_bug.cgi?id=1223653</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223654">https://bugzilla.suse.com/show_bug.cgi?id=1223654</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223655">https://bugzilla.suse.com/show_bug.cgi?id=1223655</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223657">https://bugzilla.suse.com/show_bug.cgi?id=1223657</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223660">https://bugzilla.suse.com/show_bug.cgi?id=1223660</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223661">https://bugzilla.suse.com/show_bug.cgi?id=1223661</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223663">https://bugzilla.suse.com/show_bug.cgi?id=1223663</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223664">https://bugzilla.suse.com/show_bug.cgi?id=1223664</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223665">https://bugzilla.suse.com/show_bug.cgi?id=1223665</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223666">https://bugzilla.suse.com/show_bug.cgi?id=1223666</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223667">https://bugzilla.suse.com/show_bug.cgi?id=1223667</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223668">https://bugzilla.suse.com/show_bug.cgi?id=1223668</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223669">https://bugzilla.suse.com/show_bug.cgi?id=1223669</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223670">https://bugzilla.suse.com/show_bug.cgi?id=1223670</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223671">https://bugzilla.suse.com/show_bug.cgi?id=1223671</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223675">https://bugzilla.suse.com/show_bug.cgi?id=1223675</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223677">https://bugzilla.suse.com/show_bug.cgi?id=1223677</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223678">https://bugzilla.suse.com/show_bug.cgi?id=1223678</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223679">https://bugzilla.suse.com/show_bug.cgi?id=1223679</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223686">https://bugzilla.suse.com/show_bug.cgi?id=1223686</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223692">https://bugzilla.suse.com/show_bug.cgi?id=1223692</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223693">https://bugzilla.suse.com/show_bug.cgi?id=1223693</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223695">https://bugzilla.suse.com/show_bug.cgi?id=1223695</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223696">https://bugzilla.suse.com/show_bug.cgi?id=1223696</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223698">https://bugzilla.suse.com/show_bug.cgi?id=1223698</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223699">https://bugzilla.suse.com/show_bug.cgi?id=1223699</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223705">https://bugzilla.suse.com/show_bug.cgi?id=1223705</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223709">https://bugzilla.suse.com/show_bug.cgi?id=1223709</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223711">https://bugzilla.suse.com/show_bug.cgi?id=1223711</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223712">https://bugzilla.suse.com/show_bug.cgi?id=1223712</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223714">https://bugzilla.suse.com/show_bug.cgi?id=1223714</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223715">https://bugzilla.suse.com/show_bug.cgi?id=1223715</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223717">https://bugzilla.suse.com/show_bug.cgi?id=1223717</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223718">https://bugzilla.suse.com/show_bug.cgi?id=1223718</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223723">https://bugzilla.suse.com/show_bug.cgi?id=1223723</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223725">https://bugzilla.suse.com/show_bug.cgi?id=1223725</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223728">https://bugzilla.suse.com/show_bug.cgi?id=1223728</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223731">https://bugzilla.suse.com/show_bug.cgi?id=1223731</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223732">https://bugzilla.suse.com/show_bug.cgi?id=1223732</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223734">https://bugzilla.suse.com/show_bug.cgi?id=1223734</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223735">https://bugzilla.suse.com/show_bug.cgi?id=1223735</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223737">https://bugzilla.suse.com/show_bug.cgi?id=1223737</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223738">https://bugzilla.suse.com/show_bug.cgi?id=1223738</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223739">https://bugzilla.suse.com/show_bug.cgi?id=1223739</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223740">https://bugzilla.suse.com/show_bug.cgi?id=1223740</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223741">https://bugzilla.suse.com/show_bug.cgi?id=1223741</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223744">https://bugzilla.suse.com/show_bug.cgi?id=1223744</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223745">https://bugzilla.suse.com/show_bug.cgi?id=1223745</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223747">https://bugzilla.suse.com/show_bug.cgi?id=1223747</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223748">https://bugzilla.suse.com/show_bug.cgi?id=1223748</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223749">https://bugzilla.suse.com/show_bug.cgi?id=1223749</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223750">https://bugzilla.suse.com/show_bug.cgi?id=1223750</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223752">https://bugzilla.suse.com/show_bug.cgi?id=1223752</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223754">https://bugzilla.suse.com/show_bug.cgi?id=1223754</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223756">https://bugzilla.suse.com/show_bug.cgi?id=1223756</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223757">https://bugzilla.suse.com/show_bug.cgi?id=1223757</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223759">https://bugzilla.suse.com/show_bug.cgi?id=1223759</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223760">https://bugzilla.suse.com/show_bug.cgi?id=1223760</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223761">https://bugzilla.suse.com/show_bug.cgi?id=1223761</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223762">https://bugzilla.suse.com/show_bug.cgi?id=1223762</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223764">https://bugzilla.suse.com/show_bug.cgi?id=1223764</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223765">https://bugzilla.suse.com/show_bug.cgi?id=1223765</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223768">https://bugzilla.suse.com/show_bug.cgi?id=1223768</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223769">https://bugzilla.suse.com/show_bug.cgi?id=1223769</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223770">https://bugzilla.suse.com/show_bug.cgi?id=1223770</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223774">https://bugzilla.suse.com/show_bug.cgi?id=1223774</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223776">https://bugzilla.suse.com/show_bug.cgi?id=1223776</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223778">https://bugzilla.suse.com/show_bug.cgi?id=1223778</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223779">https://bugzilla.suse.com/show_bug.cgi?id=1223779</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223780">https://bugzilla.suse.com/show_bug.cgi?id=1223780</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223781">https://bugzilla.suse.com/show_bug.cgi?id=1223781</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223782">https://bugzilla.suse.com/show_bug.cgi?id=1223782</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223787">https://bugzilla.suse.com/show_bug.cgi?id=1223787</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223788">https://bugzilla.suse.com/show_bug.cgi?id=1223788</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223789">https://bugzilla.suse.com/show_bug.cgi?id=1223789</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223790">https://bugzilla.suse.com/show_bug.cgi?id=1223790</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223802">https://bugzilla.suse.com/show_bug.cgi?id=1223802</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223804">https://bugzilla.suse.com/show_bug.cgi?id=1223804</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223805">https://bugzilla.suse.com/show_bug.cgi?id=1223805</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223806">https://bugzilla.suse.com/show_bug.cgi?id=1223806</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223807">https://bugzilla.suse.com/show_bug.cgi?id=1223807</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223808">https://bugzilla.suse.com/show_bug.cgi?id=1223808</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223810">https://bugzilla.suse.com/show_bug.cgi?id=1223810</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223813">https://bugzilla.suse.com/show_bug.cgi?id=1223813</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223815">https://bugzilla.suse.com/show_bug.cgi?id=1223815</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223816">https://bugzilla.suse.com/show_bug.cgi?id=1223816</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223819">https://bugzilla.suse.com/show_bug.cgi?id=1223819</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223821">https://bugzilla.suse.com/show_bug.cgi?id=1223821</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223822">https://bugzilla.suse.com/show_bug.cgi?id=1223822</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223823">https://bugzilla.suse.com/show_bug.cgi?id=1223823</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">https://bugzilla.suse.com/show_bug.cgi?id=1223824</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223826">https://bugzilla.suse.com/show_bug.cgi?id=1223826</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223827">https://bugzilla.suse.com/show_bug.cgi?id=1223827</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223828">https://bugzilla.suse.com/show_bug.cgi?id=1223828</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223829">https://bugzilla.suse.com/show_bug.cgi?id=1223829</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223831">https://bugzilla.suse.com/show_bug.cgi?id=1223831</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223834">https://bugzilla.suse.com/show_bug.cgi?id=1223834</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