SUSE-SU-2024:2896-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Tue Aug 13 16:39:55 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2896-1  
Rating: important  
References:

  * bsc#1186716
  * bsc#1194869
  * bsc#1195775
  * bsc#1204562
  * bsc#1209834
  * bsc#1215199
  * bsc#1215587
  * bsc#1217481
  * bsc#1217912
  * bsc#1218442
  * bsc#1218730
  * bsc#1218820
  * bsc#1219224
  * bsc#1219478
  * bsc#1219596
  * bsc#1219633
  * bsc#1219832
  * bsc#1219847
  * bsc#1219953
  * bsc#1220138
  * bsc#1220427
  * bsc#1220430
  * bsc#1220942
  * bsc#1221057
  * bsc#1221086
  * bsc#1221647
  * bsc#1221654
  * bsc#1221656
  * bsc#1221659
  * bsc#1221777
  * bsc#1221958
  * bsc#1222011
  * bsc#1222015
  * bsc#1222080
  * bsc#1222241
  * bsc#1222326
  * bsc#1222328
  * bsc#1222380
  * bsc#1222438
  * bsc#1222463
  * bsc#1222588
  * bsc#1222617
  * bsc#1222619
  * bsc#1222768
  * bsc#1222775
  * bsc#1222779
  * bsc#1222809
  * bsc#1222810
  * bsc#1222893
  * bsc#1223010
  * bsc#1223018
  * bsc#1223021
  * bsc#1223265
  * bsc#1223570
  * bsc#1223731
  * bsc#1223740
  * bsc#1223778
  * bsc#1223804
  * bsc#1223806
  * bsc#1223807
  * bsc#1223813
  * bsc#1223815
  * bsc#1223836
  * bsc#1223863
  * bsc#1224049
  * bsc#1224187
  * bsc#1224414
  * bsc#1224422
  * bsc#1224439
  * bsc#1224490
  * bsc#1224497
  * bsc#1224498
  * bsc#1224499
  * bsc#1224512
  * bsc#1224515
  * bsc#1224516
  * bsc#1224520
  * bsc#1224523
  * bsc#1224539
  * bsc#1224540
  * bsc#1224544
  * bsc#1224545
  * bsc#1224549
  * bsc#1224572
  * bsc#1224575
  * bsc#1224583
  * bsc#1224584
  * bsc#1224589
  * bsc#1224604
  * bsc#1224606
  * bsc#1224612
  * bsc#1224614
  * bsc#1224619
  * bsc#1224636
  * bsc#1224641
  * bsc#1224655
  * bsc#1224659
  * bsc#1224661
  * bsc#1224662
  * bsc#1224670
  * bsc#1224673
  * bsc#1224698
  * bsc#1224735
  * bsc#1224743
  * bsc#1224751
  * bsc#1224759
  * bsc#1224767
  * bsc#1224928
  * bsc#1224930
  * bsc#1224932
  * bsc#1224933
  * bsc#1224935
  * bsc#1224937
  * bsc#1224939
  * bsc#1224941
  * bsc#1224944
  * bsc#1224946
  * bsc#1224947
  * bsc#1224949
  * bsc#1224951
  * bsc#1224988
  * bsc#1224992
  * bsc#1224998
  * bsc#1225000
  * bsc#1225001
  * bsc#1225004
  * bsc#1225006
  * bsc#1225008
  * bsc#1225009
  * bsc#1225014
  * bsc#1225015
  * bsc#1225022
  * bsc#1225025
  * bsc#1225028
  * bsc#1225029
  * bsc#1225031
  * bsc#1225036
  * bsc#1225041
  * bsc#1225044
  * bsc#1225049
  * bsc#1225050
  * bsc#1225076
  * bsc#1225077
  * bsc#1225078
  * bsc#1225081
  * bsc#1225085
  * bsc#1225086
  * bsc#1225088
  * bsc#1225090
  * bsc#1225092
  * bsc#1225096
  * bsc#1225097
  * bsc#1225098
  * bsc#1225101
  * bsc#1225103
  * bsc#1225104
  * bsc#1225105
  * bsc#1225106
  * bsc#1225108
  * bsc#1225120
  * bsc#1225132
  * bsc#1225172
  * bsc#1225180
  * bsc#1225272
  * bsc#1225300
  * bsc#1225391
  * bsc#1225472
  * bsc#1225475
  * bsc#1225476
  * bsc#1225477
  * bsc#1225478
  * bsc#1225485
  * bsc#1225489
  * bsc#1225490
  * bsc#1225527
  * bsc#1225529
  * bsc#1225530
  * bsc#1225532
  * bsc#1225534
  * bsc#1225548
  * bsc#1225550
  * bsc#1225553
  * bsc#1225554
  * bsc#1225555
  * bsc#1225556
  * bsc#1225557
  * bsc#1225559
  * bsc#1225560
  * bsc#1225564
  * bsc#1225565
  * bsc#1225566
  * bsc#1225568
  * bsc#1225569
  * bsc#1225570
  * bsc#1225571
  * bsc#1225572
  * bsc#1225573
  * bsc#1225577
  * bsc#1225581
  * bsc#1225583
  * bsc#1225584
  * bsc#1225585
  * bsc#1225586
  * bsc#1225587
  * bsc#1225588
  * bsc#1225589
  * bsc#1225590
  * bsc#1225591
  * bsc#1225592
  * bsc#1225594
  * bsc#1225595
  * bsc#1225599
  * bsc#1225600
  * bsc#1225601
  * bsc#1225602
  * bsc#1225605
  * bsc#1225609
  * bsc#1225611
  * bsc#1225681
  * bsc#1225702
  * bsc#1225711
  * bsc#1225717
  * bsc#1225719
  * bsc#1225723
  * bsc#1225726
  * bsc#1225731
  * bsc#1225732
  * bsc#1225737
  * bsc#1225741
  * bsc#1225744
  * bsc#1225745
  * bsc#1225746
  * bsc#1225752
  * bsc#1225753
  * bsc#1225757
  * bsc#1225758
  * bsc#1225759
  * bsc#1225760
  * bsc#1225761
  * bsc#1225762
  * bsc#1225763
  * bsc#1225767
  * bsc#1225770
  * bsc#1225805
  * bsc#1225810
  * bsc#1225815
  * bsc#1225820
  * bsc#1225823
  * bsc#1225827
  * bsc#1225829
  * bsc#1225830
  * bsc#1225834
  * bsc#1225835
  * bsc#1225839
  * bsc#1225840
  * bsc#1225843
  * bsc#1225847
  * bsc#1225851
  * bsc#1225856
  * bsc#1225866
  * bsc#1225872
  * bsc#1225894
  * bsc#1225895
  * bsc#1225896
  * bsc#1225898
  * bsc#1225903
  * bsc#1226022
  * bsc#1226131
  * bsc#1226145
  * bsc#1226149
  * bsc#1226155
  * bsc#1226158
  * bsc#1226163
  * bsc#1226202
  * bsc#1226211
  * bsc#1226212
  * bsc#1226213
  * bsc#1226226
  * bsc#1226457
  * bsc#1226502
  * bsc#1226503
  * bsc#1226513
  * bsc#1226514
  * bsc#1226519
  * bsc#1226520
  * bsc#1226582
  * bsc#1226587
  * bsc#1226588
  * bsc#1226592
  * bsc#1226593
  * bsc#1226594
  * bsc#1226595
  * bsc#1226597
  * bsc#1226607
  * bsc#1226608
  * bsc#1226610
  * bsc#1226612
  * bsc#1226613
  * bsc#1226630
  * bsc#1226632
  * bsc#1226633
  * bsc#1226634
  * bsc#1226637
  * bsc#1226657
  * bsc#1226658
  * bsc#1226734
  * bsc#1226735
  * bsc#1226737
  * bsc#1226738
  * bsc#1226739
  * bsc#1226740
  * bsc#1226741
  * bsc#1226742
  * bsc#1226744
  * bsc#1226746
  * bsc#1226747
  * bsc#1226749
  * bsc#1226750
  * bsc#1226754
  * bsc#1226757
  * bsc#1226758
  * bsc#1226760
  * bsc#1226761
  * bsc#1226764
  * bsc#1226767
  * bsc#1226768
  * bsc#1226769
  * bsc#1226771
  * bsc#1226772
  * bsc#1226774
  * bsc#1226775
  * bsc#1226776
  * bsc#1226777
  * bsc#1226780
  * bsc#1226781
  * bsc#1226783
  * bsc#1226785
  * bsc#1226786
  * bsc#1226788
  * bsc#1226789
  * bsc#1226790
  * bsc#1226791
  * bsc#1226796
  * bsc#1226799
  * bsc#1226837
  * bsc#1226839
  * bsc#1226840
  * bsc#1226841
  * bsc#1226842
  * bsc#1226844
  * bsc#1226848
  * bsc#1226852
  * bsc#1226856
  * bsc#1226857
  * bsc#1226859
  * bsc#1226861
  * bsc#1226863
  * bsc#1226864
  * bsc#1226866
  * bsc#1226867
  * bsc#1226868
  * bsc#1226875
  * bsc#1226876
  * bsc#1226878
  * bsc#1226879
  * bsc#1226883
  * bsc#1226886
  * bsc#1226890
  * bsc#1226891
  * bsc#1226894
  * bsc#1226895
  * bsc#1226905
  * bsc#1226908
  * bsc#1226909
  * bsc#1226911
  * bsc#1226915
  * bsc#1226928
  * bsc#1226934
  * bsc#1226938
  * bsc#1226939
  * bsc#1226941
  * bsc#1226948
  * bsc#1226949
  * bsc#1226950
  * bsc#1226962
  * bsc#1226976
  * bsc#1226989
  * bsc#1226990
  * bsc#1226992
  * bsc#1226993
  * bsc#1226994
  * bsc#1226995
  * bsc#1226996
  * bsc#1227066
  * bsc#1227072
  * bsc#1227085
  * bsc#1227089
  * bsc#1227090
  * bsc#1227096
  * bsc#1227101
  * bsc#1227103
  * bsc#1227149
  * bsc#1227190
  * bsc#1227282
  * bsc#1227362
  * bsc#1227363
  * bsc#1227383
  * bsc#1227432
  * bsc#1227433
  * bsc#1227434
  * bsc#1227435
  * bsc#1227443
  * bsc#1227446
  * bsc#1227447
  * bsc#1227487
  * bsc#1227573
  * bsc#1227626
  * bsc#1227716
  * bsc#1227719
  * bsc#1227723
  * bsc#1227730
  * bsc#1227736
  * bsc#1227755
  * bsc#1227757
  * bsc#1227762
  * bsc#1227763
  * bsc#1227779
  * bsc#1227780
  * bsc#1227783
  * bsc#1227786
  * bsc#1227788
  * bsc#1227789
  * bsc#1227797
  * bsc#1227800
  * bsc#1227801
  * bsc#1227803
  * bsc#1227806
  * bsc#1227813
  * bsc#1227814
  * bsc#1227836
  * bsc#1227855
  * bsc#1227862
  * bsc#1227866
  * bsc#1227886
  * bsc#1227899
  * bsc#1227910
  * bsc#1227913
  * bsc#1227926
  * bsc#1228090
  * bsc#1228192
  * bsc#1228193
  * bsc#1228211
  * bsc#1228269
  * bsc#1228289
  * bsc#1228327
  * bsc#1228328
  * bsc#1228403
  * bsc#1228405
  * bsc#1228408
  * bsc#1228417
  * jsc#PED-8491
  * jsc#PED-8570
  * jsc#PED-8644
  * jsc#PED-8688
  * jsc#PED-8701
  * jsc#PED-8954

  
Cross-References:

  * CVE-2021-47432
  * CVE-2022-48772
  * CVE-2023-38417
  * CVE-2023-47210
  * CVE-2023-51780
  * CVE-2023-52435
  * CVE-2023-52472
  * CVE-2023-52622
  * CVE-2023-52656
  * CVE-2023-52672
  * CVE-2023-52699
  * CVE-2023-52735
  * CVE-2023-52749
  * CVE-2023-52750
  * CVE-2023-52751
  * CVE-2023-52753
  * CVE-2023-52754
  * CVE-2023-52757
  * CVE-2023-52759
  * CVE-2023-52762
  * CVE-2023-52763
  * CVE-2023-52764
  * CVE-2023-52765
  * CVE-2023-52766
  * CVE-2023-52767
  * CVE-2023-52768
  * CVE-2023-52769
  * CVE-2023-52773
  * CVE-2023-52774
  * CVE-2023-52775
  * CVE-2023-52776
  * CVE-2023-52777
  * CVE-2023-52780
  * CVE-2023-52781
  * CVE-2023-52782
  * CVE-2023-52783
  * CVE-2023-52784
  * CVE-2023-52786
  * CVE-2023-52787
  * CVE-2023-52788
  * CVE-2023-52789
  * CVE-2023-52791
  * CVE-2023-52792
  * CVE-2023-52794
  * CVE-2023-52795
  * CVE-2023-52796
  * CVE-2023-52798
  * CVE-2023-52799
  * CVE-2023-52800
  * CVE-2023-52801
  * CVE-2023-52803
  * CVE-2023-52804
  * CVE-2023-52805
  * CVE-2023-52806
  * CVE-2023-52807
  * CVE-2023-52808
  * CVE-2023-52809
  * CVE-2023-52810
  * CVE-2023-52811
  * CVE-2023-52812
  * CVE-2023-52813
  * CVE-2023-52814
  * CVE-2023-52815
  * CVE-2023-52816
  * CVE-2023-52817
  * CVE-2023-52818
  * CVE-2023-52819
  * CVE-2023-52821
  * CVE-2023-52825
  * CVE-2023-52826
  * CVE-2023-52827
  * CVE-2023-52829
  * CVE-2023-52832
  * CVE-2023-52833
  * CVE-2023-52834
  * CVE-2023-52835
  * CVE-2023-52836
  * CVE-2023-52837
  * CVE-2023-52838
  * CVE-2023-52840
  * CVE-2023-52841
  * CVE-2023-52842
  * CVE-2023-52843
  * CVE-2023-52844
  * CVE-2023-52845
  * CVE-2023-52846
  * CVE-2023-52847
  * CVE-2023-52849
  * CVE-2023-52850
  * CVE-2023-52851
  * CVE-2023-52853
  * CVE-2023-52854
  * CVE-2023-52855
  * CVE-2023-52856
  * CVE-2023-52857
  * CVE-2023-52858
  * CVE-2023-52861
  * CVE-2023-52862
  * CVE-2023-52863
  * CVE-2023-52864
  * CVE-2023-52865
  * CVE-2023-52866
  * CVE-2023-52867
  * CVE-2023-52868
  * CVE-2023-52869
  * CVE-2023-52870
  * CVE-2023-52871
  * CVE-2023-52872
  * CVE-2023-52873
  * CVE-2023-52874
  * CVE-2023-52875
  * CVE-2023-52876
  * CVE-2023-52877
  * CVE-2023-52878
  * CVE-2023-52879
  * CVE-2023-52880
  * CVE-2023-52881
  * CVE-2023-52883
  * CVE-2023-52884
  * CVE-2024-25741
  * CVE-2024-26615
  * CVE-2024-26623
  * CVE-2024-26625
  * CVE-2024-26633
  * CVE-2024-26635
  * CVE-2024-26636
  * CVE-2024-26641
  * CVE-2024-26663
  * CVE-2024-26665
  * CVE-2024-26676
  * CVE-2024-26691
  * CVE-2024-26734
  * CVE-2024-26750
  * CVE-2024-26758
  * CVE-2024-26767
  * CVE-2024-26780
  * CVE-2024-26785
  * CVE-2024-26813
  * CVE-2024-26814
  * CVE-2024-26826
  * CVE-2024-26845
  * CVE-2024-26863
  * CVE-2024-26889
  * CVE-2024-26920
  * CVE-2024-26944
  * CVE-2024-27012
  * CVE-2024-27015
  * CVE-2024-27016
  * CVE-2024-27019
  * CVE-2024-27020
  * CVE-2024-27025
  * CVE-2024-27064
  * CVE-2024-27065
  * CVE-2024-27402
  * CVE-2024-27404
  * CVE-2024-27414
  * CVE-2024-27419
  * CVE-2024-33619
  * CVE-2024-34777
  * CVE-2024-35247
  * CVE-2024-35805
  * CVE-2024-35807
  * CVE-2024-35827
  * CVE-2024-35831
  * CVE-2024-35843
  * CVE-2024-35848
  * CVE-2024-35853
  * CVE-2024-35854
  * CVE-2024-35857
  * CVE-2024-35880
  * CVE-2024-35884
  * CVE-2024-35886
  * CVE-2024-35890
  * CVE-2024-35892
  * CVE-2024-35893
  * CVE-2024-35896
  * CVE-2024-35898
  * CVE-2024-35899
  * CVE-2024-35900
  * CVE-2024-35908
  * CVE-2024-35925
  * CVE-2024-35926
  * CVE-2024-35934
  * CVE-2024-35942
  * CVE-2024-35957
  * CVE-2024-35962
  * CVE-2024-35970
  * CVE-2024-35976
  * CVE-2024-35979
  * CVE-2024-35998
  * CVE-2024-36003
  * CVE-2024-36004
  * CVE-2024-36005
  * CVE-2024-36008
  * CVE-2024-36010
  * CVE-2024-36017
  * CVE-2024-36024
  * CVE-2024-36281
  * CVE-2024-36477
  * CVE-2024-36478
  * CVE-2024-36479
  * CVE-2024-36882
  * CVE-2024-36887
  * CVE-2024-36889
  * CVE-2024-36899
  * CVE-2024-36900
  * CVE-2024-36901
  * CVE-2024-36902
  * CVE-2024-36903
  * CVE-2024-36904
  * CVE-2024-36909
  * CVE-2024-36910
  * CVE-2024-36911
  * CVE-2024-36912
  * CVE-2024-36913
  * CVE-2024-36914
  * CVE-2024-36915
  * CVE-2024-36916
  * CVE-2024-36917
  * CVE-2024-36919
  * CVE-2024-36922
  * CVE-2024-36923
  * CVE-2024-36924
  * CVE-2024-36926
  * CVE-2024-36930
  * CVE-2024-36934
  * CVE-2024-36935
  * CVE-2024-36937
  * CVE-2024-36938
  * CVE-2024-36940
  * CVE-2024-36941
  * CVE-2024-36942
  * CVE-2024-36944
  * CVE-2024-36945
  * CVE-2024-36946
  * CVE-2024-36947
  * CVE-2024-36949
  * CVE-2024-36950
  * CVE-2024-36951
  * CVE-2024-36952
  * CVE-2024-36955
  * CVE-2024-36957
  * CVE-2024-36959
  * CVE-2024-36960
  * CVE-2024-36962
  * CVE-2024-36964
  * CVE-2024-36965
  * CVE-2024-36967
  * CVE-2024-36969
  * CVE-2024-36971
  * CVE-2024-36972
  * CVE-2024-36973
  * CVE-2024-36974
  * CVE-2024-36975
  * CVE-2024-36977
  * CVE-2024-36978
  * CVE-2024-37021
  * CVE-2024-37078
  * CVE-2024-37353
  * CVE-2024-37354
  * CVE-2024-38381
  * CVE-2024-38384
  * CVE-2024-38385
  * CVE-2024-38388
  * CVE-2024-38390
  * CVE-2024-38391
  * CVE-2024-38539
  * CVE-2024-38540
  * CVE-2024-38541
  * CVE-2024-38543
  * CVE-2024-38544
  * CVE-2024-38545
  * CVE-2024-38546
  * CVE-2024-38547
  * CVE-2024-38548
  * CVE-2024-38549
  * CVE-2024-38550
  * CVE-2024-38551
  * CVE-2024-38552
  * CVE-2024-38553
  * CVE-2024-38554
  * CVE-2024-38555
  * CVE-2024-38556
  * CVE-2024-38557
  * CVE-2024-38558
  * CVE-2024-38559
  * CVE-2024-38560
  * CVE-2024-38562
  * CVE-2024-38564
  * CVE-2024-38565
  * CVE-2024-38566
  * CVE-2024-38567
  * CVE-2024-38568
  * CVE-2024-38569
  * CVE-2024-38570
  * CVE-2024-38571
  * CVE-2024-38572
  * CVE-2024-38573
  * CVE-2024-38575
  * CVE-2024-38578
  * CVE-2024-38579
  * CVE-2024-38580
  * CVE-2024-38581
  * CVE-2024-38582
  * CVE-2024-38583
  * CVE-2024-38586
  * CVE-2024-38587
  * CVE-2024-38588
  * CVE-2024-38590
  * CVE-2024-38591
  * CVE-2024-38592
  * CVE-2024-38594
  * CVE-2024-38595
  * CVE-2024-38597
  * CVE-2024-38598
  * CVE-2024-38599
  * CVE-2024-38600
  * CVE-2024-38601
  * CVE-2024-38602
  * CVE-2024-38603
  * CVE-2024-38604
  * CVE-2024-38605
  * CVE-2024-38608
  * CVE-2024-38610
  * CVE-2024-38611
  * CVE-2024-38615
  * CVE-2024-38616
  * CVE-2024-38617
  * CVE-2024-38618
  * CVE-2024-38619
  * CVE-2024-38621
  * CVE-2024-38622
  * CVE-2024-38627
  * CVE-2024-38628
  * CVE-2024-38629
  * CVE-2024-38630
  * CVE-2024-38633
  * CVE-2024-38634
  * CVE-2024-38635
  * CVE-2024-38636
  * CVE-2024-38659
  * CVE-2024-38661
  * CVE-2024-38663
  * CVE-2024-38664
  * CVE-2024-38780
  * CVE-2024-39276
  * CVE-2024-39277
  * CVE-2024-39291
  * CVE-2024-39296
  * CVE-2024-39301
  * CVE-2024-39362
  * CVE-2024-39371
  * CVE-2024-39463
  * CVE-2024-39466
  * CVE-2024-39468
  * CVE-2024-39469
  * CVE-2024-39471
  * CVE-2024-39472
  * CVE-2024-39473
  * CVE-2024-39474
  * CVE-2024-39475
  * CVE-2024-39479
  * CVE-2024-39481
  * CVE-2024-39482
  * CVE-2024-39487
  * CVE-2024-39490
  * CVE-2024-39494
  * CVE-2024-39496
  * CVE-2024-39498
  * CVE-2024-39502
  * CVE-2024-39504
  * CVE-2024-39507
  * CVE-2024-40901
  * CVE-2024-40906
  * CVE-2024-40908
  * CVE-2024-40919
  * CVE-2024-40923
  * CVE-2024-40925
  * CVE-2024-40928
  * CVE-2024-40931
  * CVE-2024-40935
  * CVE-2024-40937
  * CVE-2024-40940
  * CVE-2024-40947
  * CVE-2024-40948
  * CVE-2024-40953
  * CVE-2024-40960
  * CVE-2024-40961
  * CVE-2024-40966
  * CVE-2024-40970
  * CVE-2024-40972
  * CVE-2024-40975
  * CVE-2024-40979
  * CVE-2024-40998
  * CVE-2024-40999
  * CVE-2024-41006
  * CVE-2024-41011
  * CVE-2024-41013
  * CVE-2024-41014
  * CVE-2024-41017
  * CVE-2024-41090
  * CVE-2024-41091

  
CVSS scores:

  * CVE-2021-47432 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48772 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-38417 ( SUSE ):  4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-47210 ( SUSE ):  4.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
  * CVE-2023-51780 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-51780 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52435 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52435 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52472 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52472 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52622 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52656 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52672 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52699 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52735 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52749 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52750 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52751 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52753 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52753 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52754 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52757 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52759 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52762 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52763 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52764 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52765 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52767 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52768 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52769 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52769 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52773 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52773 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52774 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52775 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2023-52776 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2023-52777 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52780 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52781 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52782 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52783 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52783 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52784 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52786 ( SUSE ):  3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2023-52787 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52788 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52789 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52792 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52794 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2023-52795 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52796 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52798 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52799 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52800 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52801 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52803 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52804 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-52805 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-52806 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52806 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52807 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52808 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52809 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52809 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52811 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52812 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-52813 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52814 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52814 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52815 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52816 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52817 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52817 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52818 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52819 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52821 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52825 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52826 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52827 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52827 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-52829 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2023-52832 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52833 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52834 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52835 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52836 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-52837 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52838 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52840 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52841 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52842 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52843 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52844 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52845 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52846 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52847 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52849 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52850 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52853 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52854 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52855 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52856 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52858 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52861 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52862 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52865 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52866 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52867 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52868 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52869 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52870 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52871 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2023-52872 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52873 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52874 ( SUSE ):  3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
  * CVE-2023-52875 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52876 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52877 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52878 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52879 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52880 ( SUSE ):  8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52881 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L