223836">https://bugzilla.suse.com/show_bug.cgi?id=1223836</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223837">https://bugzilla.suse.com/show_bug.cgi?id=1223837</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223838">https://bugzilla.suse.com/show_bug.cgi?id=1223838</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223842">https://bugzilla.suse.com/show_bug.cgi?id=1223842</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223843">https://bugzilla.suse.com/show_bug.cgi?id=1223843</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223844">https://bugzilla.suse.com/show_bug.cgi?id=1223844</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223847">https://bugzilla.suse.com/show_bug.cgi?id=1223847</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223863">https://bugzilla.suse.com/show_bug.cgi?id=1223863</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223869">https://bugzilla.suse.com/show_bug.cgi?id=1223869</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223870">https://bugzilla.suse.com/show_bug.cgi?id=1223870</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223871">https://bugzilla.suse.com/show_bug.cgi?id=1223871</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223872">https://bugzilla.suse.com/show_bug.cgi?id=1223872</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223874">https://bugzilla.suse.com/show_bug.cgi?id=1223874</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223944">https://bugzilla.suse.com/show_bug.cgi?id=1223944</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223945">https://bugzilla.suse.com/show_bug.cgi?id=1223945</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223946">https://bugzilla.suse.com/show_bug.cgi?id=1223946</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223991">https://bugzilla.suse.com/show_bug.cgi?id=1223991</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224049">https://bugzilla.suse.com/show_bug.cgi?id=1224049</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224076">https://bugzilla.suse.com/show_bug.cgi?id=1224076</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224096">https://bugzilla.suse.com/show_bug.cgi?id=1224096</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224098">https://bugzilla.suse.com/show_bug.cgi?id=1224098</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224099">https://bugzilla.suse.com/show_bug.cgi?id=1224099</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224137">https://bugzilla.suse.com/show_bug.cgi?id=1224137</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224166">https://bugzilla.suse.com/show_bug.cgi?id=1224166</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224174">https://bugzilla.suse.com/show_bug.cgi?id=1224174</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224177">https://bugzilla.suse.com/show_bug.cgi?id=1224177</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224180">https://bugzilla.suse.com/show_bug.cgi?id=1224180</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224181">https://bugzilla.suse.com/show_bug.cgi?id=1224181</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224187">https://bugzilla.suse.com/show_bug.cgi?id=1224187</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224331">https://bugzilla.suse.com/show_bug.cgi?id=1224331</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224348">https://bugzilla.suse.com/show_bug.cgi?id=1224348</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224414">https://bugzilla.suse.com/show_bug.cgi?id=1224414</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224422">https://bugzilla.suse.com/show_bug.cgi?id=1224422</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224423">https://bugzilla.suse.com/show_bug.cgi?id=1224423</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224429">https://bugzilla.suse.com/show_bug.cgi?id=1224429</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224430">https://bugzilla.suse.com/show_bug.cgi?id=1224430</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224432">https://bugzilla.suse.com/show_bug.cgi?id=1224432</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224433">https://bugzilla.suse.com/show_bug.cgi?id=1224433</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224437">https://bugzilla.suse.com/show_bug.cgi?id=1224437</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224438">https://bugzilla.suse.com/show_bug.cgi?id=1224438</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224439">https://bugzilla.suse.com/show_bug.cgi?id=1224439</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224442">https://bugzilla.suse.com/show_bug.cgi?id=1224442</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224443">https://bugzilla.suse.com/show_bug.cgi?id=1224443</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224445">https://bugzilla.suse.com/show_bug.cgi?id=1224445</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224449">https://bugzilla.suse.com/show_bug.cgi?id=1224449</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224477">https://bugzilla.suse.com/show_bug.cgi?id=1224477</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224479">https://bugzilla.suse.com/show_bug.cgi?id=1224479</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224480">https://bugzilla.suse.com/show_bug.cgi?id=1224480</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224481">https://bugzilla.suse.com/show_bug.cgi?id=1224481</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224482">https://bugzilla.suse.com/show_bug.cgi?id=1224482</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224486">https://bugzilla.suse.com/show_bug.cgi?id=1224486</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224487">https://bugzilla.suse.com/show_bug.cgi?id=1224487</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224488">https://bugzilla.suse.com/show_bug.cgi?id=1224488</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224490">https://bugzilla.suse.com/show_bug.cgi?id=1224490</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224491">https://bugzilla.suse.com/show_bug.cgi?id=1224491</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224492">https://bugzilla.suse.com/show_bug.cgi?id=1224492</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224493">https://bugzilla.suse.com/show_bug.cgi?id=1224493</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224494">https://bugzilla.suse.com/show_bug.cgi?id=1224494</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224495">https://bugzilla.suse.com/show_bug.cgi?id=1224495</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224497">https://bugzilla.suse.com/show_bug.cgi?id=1224497</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224498">https://bugzilla.suse.com/show_bug.cgi?id=1224498</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224499">https://bugzilla.suse.com/show_bug.cgi?id=1224499</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">https://bugzilla.suse.com/show_bug.cgi?id=1224500</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224501">https://bugzilla.suse.com/show_bug.cgi?id=1224501</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224502">https://bugzilla.suse.com/show_bug.cgi?id=1224502</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224504">https://bugzilla.suse.com/show_bug.cgi?id=1224504</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224505">https://bugzilla.suse.com/show_bug.cgi?id=1224505</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224506">https://bugzilla.suse.com/show_bug.cgi?id=1224506</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224507">https://bugzilla.suse.com/show_bug.cgi?id=1224507</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224508">https://bugzilla.suse.com/show_bug.cgi?id=1224508</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224509">https://bugzilla.suse.com/show_bug.cgi?id=1224509</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224511">https://bugzilla.suse.com/show_bug.cgi?id=1224511</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224512">https://bugzilla.suse.com/show_bug.cgi?id=1224512</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224513">https://bugzilla.suse.com/show_bug.cgi?id=1224513</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224515">https://bugzilla.suse.com/show_bug.cgi?id=1224515</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224516">https://bugzilla.suse.com/show_bug.cgi?id=1224516</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224517">https://bugzilla.suse.com/show_bug.cgi?id=1224517</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224519">https://bugzilla.suse.com/show_bug.cgi?id=1224519</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224520">https://bugzilla.suse.com/show_bug.cgi?id=1224520</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224521">https://bugzilla.suse.com/show_bug.cgi?id=1224521</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224523">https://bugzilla.suse.com/show_bug.cgi?id=1224523</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224524">https://bugzilla.suse.com/show_bug.cgi?id=1224524</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224525">https://bugzilla.suse.com/show_bug.cgi?id=1224525</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224526">https://bugzilla.suse.com/show_bug.cgi?id=1224526</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224530">https://bugzilla.suse.com/show_bug.cgi?id=1224530</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224531">https://bugzilla.suse.com/show_bug.cgi?id=1224531</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224534">https://bugzilla.suse.com/show_bug.cgi?id=1224534</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224537">https://bugzilla.suse.com/show_bug.cgi?id=1224537</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224539">https://bugzilla.suse.com/show_bug.cgi?id=1224539</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224540">https://bugzilla.suse.com/show_bug.cgi?id=1224540</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224541">https://bugzilla.suse.com/show_bug.cgi?id=1224541</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224542">https://bugzilla.suse.com/show_bug.cgi?id=1224542</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224543">https://bugzilla.suse.com/show_bug.cgi?id=1224543</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224544">https://bugzilla.suse.com/show_bug.cgi?id=1224544</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224545">https://bugzilla.suse.com/show_bug.cgi?id=1224545</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224546">https://bugzilla.suse.com/show_bug.cgi?id=1224546</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224549">https://bugzilla.suse.com/