  * CVE-2023-52883 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52884 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-25741 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-26615 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26623 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26625 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26633 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26635 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-26636 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26641 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-26663 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26665 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26676 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26691 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26734 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26750 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26780 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26785 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26813 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26814 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26826 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26845 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26889 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26920 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26944 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27012 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27012 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27015 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27015 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27016 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27016 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27019 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27019 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-27020 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27020 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27025 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-27064 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27065 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27402 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-27404 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-27414 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-27419 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-33619 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-34777 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-35247 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35805 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35807 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35827 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35831 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35843 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35848 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35854 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35880 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35890 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35892 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35893 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35896 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35898 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35899 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35900 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35908 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35925 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35926 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-35934 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-35942 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-35957 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35962 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35970 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35976 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35979 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35998 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36003 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36004 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36005 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36008 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36008 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36010 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36017 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36024 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36281 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36477 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-36477 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36478 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36479 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36882 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36889 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-36899 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36900 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36901 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36901 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36902 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36902 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36903 ( SUSE ):  5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-36904 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36909 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-36910 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
  * CVE-2024-36911 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-36912 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-36913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-36914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36915 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36916 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-36917 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36922 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36923 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-36924 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36926 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36926 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36930 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36930 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36934 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
  * CVE-2024-36935 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
  * CVE-2024-36937 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36938 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36938 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36940 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-36941 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36942 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-36944 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36945 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36946 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-36947 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-36949 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36950 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36951 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36952 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36955 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-36957 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-36959 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36960 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36962 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36964 ( SUSE ):  7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36965 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-36965 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36967 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36967 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36969 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36971 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36971 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36972 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36973 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36974 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36975 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36977 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36978 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-37021 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-37078 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-37353 ( SUSE ):  3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-37354 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-38381 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-38384 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38385 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38388 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38390 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38391 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38539 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38540 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38541 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38543 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38544 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38545 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38546 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38547 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38548 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38549 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38550 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38551 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38552 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-38553 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38554 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38555 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38556 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38557 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38558 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2024-38559 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38560 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38562 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38564 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-38565 ( SUSE ):  5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2024-38566 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38567 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38568 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-38569 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-38570 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38570 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38571 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38571 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38572 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-38573 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38575 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38578 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-38579 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-38580 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38581 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-38581 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38582 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38583 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38583 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38586 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38587 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-38588 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38590 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38591 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38592 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38594 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-38595 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38597 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38598 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38599 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-38600 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38601 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38602 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38603 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38603 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38604 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38605 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38608 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-38610 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38611 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-38615 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38616 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38617 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38618 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38619 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38621 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38622 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38627 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38628 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38629 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38630 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38633 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38634 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38635 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38636 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38659 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H
  * CVE-2024-38661 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38663 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38664 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38664 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38780 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38780 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39276 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39277 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-39277 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39291 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39291 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39296 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39301 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39362 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39371 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39463 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39466 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39468 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39469 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39471 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39472 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
  * CVE-2024-39472 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39473 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39473 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39474 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39474 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39475 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39475 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39479 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39479 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39481 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39481 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39482 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
  * CVE-2024-39482 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39487 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-39490 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-39494 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39494 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39496 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39496 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39498 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39502 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39504 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39507 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40901 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
  * CVE-2024-40906 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40908 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40923 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40925 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40928 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-40931 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-40935 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40937 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-40940 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40947 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40948 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40960 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40961 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40966 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40970 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40972 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40975 ( SUSE ):  2.1 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-40979 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40998 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40999 ( SUSE ):  3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2024-41006 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-41011 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41013 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-41014 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41017 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41090 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  * CVE-2024-41091 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

  
Affected Products:

  * openSUSE Leap 15.6
  * Public Cloud Module 15-SP6
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6

  
  
An update that solves 402 vulnerabilities, contains six features and has 58
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data
    (bsc#1228408).
  * CVE-2024-41013: xfs: do not walk off the end of a directory data block
    (bsc#1228405).
  * CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
  * CVE-2024-40972: ext4: fold quota accounting into
    ext4_xattr_inode_lookup_create() (bsc#1227910).
  * CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in
    ext4_xattr_block_cache_find() (bsc#1226993).
  * CVE-2024-40925: block: fix request.queuelist usage in flush (bsc#1227789).
  * CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in
    __ext4_fill_super() (bsc#1227866).
  * CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name
    (bsc#1227716).
  * CVE-2024-39496: btrfs: zoned: fix use-after-free due to race with dev
    replace (bsc#1227719).
  * CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
  * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
  * CVE-2024-40999: net: ena: Add validation for completion descriptors
    consistency (bsc#1227913).
  * CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc
    (bsc#1227886).
  * CVE-2024-40975: platform/x86: x86-android-tablets: Unregister devices in
    reverse order (bsc#1227926).
  * CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
  * CVE-2024-40947: ima: Avoid blocking in RCU read-side critical section
    (bsc#1227803).
  * CVE-2024-40908: bpf: Set run context for rawtp test_run callback
    (bsc#1227783).
  * CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe()
    (bsc#1227813).
  * CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD
    (bsc#1227797).
  * CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init()
    (bsc#1227814).
  * CVE-2024-39504: netfilter: nft_inner: validate mandatory meta and payload
    (bsc#1227757).
  * CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry()
    (bsc#1227862).
  * CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
    (bsc#1227836).
  * CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario
    (bsc#1227730).
  * CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules
    creation fail (bsc#1227800).
  * CVE-2024-40928: net: ethtool: fix the error condition in
    ethtool_get_phy_stats_ethtool() (bsc#1227788).
  * CVE-2024-26944: btrfs: zoned: fix lock ordering in btrfs_zone_activate()
    (bsc#1223731).
  * CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure
    (bsc#1227786).
  * CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect
    (bsc#1227780).
  * CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of
    released token in __hwrm_send() (bsc#1227779).
  * CVE-2024-39487: bonding: Fix out-of-bounds read in
    bond_option_arp_ip_targets_set() (bsc#1227573)
  * CVE-2024-35908: tls: get psock ref after taking rxlock to avoid leak
    (bsc#1224490)
  * CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before
    exit_net release (bsc#1224499)
  * CVE-2024-35934: net/smc: reduce rtnl pressure in
    smc_pnet_create_pnetids_list() (bsc#1224641)
  * CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
  * CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-
    allocated memory (bsc#1227762).
  * CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy
    h_size fixup (bsc#1227432).
  * CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in
    kvm_vcpu_on_spin() (bsc#1227806).
  * CVE-2024-27404: mptcp: fix data races on remote_id (bsc#1224422)
  * CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in
    __nft_expr_type_get() (bsc#1223815)
  * CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in
    __nft_obj_type_get() (bsc#1223813)
  * CVE-2024-40948: mm/page_table_check: fix crash on ZONE_DEVICE (bsc#1227801).
  * CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
  * CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in
    fib6_rule_action() (bsc#1225719).
  * CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation
    (bsc#1225851).
  * CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx
    packets (bsc#1226750).
  * CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon()
    (bsc#1227103.
  * CVE-2024-40906: net/mlx5: Always stop health timer during driver removal
    (bsc#1227763).
  * CVE-2024-27012: netfilter: nf_tables: restore set elements when delete set
    fails (bsc#1223804).
  * CVE-2024-39498: drm/mst: Fix NULL pointer dereference at
    drm_dp_add_payload_part2 (bsc#1227723)
  * CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
  * CVE-2024-27016: netfilter: flowtable: validate pppoe header (bsc#1223807).
  * CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
  * CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
    (bsc#1224545)
  * CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
  * CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
    (bsc#1224604).
  * CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
  * CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
  * CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
  * CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on
    updates (bsc#1223836).
  * CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
  * CVE-2024-27064: netfilter: nf_tables: Fix a memory leak in
    nf_tables_updchain (bsc#1223740).
  * CVE-2024-26663: tipc: Check the bearer type before calling
    tipc_udp_nl_bearer_add() (bsc#1222326).
  * CVE-2023-47210: wifi: iwlwifi: bump FW API to 90 for BZ/SC devices
    (bsc#1225601, bsc#1225600).
  * CVE-2023-52775: net/smc: avoid data corruption caused by decline
    (bsc#1225088).
  * CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for
    ICMPv6 (bsc#1226783).
  * CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core
    (bsc#1227626).
  * CVE-2024-26826: mptcp: fix data re-injection from stale subflow
    (bsc#1223010).
  * CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection
    dump (bsc#1220942).
  * CVE-2024-35942: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to
    hdmimix domain (bsc#1224589).
  * CVE-2024-26691: KVM: arm64: Fix circular locking dependency (bsc#1222463).
  * CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't
    be re-encrypted (bsc#1225744).
  * CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
  * CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
  * CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl
    (bsc#1225752).
  * CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted()
    fails (bsc#1225753).
  * CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU
    error (bsc#1222328).
  * CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port
    (bsc#1226883).
  * CVE-2023-52751: smb: client: fix use-after-free in
    smb2_query_info_compound() (bsc#1225489).
  * CVE-2024-39482: bcache: fix variable length array abuse in btree_iter
    (bsc#1227447).
  * CVE-2024-39474: mm/vmalloc: fix vmalloc which may return null if called with
    __GFP_NOFAIL (bsc#1227434).
  * CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding
    changes (bsc#1221659).
  * CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
  * CVE-2024-38598: md: fix resync softlockup when bitmap size is less than
    array size (bsc#1226757).
  * CVE-2024-36003: ice: fix LAG and VF lock dependency in ice_reset_vf()
    (bsc#1224544).
  * CVE-2024-38604: block: refine the EOF check in blkdev_iomap_begin
    (bsc#1226866).
  * CVE-2024-26641: ip6_tunnel: make sure to pull inner header in
    __ip6_tnl_rcv() (bsc#1221654).
  * CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node()
    (bsc#1223021).
  * CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in
    ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
  * CVE-2024-26623: pds_core: Prevent race issues involving the adminq
    (bsc#1221057).
  * CVE-2024-26785: iommufd: Fix protection fault in iommufd_test_syz_conv_iova
    (bsc#1222779).
  * CVE-2024-26734: devlink: fix possible use-after-free and memory leaks in
    devlink_init() (bsc#1222438).
  * CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit
    (bsc#1224743).
  * CVE-2024-39371: io_uring: check for non-NULL file pointer in
    io_file_can_poll() (bsc#1226990).
  * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
    (bsc#1225098).
  * CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in
    acrn_vm_ram_map() (bsc#1226758).
  * CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write
    into prealloc (bsc#1227101).
  * CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources
    after upload (bsc#1225767).
  * CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated
    (bsc#1226785).
  * CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount
    (bsc#1226775).
  * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
    (bsc#1225732).
  * CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
  * CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
  * CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
  * CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path
    (bsc#1224751).
  * CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback
    flag waiting (bsc#1227066).
  * CVE-2024-35247: fpga: region: add owner module and take its refcount
    (bsc#1226948).
  * CVE-2024-36479: fpga: bridge: add owner module and take its refcount
    (bsc#1226949).
  * CVE-2024-37021: fpga: manager: add owner module and take its refcount
    (bsc#1226950).
  * CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly
    delete status rules (bsc#1226799).
  * CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
  * CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power'
    and 'submit_queues' (bsc#1226841).
  * CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address
    (bsc#1226879).
  * CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap()
    (bsc#1226996).
  * CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in
    BPF_LINK_CREATE (bsc#1226789).
  * CVE-2024-38566: bpf: Fix verifier assumptions about socket->sk
    (bsc#1226790).
  * CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated
    (bsc#1226786).
  * CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in
    multiq_tune() (bsc#1226514).
  * CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
  * CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
    (bsc#1226519).
  * CVE-2024-38627: stm class: Fix a double free in stm_register_device()
    (bsc#1226857).
  * CVE-2024-38603: drivers/perf: hisi: hns3: Actually use
    devm_add_action_or_reset() (bsc#1226842).
  * CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock
    (bsc#1226744).
  * CVE-2024-38555: net/mlx5: Discard command completions in internal error
    (bsc#1226607).
  * CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue
    semaphore (bsc#1226774).
  * CVE-2024-38557: net/mlx5: Reload only IB representors upon lag
    disable/enable (bsc#1226781).
  * CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
  * CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks
    (bsc#1226749).
  * CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv
    (bsc#1226734).
  * CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid
    event group (bsc#1226772).
  * CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid
    event group (bsc#1226771).
  * CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger
    (bsc#1222810).
  * CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).
  * CVE-2024-36945: net/smc: fix neighbour and rtable leak in
    smc_ib_find_route() (bsc#1225823).
  * CVE-2024-36923: fs/9p: fix uninitialized values during inode evict
    (bsc#1225815).
  * CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
  * CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back
    (bsc#1224439).
  * CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag
    update (bsc#1224497).
  * CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done()
    (bsc#1224670).
  * CVE-2024-36024: drm/amd/display: Disable idle reallow as part of
    command/gpint execution (bsc#1225702).
  * CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb()
    (bsc#1225741).
  * CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable
    (bsc#1225757).
  * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
    (bsc#1225737).
  * CVE-2024-35979: raid1: fix use-after-free for original bio in
    raid1_write_request() (bsc#1224572).
  * CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
  * CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex
    bg (bsc#1222080).
  * CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
  * CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in
    __nft_flowtable_type_get() (bsc#1224498).
  * CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
    (bsc#1225758).
  * CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute
    validation (bsc#1225681).
  * CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order()
    (bsc#1225723).
  * CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
  * CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during
    initialization (bsc#1225726).
  * CVE-2023-52787: blk-mq: make sure active queue usage is held for
    bio_integrity_prep() (bsc#1225105).
  * CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum()
    (bsc#1224661).
  * CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
  * CVE-2023-52786: ext4: fix racy may inline data check in dio write
    (bsc#1224939).
  * CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
  * CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763).
  * CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect
    (bsc#1225834).
  * CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
  * CVE-2023-52845: tipc: Change nla_policy for bearer-related names to
    NLA_NUL_STRING (bsc#1225585).
  * CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev
    release event path (bsc#1224539).
  * CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling
    (bsc#1223018).
  * CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()
    (bsc#1224515).
  * CVE-2024-35848: eeprom: at24: fix memory corruption race condition
    (bsc#1224612).
  * CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel
    (bsc#1224520).
  * CVE-2024-35857: icmp: prevent possible NULL dereferences from
    icmp_build_probe() (bsc#1224619).
  * CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call
    itself (bsc#1225475).
  * CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak
    (bsc#1224655).
  * CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
    (bsc#1224575).
  * CVE-2024-36938: Fixed NULL pointer dereference in
    sk_psock_skb_ingress_enqueue (bsc#1225761).
  * CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint()
    (bsc#1224540).
  * CVE-2024-35998: Fixed lock ordering potential deadlock in
    cifs_sync_mid_result (bsc#1224549).
  * CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
  * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
  * CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace
    (bsc#1225762).
  * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
  * CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap
    (bsc#1224523).
  * CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map
    fails (bsc#1224698).
  * CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep()
    (bsc#1224606).
  * CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
  * CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held
    (bsc#1224659).

The following non-security bugs were fixed:

  * ACPI: EC: Abort address space access upon error (stable-fixes).
  * ACPI: EC: Avoid returning AE_OK on errors in address space handler (stable-
    fixes).
  * ACPI: EC: Evaluate orphan _REG under EC device (git-fixes).
  * ACPI: EC: Install address space handler at the namespace root (stable-
    fixes).
  * ACPI: processor_idle: Fix invalid comparison with insertion sort for latency
    (git-fixes).
  * ACPI: resource: Do IRQ override on TongFang GXxHRXx and GMxHGxx (stable-
    fixes).
  * ACPI: x86: Add PNP_UART1_SKIP quirk for Lenovo Blade2 tablets (stable-
    fixes).
  * ACPI: x86: Force StorageD3Enable on more products (stable-fixes).
  * ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is
    fine." (git-fixes).
  * ALSA/hda: intel-dsp-config: Document AVS as dsp_driver option (git-fixes).
  * ALSA: PCM: Allow resume only for suspended streams (stable-fixes).
  * ALSA: dmaengine: Synchronize dma channel after drop() (stable-fixes).
  * ALSA: dmaengine_pcm: terminate dmaengine before synchronize (stable-fixes).
  * ALSA: emux: improve patch ioctl data validation (stable-fixes).
  * ALSA: hda/conexant: Mute speakers at suspend / shutdown (bsc#1228269).
  * ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown
    (bsc#1228269).
  * ALSA: hda/realtek: Add more codec ID to no shutup pins list (stable-fixes).
  * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14AHP9 (stable-fixes).
  * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ARP8 (stable-fixes).
  * ALSA: hda/realtek: Enable Mute LED on HP 250 G7 (stable-fixes).
  * ALSA: hda/realtek: Enable headset mic on IdeaPad 330-17IKB 81DM (git-fixes).
  * ALSA: hda/realtek: Enable headset mic on Positivo SU C1400 (stable-fixes).
  * ALSA: hda/realtek: Fix conflicting quirk for PCI SSID 17aa:3820 (git-fixes).
  * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360
    (stable-fixes).
  * ALSA: hda/realtek: Limit mic boost on N14AP7 (stable-fixes).
  * ALSA: hda/realtek: Limit mic boost on VAIO PRO PX (stable-fixes).
  * ALSA: hda/realtek: Remove Framework Laptop 16 from quirks (git-fixes).
  * ALSA: hda/realtek: Support Lenovo Thinkbook 13x Gen 4 (stable-fixes).
  * ALSA: hda/realtek: Support Lenovo Thinkbook 16P Gen 5 (stable-fixes).
  * ALSA: hda/realtek: add quirk for Clevo V5[46]0TU (stable-fixes).
  * ALSA: hda/realtek: cs35l41: Fixup remaining asus strix models (git-fixes).
  * ALSA: hda/realtek: fix mute/micmute LEDs do not work for EliteBook 645/665
    G11 (stable-fixes).
  * ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 445/465 G11
    (stable-fixes).
  * ALSA: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx (stable-fixes).
  * ALSA: hda/tas2781: Add new quirk for Lenovo Hera2 Laptop (stable-fixes).
  * ALSA: hda: cs35l41: Component should be unbound before deconstruction (git-
    fixes).
  * ALSA: hda: cs35l41: Fix swapped l/r audio channels for Lenovo ThinBook 13x
    Gen4 (git-fixes).
  * ALSA: hda: cs35l41: Possible null pointer dereference in
    cs35l41_hda_unbind() (git-fixes).
  * ALSA: hda: cs35l41: Support Lenovo Thinkbook 13x Gen 4 (stable-fixes).
  * ALSA: hda: cs35l41: Support Lenovo Thinkbook 16P Gen 5 (stable-fixes).
  * ALSA: hda: cs35l56: Component should be unbound before deconstruction (git-
    fixes).
  * ALSA: hda: cs35l56: Fix lifecycle of codec pointer (stable-fixes).
  * ALSA: hda: tas2781: Component should be unbound before deconstruction (git-
    fixes).
  * ALSA: pcm_dmaengine: Do not synchronize DMA channel when DMA is paused (git-
    fixes).
  * ALSA: seq: Fix missing MSB in MIDI2 SPP conversion (git-fixes).
  * ALSA: seq: Fix missing channel at encoding RPN/NRPN MIDI2 messages (git-
    fixes).
  * ALSA: seq: ump: Fix missing System Reset message handling (git-fixes).
  * ALSA: seq: ump: Skip useless ports for static blocks (git-fixes).
  * ALSA: ump: Do not update FB name for static blocks (git-fixes).
  * ALSA: ump: Force 1 Group for MIDI1 FBs (git-fixes).
  * ALSA: usb-audio: Add a quirk for Sonix HD USB Camera (stable-fixes).
  * ALSA: usb-audio: Fix microphone sound on HD webcam (stable-fixes).
  * ALSA: usb-audio: Move HD Webcam quirk to the right place (git-fixes).
  * ASoC: Intel: common: add ACPI matching tables for Arrow Lake (stable-fixes).
  * ASoC: Intel: sof-sdw: really remove FOUR_SPEAKER quirk (git-fixes).
  * ASoC: Intel: sof_sdw: add JD2 quirk for HP Omen 14 (stable-fixes).
  * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0C0F (stable-fixes).
  * ASoC: Intel: use soc_intel_is_byt_cr() only when IOSF_MBI is reachable (git-
    fixes).
  * ASoC: SOF: Intel: hda-pcm: Limit the maximum number of periods by
    MAX_BDL_ENTRIES (stable-fixes).
  * ASoC: SOF: Intel: hda: fix null deref on system suspend entry (git-fixes).
  * ASoC: SOF: imx8m: Fix DSP control regmap retrieval (git-fixes).
  * ASoC: SOF: ipc4-topology: Preserve the DMA Link ID for ChainDMA on unprepare
    (git-fixes).
  * ASoC: SOF: ipc4-topology: Use correct queue_id for requesting input pin
    format (stable-fixes).
  * ASoC: SOF: pcm: Restrict DSP D0i3 during S0ix to IPC3 (stable-fixes).
  * ASoC: SOF: sof-audio: Skip unprepare for in-use widgets on error rollback
    (stable-fixes).
  * ASoC: TAS2781: Fix tasdev_load_calibrated_data() (git-fixes).
  * ASoC: amd: Adjust error handling in case of absent codec device (git-fixes).
  * ASoC: amd: acp: add a null check for chip_pdev structure (git-fixes).
  * ASoC: amd: acp: remove i2s configuration check in acp_i2s_probe() (git-
    fixes).
  * ASoC: amd: yc: Fix non-functional mic on ASUS M5602RA (stable-fixes).
  * ASoC: amd: yc: Support mic on Lenovo Thinkpad E16 Gen 2 (bsc#1228269).
  * ASoC: cs35l56: Accept values greater than 0 as IRQ numbers (git-fixes).
  * ASoC: fsl-asoc-card: set priv->pdev before using it (git-fixes).
  * ASoC: fsl: fsl_qmc_audio: Check devm_kasprintf() returned value (git-fixes).
  * ASoC: max98088: Check for clk_prepare_enable() error (git-fixes).
  * ASoC: q6apm-lpass-dai: close graph on prepare errors (git-fixes).
  * ASoC: qcom: Adjust issues in case of DT error in
    asoc_qcom_lpass_cpu_platform_probe() (git-fixes).
  * ASoC: rockchip: i2s-tdm: Fix trcm mode by setting clock on right mclk (git-
    fixes).
  * ASoC: rt711-sdw: add missing readable registers (stable-fixes).
  * ASoC: rt722-sdca-sdw: add debounce time for type detection (stable-fixes).
  * ASoC: rt722-sdca-sdw: add silence detection register as volatile (stable-
    fixes).
  * ASoC: sof: amd: fix for firmware reload failure in Vangogh platform (git-
    fixes).
  * ASoC: ti: davinci-mcasp: Set min period size using FIFO config (stable-
    fixes).
  * ASoC: ti: omap-hdmi: Fix too long driver name (stable-fixes).
  * ASoC: topology: Do not assign fields that are already set (stable-fixes).
  * ASoC: topology: Fix references to freed memory (stable-fixes).
  * ASoc: tas2781: Enable RCA-based playback without DSP firmware download (git-
    fixes).
  * Bluetooth: ISO: Check socket flag instead of hcon (git-fixes).
  * Bluetooth: ISO: Fix BIS cleanup (stable-fixes).
  * Bluetooth: Ignore too large handle values in BIG (git-fixes).
  * Bluetooth: L2CAP: Fix rejecting L2CAP_CONN_PARAM_UPDATE_REQ (git-fixes).
  * Bluetooth: Remove usage of the deprecated ida_simple_xx() API (stable-
    fixes).
  * Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl (stable-
    fixes).
  * Bluetooth: btintel: Refactor btintel_set_ppag() (git-fixes).
  * Bluetooth: btnxpuart: Add handling for boot-signature timeout errors (git-
    fixes).
  * Bluetooth: btnxpuart: Enable Power Save feature on startup (stable-fixes).
  * Bluetooth: hci_bcm4377: Fix msgid release (git-fixes).
  * Bluetooth: hci_bcm4377: Use correct unit for timeouts (git-fixes).
  * Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (stable-
    fixes).
  * Bluetooth: hci_event: Fix setting of unicast qos interval (git-fixes).
  * Bluetooth: hci_event: Remove code to removed CONFIG_BT_HS (stable-fixes).
  * Bluetooth: hci_event: Set QoS encryption from BIGInfo report (git-fixes).
  * Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot
    (git-fixes).
  * Bluetooth: qca: set power_ctrl_enabled on NULL returned by
    gpiod_get_optional() (git-fixes).
  * Enable CONFIG_SCHED_CLUSTER=y on arm64 (jsc#PED-8701).
  * HID: Add quirk for Logitech Casa touchpad (stable-fixes).
  * HID: Ignore battery for ELAN touchscreens 2F2C and 4116 (stable-fixes).
  * HID: core: remove unnecessary WARN_ON() in implement() (git-fixes).
  * HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() (git-
    fixes).
  * HID: mcp-2221: cancel delayed_work only when CONFIG_IIO is enabled (stable-
    fixes).
  * HID: wacom: Modify pen IDs (git-fixes).
  * Input: ads7846 - use spi_device_id table (stable-fixes).
  * Input: elan_i2c - do not leave interrupt disabled on suspend failure (git-
    fixes).
  * Input: elantech - fix touchpad state on resume for Lenovo N24 (stable-
    fixes).