show_bug.cgi?id=1224549</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224550">https://bugzilla.suse.com/show_bug.cgi?id=1224550</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224552">https://bugzilla.suse.com/show_bug.cgi?id=1224552</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224553">https://bugzilla.suse.com/show_bug.cgi?id=1224553</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224555">https://bugzilla.suse.com/show_bug.cgi?id=1224555</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">https://bugzilla.suse.com/show_bug.cgi?id=1224557</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224558">https://bugzilla.suse.com/show_bug.cgi?id=1224558</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224559">https://bugzilla.suse.com/show_bug.cgi?id=1224559</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224562">https://bugzilla.suse.com/show_bug.cgi?id=1224562</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224565">https://bugzilla.suse.com/show_bug.cgi?id=1224565</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224566">https://bugzilla.suse.com/show_bug.cgi?id=1224566</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224567">https://bugzilla.suse.com/show_bug.cgi?id=1224567</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224568">https://bugzilla.suse.com/show_bug.cgi?id=1224568</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224569">https://bugzilla.suse.com/show_bug.cgi?id=1224569</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224571">https://bugzilla.suse.com/show_bug.cgi?id=1224571</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224572">https://bugzilla.suse.com/show_bug.cgi?id=1224572</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224573">https://bugzilla.suse.com/show_bug.cgi?id=1224573</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224575">https://bugzilla.suse.com/show_bug.cgi?id=1224575</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224576">https://bugzilla.suse.com/show_bug.cgi?id=1224576</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224577">https://bugzilla.suse.com/show_bug.cgi?id=1224577</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224578">https://bugzilla.suse.com/show_bug.cgi?id=1224578</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224579">https://bugzilla.suse.com/show_bug.cgi?id=1224579</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224580">https://bugzilla.suse.com/show_bug.cgi?id=1224580</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224581">https://bugzilla.suse.com/show_bug.cgi?id=1224581</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224582">https://bugzilla.suse.com/show_bug.cgi?id=1224582</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224583">https://bugzilla.suse.com/show_bug.cgi?id=1224583</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224584">https://bugzilla.suse.com/show_bug.cgi?id=1224584</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224585">https://bugzilla.suse.com/show_bug.cgi?id=1224585</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224586">https://bugzilla.suse.com/show_bug.cgi?id=1224586</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224587">https://bugzilla.suse.com/show_bug.cgi?id=1224587</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224588">https://bugzilla.suse.com/show_bug.cgi?id=1224588</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224589">https://bugzilla.suse.com/show_bug.cgi?id=1224589</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224592">https://bugzilla.suse.com/show_bug.cgi?id=1224592</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224596">https://bugzilla.suse.com/show_bug.cgi?id=1224596</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224598">https://bugzilla.suse.com/show_bug.cgi?id=1224598</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224600">https://bugzilla.suse.com/show_bug.cgi?id=1224600</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224601">https://bugzilla.suse.com/show_bug.cgi?id=1224601</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224602">https://bugzilla.suse.com/show_bug.cgi?id=1224602</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224603">https://bugzilla.suse.com/show_bug.cgi?id=1224603</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224604">https://bugzilla.suse.com/show_bug.cgi?id=1224604</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224605">https://bugzilla.suse.com/show_bug.cgi?id=1224605</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224606">https://bugzilla.suse.com/show_bug.cgi?id=1224606</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224607">https://bugzilla.suse.com/show_bug.cgi?id=1224607</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224608">https://bugzilla.suse.com/show_bug.cgi?id=1224608</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224609">https://bugzilla.suse.com/show_bug.cgi?id=1224609</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224611">https://bugzilla.suse.com/show_bug.cgi?id=1224611</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224612">https://bugzilla.suse.com/show_bug.cgi?id=1224612</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224613">https://bugzilla.suse.com/show_bug.cgi?id=1224613</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224614">https://bugzilla.suse.com/show_bug.cgi?id=1224614</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224615">https://bugzilla.suse.com/show_bug.cgi?id=1224615</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224617">https://bugzilla.suse.com/show_bug.cgi?id=1224617</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224618">https://bugzilla.suse.com/show_bug.cgi?id=1224618</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224619">https://bugzilla.suse.com/show_bug.cgi?id=1224619</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224620">https://bugzilla.suse.com/show_bug.cgi?id=1224620</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224621">https://bugzilla.suse.com/show_bug.cgi?id=1224621</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224622">https://bugzilla.suse.com/show_bug.cgi?id=1224622</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224623">https://bugzilla.suse.com/show_bug.cgi?id=1224623</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224624">https://bugzilla.suse.com/show_bug.cgi?id=1224624</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224626">https://bugzilla.suse.com/show_bug.cgi?id=1224626</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224627">https://bugzilla.suse.com/show_bug.cgi?id=1224627</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224628">https://bugzilla.suse.com/show_bug.cgi?id=1224628</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224629">https://bugzilla.suse.com/show_bug.cgi?id=1224629</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224630">https://bugzilla.suse.com/show_bug.cgi?id=1224630</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224632">https://bugzilla.suse.com/show_bug.cgi?id=1224632</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224633">https://bugzilla.suse.com/show_bug.cgi?id=1224633</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224634">https://bugzilla.suse.com/show_bug.cgi?id=1224634</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">https://bugzilla.suse.com/show_bug.cgi?id=1224636</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224637">https://bugzilla.suse.com/show_bug.cgi?id=1224637</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224638">https://bugzilla.suse.com/show_bug.cgi?id=1224638</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224639">https://bugzilla.suse.com/show_bug.cgi?id=1224639</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224640">https://bugzilla.suse.com/show_bug.cgi?id=1224640</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224641">https://bugzilla.suse.com/show_bug.cgi?id=1224641</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224643">https://bugzilla.suse.com/show_bug.cgi?id=1224643</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224644">https://bugzilla.suse.com/show_bug.cgi?id=1224644</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224645">https://bugzilla.suse.com/show_bug.cgi?id=1224645</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224646">https://bugzilla.suse.com/show_bug.cgi?id=1224646</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224647">https://bugzilla.suse.com/show_bug.cgi?id=1224647</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224648">https://bugzilla.suse.com/show_bug.cgi?id=1224648</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224649">https://bugzilla.suse.com/show_bug.cgi?id=1224649</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224650">https://bugzilla.suse.com/show_bug.cgi?id=1224650</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224651">https://bugzilla.suse.com/show_bug.cgi?id=1224651</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224652">https://bugzilla.suse.com/show_bug.cgi?id=1224652</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224653">https://bugzilla.suse.com/show_bug.cgi?id=1224653</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224654">https://bugzilla.suse.com/show_bug.cgi?id=1224654</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224655">https://bugzilla.suse.com/show_bug.cgi?id=1224655</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224657">https://bugzilla.suse.com/show_bug.cgi?id=1224657</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224659">https://bugzilla.suse.com/show_bug.cgi?id=1224659</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224660">https://bugzilla.suse.com/show_bug.cgi?id=1224660</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224661">https://bugzilla.suse.com/show_bug.cgi?id=1224661</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224662">https://bugzilla.suse.com/show_bug.cgi?id=1224662</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224663">https://bugzilla.suse.com/show_bug.cgi?id=1224663</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224664">https://bugzilla.suse.com/show_bug.cgi?id=1224664</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224665">https://bugzilla.suse.com/show_bug.cgi?id=1224665</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224666">https://bugzilla.suse.com/show_bug.cgi?id=1224666</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224667">https://bugzilla.suse.com/show_bug.cgi?id=1224667</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224668">https://bugzilla.suse.com/show_bug.cgi?id=1224668</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224670">https://bugzilla.suse.com/show_bug.cgi?id=1224670</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