  * Input: ff-core - prefer struct_size over open coded arithmetic (stable-
    fixes).
  * Input: i8042 - add Ayaneo Kun to i8042 quirk table (stable-fixes).
  * Input: ili210x - fix ili251x_read_touch_data() return value (git-fixes).
  * Input: qt1050 - handle CHIP_ID reading error (git-fixes).
  * Input: silead - Always support 10 fingers (stable-fixes).
  * Input: xpad - add support for ASUS ROG RAIKIRI (git-fixes).
  * Input: xpad - add support for ASUS ROG RAIKIRI PRO (stable-fixes).
  * KVM: SEV-ES: Delegate LBR virtualization to the processor (git-fixes).
  * KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent (git-
    fixes).
  * KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (git-
    fixes).
  * KVM: arm64: Use local TLBI on permission relaxation (bsc#1219478).
  * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index
    (bsc#1226158).
  * KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes (git-
    fixes).
  * KVM: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID
    (git-fixes).
  * NFS: Fix READ_PLUS when server does not support OP_READ_PLUS (git-fixes).
  * NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847).
  * NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
  * NFS: add barriers when testing for NFS_FSDATA_BLOCKED (git-fixes).
  * NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).
  * NFSD: Fix checksum mismatches in the duplicate reply cache (git-fixes).
  * NFSv4.1 enforce rootpath check in fs_location query (git-fixes).
  * NFSv4.x: by default serialize open/close operations (bsc#1223863
    bsc#1227362).
  * NFSv4: Fixup smatch warning for ambiguous return (git-fixes).
  * PCI/ASPM: Update save_state when configuration changes (bsc#1226915)
  * PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal (git-fixes).
  * PCI/MSI: Fix UAF in msi_capability_init (git-fixes).
  * PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (stable-fixes).
  * PCI: Clear Secondary Status errors after enumeration (bsc#1226928)
  * PCI: Do not wait for disconnected devices when resuming (git-fixes).
  * PCI: Extend ACS configurability (bsc#1228090).
  * PCI: Fix resource double counting on remove & rescan (git-fixes).
  * PCI: Introduce cleanup helpers for device reference counts and locks
    (stable-fixes).
  * PCI: dw-rockchip: Fix initial PERST# GPIO value (git-fixes).
  * PCI: dwc: Fix index 0 incorrectly being interpreted as a free ATU slot (git-
    fixes).
  * PCI: endpoint: Clean up error handling in vpci_scan_bus() (git-fixes).
  * PCI: endpoint: Fix error handling in epf_ntb_epc_cleanup() (git-fixes).
  * PCI: endpoint: pci-epf-test: Make use of cached 'epc_features' in
    pci_epf_test_core_init() (git-fixes).
  * PCI: keystone: Do not enable BAR 0 for AM654x (git-fixes).
  * PCI: keystone: Fix NULL pointer dereference in case of DT error in
    ks_pcie_setup_rc_app_regs() (git-fixes).
  * PCI: keystone: Relocate ks_pcie_set/clear_dbi_mode() (git-fixes).
  * PCI: qcom-ep: Disable resources unconditionally during PERST# assert (git-
    fixes).
  * PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup()
    (git-fixes).
  * PCI: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio (git-fixes).
  * PCI: tegra194: Set EP alignment restriction for inbound ATU (git-fixes).
  * PCI: vmd: Create domain symlink before pci_bus_add_devices() (bsc#1227363).
  * RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300).
  * RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address
    translation (bsc#1225300).
  * RDMA/bnxt_re: Fix the max msix vectors macro (git-fixes)
  * RDMA/mana_ib: Ignore optional access flags for MRs (git-fixes).
  * RDMA/mlx5: Add check for srq max_sge attribute (git-fixes)
  * RDMA/mlx5: Ensure created mkeys always have a populated rb_key (git-fixes)
  * RDMA/mlx5: Fix unwind flow as part of mlx5_ib_stage_init_init (git-fixes)
  * RDMA/mlx5: Follow rb_key.ats when creating new mkeys (git-fixes)
  * RDMA/mlx5: Remove extra unlock on error path (git-fixes)
  * RDMA/restrack: Fix potential invalid address access (git-fixes)
  * RDMA/rxe: Fix data copy for IB_SEND_INLINE (git-fixes)
  * RDMA/rxe: Fix responder length checking for UD request packets (git-fixes)
  * SUNRPC: Fix gss_free_in_token_pages() (git-fixes).
  * SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-
    fixes).
  * SUNRPC: avoid soft lockup when transmitting UDP to reachable server
    (bsc#1225272).
  * SUNRPC: return proper error from gss_wrap_req_priv (git-fixes).
  * Temporarily drop KVM patch that caused a regression (bsc#1226158)
  * USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k (stable-fixes).
  * USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-
    fixes).
  * USB: core: Fix duplicate endpoint bug by clearing reserved bits in the
    descriptor (git-fixes).
  * USB: serial: mos7840: fix crash on resume (git-fixes).
  * USB: serial: option: add Fibocom FM350-GL (stable-fixes).
  * USB: serial: option: add Netprisma LCUK54 series modules (stable-fixes).
  * USB: serial: option: add Rolling RW350-GL variants (stable-fixes).
  * USB: serial: option: add Telit FN912 rmnet compositions (stable-fixes).
  * USB: serial: option: add Telit generic core-dump composition (stable-fixes).
  * USB: serial: option: add support for Foxconn T99W651 (stable-fixes).
  * USB: xen-hcd: Traverse host/ when CONFIG_USB_XEN_HCD is selected (git-
    fixes).
  * X.509: Fix the parser of extended key usage for length (bsc#1218820).
  * arm64/io: Provide a WC friendly __iowriteXX_copy() (bsc#1226502)
  * arm64/io: add constant-argument check (bsc#1226502 git-fixes)
  * arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes).
  * arm64: dts: freescale: imx8mm-verdin: enable hysteresis on slow input (git-
    fixes)
  * arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc (git-fixes)
  * arm64: dts: imx93-11x11-evk: Remove the 'no-sdio' property (git-fixes)
  * arm64: dts: rockchip: Add mdio and ethernet-phy nodes to (git-fixes)
  * arm64: dts: rockchip: Add missing power-domains for rk356x vop_mmu (git-
    fixes)
  * arm64: dts: rockchip: Add pinctrl for UART0 to rk3308-rock-pi-s (git-fixes)
  * arm64: dts: rockchip: Add sdmmc related properties on (git-fixes)
  * arm64: dts: rockchip: Add sound-dai-cells for RK3368 (git-fixes)
  * arm64: dts: rockchip: Drop invalid mic-in-differential on (git-fixes)
  * arm64: dts: rockchip: Fix SD NAND and eMMC init on rk3308-rock-pi-s (git-
    fixes)
  * arm64: dts: rockchip: Fix mic-in-differential usage on (git-fixes)
  * arm64: dts: rockchip: Fix mic-in-differential usage on rk3566-roc-pc (git-
    fixes)
  * arm64: dts: rockchip: Fix the DCDC_REG2 minimum voltage on Quartz64 (git-
    fixes)
  * arm64: dts: rockchip: Fix the value of `dlg,jack-det-rate` mismatch (git-
    fixes)
  * arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
  * arm64: dts: rockchip: Rename LED related pinctrl nodes on (git-fixes)
  * arm64: dts: rockchip: Update WIFi/BT related nodes on (git-fixes)
  * arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E (git-fixes)
  * arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8688).
  * arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8688).
  * arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8688).
  * ata,scsi: libata-core: Do not leak memory for ata_port struct members (git-
    fixes).
  * ata: ahci: Clean up sysfs file on error (git-fixes).
  * ata: libata-core: Fix double free on error (git-fixes).
  * ata: libata-core: Fix null pointer dereference on error (git-fixes).
  * ata: libata-scsi: Fix offsets for the fixed format sense data (git-fixes).
  * auxdisplay: ht16k33: Drop reference after LED registration (git-fixes).
  * ax25: Fix refcount imbalance on inbound connections (git-fixes).
  * batman-adv: Do not accept TT entries for out-of-spec VIDs (git-fixes).
  * batman-adv: bypass empty buckets in batadv_purge_orig_ref() (stable-fixes).
  * block: Move checking GENHD_FL_NO_PART to bdev_add_partition() (bsc#1226213).
  * bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX (git-
    fixes).
  * bpf: check bpf_func_state->callback_depth when pruning states (bsc#1225903).
  * bpf: correct loop detection for iterators convergence (bsc#1225903).
  * bpf: exact states comparison for iterator convergence checks (bsc#1225903).
  * bpf: extract __check_reg_arg() utility function (bsc#1225903).
  * bpf: extract same_callsites() as utility function (bsc#1225903).
  * bpf: extract setup_func_entry() utility function (bsc#1225903).
  * bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903).
  * bpf: move explored_state() closer to the beginning of verifier.c
    (bsc#1225903).
  * bpf: print full verifier states on infinite loop detection (bsc#1225903).
  * bpf: verify callbacks as if they are called unknown number of times
    (bsc#1225903).
  * bpf: widening for callback iterators (bsc#1225903).
  * bus: mhi: host: allow MHI client drivers to provide the firmware via a
    pointer (bsc#1227149).
  * bytcr_rt5640 : inverse jack detect for Archos 101 cesium (stable-fixes).
  * cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd (git-
    fixes).
  * cachefiles: remove requests from xarray during flushing requests
    (bsc#1226588).
  * can: kvaser_usb: Explicitly initialize family in leafimx driver_info struct
    (git-fixes).
  * can: kvaser_usb: fix return value for hif_usb_send_regout (stable-fixes).
  * can: mcp251xfd: fix infinite loop when xmit fails (git-fixes).
  * cdrom: rearrange last_media_change check to avoid unintentional overflow
    (stable-fixes).
  * ceph: add ceph_cap_unlink_work to fire check_caps() immediately
    (bsc#1226022).
  * ceph: always check dir caps asynchronously (bsc#1226022).
  * ceph: always queue a writeback when revoking the Fb caps (bsc#1226022).
  * ceph: break the check delayed cap loop every 5s (bsc#1226022).
  * ceph: fix incorrect kmalloc size of pagevec mempool (bsc#1228417).
  * ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022).
  * char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git-
    fixes).
  * checkpatch: really skip LONG_LINE_* when LONG_LINE is ignored (git-fixes).
  * cifs: Add a laundromat thread for cached directories (git-fixes,
    bsc#1225172).
  * clk: davinci: da8xx-cfgchip: Initialize clk_init_data before use (git-
    fixes).
  * clk: mediatek: mt8183: Only enable runtime PM on mt8183-mfgcfg (git-fixes).
  * clk: qcom: clk-alpha-pll: set ALPHA_EN bit for Stromer Plus PLLs (git-
    fixes).
  * clk: qcom: gcc-sm6350: Fix gpll6* & gpll7 parents (git-fixes).
  * clkdev: Update clkdev id usage to allow for longer names (stable-fixes).
  * config/arm64: Enable CoreSight PMU drivers (bsc#1228289 jsc#PED-7859)
  * counter: ti-eqep: enable clock at probe (git-fixes).
  * cpufreq/amd-pstate: Fix the scaling_max_freq setting on shared memory CPPC
    systems (git-fixes).
  * cpufreq: amd-pstate: Fix the inconsistency in max frequency units (git-
    fixes).
  * cpufreq: amd-pstate: fix memory leak on CPU EPP exit (stable-fixes).
  * cpufreq: ti-cpufreq: Handle deferred probe with dev_err_probe() (git-fixes).
  * crypto/ecdh: make ecdh_compute_value() to zeroize the public key
    (bsc#1222768).
  * crypto/ecdsa: make ecdsa_ecc_ctx_deinit() to zeroize the public key
    (bsc#1222768).
  * crypto: aead,cipher - zeroize key buffer after use (stable-fixes).
  * crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked
    (git-fixes).
  * crypto: deflate - Add aliases to deflate (bsc#1227190).
  * crypto: ecdh - explicitly zeroize private_key (stable-fixes).
  * crypto: ecdsa - Fix the public key format description (git-fixes).
  * crypto: ecrdsa - Fix module auto-load on add_key (stable-fixes).
  * crypto: hisilicon/debugfs - Fix debugfs uninit process issue (stable-fixes).
  * crypto: hisilicon/qm - Add the err memory release process to qm uninit
    (stable-fixes).
  * crypto: hisilicon/sec - Fix memory leak for sec resource release (stable-
    fixes).
  * crypto: iaa - Account for cpu-less numa nodes (bsc#1227190).
  * crypto: qat - extend scope of lock in adf_cfg_add_key_value_param() (git-
    fixes).
  * cxl/region: Fix cxlr_pmem leaks (git-fixes).
  * cxl/region: Fix memregion leaks in devm_cxl_add_region() (git-fixes).
  * cxl/test: Add missing vmalloc.h for tools/testing/cxl/test/mem.c (git-
    fixes).
  * cxl/trace: Correct DPA field masks for general_media & dram events (git-
    fixes).
  * decompress_bunzip2: fix rare decompression failure (git-fixes).
  * devres: Fix devm_krealloc() wasting memory (git-fixes).
  * devres: Fix memory leakage caused by driver API devm_free_percpu() (git-
    fixes).
  * dlm: fix user space lock decision to copy lvb (git-fixes).
  * dma: fix call order in dmam_free_coherent (git-fixes).
  * dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (git-
    fixes).
  * dmaengine: ioatdma: Fix error path in ioat3_dma_probe() (git-fixes).
  * dmaengine: ioatdma: Fix kmemleak in ioat_pci_probe() (git-fixes).
  * dmaengine: ioatdma: Fix leaking on version mismatch (git-fixes).
  * dmaengine: ioatdma: Fix missing kmem_cache_destroy() (git-fixes).
  * dmaengine: ti: k3-udma: Fix BCHAN count with UHC and HC channels (git-
    fixes).
  * docs: crypto: async-tx-api: fix broken code example (git-fixes).
  * dpll: spec: use proper enum for pin capabilities attribute (git-fixes).
  * drivers/xen: Improve the late XenStore init protocol (git-fixes).
  * drivers: core: synchronize really_probe() and dev_uevent() (git-fixes).
  * drivers: soc: xilinx: check return status of get_api_version() (git-fixes).
  * drm/amd/amdgpu: Fix uninitialized variable warnings (git-fixes).
  * drm/amd/display: ASSERT when failing to find index by plane/stream id
    (stable-fixes).
  * drm/amd/display: Account for cursor prefetch BW in DML1 mode support
    (stable-fixes).
  * drm/amd/display: Add VCO speed parameter for DCN31 FPU (stable-fixes).
  * drm/amd/display: Add dtbclk access to dcn315 (stable-fixes).
  * drm/amd/display: Add refresh rate range check (stable-fixes).
  * drm/amd/display: Allocate zero bw after bw alloc enable (stable-fixes).
  * drm/amd/display: Check index msg_id before read or write (stable-fixes).
  * drm/amd/display: Check pipe offset before setting vblank (stable-fixes).
  * drm/amd/display: Disable seamless boot on 128b/132b encoding (stable-fixes).
  * drm/amd/display: Exit idle optimizations before HDCP execution (stable-
    fixes).
  * drm/amd/display: Fix DC mode screen flickering on DCN321 (stable-fixes).
  * drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport
    (stable-fixes).
  * drm/amd/display: Fix overlapping copy within dml_core_mode_programming
    (stable-fixes).
  * drm/amd/display: Fix refresh rate range for some panel (stable-fixes).
  * drm/amd/display: Fix uninitialized variables in DM (stable-fixes).
  * drm/amd/display: Move 'struct scaler_data' off stack (git-fixes).
  * drm/amd/display: Remove pixle rate limit for subvp (stable-fixes).
  * drm/amd/display: Revert Remove pixle rate limit for subvp (stable-fixes).
  * drm/amd/display: Send DP_TOTAL_LTTPR_CNT during detection if LTTPR is
    present (stable-fixes).
  * drm/amd/display: Set color_mgmt_changed to true on unsuspend (stable-fixes).
  * drm/amd/display: Skip finding free audio for unknown engine_id (stable-
    fixes).
  * drm/amd/display: Skip pipe if the pipe idx not set properly (stable-fixes).
  * drm/amd/display: Update efficiency bandwidth for dcn351 (stable-fixes).
  * drm/amd/display: Workaround register access in idle race with cursor
    (stable-fixes).
  * drm/amd/display: change dram_clock_latency to 34us for dcn35 (stable-fixes).
  * drm/amd/display: revert Exit idle optimizations before HDCP execution
    (stable-fixes).
  * drm/amd/pm: Fix aldebaran pcie speed reporting (git-fixes).
  * drm/amd/pm: Restore config space after reset (stable-fixes).
  * drm/amd/pm: remove logically dead code for renoir (git-fixes).
  * drm/amd: Fix shutdown (again) on some SMU v13.0.4/11 platforms (git-fixes).
  * drm/amdgpu/atomfirmware: add intergrated info v2.3 table (stable-fixes).
  * drm/amdgpu/atomfirmware: fix parsing of vram_info (stable-fixes).
  * drm/amdgpu/atomfirmware: silence UBSAN warning (stable-fixes).
  * drm/amdgpu/mes: fix use-after-free issue (stable-fixes).
  * drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit (git-
    fixes).
  * drm/amdgpu: Fix VRAM memory accounting (stable-fixes).
  * drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and
    rlc_microcode() (git-fixes).
  * drm/amdgpu: Fix memory range calculation (git-fixes).
  * drm/amdgpu: Fix pci state save during mode-1 reset (git-fixes).
  * drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() (git-fixes).
  * drm/amdgpu: Fix the ring buffer size for queue VM flush (stable-fixes).
  * drm/amdgpu: Fix uninitialized variable warnings (stable-fixes).
  * drm/amdgpu: Indicate CU havest info to CP (stable-fixes).
  * drm/amdgpu: Initialize timestamp for some legacy SOCs (stable-fixes).
  * drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1 (git-fixes).
  * drm/amdgpu: Update BO eviction priorities (stable-fixes).
  * drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
    (stable-fixes).
  * drm/amdgpu: add error handle to avoid out-of-bounds (stable-fixes).
  * drm/amdgpu: avoid using null object of framebuffer (stable-fixes).
  * drm/amdgpu: fix UBSAN warning in kv_dpm.c (stable-fixes).
  * drm/amdgpu: fix locking scope when flushing tlb (stable-fixes).
  * drm/amdgpu: fix the warning about the expression (int)size - len (stable-
    fixes).
  * drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes).
  * drm/amdgpu: init microcode chip name from ip versions (stable-fixes).
  * drm/amdgpu: silence UBSAN warning (stable-fixes).
  * drm/amdkfd: Add VRAM accounting for SVM migration (stable-fixes).
  * drm/amdkfd: Fix CU Masking for GFX 9.4.3 (git-fixes).
  * drm/amdkfd: Flush the process wq before creating a kfd_process (stable-
    fixes).
  * drm/amdkfd: Let VRAM allocations go to GTT domain on small APUs (stable-
    fixes).
  * drm/arm/komeda: Fix komeda probe failing if there are no links in the
    secondary pipeline (git-fixes).
  * drm/bridge/panel: Fix runtime warning on panel bridge release (git-fixes).
  * drm/bridge: it6505: fix hibernate to resume no display issue (git-fixes).
  * drm/bridge: samsung-dsim: Set P divider based on min/max of fin pll (git-
    fixes).
  * drm/dp_mst: Fix all mstb marked as not probed after suspend/resume (git-
    fixes).
  * drm/drm_file: Fix pid refcounting race (git-fixes).
  * drm/etnaviv: fix DMA direction handling for cached RW buffers (git-fixes).
  * drm/etnaviv: fix tx clock gating on some GC7000 variants (stable-fixes).
  * drm/exynos/vidi: fix memory leak in .get_modes() (stable-fixes).
  * drm/exynos: dp: drop driver owner initialization (stable-fixes).
  * drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found
    (git-fixes).
  * drm/fbdev-dma: Fix framebuffer mode for big endian devices (git-fixes).
  * drm/fbdev-dma: Only set smem_start is enable per module option (git-fixes).
  * drm/fbdev-generic: Fix framebuffer on big endian devices (git-fixes).
  * drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes (git-
    fixes).
  * drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes (git-
    fixes).
  * drm/i915/dp: Do not switch the LTTPR mode on an active link (git-fixes).
  * drm/i915/gt: Do not consider preemption during execlists_dequeue for gen8
    (git-fixes).
  * drm/i915/gt: Fix potential UAF by revoke of fence registers (git-fixes).
  * drm/i915/hwmon: Get rid of devm (stable-fixes).
  * drm/i915/mso: using joiner is not possible with eDP MSO (git-fixes).
  * drm/komeda: check for error-valued pointer (git-fixes).
  * drm/lima: Mark simple_ondemand governor as softdep (git-fixes).
  * drm/lima: add mask irq callback to gp and pp (stable-fixes).
  * drm/lima: fix shared irq handling on driver remove (stable-fixes).
  * drm/lima: mask irqs in timeout path before hard reset (stable-fixes).
  * drm/mediatek: Add DRM_MODE_ROTATE_0 to rotation property (git-fixes).
  * drm/mediatek: Add OVL compatible name for MT8195 (git-fixes).
  * drm/mediatek: Add missing plane settings when async update (git-fixes).
  * drm/mediatek: Call drm_atomic_helper_shutdown() at shutdown time (stable-
    fixes).
  * drm/mediatek: Fix XRGB setting error in Mixer (git-fixes).
  * drm/mediatek: Fix XRGB setting error in OVL (git-fixes).
  * drm/mediatek: Fix bit depth overwritten for mtk_ovl_set bit_depth() (git-
    fixes).
  * drm/mediatek: Fix destination alpha error in OVL (git-fixes).
  * drm/mediatek: Remove less-than-zero comparison of an unsigned value (git-
    fixes).
  * drm/mediatek: Set DRM mode configs accordingly (git-fixes).
  * drm/mediatek: Support DRM plane alpha in Mixer (git-fixes).
  * drm/mediatek: Support DRM plane alpha in OVL (git-fixes).
  * drm/mediatek: Support RGBA8888 and RGBX8888 in OVL on MT8195 (git-fixes).
  * drm/mediatek: Turn off the layers with zero width or height (git-fixes).
  * drm/mediatek: Use 8-bit alpha in ETHDR (git-fixes).
  * drm/meson: fix canvas release in bind function (git-fixes).
  * drm/mgag200: Bind I2C lifetime to DRM device (git-fixes).
  * drm/mgag200: Set DDC timeout in milliseconds (git-fixes).
  * drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_dcs_write_seq() (git-
    fixes).
  * drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_generic_write_seq()
    (git-fixes).
  * drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op (git-
    fixes).
  * drm/msm/dpu: fix encoder irq wait skip (git-fixes).
  * drm/msm/dsi: set VIDEO_COMPRESSION_MODE_CTRL_WC (git-fixes).
  * drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config (git-fixes).
  * drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
    (stable-fixes).
  * drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
    (stable-fixes).
  * drm/nouveau: do not attempt to schedule hpd_work on headless cards (git-
    fixes).
  * drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
    (git-fixes).
  * drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare() (git-
    fixes).
  * drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before
    regulators (git-fixes).
  * drm/panel: himax-hx8394: Handle errors from mipi_dsi_dcs_set_display_on()
    better (git-fixes).
  * drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep
    (stable-fixes).
  * drm/panel: ilitek-ili9882t: Check for errors on the NOP in prepare() (git-
    fixes).
  * drm/panel: ilitek-ili9882t: If prepare fails, disable GPIO before regulators
    (git-fixes).
  * drm/panel: simple: Add missing display timing flags for KOE TX26D202VM0BWA
    (git-fixes).
  * drm/panel: sitronix-st7789v: Add check for of_drm_get_panel_orientation
    (git-fixes).
  * drm/panfrost: Mark simple_ondemand governor as softdep (git-fixes).
  * drm/qxl: Add check for drm_cvt_mode (git-fixes).
  * drm/radeon/radeon_display: Decrease the size of allocated memory (stable-
    fixes).
  * drm/radeon: check bo_va->bo is non-NULL before using it (stable-fixes).
  * drm/radeon: fix UBSAN warning in kv_dpm.c (stable-fixes).
  * drm/rockchip: vop2: Fix the port mux of VP2 (git-fixes).
  * drm/sun4i: hdmi: Convert encoder to atomic (stable-fixes).
  * drm/sun4i: hdmi: Move mode_set into enable (stable-fixes).
  * drm/ttm: Always take the bo delayed cleanup path for imported bos (git-
    fixes).
  * drm/udl: Remove DRM_CONNECTOR_POLL_HPD (git-fixes).
  * drm/vmwgfx: 3D disabled should not effect STDU memory limits (git-fixes).
  * drm/vmwgfx: Do not memcmp equivalent pointers (git-fixes).
  * drm/vmwgfx: Filter modes which exceed graphics memory (git-fixes).
  * drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency (stable-fixes).
  * drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes).
  * drm: panel-orientation-quirks: Add quirk for Valve Galileo (stable-fixes).
  * drm: zynqmp_dpsub: Fix an error handling path in zynqmp_dpsub_probe() (git-
    fixes).
  * drm: zynqmp_kms: Fix AUX bus not getting unregistered (git-fixes).
  * eeprom: at24: Probe for DDR3 thermal sensor in the SPD case (stable-fixes).
  * eeprom: digsy_mtc: Fix 93xx46 driver probe failure (git-fixes).
  * efi/x86: Free EFI memory map only when installing a new one (git-fixes).
  * erofs: ensure m_llen is reset to 0 if metadata is invalid (git-fixes).
  * exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes).
  * f2fs: fix error path of __f2fs_build_free_nids (git-fixes).
  * filelock: fix potential use-after-free in posix_lock_inode (git-fixes).
  * firmware: cs_dsp: Fix overflow checking of wmfw header (git-fixes).
  * firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
    (git-fixes).
  * firmware: cs_dsp: Return error if block header overflows file (git-fixes).
  * firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (git-fixes).
  * firmware: cs_dsp: Validate payload length before processing block (git-
    fixes).
  * firmware: dmi: Stop decoding on broken entry (stable-fixes).
  * firmware: psci: Fix return value from psci_system_suspend() (git-fixes).
  * firmware: turris-mox-rwtm: Do not complete if there are no waiters (git-
    fixes).
  * firmware: turris-mox-rwtm: Fix checking return value of
    wait_for_completion_timeout() (git-fixes).
  * firmware: turris-mox-rwtm: Initialize completion before mailbox (git-fixes).
  * fpga: dfl-pci: add PCI subdevice ID for Intel D5005 card (stable-fixes).
  * fs/file: fix the check in find_next_fd() (git-fixes).
  * fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes).
  * fuse: verify {g,u}id mount options correctly (bsc#1228193).
  * genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after() (git-
    fixes).
  * gfs2: Do not forget to complete delayed withdraw (git-fixes).
  * gfs2: Fix "ignore unlock failures after withdraw" (git-fixes).
  * gfs2: Fix invalid metadata access in punch_hole (git-fixes).
  * gfs2: Get rid of gfs2_alloc_blocks generation parameter (git-fixes).
  * gfs2: Rename gfs2_lookup_{ simple => meta } (git-fixes).
  * gfs2: Use mapping->gfp_mask for metadata inodes (git-fixes).
  * gfs2: convert to ctime accessor functions (git-fixes).
  * gpio: davinci: Validate the obtained number of IRQs (git-fixes).
  * gpio: lpc32xx: fix module autoloading (stable-fixes).
  * gpio: mc33880: Convert comma to semicolon (git-fixes).
  * gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (stable-fixes).
  * gpio: tqmx86: fix broken IRQ_TYPE_EDGE_BOTH interrupt type (git-fixes).
  * gpio: tqmx86: fix typo in Kconfig label (git-fixes).
  * gpio: tqmx86: introduce shadow register for GPIO output value (git-fixes).
  * gpio: tqmx86: store IRQ trigger type and unmask status separately (git-
    fixes).
  * gpiolib: cdev: Disallow reconfiguration without direction (uAPI v1) (git-
    fixes).
  * hfsplus: fix to avoid false alarm of circular locking (git-fixes).
  * hfsplus: fix uninit-value in copy_name (git-fixes).
  * hpet: Support 32-bit userspace (git-fixes).
  * hwmon: (adt7475) Fix default duty on fan is disabled (git-fixes).
  * hwmon: (max6697) Fix swapped temp{1,8} critical alarms (git-fixes).
  * hwmon: (max6697) Fix underflow when writing limit attributes (git-fixes).
  * hwrng: amd - Convert PCIBIOS_* return codes to errnos (git-fixes).
  * hwrng: core - Fix wrong quality calculation at hw rng registration (git-
    fixes).
  * i2c: at91: Fix the functionality flags of the slave-only interface (git-
    fixes).
  * i2c: designware: Fix the functionality flags of the slave-only interface
    (git-fixes).
  * i2c: i801: Annotate apanel_addr as __ro_after_init (stable-fixes).
  * i2c: mark HostNotify target address as used (git-fixes).
  * i2c: ocores: set IACK bit after core is enabled (git-fixes).
  * i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr
    (git-fixes).
  * i2c: rcar: bring hardware to known state when probing (git-fixes).
  * i2c: testunit: avoid re-issued work after read message (git-fixes).
  * i2c: testunit: correct Kconfig description (git-fixes).
  * i2c: testunit: discard write requests while old command is running (git-
    fixes).
  * i2c: testunit: do not erase registers after STOP (git-fixes).
  * i40e: fix: remove needless retries of NVM update (bsc#1227736).
  * iio: Fix the sorting functionality in iio_gts_build_avail_time_table (git-
    fixes).
  * iio: accel: fxls8962af: select IIO_BUFFER & IIO_KFIFO_BUF (git-fixes).
  * iio: accel: mxc4005: Reset chip on probe() and resume() (stable-fixes).
  * iio: accel: mxc4005: allow module autoloading via OF compatible (stable-
    fixes).
  * iio: adc: ad7266: Fix variable checking bug (git-fixes).
  * iio: adc: ad9467: fix scan type sign (git-fixes).
  * iio: adc: ad9467: use chip_info variables instead of array (stable-fixes).
  * iio: adc: ad9467: use spi_get_device_match_data() (stable-fixes).
  * iio: chemical: bme680: Fix calibration data variable (git-fixes).
  * iio: chemical: bme680: Fix overflows in compensate() functions (git-fixes).
  * iio: chemical: bme680: Fix pressure value output (git-fixes).
  * iio: chemical: bme680: Fix sensor data read operation (git-fixes).
  * iio: dac: ad5592r: fix temperature channel scaling value (git-fixes).
  * iio: frequency: adrf6780: rm clk provider include (git-fixes).
  * iio: imu: inv_icm42600: delete unneeded update watermark call (git-fixes).
  * iio: pressure: bmp280: Fix BMP580 temperature reading (stable-fixes).
  * iio: pressure: fix some word spelling errors (stable-fixes).
  * iio: xilinx-ams: Do not include ams_ctrl_channels in scan_mask (git-fixes).
  * input: Add event code for accessibility key (stable-fixes).
  * input: Add support for "Do Not Disturb" (stable-fixes).
  * intel_th: pci: Add Granite Rapids SOC support (stable-fixes).
  * intel_th: pci: Add Granite Rapids support (stable-fixes).
  * intel_th: pci: Add Lunar Lake support (stable-fixes).
  * intel_th: pci: Add Meteor Lake-S CPU support (stable-fixes).
  * intel_th: pci: Add Meteor Lake-S support (stable-fixes).
  * intel_th: pci: Add Sapphire Rapids SOC support (stable-fixes).
  * interconnect: qcom: qcm2290: Fix mas_snoc_bimc RPM master ID (git-fixes).
  * io-wq: write next_work before dropping acct_lock (git-fixes).
  * io_uring/io-wq: Use set_bit() and test_bit() at worker->flags (git-fixes).
  * io_uring/io-wq: avoid garbage value of 'match' in io_wq_enqueue() (git-
    fixes).
  * io_uring/kbuf: get rid of bl->is_ready (git-fixes).
  * io_uring/kbuf: get rid of lower BGID lists (git-fixes).
  * io_uring/kbuf: protect io_buffer_list teardown with a reference (git-fixes).
    Reuses a padding space in the structure.
  * io_uring/kbuf: rename is_mapped (git-fixes).
  * io_uring/net: correct the type of variable (git-fixes).
  * io_uring/net: correctly handle multishot recvmsg retry setup (git-fixes).
  * io_uring/net: fix sendzc lazy wake polling (git-fixes).
  * io_uring/net: move receive multishot out of the generic msghdr path (git-
    fixes).
  * io_uring/net: restore msg_control on sendzc retry (git-fixes).
  * io_uring/net: unify how recvmsg and sendmsg copy in the msghdr (git-fixes).
  * io_uring/rsrc: do not lock while !TASK_RUNNING (git-fixes).
  * io_uring/rsrc: fix incorrect assignment of iter->nr_segs in io_import_fixed
    (git-fixes).
  * io_uring/rw: do not allow multishot reads without NOWAIT support (git-
    fixes).
  * io_uring/rw: return IOU_ISSUE_SKIP_COMPLETE for multishot retry (git-fixes).
  * io_uring/sqpoll: work around a potential audit memory leak (git-fixes).
  * io_uring/unix: drop usage of io_uring socket (git-fixes).