224671">https://bugzilla.suse.com/show_bug.cgi?id=1224671</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224672">https://bugzilla.suse.com/show_bug.cgi?id=1224672</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224673">https://bugzilla.suse.com/show_bug.cgi?id=1224673</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224675">https://bugzilla.suse.com/show_bug.cgi?id=1224675</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224676">https://bugzilla.suse.com/show_bug.cgi?id=1224676</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224677">https://bugzilla.suse.com/show_bug.cgi?id=1224677</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224678">https://bugzilla.suse.com/show_bug.cgi?id=1224678</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224679">https://bugzilla.suse.com/show_bug.cgi?id=1224679</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224680">https://bugzilla.suse.com/show_bug.cgi?id=1224680</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224681">https://bugzilla.suse.com/show_bug.cgi?id=1224681</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224682">https://bugzilla.suse.com/show_bug.cgi?id=1224682</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">https://bugzilla.suse.com/show_bug.cgi?id=1224683</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224685">https://bugzilla.suse.com/show_bug.cgi?id=1224685</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224686">https://bugzilla.suse.com/show_bug.cgi?id=1224686</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224687">https://bugzilla.suse.com/show_bug.cgi?id=1224687</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224688">https://bugzilla.suse.com/show_bug.cgi?id=1224688</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224692">https://bugzilla.suse.com/show_bug.cgi?id=1224692</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224696">https://bugzilla.suse.com/show_bug.cgi?id=1224696</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224697">https://bugzilla.suse.com/show_bug.cgi?id=1224697</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224698">https://bugzilla.suse.com/show_bug.cgi?id=1224698</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224699">https://bugzilla.suse.com/show_bug.cgi?id=1224699</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224701">https://bugzilla.suse.com/show_bug.cgi?id=1224701</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224703">https://bugzilla.suse.com/show_bug.cgi?id=1224703</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224704">https://bugzilla.suse.com/show_bug.cgi?id=1224704</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224705">https://bugzilla.suse.com/show_bug.cgi?id=1224705</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224706">https://bugzilla.suse.com/show_bug.cgi?id=1224706</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224707">https://bugzilla.suse.com/show_bug.cgi?id=1224707</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224709">https://bugzilla.suse.com/show_bug.cgi?id=1224709</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224710">https://bugzilla.suse.com/show_bug.cgi?id=1224710</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224712">https://bugzilla.suse.com/show_bug.cgi?id=1224712</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224714">https://bugzilla.suse.com/show_bug.cgi?id=1224714</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224716">https://bugzilla.suse.com/show_bug.cgi?id=1224716</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224717">https://bugzilla.suse.com/show_bug.cgi?id=1224717</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224718">https://bugzilla.suse.com/show_bug.cgi?id=1224718</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224719">https://bugzilla.suse.com/show_bug.cgi?id=1224719</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224720">https://bugzilla.suse.com/show_bug.cgi?id=1224720</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224721">https://bugzilla.suse.com/show_bug.cgi?id=1224721</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224722">https://bugzilla.suse.com/show_bug.cgi?id=1224722</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224723">https://bugzilla.suse.com/show_bug.cgi?id=1224723</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224725">https://bugzilla.suse.com/show_bug.cgi?id=1224725</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224727">https://bugzilla.suse.com/show_bug.cgi?id=1224727</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224728">https://bugzilla.suse.com/show_bug.cgi?id=1224728</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224729">https://bugzilla.suse.com/show_bug.cgi?id=1224729</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224730">https://bugzilla.suse.com/show_bug.cgi?id=1224730</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224731">https://bugzilla.suse.com/show_bug.cgi?id=1224731</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224732">https://bugzilla.suse.com/show_bug.cgi?id=1224732</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224733">https://bugzilla.suse.com/show_bug.cgi?id=1224733</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224735">https://bugzilla.suse.com/show_bug.cgi?id=1224735</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224736">https://bugzilla.suse.com/show_bug.cgi?id=1224736</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224738">https://bugzilla.suse.com/show_bug.cgi?id=1224738</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224739">https://bugzilla.suse.com/show_bug.cgi?id=1224739</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224740">https://bugzilla.suse.com/show_bug.cgi?id=1224740</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224741">https://bugzilla.suse.com/show_bug.cgi?id=1224741</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224742">https://bugzilla.suse.com/show_bug.cgi?id=1224742</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224743">https://bugzilla.suse.com/show_bug.cgi?id=1224743</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224747">https://bugzilla.suse.com/show_bug.cgi?id=1224747</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224749">https://bugzilla.suse.com/show_bug.cgi?id=1224749</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224751">https://bugzilla.suse.com/show_bug.cgi?id=1224751</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224763">https://bugzilla.suse.com/show_bug.cgi?id=1224763</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224764">https://bugzilla.suse.com/show_bug.cgi?id=1224764</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224765">https://bugzilla.suse.com/show_bug.cgi?id=1224765</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224766">https://bugzilla.suse.com/show_bug.cgi?id=1224766</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224767">https://bugzilla.suse.com/show_bug.cgi?id=1224767</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224790">https://bugzilla.suse.com/show_bug.cgi?id=1224790</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224792">https://bugzilla.suse.com/show_bug.cgi?id=1224792</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224793">https://bugzilla.suse.com/show_bug.cgi?id=1224793</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224803">https://bugzilla.suse.com/show_bug.cgi?id=1224803</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224804">https://bugzilla.suse.com/show_bug.cgi?id=1224804</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224866">https://bugzilla.suse.com/show_bug.cgi?id=1224866</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224928">https://bugzilla.suse.com/show_bug.cgi?id=1224928</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224930">https://bugzilla.suse.com/show_bug.cgi?id=1224930</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224932">https://bugzilla.suse.com/show_bug.cgi?id=1224932</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224933">https://bugzilla.suse.com/show_bug.cgi?id=1224933</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224935">https://bugzilla.suse.com/show_bug.cgi?id=1224935</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224936">https://bugzilla.suse.com/show_bug.cgi?id=1224936</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224937">https://bugzilla.suse.com/show_bug.cgi?id=1224937</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224939">https://bugzilla.suse.com/show_bug.cgi?id=1224939</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224941">https://bugzilla.suse.com/show_bug.cgi?id=1224941</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224944">https://bugzilla.suse.com/show_bug.cgi?id=1224944</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224946">https://bugzilla.suse.com/show_bug.cgi?id=1224946</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224947">https://bugzilla.suse.com/show_bug.cgi?id=1224947</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224949">https://bugzilla.suse.com/show_bug.cgi?id=1224949</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224951">https://bugzilla.suse.com/show_bug.cgi?id=1224951</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224988">https://bugzilla.suse.com/show_bug.cgi?id=1224988</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224989">https://bugzilla.suse.com/show_bug.cgi?id=1224989</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224992">https://bugzilla.suse.com/show_bug.cgi?id=1224992</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224998">https://bugzilla.suse.com/show_bug.cgi?id=1224998</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225000">https://bugzilla.suse.com/show_bug.cgi?id=1225000</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225001">https://bugzilla.suse.com/show_bug.cgi?id=1225001</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225004">https://bugzilla.suse.com/show_bug.cgi?id=1225004</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225006">https://bugzilla.suse.com/show_bug.cgi?id=1225006</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225007">https://bugzilla.suse.com/show_bug.cgi?id=1225007</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225008">https://bugzilla.suse.com/show_bug.cgi?id=1225008</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225009">https://bugzilla.suse.com/show_bug.cgi?id=1225009</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225014">https://bugzilla.suse.com/show_bug.cgi?id=1225014</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225015">https://bugzilla.suse.com/show_bug.cgi?id=1225015</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225022">https://bugzilla.suse.com/show