  * io_uring: Fix io_cqring_wait() not restoring sigmask on get_timespec64()
    failure (git-fixes).
  * io_uring: clean rings on NO_MMAP alloc fail (git-fixes).
  * io_uring: clear opcode specific data for an early failure (git-fixes).
  * io_uring: do not save/restore iowait state (git-fixes).
  * io_uring: fail NOP if non-zero op flags is passed in (git-fixes).
  * io_uring: fix io_queue_proc modifying req->flags (git-fixes).
  * io_uring: fix mshot io-wq checks (git-fixes).
  * io_uring: fix mshot read defer taskrun cqe posting (git-fixes).
  * io_uring: fix poll_remove stalled req completion (git-fixes).
  * io_uring: remove looping around handling traditional task_work (git-fixes).
  * io_uring: remove unconditional looping in local task_work handling (git-
    fixes).
  * io_uring: use private workqueue for exit work (git-fixes).
  * io_uring: use the right type for work_llist empty check (git-fixes).
  * iommu/amd: Enhance def_domain_type to handle untrusted device (git-fixes).
  * iommu/amd: Fix panic accessing amd_iommu_enable_faulting (bsc#1224767).
  * iommu/amd: Fix sysfs leak in iommu init (git-fixes).
  * iommu/arm-smmu-v3: Free MSIs in case of ENOMEM (git-fixes).
  * iommu/vt-d: Allocate DMAR fault interrupts locally (bsc#1224767).
  * iommu/vt-d: Fix WARN_ON in iommu probe path (git-fixes).
  * iommu/vt-d: Improve ITE fault handling if target device isn't present (git-
    fixes).
  * iommu/vt-d: Use rbtree to track iommu probed devices (git-fixes).
  * iommu: Fix compilation without CONFIG_IOMMU_INTEL (git-fixes).
  * iommu: Return right value in iommu_sva_bind_device() (git-fixes).
  * iommu: Undo pasid attachment only for the devices that have succeeded (git-
    fixes).
  * iommu: mtk: fix module autoloading (git-fixes).
  * ipmi: ssif_bmc: prevent integer overflow on 32bit systems (git-fixes).
  * ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
  * iwlwifi: fw: fix more kernel-doc warnings (bsc#1227149).
  * iwlwifi: mvm: Drop unused fw_trips_index[] from iwl_mvm_thermal_device
    (bsc#1227149).
  * iwlwifi: mvm: Populate trip table before registering thermal zone
    (bsc#1227149).
  * iwlwifi: mvm: Use for_each_thermal_trip() for walking trip points
    (bsc#1227149).
  * jffs2: Fix potential illegal address access in jffs2_free_inode (git-fixes).
  * jfs: Fix array-index-out-of-bounds in diFree (git-fixes).
  * jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
  * kABI fix of KVM: x86/pmu: Prioritize VMX interception over
  * kABI workaround for sof_ipc_pcm_ops (git-fixes).
  * kABI workaround for wireless updates (bsc#1227149).
  * kABI: bpf: verifier kABI workaround (bsc#1225903).
  * kabi/severities: Ignore io_uring internal symbols
  * kabi/severities: cleanup and update for WiFi driver entries (bsc#1227149)
  * kabi/severities: cover all ath/ _drivers (bsc#1227149) All symbols in ath/_
    network drivers are local and can be ignored
  * kabi/severities: cover all mt76 modules (bsc#1227149)
  * kabi/severities: ignore amd pds internal symbols
  * kabi/severities: ignore kABI changes Realtek WiFi drivers (bsc#1227149) All
    those symbols are local and used for its own helpers
  * kabi: Use __iowriteXX_copy_inlined for in-kernel modules (bsc#1226502)
  * kbuild: Fix build target deb-pkg: ln: failed to create hard link (git-
    fixes).
  * kbuild: Install dtb files as 0644 in Makefile.dtbinst (git-fixes).
  * kbuild: avoid build error when single DTB is turned into composite DTB (git-
    fixes).
  * kbuild: doc: Update default INSTALL_MOD_DIR from extra to updates (git-
    fixes).
  * kconfig: doc: fix a typo in the note about 'imply' (git-fixes).
  * kconfig: fix comparison to constant symbols, 'm', 'n' (git-fixes).
  * kconfig: gconf: give a proper initial state to the Save button (stable-
    fixes).
  * kconfig: remove wrong expr_trans_bool() (stable-fixes).
  * kcov: do not lose track of remote references during softirqs (git-fixes).
  * kernel-binary: vdso: Own module_dir
  * kernel-doc: fix struct_group_tagged() parsing (git-fixes).
  * kheaders: explicitly define file modes for archived headers (stable-fixes).
  * knfsd: LOOKUP can return an illegal error value (git-fixes).
  * kobject_uevent: Fix OOB access within zap_modalias_env() (git-fixes).
  * kprobe/ftrace: bail out if ftrace was killed (git-fixes).
  * kprobe/ftrace: fix build error due to bad function definition (git-fixes).
  * kunit: Fix checksum tests on big endian CPUs (git-fixed).
  * leds: flash: leds-qcom-flash: Test the correct variable in init (git-fixes).
  * leds: mt6360: Fix memory leak in mt6360_init_isnk_properties() (git-fixes).
  * leds: ss4200: Convert PCIBIOS_* return codes to errnos (git-fixes).
  * leds: trigger: Unregister sysfs attributes before calling deactivate() (git-
    fixes).
  * leds: triggers: Flush pending brightness before activating trigger (git-
    fixes).
  * lib: objagg: Fix general protection fault (git-fixes).
  * lib: objagg: Fix spelling (git-fixes).
  * lib: test_objagg: Fix spelling (git-fixes).
  * libceph: fix race between delayed_work() and ceph_monc_stop() (bsc#1228192).
  * mISDN: Fix a use after free in hfcmulti_tx() (git-fixes).
  * mISDN: fix MISDN_TIME_STAMP handling (git-fixes).
  * mac802154: fix time calculation in ieee802154_configure_durations() (git-
    fixes).
  * mailbox: mtk-cmdq: Move devm_mbox_controller_register() after
    devm_pm_runtime_enable() (git-fixes).
  * media: dvb-frontends: tda10048: Fix integer overflow (stable-fixes).
  * media: dvb-frontends: tda18271c2dd: Remove casting during div (stable-
    fixes).
  * media: dvb-usb: Fix unexpected infinite loop in
    dvb_usb_read_remote_control() (git-fixes).
  * media: dvb-usb: dib0700_devices: Add missing release_firmware() (stable-
    fixes).
  * media: dvb: as102-fe: Fix as10x_register_addr packing (stable-fixes).
  * media: dvbdev: Initialize sbuf (stable-fixes).
  * media: dw2102: Do not translate i2c read into write (stable-fixes).
  * media: dw2102: fix a potential buffer overflow (git-fixes).
  * media: i2c: Fix imx412 exposure control (git-fixes).
  * media: imon: Fix race getting ictx->lock (git-fixes).
  * media: imx-jpeg: Drop initial source change event if capture has been setup
    (git-fixes).
  * media: imx-jpeg: Remove some redundant error logs (git-fixes).
  * media: imx-pxp: Fix ERR_PTR dereference in pxp_probe() (git-fixes).
  * media: lgdt3306a: Add a check against null-pointer-def (stable-fixes).
  * media: mxl5xx: Move xpt structures off stack (stable-fixes).
  * media: pci: ivtv: Add check for DMA map result (git-fixes).
  * media: radio-shark2: Avoid led_names truncations (git-fixes).
  * media: rcar-vin: Fix YUYV8_1X16 handling for CSI-2 (git-fixes).
  * media: renesas: vsp1: Fix _irqsave and _irq mix (git-fixes).
  * media: renesas: vsp1: Store RPF partition configuration per RPF instance
    (git-fixes).
  * media: s2255: Use refcount_t instead of atomic_t for num_channels (stable-
    fixes).
  * media: uvcvideo: Fix integer overflow calculating timestamp (git-fixes).
  * media: uvcvideo: Override default flags (git-fixes).
  * media: v4l2-core: hold videodev_lock until dev reg, finishes (stable-fixes).
  * media: v4l: async: Fix NULL pointer dereference in adding ancillary links
    (git-fixes).
  * media: v4l: subdev: Fix typo in documentation (git-fixes).
  * media: venus: fix use after free in vdec_close (git-fixes).
  * media: venus: flush all buffers in output plane streamoff (git-fixes).
  * mei: demote client disconnect warning on suspend to debug (stable-fixes).
  * mei: me: release irq in mei_me_pci_resume error path (git-fixes).
  * mfd: omap-usb-tll: Use struct_size to allocate tll (git-fixes).
  * mfd: pm8008: Fix regmap irq chip initialisation (git-fixes).
  * misc: fastrpc: Avoid updating PD type for capability request (git-fixes).
  * misc: fastrpc: Copy the complete capability structure to user (git-fixes).
  * misc: fastrpc: Fix DSP capabilities request (git-fixes).
  * misc: fastrpc: Fix memory leak in audio daemon attach operation (git-fixes).
  * misc: fastrpc: Fix ownership reassignment of remote heap (git-fixes).
  * misc: fastrpc: Restrict untrusted app to attach to privileged PD (git-
    fixes).
  * misc: microchip: pci1xxxx: Fix a memory leak in the error handling of
    gp_aux_bus_probe() (git-fixes).
  * misc: microchip: pci1xxxx: fix double free in the error handling of
    gp_aux_bus_probe() (git-fixes).
  * mmc: core: Add mmc_gpiod_set_cd_config() function (stable-fixes).
  * mmc: core: Do not force a retune before RPMB switch (stable-fixes).
  * mmc: sdhci-acpi: Add quirk to enable pull-up on the card-detect GPIO on Asus
    T100TA (git-fixes).
  * mmc: sdhci-acpi: Disable write protect detection on Toshiba WT10-A (stable-
    fixes).
  * mmc: sdhci-acpi: Fix Lenovo Yoga Tablet 2 Pro 1380 sdcard slot not working
    (stable-fixes).
  * mmc: sdhci-acpi: Sort DMI quirks alphabetically (stable-fixes).
  * mmc: sdhci-brcmstb: check R1_STATUS for erase/trim/discard (git-fixes).
  * mmc: sdhci-pci: Convert PCIBIOS_* return codes to errnos (git-fixes).
  * mmc: sdhci: Add support for "Tuning Error" interrupts (stable-fixes).
  * mmc: sdhci: Do not invert write-protect twice (git-fixes).
  * mmc: sdhci: Do not lock spinlock around mmc_gpio_get_ro() (git-fixes).
  * module: do not ignore sysfs_create_link() failures (git-fixes).
  * mt76: connac: move more mt7921/mt7915 mac shared code in connac lib
    (bsc#1227149).
  * mt76: mt7996: rely on mt76_sta_stats in mt76_wcid (bsc#1227149).
  * mtd: partitions: redboot: Added conversion of operands to a larger type
    (stable-fixes).
  * mtd: rawnand: Bypass a couple of sanity checks during NAND identification
    (git-fixes).
  * mtd: rawnand: Ensure ECC configuration is propagated to upper layers (git-
    fixes).
  * mtd: rawnand: Fix the nand_read_data_op() early check (git-fixes).
  * mtd: rawnand: rockchip: ensure NVDDR timings are rejected (git-fixes).
  * net/dcb: check for detached device before executing callbacks (bsc#1215587).
  * net/mlx5: Fix MTMP register capability offset in MCAM register (git-fixes).
  * net: can: j1939: Initialize unused data in j1939_send_one() (git-fixes).
  * net: can: j1939: enhanced error handling for tightly received RTS messages
    in xtp_rx_rts_session_new (git-fixes).
  * net: can: j1939: recover socket queue on CAN bus error during BAM
    transmission (git-fixes).
  * net: ena: Fix redundant device NUMA node override (jsc#PED-8688).
  * net: ethernet: mtk_wed: introduce mtk_wed_buf structure (bsc#1227149).
  * net: ethernet: mtk_wed: rename mtk_rxbm_desc in mtk_wed_bm_desc
    (bsc#1227149).
  * net: fill in MODULE_DESCRIPTION()s in kuba@'s modules (bsc#1227149).
  * net: hns3: Remove io_stop_wc() calls after __iowrite64_copy() (bsc#1226502)
  * net: lan743x: Support WOL at both the PHY and MAC appropriately (git-fixes).
  * net: lan743x: disable WOL upon resume to restore full data path operation
    (git-fixes).
  * net: mac802154: Fix racy device stats updates by DEV_STATS_INC() and
    DEV_STATS_ADD() (stable-fixes).
  * net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491).
  * net: mana: Fix possible double free in error handling path (git-fixes).
  * net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).
  * net: phy: Micrel KSZ8061: fix errata solution not taking effect problem
    (git-fixes).
  * net: phy: micrel: add Microchip KSZ 9477 to the device table (git-fixes).
  * net: phy: micrel: fix KSZ9477 PHY issues after suspend/resume (git-fixes).
  * net: phy: microchip: lan87xx: reinit PHY after cable test (git-fixes).
  * net: phy: mxl-gpy: Remove interrupt mask clearing from config_init (git-
    fixes).
  * net: phy: phy_device: Fix PHY LED blinking code comment (git-fixes).
  * net: usb: ax88179_178a: improve link status logs (git-fixes).
  * net: usb: ax88179_178a: improve reset check (git-fixes).
  * net: usb: qmi_wwan: add Telit FN912 compositions (stable-fixes).
  * net: usb: qmi_wwan: add Telit FN920C04 compositions (git-fixes).
  * net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings
    (git-fixes).
  * nfc/nci: Add the inconsistency check between the input data length and count
    (stable-fixes).
  * nfs: Avoid flushing many pages with NFS_FILE_SYNC (bsc#1218442).
  * nfs: Block on write congestion (bsc#1218442).
  * nfs: Bump default write congestion size (bsc#1218442).
  * nfs: Drop pointless check from nfs_commit_release_pages() (bsc#1218442).
  * nfs: Fix up kabi after adding write_congestion_wait (bsc#1218442).
  * nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes).
  * nfs: Properly initialize server->writeback (bsc#1218442).
  * nfs: drop the incorrect assertion in nfs_swap_rw() (git-fixes).
  * nfs: fix undefined behavior in nfs_block_bits() (git-fixes).
  * nfs: keep server info for remounts (git-fixes).
  * nfsd: hold a lighter-weight client reference over CB_RECALL_ANY (git-fixes).
  * nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).
  * nilfs2: add missing check for inode numbers on directory entries (stable-
    fixes).
  * nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro (git-fixes).
  * nilfs2: convert persistent object allocator to use kmap_local (git-fixes).
  * nilfs2: fix incorrect inode allocation from reserved inodes (git-fixes).
  * nilfs2: fix inode number range checks (stable-fixes).
  * nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (git-
    fixes).
  * nilfs2: fix potential hang in nilfs_detach_log_writer() (git-fixes).
  * nilfs2: return the mapped address from nilfs_get_page() (stable-fixes).
  * nouveau: add an ioctl to report vram usage (stable-fixes).
  * nouveau: add an ioctl to return vram bar size (stable-fixes).
  * nouveau: report byte usage in VRAM usage (git-fixes).
  * nvme-fabrics: short-circuit reconnect retries (bsc#1186716).
  * nvme-tcp: Export the nvme_tcp_wq to sysfs (bsc#1224049).
  * nvme/tcp: Add wq_unbound modparam for nvme_tcp_wq (bsc#1224049).
  * nvme: cancel pending I/O if nvme controller is in terminal state
    (bsc#1226503).
  * nvme: do not retry authentication failures (bsc#1186716).
  * nvme: find numa distance only if controller has valid numa id (git-fixes).
  * nvme: fix nvme_pr_* status code parsing (git-fixes).
  * nvme: return kernel error codes for admin queue connect (bsc#1186716).
  * nvmet-auth: replace pr_debug() with pr_err() to report an error (git-fixes).
  * nvmet-auth: return the error code to the nvmet_auth_host_hash() callers
    (git-fixes).
  * nvmet-passthru: propagate status from id override functions (git-fixes).
  * nvmet-tcp: fix possible memory leak when tearing down a controller (git-
    fixes).
  * nvmet: fix nvme status code when namespace is disabled (git-fixes).
  * nvmet: lock config semaphore when accessing DH-HMAC-CHAP key (bsc#1186716).
  * nvmet: prevent sprintf() overflow in nvmet_subsys_nsid_exists() (git-fixes).
  * nvmet: return DHCHAP status codes from nvmet_setup_auth() (bsc#1186716).
  * ocfs2: adjust enabling place for la window (bsc#1219224).
  * ocfs2: fix DIO failure due to insufficient transaction credits (git-fixes).
  * ocfs2: fix races between hole punching and AIO+DIO (git-fixes).
  * ocfs2: fix sparse warnings (bsc#1219224).
  * ocfs2: improve write IO performance when fragmentation is high
    (bsc#1219224).