_bug.cgi?id=1225022</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225025">https://bugzilla.suse.com/show_bug.cgi?id=1225025</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225028">https://bugzilla.suse.com/show_bug.cgi?id=1225028</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225029">https://bugzilla.suse.com/show_bug.cgi?id=1225029</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225031">https://bugzilla.suse.com/show_bug.cgi?id=1225031</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225036">https://bugzilla.suse.com/show_bug.cgi?id=1225036</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225041">https://bugzilla.suse.com/show_bug.cgi?id=1225041</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225044">https://bugzilla.suse.com/show_bug.cgi?id=1225044</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225049">https://bugzilla.suse.com/show_bug.cgi?id=1225049</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225050">https://bugzilla.suse.com/show_bug.cgi?id=1225050</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225053">https://bugzilla.suse.com/show_bug.cgi?id=1225053</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225076">https://bugzilla.suse.com/show_bug.cgi?id=1225076</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225077">https://bugzilla.suse.com/show_bug.cgi?id=1225077</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225078">https://bugzilla.suse.com/show_bug.cgi?id=1225078</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225081">https://bugzilla.suse.com/show_bug.cgi?id=1225081</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225085">https://bugzilla.suse.com/show_bug.cgi?id=1225085</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225086">https://bugzilla.suse.com/show_bug.cgi?id=1225086</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225088">https://bugzilla.suse.com/show_bug.cgi?id=1225088</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225090">https://bugzilla.suse.com/show_bug.cgi?id=1225090</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225092">https://bugzilla.suse.com/show_bug.cgi?id=1225092</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225096">https://bugzilla.suse.com/show_bug.cgi?id=1225096</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225097">https://bugzilla.suse.com/show_bug.cgi?id=1225097</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225098">https://bugzilla.suse.com/show_bug.cgi?id=1225098</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225101">https://bugzilla.suse.com/show_bug.cgi?id=1225101</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225103">https://bugzilla.suse.com/show_bug.cgi?id=1225103</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225104">https://bugzilla.suse.com/show_bug.cgi?id=1225104</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225105">https://bugzilla.suse.com/show_bug.cgi?id=1225105</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225106">https://bugzilla.suse.com/show_bug.cgi?id=1225106</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225108">https://bugzilla.suse.com/show_bug.cgi?id=1225108</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225120">https://bugzilla.suse.com/show_bug.cgi?id=1225120</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225132">https://bugzilla.suse.com/show_bug.cgi?id=1225132</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225133">https://bugzilla.suse.com/show_bug.cgi?id=1225133</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225134">https://bugzilla.suse.com/show_bug.cgi?id=1225134</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225136">https://bugzilla.suse.com/show_bug.cgi?id=1225136</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225172">https://bugzilla.suse.com/show_bug.cgi?id=1225172</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225180">https://bugzilla.suse.com/show_bug.cgi?id=1225180</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225272">https://bugzilla.suse.com/show_bug.cgi?id=1225272</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225300">https://bugzilla.suse.com/show_bug.cgi?id=1225300</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225391">https://bugzilla.suse.com/show_bug.cgi?id=1225391</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225472">https://bugzilla.suse.com/show_bug.cgi?id=1225472</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">https://bugzilla.suse.com/show_bug.cgi?id=1225475</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225476">https://bugzilla.suse.com/show_bug.cgi?id=1225476</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225477">https://bugzilla.suse.com/show_bug.cgi?id=1225477</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225478">https://bugzilla.suse.com/show_bug.cgi?id=1225478</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225485">https://bugzilla.suse.com/show_bug.cgi?id=1225485</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225489">https://bugzilla.suse.com/show_bug.cgi?id=1225489</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225490">https://bugzilla.suse.com/show_bug.cgi?id=1225490</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225502">https://bugzilla.suse.com/show_bug.cgi?id=1225502</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225527">https://bugzilla.suse.com/show_bug.cgi?id=1225527</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225529">https://bugzilla.suse.com/show_bug.cgi?id=1225529</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225530">https://bugzilla.suse.com/show_bug.cgi?id=1225530</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225532">https://bugzilla.suse.com/show_bug.cgi?id=1225532</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225534">https://bugzilla.suse.com/show_bug.cgi?id=1225534</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225548">https://bugzilla.suse.com/show_bug.cgi?id=1225548</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225550">https://bugzilla.suse.com/show_bug.cgi?id=1225550</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225553">https://bugzilla.suse.com/show_bug.cgi?id=1225553</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225554">https://bugzilla.suse.com/show_bug.cgi?id=1225554</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225555">https://bugzilla.suse.com/show_bug.cgi?id=1225555</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225556">https://bugzilla.suse.com/show_bug.cgi?id=1225556</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225557">https://bugzilla.suse.com/show_bug.cgi?id=1225557</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225559">https://bugzilla.suse.com/show_bug.cgi?id=1225559</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225560">https://bugzilla.suse.com/show_bug.cgi?id=1225560</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225564">https://bugzilla.suse.com/show_bug.cgi?id=1225564</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225565">https://bugzilla.suse.com/show_bug.cgi?id=1225565</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225566">https://bugzilla.suse.com/show_bug.cgi?id=1225566</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225568">https://bugzilla.suse.com/show_bug.cgi?id=1225568</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225569">https://bugzilla.suse.com/show_bug.cgi?id=1225569</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225570">https://bugzilla.suse.com/show_bug.cgi?id=1225570</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225571">https://bugzilla.suse.com/show_bug.cgi?id=1225571</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225572">https://bugzilla.suse.com/show_bug.cgi?id=1225572</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225573">https://bugzilla.suse.com/show_bug.cgi?id=1225573</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225577">https://bugzilla.suse.com/show_bug.cgi?id=1225577</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225578">https://bugzilla.suse.com/show_bug.cgi?id=1225578</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225579">https://bugzilla.suse.com/show_bug.cgi?id=1225579</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225580">https://bugzilla.suse.com/show_bug.cgi?id=1225580</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225581">https://bugzilla.suse.com/show_bug.cgi?id=1225581</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225583">https://bugzilla.suse.com/show_bug.cgi?id=1225583</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225584">https://bugzilla.suse.com/show_bug.cgi?id=1225584</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225585">https://bugzilla.suse.com/show_bug.cgi?id=1225585</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225586">https://bugzilla.suse.com/show_bug.cgi?id=1225586</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225587">https://bugzilla.suse.com/show_bug.cgi?id=1225587</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225588">https://bugzilla.suse.com/show_bug.cgi?id=1225588</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225589">https://bugzilla.suse.com/show_bug.cgi?id=1225589</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225590">https://bugzilla.suse.com/show_bug.cgi?id=1225590</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225591">https://bugzilla.suse.com/show_bug.cgi?id=1225591</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225592">https://bugzilla.suse.com/show_bug.cgi?id=1225592</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225593">https://bugzilla.suse.com/show_bug.cgi?id=1225593</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225594">https://bugzilla.suse.com/show_bug.cgi?id=1225594</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225595">https://bugzilla.suse.com/show_bug.cgi?id=1225595</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225599">https://bugzilla.suse.com/show_bug.cgi?id=1225599</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225600">https://bugzilla.suse.com/show_bug.cgi?id=1225600</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225601">https://bugzilla.suse.com/show_bug.cgi?id=1225601</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225602">https://bugzilla.suse.com/show_bug.cgi?id=1225602</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225605">https://bugzilla.suse.com/show_bug.cgi?id=1225605</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225607">https://bugzilla.suse.com/show_bug.cgi?id=1225607</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225609">https://bugzilla.suse.com/show_bug.cgi?id=1225609</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225610">https://bugzilla.suse.com/show_bug.cgi?id=1225610</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