  * ocfs2: speed up chain-list searching (bsc#1219224).
  * ocfs2: use coarse time for new created files (git-fixes).
  * orangefs: fix out-of-bounds fsid access (git-fixes).
  * pNFS/filelayout: fixup pNfs allocation modes (git-fixes).
  * phy: cadence-torrent: Check return value on register read (git-fixes).
  * pinctrl: core: fix possible memory leak when pinctrl_enable() fails (git-
    fixes).
  * pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (git-
    fixes).
  * pinctrl: freescale: mxs: Fix refcount of child (git-fixes).
  * pinctrl: qcom: spmi-gpio: drop broken pm8008 support (git-fixes).
  * pinctrl: renesas: r8a779g0: FIX PWM suffixes (git-fixes).
  * pinctrl: renesas: r8a779g0: Fix (H)SCIF1 suffixes (git-fixes).
  * pinctrl: renesas: r8a779g0: Fix (H)SCIF3 suffixes (git-fixes).
  * pinctrl: renesas: r8a779g0: Fix CANFD5 suffix (git-fixes).
  * pinctrl: renesas: r8a779g0: Fix FXR_TXEN[AB] suffixes (git-fixes).
  * pinctrl: renesas: r8a779g0: Fix IRQ suffixes (git-fixes).
  * pinctrl: renesas: r8a779g0: Fix TCLK suffixes (git-fixes).
  * pinctrl: renesas: r8a779g0: Fix TPU suffixes (git-fixes).
  * pinctrl: rockchip: fix pinmux bits for RK3328 GPIO2-B pins (git-fixes).
  * pinctrl: rockchip: fix pinmux bits for RK3328 GPIO3-B pins (git-fixes).
  * pinctrl: rockchip: fix pinmux reset in rockchip_pmx_set (git-fixes).
  * pinctrl: rockchip: update rk3308 iomux routes (git-fixes).
  * pinctrl: rockchip: use dedicated pinctrl type for RK3328 (git-fixes).
  * pinctrl: single: fix possible memory leak when pinctrl_enable() fails (git-
    fixes).
  * pinctrl: ti: ti-iodelay: fix possible memory leak when pinctrl_enable()
    fails (git-fixes).
  * platform/chrome: cros_ec_debugfs: fix wrong EC message version (git-fixes).
  * platform/x86/intel/tpmi: Handle error from tpmi_process_info() (stable-
    fixes).
  * platform/x86: ISST: Add Grand Ridge to HPM CPU list (stable-fixes).
  * platform/x86: dell-smbios: Fix wrong token data in sysfs (git-fixes).
  * platform/x86: lg-laptop: Change ACPI device id (stable-fixes).
  * platform/x86: lg-laptop: Remove LGEX0815 hotkey handling (stable-fixes).
  * platform/x86: lg-laptop: Use ACPI device handle when evaluating WMAB/WMBB
    (stable-fixes).
  * platform/x86: thinkpad_acpi: Take hotkey_mutex during hotkey_exit() (git-
    fixes).
  * platform/x86: toshiba_acpi: Add quirk for buttons on Z830 (stable-fixes).
  * platform/x86: toshiba_acpi: Fix array out-of-bounds access (git-fixes).
  * platform/x86: toshiba_acpi: Fix quickstart quirk handling (git-fixes).
  * platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW 11.6"
    tablet (stable-fixes).
  * platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro (stable-fixes).
  * platform/x86: wireless-hotkey: Add support for LG Airplane Button (stable-
    fixes).
  * power: supply: ab8500: Fix error handling when calling
    iio_read_channel_processed() (git-fixes).
  * power: supply: cros_usbpd: provide ID table for avoiding fallback match
    (stable-fixes).
  * power: supply: ingenic: Fix some error handling paths in
    ingenic_battery_get_property() (git-fixes).
  * powerpc/64s/radix/kfence: map __kfence_pool at page granularity (bsc#1223570
    ltc#205770).
  * powerpc/prom: Add CPU info to hardware description string later
    (bsc#1215199).
  * powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
  * powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()
    (bsc#1227487).
  * pwm: sti: Prepare removing pwm_chip from driver data (stable-fixes).
  * pwm: sti: Simplify probe function using devm functions (git-fixes).
  * pwm: stm32: Always do lazy disabling (git-fixes).
  * regmap-i2c: Subtract reg size from max_write (stable-fixes).
  * regulator: bd71815: fix ramp values (git-fixes).
  * regulator: core: Fix modpost error "regulator_get_regmap" undefined (git-
    fixes).
  * regulator: irq_helpers: duplicate IRQ name (stable-fixes).
  * regulator: vqmmc-ipq4019: fix module autoloading (stable-fixes).
  * remoteproc: imx_rproc: Fix refcount mistake in imx_rproc_addr_init (git-
    fixes).
  * remoteproc: imx_rproc: Skip over memory region when node value is NULL (git-
    fixes).
  * remoteproc: k3-r5: Fix IPC-only mode detection (git-fixes).
  * remoteproc: stm32_rproc: Fix mailbox interrupts queuing (git-fixes).
  * rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL (git-fixes).
  * rtc: abx80x: Fix return value of nvmem callback on read (git-fixes).
  * rtc: cmos: Fix return value of nvmem callbacks (git-fixes).
  * rtc: interface: Add RTC offset to alarm after fix-up (git-fixes).
  * rtc: isl1208: Fix return value of nvmem callbacks (git-fixes).
  * s390/cpacf: Make use of invalid opcode produce a link error (git-fixes
    bsc#1227072).
  * s390: Implement __iowrite32_copy() (bsc#1226502)
  * s390: Stop using weak symbols for __iowrite64_copy() (bsc#1226502)
  * saa7134: Unchecked i2c_transfer function result fixed (git-fixes).
  * sched/core: Fix incorrect initialization of the 'burst' parameter in
    cpu_max_write() (bsc#1226791).
  * selftests/bpf: test case for callback_depth states pruning logic
    (bsc#1225903).
  * selftests/bpf: test if state loops are detected in a tricky case
    (bsc#1225903).
  * selftests/bpf: test widening for iterating callbacks (bsc#1225903).
  * selftests/bpf: tests for iterating callbacks (bsc#1225903).
  * selftests/bpf: tests with delayed read/precision makrs in loop body
    (bsc#1225903).
  * selftests/bpf: track string payload offset as scalar in strobemeta
    (bsc#1225903).
  * selftests/bpf: track tcp payload offset as scalar in xdp_synproxy
    (bsc#1225903).
  * selftests/mm: compaction_test: fix incorrect write of zero to nr_hugepages
    (git-fixes).
  * selftests/mm: fix build warnings on ppc64 (stable-fixes).
  * selftests/sigaltstack: Fix ppc64 GCC build (git-fixes).
  * selftests: fix OOM in msg_zerocopy selftest (git-fixes).
  * selftests: make order checking verbose in msg_zerocopy selftest (git-fixes).
  * selftests: mptcp: add ms units for tc-netem delay (stable-fixes).
  * selftests: sud_test: return correct emulated syscall value on RISC-V
    (stable-fixes).
  * serial: bcm63xx-uart: fix tx after conversion to uart_port_tx_limited()
    (git-fixes).
  * serial: core: introduce uart_port_tx_limited_flags() (git-fixes).
  * serial: exar: adding missing CTI and Exar PCI ids (stable-fixes).
  * serial: imx: Introduce timeout when waiting on transmitter empty (stable-
    fixes).
  * serial: imx: Raise TX trigger level to 8 (stable-fixes).
  * smb3: allow controlling length of time directory entries are cached with dir
    leases (git-fixes, bsc#1225172).
  * smb3: allow controlling maximum number of cached directories (git-fixes,
    bsc#1225172).
  * smb3: do not start laundromat thread when dir leases disabled (git-fixes,
    bsc#1225172).
  * smb: client: do not start laundromat thread on nohandlecache (git-fixes,
    bsc#1225172).
  * smb: client: make laundromat a delayed worker (git-fixes, bsc#1225172).
  * smb: client: prevent new fids from being removed by laundromat (git-fixes,
    bsc#1225172).
  * soc: qcom: pdr: fix parsing of domains lists (git-fixes).
  * soc: qcom: pdr: protect locator_addr with the main mutex (git-fixes).
  * soc: qcom: pmic_glink: Handle the return value of pmic_glink_init (git-
    fixes).
  * soc: qcom: rpmh-rsc: Ensure irqs are not disabled by rpmh_rsc_send_data()
    callers (git-fixes).
  * soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer message
    (stable-fixes).
  * soc: xilinx: rename cpu_number1 to dummy_cpu_number (git-fixes).
  * soundwire: cadence: fix invalid PDI offset (stable-fixes).
  * spi: atmel-quadspi: Add missing check for clk_prepare (git-fixes).
  * spi: cadence: Ensure data lines set to low during dummy-cycle period
    (stable-fixes).
  * spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices (stable-
    fixes).
  * spi: microchip-core: defer asserting chip select until just before write to
    TX FIFO (git-fixes).
  * spi: microchip-core: ensure TX and RX FIFOs are empty at start of a transfer
    (git-fixes).
  * spi: microchip-core: fix the issues in the isr (git-fixes).
  * spi: microchip-core: only disable SPI controller when register value change
    requires it (git-fixes).
  * spi: mux: set ctlr->bits_per_word_mask (stable-fixes).
  * spi: spi-microchip-core: Fix the number of chip selects supported (git-
    fixes).
  * spi: spidev: add correct compatible for Rohm BH2228FV (git-fixes).
  * spi: stm32: qspi: Clamp stm32_qspi_get_mode() output to CCR_BUSWIDTH_4 (git-
    fixes).
  * spi: stm32: qspi: Fix dual flash mode sanity test in stm32_qspi_setup()
    (git-fixes).
  * ssb: Fix potential NULL pointer dereference in ssb_device_uevent() (stable-
    fixes).
  * struct acpi_ec kABI workaround (git-fixes).
  * sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).
  * tcp: Dump bound-only sockets in inet_diag (bsc#1204562).
  * thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data (stable-
    fixes).
  * thermal/drivers/mediatek/lvts_thermal: Return error in case of invalid efuse
    data (git-fixes).
  * thunderbolt: debugfs: Fix margin debugfs node creation condition (git-
    fixes).
  * tools/memory-model: Fix bug in lock.cat (git-fixes).
  * tools/power turbostat: Remember global max_die_id (stable-fixes).
  * tools/power/cpupower: Fix Pstate frequency reporting on AMD Family 1Ah CPUs
    (stable-fixes).
  * tools: ynl: do not leak mcast_groups on init error (git-fixes).
  * tools: ynl: fix handling of multiple mcast groups (git-fixes).
  * tools: ynl: make sure we always pass yarg to mnl_cb_run (git-fixes).
  * tpm_tis: Do _not_ flush uninitialized work (git-fixes).
  * tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).
  * tracing/net_sched: NULL pointer dereference in perf_trace_qdisc_reset()
    (git-fixes).
  * tracing: Build event generation tests only as modules (git-fixes).
  * tty: mcf: MCF54418 has 10 UARTS (git-fixes).
  * tty: n_tty: Fix buffer offsets when lookahead is used (git-fixes).
  * usb-storage: alauda: Check whether the media is initialized (git-fixes).
  * usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).
  * usb: dwc3: core: Add DWC31 version 2.00a controller (stable-fixes).
  * usb: dwc3: core: Workaround for CSR read timeout (stable-fixes).
  * usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to
    avoid deadlock (git-fixes).
  * usb: dwc3: pci: Do not set "linux,phy_charger_detect" property on Lenovo
    Yoga Tab2 1380 (stable-fixes).
  * usb: dwc3: pci: add support for the Intel Panther Lake (stable-fixes).
  * usb: gadget: aspeed_udc: fix device address configuration (git-fixes).
  * usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() (stable-
    fixes).
  * usb: gadget: function: Remove usage of the deprecated ida_simple_xx() API
    (stable-fixes).
  * usb: gadget: printer: SS+ support (stable-fixes).
  * usb: gadget: printer: fix races against disable (git-fixes).
  * usb: gadget: uvc: configfs: ensure guid to be valid before set (stable-
    fixes).
  * usb: misc: uss720: check for incompatible versions of the Belkin F5U002
    (stable-fixes).
  * usb: musb: da8xx: fix a resource leak in probe() (git-fixes).
  * usb: typec: tcpm: Ignore received Hard Reset in TOGGLING state (git-fixes).
  * usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (git-
    fixes).
  * usb: typec: ucsi: Ack also failed Get Error commands (git-fixes).
  * usb: typec: ucsi: Never send a lone connector change ack (stable-fixes).
  * usb: typec: ucsi: glink: fix child node release in probe function (git-
    fixes).
  * usb: typec: ucsi_glink: drop special handling for CCI_BUSY (stable-fixes).
  * usb: ucsi: stm32: fix command completion handling (git-fixes).
  * usb: xhci: prevent potential failure in handle_tx_event() for Transfer
    events without TRB (stable-fixes).
  * virtio_net: avoid data-races on dev->stats fields (git-fixes).
  * virtio_net: checksum offloading handling fix (git-fixes).
  * vmlinux.lds.h: catch .bss..L* sections into BSS") (git-fixes).
  * watchdog: rzg2l_wdt: Check return status of pm_runtime_put() (git-fixes).
  * watchdog: rzg2l_wdt: Use pm_runtime_resume_and_get() (git-fixes).
  * watchdog: rzn1: Convert comma to semicolon (git-fixes).
  * wifi: add HAS_IOPORT dependencies (bsc#1227149).
  * wifi: ar5523: Remove unnecessary (void*) conversions (bsc#1227149).
  * wifi: ath10/11/12k: Use alloc_ordered_workqueue() to create ordered
    workqueues (bsc#1227149).
  * wifi: ath10k: Annotate struct ath10k_ce_ring with __counted_by
    (bsc#1227149).
  * wifi: ath10k: Convert to platform remove callback returning void
    (bsc#1227149).
  * wifi: ath10k: Drop checks that are always false (bsc#1227149).
  * wifi: ath10k: Drop cleaning of driver data from probe error path and remove
    (bsc#1227149).
  * wifi: ath10k: Fix a few spelling errors (bsc#1227149).
  * wifi: ath10k: Fix enum ath10k_fw_crash_dump_type kernel-doc (bsc#1227149).
  * wifi: ath10k: Fix htt_data_tx_completion kernel-doc warning (bsc#1227149).
  * wifi: ath10k: Remove unnecessary (void*) conversions (bsc#1227149).
  * wifi: ath10k: Remove unused struct ath10k_htc_frame (bsc#1227149).
  * wifi: ath10k: Update Qualcomm Innovation Center, Inc. copyrights
    (bsc#1227149).
  * wifi: ath10k: Use DECLARE_FLEX_ARRAY() for ath10k_htc_record (bsc#1227149).
  * wifi: ath10k: Use list_count_nodes() (bsc#1227149).
  * wifi: ath10k: add missing wmi_10_4_feature_mask documentation (bsc#1227149).
  * wifi: ath10k: add support to allow broadcast action frame RX (bsc#1227149).
  * wifi: ath10k: consistently use kstrtoX_from_user() functions (bsc#1227149).
  * wifi: ath10k: correctly document enum wmi_tlv_tx_pause_id (bsc#1227149).
  * wifi: ath10k: drop HTT_DATA_TX_STATUS_DOWNLOAD_FAIL (bsc#1227149).
  * wifi: ath10k: fix QCOM_RPROC_COMMON dependency (git-fixes).
  * wifi: ath10k: fix Wvoid-pointer-to-enum-cast warning (bsc#1227149).
  * wifi: ath10k: fix htt_q_state_conf & htt_q_state kernel-doc (bsc#1227149).
  * wifi: ath10k: improve structure padding (bsc#1227149).
  * wifi: ath10k: indicate to mac80211 scan complete with aborted flag for
    ATH10K_SCAN_STARTING state (bsc#1227149).
  * wifi: ath10k: remove ath10k_htc_record::pauload[] (bsc#1227149).
  * wifi: ath10k: remove duplicate memset() in 10.4 TDLS peer update
    (bsc#1227149).
  * wifi: ath10k: remove struct wmi_pdev_chanlist_update_event (bsc#1227149).
  * wifi: ath10k: remove unused template structs (bsc#1227149).
  * wifi: ath10k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).
  * wifi: ath10k: replace deprecated strncpy with memcpy (bsc#1227149).
  * wifi: ath10k: simplify __ath10k_htt_tx_txq_recalc() (bsc#1227149).
  * wifi: ath10k: simplify ath10k_peer_create() (bsc#1227149).
  * wifi: ath10k: use flexible array in struct wmi_host_mem_chunks
    (bsc#1227149).
  * wifi: ath10k: use flexible array in struct wmi_tdls_peer_capabilities
    (bsc#1227149).