225611">https://bugzilla.suse.com/show_bug.cgi?id=1225611</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225616">https://bugzilla.suse.com/show_bug.cgi?id=1225616</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225618">https://bugzilla.suse.com/show_bug.cgi?id=1225618</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225640">https://bugzilla.suse.com/show_bug.cgi?id=1225640</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225642">https://bugzilla.suse.com/show_bug.cgi?id=1225642</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225681">https://bugzilla.suse.com/show_bug.cgi?id=1225681</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225692">https://bugzilla.suse.com/show_bug.cgi?id=1225692</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225694">https://bugzilla.suse.com/show_bug.cgi?id=1225694</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225695">https://bugzilla.suse.com/show_bug.cgi?id=1225695</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225696">https://bugzilla.suse.com/show_bug.cgi?id=1225696</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225698">https://bugzilla.suse.com/show_bug.cgi?id=1225698</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225699">https://bugzilla.suse.com/show_bug.cgi?id=1225699</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225702">https://bugzilla.suse.com/show_bug.cgi?id=1225702</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225704">https://bugzilla.suse.com/show_bug.cgi?id=1225704</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225705">https://bugzilla.suse.com/show_bug.cgi?id=1225705</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225708">https://bugzilla.suse.com/show_bug.cgi?id=1225708</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225710">https://bugzilla.suse.com/show_bug.cgi?id=1225710</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225711">https://bugzilla.suse.com/show_bug.cgi?id=1225711</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225712">https://bugzilla.suse.com/show_bug.cgi?id=1225712</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225714">https://bugzilla.suse.com/show_bug.cgi?id=1225714</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225715">https://bugzilla.suse.com/show_bug.cgi?id=1225715</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225717">https://bugzilla.suse.com/show_bug.cgi?id=1225717</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225719">https://bugzilla.suse.com/show_bug.cgi?id=1225719</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225720">https://bugzilla.suse.com/show_bug.cgi?id=1225720</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225722">https://bugzilla.suse.com/show_bug.cgi?id=1225722</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225723">https://bugzilla.suse.com/show_bug.cgi?id=1225723</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225726">https://bugzilla.suse.com/show_bug.cgi?id=1225726</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225728">https://bugzilla.suse.com/show_bug.cgi?id=1225728</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225731">https://bugzilla.suse.com/show_bug.cgi?id=1225731</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225732">https://bugzilla.suse.com/show_bug.cgi?id=1225732</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225734">https://bugzilla.suse.com/show_bug.cgi?id=1225734</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225735">https://bugzilla.suse.com/show_bug.cgi?id=1225735</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225736">https://bugzilla.suse.com/show_bug.cgi?id=1225736</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225737">https://bugzilla.suse.com/show_bug.cgi?id=1225737</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225741">https://bugzilla.suse.com/show_bug.cgi?id=1225741</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225744">https://bugzilla.suse.com/show_bug.cgi?id=1225744</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225745">https://bugzilla.suse.com/show_bug.cgi?id=1225745</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225746">https://bugzilla.suse.com/show_bug.cgi?id=1225746</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225747">https://bugzilla.suse.com/show_bug.cgi?id=1225747</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225748">https://bugzilla.suse.com/show_bug.cgi?id=1225748</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225749">https://bugzilla.suse.com/show_bug.cgi?id=1225749</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225750">https://bugzilla.suse.com/show_bug.cgi?id=1225750</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225752">https://bugzilla.suse.com/show_bug.cgi?id=1225752</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225753">https://bugzilla.suse.com/show_bug.cgi?id=1225753</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225756">https://bugzilla.suse.com/show_bug.cgi?id=1225756</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225757">https://bugzilla.suse.com/show_bug.cgi?id=1225757</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225758">https://bugzilla.suse.com/show_bug.cgi?id=1225758</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225759">https://bugzilla.suse.com/show_bug.cgi?id=1225759</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225760">https://bugzilla.suse.com/show_bug.cgi?id=1225760</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225761">https://bugzilla.suse.com/show_bug.cgi?id=1225761</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225762">https://bugzilla.suse.com/show_bug.cgi?id=1225762</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225763">https://bugzilla.suse.com/show_bug.cgi?id=1225763</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225765">https://bugzilla.suse.com/show_bug.cgi?id=1225765</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225766">https://bugzilla.suse.com/show_bug.cgi?id=1225766</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225767">https://bugzilla.suse.com/show_bug.cgi?id=1225767</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225769">https://bugzilla.suse.com/show_bug.cgi?id=1225769</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225770">https://bugzilla.suse.com/show_bug.cgi?id=1225770</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225773">https://bugzilla.suse.com/show_bug.cgi?id=1225773</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225775">https://bugzilla.suse.com/show_bug.cgi?id=1225775</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225805">https://bugzilla.suse.com/show_bug.cgi?id=1225805</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225810">https://bugzilla.suse.com/show_bug.cgi?id=1225810</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225815">https://bugzilla.suse.com/show_bug.cgi?id=1225815</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">https://bugzilla.suse.com/show_bug.cgi?id=1225820</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225823">https://bugzilla.suse.com/show_bug.cgi?id=1225823</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225827">https://bugzilla.suse.com/show_bug.cgi?id=1225827</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225829">https://bugzilla.suse.com/show_bug.cgi?id=1225829</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225830">https://bugzilla.suse.com/show_bug.cgi?id=1225830</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225834">https://bugzilla.suse.com/show_bug.cgi?id=1225834</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225835">https://bugzilla.suse.com/show_bug.cgi?id=1225835</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225839">https://bugzilla.suse.com/show_bug.cgi?id=1225839</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225840">https://bugzilla.suse.com/show_bug.cgi?id=1225840</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225842">https://bugzilla.suse.com/show_bug.cgi?id=1225842</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225843">https://bugzilla.suse.com/show_bug.cgi?id=1225843</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225847">https://bugzilla.suse.com/show_bug.cgi?id=1225847</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225851">https://bugzilla.suse.com/show_bug.cgi?id=1225851</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225856">https://bugzilla.suse.com/show_bug.cgi?id=1225856</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225866">https://bugzilla.suse.com/show_bug.cgi?id=1225866</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225872">https://bugzilla.suse.com/show_bug.cgi?id=1225872</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225894">https://bugzilla.suse.com/show_bug.cgi?id=1225894</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225895">https://bugzilla.suse.com/show_bug.cgi?id=1225895</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225896">https://bugzilla.suse.com/show_bug.cgi?id=1225896</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225898">https://bugzilla.suse.com/show_bug.cgi?id=1225898</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">https://bugzilla.suse.com/show_bug.cgi?id=1225903</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225945">https://bugzilla.suse.com/show_bug.cgi?id=1225945</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226022">https://bugzilla.suse.com/show_bug.cgi?id=1226022</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226131">https://bugzilla.suse.com/show_bug.cgi?id=1226131</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226145">https://bugzilla.suse.com/show_bug.cgi?id=1226145</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226149">https://bugzilla.suse.com/show_bug.cgi?id=1226149</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226155">https://bugzilla.suse.com/show_bug.cgi?id=1226155</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226158">https://bugzilla.suse.com/show_bug.cgi?id=1226158</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226163">https://bugzilla.suse.com/show_bug.cgi?id=1226163</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226202">https://bugzilla.suse.com/show_bug.cgi?id=1226202</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226211">https://bugzilla.suse.com/show_bug.cgi?id=1226211</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226212">https://bugzilla.suse.com/show_bug.cgi?id=1226212</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226213">https://bugzilla.suse.com/show_bug.cgi?id=1226213</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226226">https://bugzilla.suse.com/show_bug.cgi?id=1226226</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226457">https://bugzilla.suse.com/show_bug.cgi?id=1226457</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">https://bugzilla.suse.com/show_bug.cgi?id=1226502</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226503">https://bugzilla.suse.com/show_bug.cgi?id=1226503</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226513">https://bugzilla.suse.com/show_bug.cgi?id=1226513</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226514">https://bugzilla.suse.com/show_bug.cgi?id=1226514</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226519">https://bugzilla.suse.com/show_bug.cgi?id=1226519</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226520">https://bugzilla.suse.com/show_bug.cgi?id=1226520</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226582">https://bugzilla.suse.com/show_bug.cgi?id=1226582</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226587">https://bugzilla.suse.com/show_bug.cgi?id=1226587</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">https://bugzilla.suse.com/show_bug.cgi?id=1226588</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226592">https://bugzilla.suse.com/show_bug.cgi?id=1226592</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226593">https://bugzilla.suse.com/show_bug.cgi?id=1226593</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226594">https://bugzilla.suse.com/show_bug.cgi?id=1226594</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226595">https://bugzilla.suse.com/show_bug.cgi?id=1226595</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226597">https://bugzilla.suse.com/show_bug.cgi?id=1226597</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226607">https://bugzilla.suse.com/show_bug.cgi?id=1226607</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226608">https://bugzilla.suse.com/show_bug.cgi?id=1226608</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226610">https://bugzilla.suse.com/show_bug.cgi?id=1226610</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226612">https://bugzilla.suse.com/show_bug.cgi?id=1226612</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226613">https://bugzilla.suse.com/show_bug.cgi?id=1226613</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226630">https://bugzilla.suse.com/show_bug.cgi?id=1226630</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226632">https://bugzilla.suse.com/show_bug.cgi?id=1226632</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226633">https://bugzilla.suse.com/show_bug.cgi?id=1226633</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226634">https://bugzilla.suse.com/show_bug.cgi?id=1226634</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226637">https://bugzilla.suse.com/show_bug.cgi?id=1226637</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226657">https://bugzilla.suse.com/show_bug.cgi?id=1226657</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226658">https://bugzilla.suse.com/show_bug.cgi?id=1226658</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226734">https://bugzilla.suse.com/show_bug.cgi?id=1226734</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226735">https://bugzilla.suse.com/show_bug.cgi?id=1226735</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226737">https://bugzilla.suse.com/show_bug.cgi?id=1226737</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226738">https://bugzilla.suse.com/show_bug.cgi?id=1226738</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226739">https://bugzilla.suse.com/show_bug.cgi?id=1226739</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226740">https://bugzilla.suse.com/show_bug.cgi?id=1226740</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226741">https://bugzilla.suse.com/show_bug.cgi?id=1226741</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226742">https://bugzilla.suse.com/show_bug.cgi?id=1226742</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226744">https://bugzilla.suse.com/show_bug.cgi?id=1226744</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226746">https://bugzilla.suse.com/show_bug.cgi?id=1226746</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226747">https://bugzilla.suse.com/show_bug.cgi?id=1226747</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226749">https://bugzilla.suse.com/show_bug.cgi?id=1226749</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226750">https://bugzilla.suse.com/show_bug.cgi?id=1226750</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226754">https://bugzilla.suse.com/show_bug.cgi?id=1226754</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226757">https://bugzilla.suse.com/show_bug.cgi?id=1226757</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226758">https://bugzilla.suse.com/show_bug.cgi?id=1226758</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226760">https://bugzilla.suse.com/show_bug.cgi?id=1226760</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226761">https://bugzilla.suse.com/show_bug.cgi?id=1226761</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226764">https://bugzilla.suse.com/show_bug.cgi?id=1226764</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226767">https://bugzilla.suse.com/show_bug.cgi?id=1226767</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226768">https://bugzilla.suse.com/show_bug.cgi?id=1226768</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226769">https://bugzilla.suse.com/show_bug.cgi?id=1226769</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226771">https://bugzilla.suse.com/show_bug.cgi?id=1226771</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226772">https://bugzilla.suse.com/show_bug.cgi?id=1226772</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226774">https://bugzilla.suse.com/show_bug.cgi?id=1226774</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226775">https://bugzilla.suse.com/show_bug.cgi?id=1226775</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226776">https://bugzilla.suse.com/show_bug.cgi?id=1226776</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226777">https://bugzilla.suse.com/show_bug.cgi?id=1226777</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226780">https://bugzilla.suse.com/show_bug.cgi?id=1226780</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226781">https://bugzilla.suse.com/show_bug.cgi?id=1226781</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226783">https://bugzilla.suse.com/show_bug.cgi?id=1226783</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226785">https://bugzilla.suse.com/show_bug.cgi?id=1226785</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226786">https://bugzilla.suse.com/show_bug.cgi?id=1226786</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226788">https://bugzilla.suse.com/show_bug.cgi?id=1226788</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226789">https://bugzilla.suse.com/show_bug.cgi?id=1226789</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226790">https://bugzilla.suse.com/show_bug.cgi?id=1226790</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226791">https://bugzilla.suse.com/show_bug.cgi?id=1226791</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226796">https://bugzilla.suse.com/show_bug.cgi?id=1226796</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226799">https://bugzilla.suse.com/show_bug.cgi?id=1226799</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226837">https://bugzilla.suse.com/show_bug.cgi?id=1226837</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226839">https://bugzilla.suse.com/show_bug.cgi?id=1226839</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226840">https://bugzilla.suse.com/show_bug.cgi?id=1226840</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226841">https://bugzilla.suse.com/show_bug.cgi?id=1226841</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226842">https://bugzilla.suse.com/show_bug.cgi?id=1226842</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226844">https://bugzilla.suse.com/show_bug.cgi?id=1226844</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226848">https://bugzilla.suse.com/show_bug.cgi?id=1226848</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226852">https://bugzilla.suse.com/show_bug.cgi?id=1226852</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226856">https://bugzilla.suse.com/show_bug.cgi?id=1226856</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226857">https://bugzilla.suse.com/show_bug.cgi?id=1226857</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226859">https://bugzilla.suse.com/show_bug.cgi?id=1226859</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226861">https://bugzilla.suse.com/show_bug.cgi?id=1226861</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226863">https://bugzilla.suse.com/show_bug.cgi?id=1226863</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226864">https://bugzilla.suse.com/show_bug.cgi?id=1226864</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226866">https://bugzilla.suse.com/show_bug.cgi?id=1226866</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226867">https://bugzilla.suse.com/show_bug.cgi?id=1226867</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226868">https://bugzilla.suse.com/show_bug.cgi?id=1226868</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226875">https://bugzilla.suse.com/show_bug.cgi?id=1226875</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226876">https://bugzilla.suse.com/show_bug.cgi?id=1226876</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226878">https://bugzilla.suse.com/show_bug.cgi?id=1226878</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226879">https://bugzilla.suse.com/show_bug.cgi?id=1226879</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226883">https://bugzilla.suse.com/show_bug.cgi?id=1226883</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226886">https://bugzilla.suse.com/show_bug.cgi?id=1226886</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226890">https://bugzilla.suse.com/show_bug.cgi?id=1226890</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226891">https://bugzilla.suse.com/show_bug.cgi?id=1226891</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226894">https://bugzilla.suse.com/show_bug.cgi?id=1226894</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226895">https://bugzilla.suse.com/show_bug.cgi?id=1226895</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226905">https://bugzilla.suse.com/show_bug.cgi?id=1226905</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226908">https://bugzilla.suse.com/show_bug.cgi?id=1226908</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226909">https://bugzilla.suse.com/show_bug.cgi?id=1226909</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226911">https://bugzilla.suse.com/show_bug.cgi?id=1226911</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226915">https://bugzilla.suse.com/show_bug.cgi?id=1226915</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226928">https://bugzilla.suse.com/show_bug.cgi?id=1226928</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226934">https://bugzilla.suse.com/show_bug.cgi?id=1226934</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226938">https://bugzilla.suse.com/show_bug.cgi?id=1226938</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226939">https://bugzilla.suse.com/show_bug.cgi?id=1226939</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226941">https://bugzilla.suse.com/show_bug.cgi?id=1226941</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226948">https://bugzilla.suse.com/show_bug.cgi?id=1226948</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226949">https://bugzilla.suse.com/show_bug.cgi?id=1226949</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226950">https://bugzilla.suse.com/show_bug.cgi?id=1226950</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226962">https://bugzilla.suse.com/show_bug.cgi?id=1226962</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226976">https://bugzilla.suse.com/show_bug.cgi?id=1226976</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226989">https://bugzilla.suse.com/show_bug.cgi?id=1226989</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226990">https://bugzilla.suse.com/show_bug.cgi?id=1226990</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226992">https://bugzilla.suse.com/show_bug.cgi?id=1226992</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226993">https://bugzilla.suse.com/show_bug.cgi?id=1226993</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226994">https://bugzilla.suse.com/show_bug.cgi?id=1226994</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226995">https://bugzilla.suse.com/show_bug.cgi?id=1226995</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226996">https://bugzilla.suse.com/show_bug.cgi?id=1226996</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227066">https://bugzilla.suse.com/show_bug.cgi?id=1227066</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227072">https://bugzilla.suse.com/show_bug.cgi?id=1227072</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227085">https://bugzilla.suse.com/show_bug.cgi?id=1227085</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227089">https://bugzilla.suse.com/show_bug.cgi?id=1227089</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227090">https://bugzilla.suse.com/show_bug.cgi?id=1227090</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227096">https://bugzilla.suse.com/show_bug.cgi?id=1227096</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227101">https://bugzilla.suse.com/show_bug.cgi?id=1227101</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227103">https://bugzilla.suse.com/show_bug.cgi?id=1227103</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227149">https://bugzilla.suse.com/show_bug.cgi?id=1227149</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227190">https://bugzilla.suse.com/show_bug.cgi?id=1227190</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227282">https://bugzilla.suse.com/show_bug.cgi?id=1227282</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227362">https://bugzilla.suse.com/show_bug.cgi?id=1227362</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227363">https://bugzilla.suse.com/show_bug.cgi?id=1227363</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">https://bugzilla.suse.com/show_bug.cgi?id=1227383</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227432">https://bugzilla.suse.com/show_bug.cgi?id=1227432</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227433">https://bugzilla.suse.com/show_bug.cgi?id=1227433</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227434">https://bugzilla.suse.com/show_bug.cgi?id=1227434</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227435">https://bugzilla.suse.com/show_bug.cgi?id=1227435</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227443">https://bugzilla.suse.com/show_bug.cgi?id=1227443</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227446">https://bugzilla.suse.com/show_bug.cgi?id=1227446</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227447">https://bugzilla.suse.com/show_bug.cgi?id=1227447</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227487">https://bugzilla.suse.com/show_bug.cgi?id=1227487</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227573">https://bugzilla.suse.com/show_bug.cgi?id=1227573</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227626">https://bugzilla.suse.com/show_bug.cgi?id=1227626</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227716">https://bugzilla.suse.com/show_bug.cgi?id=1227716</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227719">https://bugzilla.suse.com/show_bug.cgi?id=1227719</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227723">https://bugzilla.suse.com/show_bug.cgi?id=1227723</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227730">https://bugzilla.suse.com/show_bug.cgi?id=1227730</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227736">https://bugzilla.suse.com/show_bug.cgi?id=1227736</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227755">https://bugzilla.suse.com/show_bug.cgi?id=1227755</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227757">https://bugzilla.suse.com/show_bug.cgi?id=1227757</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227762">https://bugzilla.suse.com/show_bug.cgi?id=1227762</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227763">https://bugzilla.suse.com/show_bug.cgi?id=1227763</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227779">https://bugzilla.suse.com/show_bug.cgi?id=1227779</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227780">https://bugzilla.suse.com/show_bug.cgi?id=1227780</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227783">https://bugzilla.suse.com/show_bug.cgi?id=1227783</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227786">https://bugzilla.suse.com/show_bug.cgi?id=1227786</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227788">https://bugzilla.suse.com/show_bug.cgi?id=1227788</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227789">https://bugzilla.suse.com/show_bug.cgi?id=1227789</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227797">https://bugzilla.suse.com/show_bug.cgi?id=1227797</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227800">https://bugzilla.suse.com/show_bug.cgi?id=1227800</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227801">https://bugzilla.suse.com/show_bug.cgi?id=1227801</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227803">https://bugzilla.suse.com/show_bug.cgi?id=1227803</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227806">https://bugzilla.suse.com/show_bug.cgi?id=1227806</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227813">https://bugzilla.suse.com/show_bug.cgi?id=1227813</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227814">https://bugzilla.suse.com/show_bug.cgi?id=1227814</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227836">https://bugzilla.suse.com/show_bug.cgi?id=1227836</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227855">https://bugzilla.suse.com/show_bug.cgi?id=1227855</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227862">https://bugzilla.suse.com/show_bug.cgi?id=1227862</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227866">https://bugzilla.suse.com/show_bug.cgi?id=1227866</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227886">https://bugzilla.suse.com/show_bug.cgi?id=1227886</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227899">https://bugzilla.suse.com/show_bug.cgi?id=1227899</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227910">https://bugzilla.suse.com/show_bug.cgi?id=1227910</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227913">https://bugzilla.suse.com/show_bug.cgi?id=1227913</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227926">https://bugzilla.suse.com/show_bug.cgi?id=1227926</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228090">https://bugzilla.suse.com/show_bug.cgi?id=1228090</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">https://bugzilla.suse.com/show_bug.cgi?id=1228114</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228192">https://bugzilla.suse.com/show_bug.cgi?id=1228192</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228193">https://bugzilla.suse.com/show_bug.cgi?id=1228193</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228211">https://bugzilla.suse.com/show_bug.cgi?id=1228211</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228269">https://bugzilla.suse.com/show_bug.cgi?id=1228269</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228289">https://bugzilla.suse.com/show_bug.cgi?id=1228289</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228327">https://bugzilla.suse.com/show_bug.cgi?id=1228327</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228328">https://bugzilla.suse.com/show_bug.cgi?id=1228328</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228403">https://bugzilla.suse.com/show_bug.cgi?id=1228403</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228405">https://bugzilla.suse.com/show_bug.cgi?id=1228405</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228408">https://bugzilla.suse.com/show_bug.cgi?id=1228408</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228417">https://bugzilla.suse.com/show_bug.cgi?id=1228417</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229025">https://bugzilla.suse.com/show_bug.cgi?id=1229025</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-542">https://jira.suse.com/browse/PED-542</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-8111">https://jira.suse.com/browse/PED-8111</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-8240">https://jira.suse.com/browse/PED-8240</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-8491">https://jira.suse.com/browse/PED-8491</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-8570">https://jira.suse.com/browse/PED-8570</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-8644">https://jira.suse.com/browse/PED-8644</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-8645">https://jira.suse.com/browse/PED-8645</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-8649">https://jira.suse.com/browse/PED-8649</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-8688">https://jira.suse.com/browse/PED-8688</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-8701">https://jira.suse.com/browse/PED-8701</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-8954">https://jira.suse.com/browse/PED-8954</a>
</li>
</ul>
</div>