  * wifi: ath10k: use flexible arrays for WMI start scan TLVs (bsc#1227149).
  * wifi: ath11k: Add HTT stats for PHY reset case (bsc#1227149).
  * wifi: ath11k: Add coldboot calibration support for QCN9074 (bsc#1227149).
  * wifi: ath11k: Allow ath11k to boot without caldata in ftm mode
    (bsc#1227149).
  * wifi: ath11k: Consistently use ath11k_vif_to_arvif() (bsc#1227149).
  * wifi: ath11k: Consolidate WMI peer flags (bsc#1227149).
  * wifi: ath11k: Convert to platform remove callback returning void
    (bsc#1227149).
  * wifi: ath11k: Do not directly use scan_flags in struct scan_req_params
    (bsc#1227149).
  * wifi: ath11k: EMA beacon support (bsc#1227149).
  * wifi: ath11k: Fix a few spelling errors (bsc#1227149).
  * wifi: ath11k: Fix ath11k_htc_record flexible record (bsc#1227149).
  * wifi: ath11k: Introduce and use ath11k_sta_to_arsta() (bsc#1227149).
  * wifi: ath11k: MBSSID beacon support (bsc#1227149).
  * wifi: ath11k: MBSSID configuration during vdev create/start (bsc#1227149).
  * wifi: ath11k: MBSSID parameter configuration in AP mode (bsc#1227149).
  * wifi: ath11k: Really consistently use ath11k_vif_to_arvif() (bsc#1227149).
  * wifi: ath11k: Relocate the func ath11k_mac_bitrate_mask_num_ht_rates() and
    change hweight16 to hweight8 (bsc#1227149).
  * wifi: ath11k: Remove ath11k_base::bd_api (bsc#1227149).
  * wifi: ath11k: Remove cal_done check during probe (bsc#1227149).
  * wifi: ath11k: Remove obsolete struct wmi_peer_flags_map *peer_flags
    (bsc#1227149).
  * wifi: ath11k: Remove scan_flags union from struct scan_req_params
    (bsc#1227149).
  * wifi: ath11k: Remove struct ath11k::ops (bsc#1227149).
  * wifi: ath11k: Remove unneeded semicolon (bsc#1227149).
  * wifi: ath11k: Remove unused declarations (bsc#1227149).
  * wifi: ath11k: Remove unused struct ath11k_htc_frame (bsc#1227149).
  * wifi: ath11k: Send HT fixed rate in WMI peer fixed param (bsc#1227149).
  * wifi: ath11k: Split coldboot calibration hw_param (bsc#1227149).
  * wifi: ath11k: Update Qualcomm Innovation Center, Inc. copyrights
    (bsc#1227149).
  * wifi: ath11k: Use device_get_match_data() (bsc#1227149).
  * wifi: ath11k: Use list_count_nodes() (bsc#1227149).
  * wifi: ath11k: add WMI event debug messages (bsc#1227149).
  * wifi: ath11k: add WMI_TLV_SERVICE_EXT_TPC_REG_SUPPORT service bit
    (bsc#1227149).
  * wifi: ath11k: add chip id board name while searching board-2.bin for WCN6855
    (bsc#1227149).
  * wifi: ath11k: add firmware-2.bin support (bsc#1227149).
  * wifi: ath11k: add handler for WMI_VDEV_SET_TPC_POWER_CMDID (bsc#1227149).
  * wifi: ath11k: add parse of transmit power envelope element (bsc#1227149).
  * wifi: ath11k: add parsing of phy bitmap for reg rules (bsc#1227149).
  * wifi: ath11k: add support for QCA2066 (bsc#1227149).
  * wifi: ath11k: add support to select 6 GHz regulatory type (bsc#1227149).
  * wifi: ath11k: ath11k_debugfs_register(): fix format-truncation warning
    (bsc#1227149).
  * wifi: ath11k: avoid forward declaration of ath11k_mac_start_vdev_delay()
    (bsc#1227149).
  * wifi: ath11k: call ath11k_mac_fils_discovery() without condition
    (bsc#1227149).
  * wifi: ath11k: constify MHI channel and controller configs (bsc#1227149).
  * wifi: ath11k: debug: add ATH11K_DBG_CE (bsc#1227149).
  * wifi: ath11k: debug: remove unused ATH11K_DBG_ANY (bsc#1227149).
  * wifi: ath11k: debug: use all upper case in ATH11k_DBG_HAL (bsc#1227149).
  * wifi: ath11k: do not use %pK (bsc#1227149).
  * wifi: ath11k: document HAL_RX_BUF_RBM_SW4_BM (bsc#1227149).
  * wifi: ath11k: dp: cleanup debug message (bsc#1227149).
  * wifi: ath11k: driver settings for MBSSID and EMA (bsc#1227149).
  * wifi: ath11k: drop NULL pointer check in ath11k_update_per_peer_tx_stats()
    (bsc#1227149).
  * wifi: ath11k: drop redundant check in ath11k_dp_rx_mon_dest_process()
    (bsc#1227149).
  * wifi: ath11k: enable 36 bit mask for stream DMA (bsc#1227149).
  * wifi: ath11k: factory test mode support (bsc#1227149).
  * wifi: ath11k: fill parameters for vdev set tpc power WMI command
    (bsc#1227149).
  * wifi: ath11k: fix CAC running state during virtual interface start
    (bsc#1227149).
  * wifi: ath11k: fix IOMMU errors on buffer rings (bsc#1227149).
  * wifi: ath11k: fix RCU documentation in ath11k_mac_op_ipv6_changed() (git-
    fixes).
  * wifi: ath11k: fix WCN6750 firmware crash caused by 17 num_vdevs
    (bsc#1227149).
  * wifi: ath11k: fix Wvoid-pointer-to-enum-cast warning (bsc#1227149).
  * wifi: ath11k: fix a possible dead lock caused by ab->base_lock
    (bsc#1227149).
  * wifi: ath11k: fix ath11k_mac_op_remain_on_channel() stack usage
    (bsc#1227149).
  * wifi: ath11k: fix connection failure due to unexpected peer delete
    (bsc#1227149).
  * wifi: ath11k: fix tid bitmap is 0 in peer rx mu stats (bsc#1227149).
  * wifi: ath11k: fix wrong definition of CE ring's base address (git-fixes).
  * wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes).
  * wifi: ath11k: hal: cleanup debug message (bsc#1227149).
  * wifi: ath11k: htc: cleanup debug messages (bsc#1227149).
  * wifi: ath11k: initialize eirp_power before use (bsc#1227149).
  * wifi: ath11k: mac: fix struct ieee80211_sband_iftype_data handling
    (bsc#1227149).
  * wifi: ath11k: mhi: add a warning message for MHI_CB_EE_RDDM crash
    (bsc#1227149).
  * wifi: ath11k: move pci.ops registration ahead (bsc#1227149).
  * wifi: ath11k: move power type check to ASSOC stage when connecting to 6 GHz
    AP (bsc#1227149).
  * wifi: ath11k: move references from rsvd2 to info fields (bsc#1227149).
  * wifi: ath11k: pci: cleanup debug logging (bsc#1227149).
  * wifi: ath11k: print debug level in debug messages (bsc#1227149).
  * wifi: ath11k: provide address list if chip supports 2 stations
    (bsc#1227149).
  * wifi: ath11k: qmi: refactor ath11k_qmi_m3_load() (bsc#1227149).
  * wifi: ath11k: refactor ath11k_wmi_tlv_parse_alloc() (bsc#1227149).
  * wifi: ath11k: refactor setting country code logic (stable-fixes).
  * wifi: ath11k: refactor vif parameter configurations (bsc#1227149).
  * wifi: ath11k: rely on mac80211 debugfs handling for vif (bsc#1227149).
  * wifi: ath11k: remove ath11k_htc_record::pauload[] (bsc#1227149).
  * wifi: ath11k: remove invalid peer create logic (bsc#1227149).
  * wifi: ath11k: remove manual mask names from debug messages (bsc#1227149).
  * wifi: ath11k: remove unnecessary (void*) conversions (bsc#1227149).
  * wifi: ath11k: remove unsupported event handlers (bsc#1227149).
  * wifi: ath11k: remove unused function ath11k_tm_event_wmi() (bsc#1227149).
  * wifi: ath11k: remove unused members of 'struct ath11k_base' (bsc#1227149).
  * wifi: ath11k: remove unused scan_events from struct scan_req_params
    (bsc#1227149).
  * wifi: ath11k: rename MBSSID fields in wmi_vdev_up_cmd (bsc#1227149).
  * wifi: ath11k: rename ath11k_start_vdev_delay() (bsc#1227149).
  * wifi: ath11k: rename the sc naming convention to ab (bsc#1227149).
  * wifi: ath11k: rename the wmi_sc naming convention to wmi_ab (bsc#1227149).
  * wifi: ath11k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).
  * wifi: ath11k: restore country code during resume (git-fixes).
  * wifi: ath11k: save max transmit power in vdev start response event from
    firmware (bsc#1227149).
  * wifi: ath11k: save power spectral density(PSD) of regulatory rule
    (bsc#1227149).
  * wifi: ath11k: simplify ath11k_mac_validate_vht_he_fixed_rate_settings()
    (bsc#1227149).
  * wifi: ath11k: simplify the code with module_platform_driver (bsc#1227149).
  * wifi: ath11k: store cur_regulatory_info for each radio (bsc#1227149).
  * wifi: ath11k: support 2 station interfaces (bsc#1227149).
  * wifi: ath11k: update proper pdev/vdev id for testmode command (bsc#1227149).
  * wifi: ath11k: update regulatory rules when connect to AP on 6 GHz band for
    station (bsc#1227149).
  * wifi: ath11k: update regulatory rules when interface added (bsc#1227149).
  * wifi: ath11k: use RCU when accessing struct inet6_dev::ac_list
    (bsc#1227149).
  * wifi: ath11k: use WMI_VDEV_SET_TPC_POWER_CMDID when EXT_TPC_REG_SUPPORT for
    6 GHz (bsc#1227149).
  * wifi: ath11k: use kstrtoul_from_user() where appropriate (bsc#1227149).
  * wifi: ath11k: use select for CRYPTO_MICHAEL_MIC (bsc#1227149).
  * wifi: ath11k: wmi: add unified command debug messages (bsc#1227149).
  * wifi: ath11k: wmi: cleanup error handling in
    ath11k_wmi_send_init_country_cmd() (bsc#1227149).
  * wifi: ath11k: wmi: use common error handling style (bsc#1227149).
  * wifi: ath11k: workaround too long expansion sparse warnings (bsc#1227149).
  * wifi: ath12k: Add logic to write QRTR node id to scratch (bsc#1227149).
  * wifi: ath12k: Add missing qmi_txn_cancel() calls (bsc#1227149).
  * wifi: ath12k: Add support to parse new WMI event for 6 GHz regulatory
    (bsc#1227149).
  * wifi: ath12k: Consistently use ath12k_vif_to_arvif() (bsc#1227149).
  * wifi: ath12k: Consolidate WMI peer flags (bsc#1227149).
  * wifi: ath12k: Correct 6 GHz frequency value in rx status (git-fixes).
  * wifi: ath12k: Do not drop tx_status in failure case (git-fixes).
  * wifi: ath12k: Do not use scan_flags from struct ath12k_wmi_scan_req_arg
    (bsc#1227149).
  * wifi: ath12k: Enable Mesh support for QCN9274 (bsc#1227149).
  * wifi: ath12k: Fix a few spelling errors (bsc#1227149).
  * wifi: ath12k: Fix tx completion ring (WBM2SW) setup failure (git-fixes).
  * wifi: ath12k: Fix uninitialized use of ret in ath12k_mac_allocate()
    (bsc#1227149).
  * wifi: ath12k: Introduce and use ath12k_sta_to_arsta() (bsc#1227149).
  * wifi: ath12k: Introduce the container for mac80211 hw (bsc#1227149).
  * wifi: ath12k: Make QMI message rules const (bsc#1227149).
  * wifi: ath12k: Optimize the mac80211 hw data access (bsc#1227149).
  * wifi: ath12k: Read board id to support split-PHY QCN9274 (bsc#1227149).
  * wifi: ath12k: Refactor the mac80211 hw access from link/radio (bsc#1227149).
  * wifi: ath12k: Remove ath12k_base::bd_api (bsc#1227149).
  * wifi: ath12k: Remove obsolete struct wmi_peer_flags_map *peer_flags
    (bsc#1227149).
  * wifi: ath12k: Remove some dead code (bsc#1227149).
  * wifi: ath12k: Remove struct ath12k::ops (bsc#1227149).
  * wifi: ath12k: Remove unnecessary (void*) conversions (bsc#1227149).
  * wifi: ath12k: Remove unnecessary struct qmi_txn initializers (bsc#1227149).
  * wifi: ath12k: Remove unused declarations (bsc#1227149).
  * wifi: ath12k: Remove unused scan_flags from struct ath12k_wmi_scan_req_arg
    (bsc#1227149).
  * wifi: ath12k: Set default beacon mode to burst mode (bsc#1227149).
  * wifi: ath12k: Use initializers for QMI message buffers (bsc#1227149).
  * wifi: ath12k: Use msdu_end to check MCBC (bsc#1227149).
  * wifi: ath12k: Use pdev_id rather than mac_id to get pdev (bsc#1227149).
  * wifi: ath12k: WMI support to process EHT capabilities (bsc#1227149).
  * wifi: ath12k: add 320 MHz bandwidth enums (bsc#1227149).
  * wifi: ath12k: add CE and ext IRQ flag to indicate irq_handler (bsc#1227149).
  * wifi: ath12k: add EHT PHY modes (bsc#1227149).
  * wifi: ath12k: add MAC id support in WBM error path (bsc#1227149).
  * wifi: ath12k: add MLO header in peer association (bsc#1227149).
  * wifi: ath12k: add P2P IE in beacon template (bsc#1227149).
  * wifi: ath12k: add QMI PHY capability learn support (bsc#1227149).
  * wifi: ath12k: add WMI support for EHT peer (bsc#1227149).
  * wifi: ath12k: add ath12k_qmi_free_resource() for recovery (bsc#1227149).
  * wifi: ath12k: add fallback board name without variant while searching
    board-2.bin (bsc#1227149).
  * wifi: ath12k: add firmware-2.bin support (bsc#1227149).
  * wifi: ath12k: add handler for scan event WMI_SCAN_EVENT_DEQUEUED
    (bsc#1227149).
  * wifi: ath12k: add keep backward compatibility of PHY mode to avoid firmware
    crash (bsc#1227149).
  * wifi: ath12k: add msdu_end structure for WCN7850 (bsc#1227149).
  * wifi: ath12k: add parsing of phy bitmap for reg rules (bsc#1227149).
  * wifi: ath12k: add processing for TWT disable event (bsc#1227149).
  * wifi: ath12k: add processing for TWT enable event (bsc#1227149).
  * wifi: ath12k: add qmi_cnss_feature_bitmap field to hardware parameters
    (bsc#1227149).
  * wifi: ath12k: add rcu lock for ath12k_wmi_p2p_noa_event() (bsc#1227149).
  * wifi: ath12k: add read variant from SMBIOS for download board data
    (bsc#1227149).
  * wifi: ath12k: add string type to search board data in board-2.bin for
    WCN7850 (bsc#1227149).
  * wifi: ath12k: add support for BA1024 (bsc#1227149).
  * wifi: ath12k: add support for collecting firmware log (bsc#1227149).
  * wifi: ath12k: add support for hardware rfkill for WCN7850 (bsc#1227149).
  * wifi: ath12k: add support for peer meta data version (bsc#1227149).
  * wifi: ath12k: add support one MSI vector (bsc#1227149).
  * wifi: ath12k: add support to search regdb data in board-2.bin for WCN7850
    (bsc#1227149).
  * wifi: ath12k: add wait operation for tx management packets for flush from
    mac80211 (bsc#1227149).
  * wifi: ath12k: advertise P2P dev support for WCN7850 (bsc#1227149).
  * wifi: ath12k: allow specific mgmt frame tx while vdev is not up
    (bsc#1227149).
  * wifi: ath12k: ath12k_start_vdev_delay(): convert to use ar (bsc#1227149).
  * wifi: ath12k: avoid deadlock by change ieee80211_queue_work for
    regd_update_work (bsc#1227149).
  * wifi: ath12k: avoid duplicated vdev stop (git-fixes).
  * wifi: ath12k: avoid explicit HW conversion argument in Rxdma replenish
    (bsc#1227149).
  * wifi: ath12k: avoid explicit RBM id argument in Rxdma replenish
    (bsc#1227149).
  * wifi: ath12k: avoid explicit mac id argument in Rxdma replenish
    (bsc#1227149).
  * wifi: ath12k: avoid repeated hw access from ar (bsc#1227149).
  * wifi: ath12k: avoid repeated wiphy access from hw (bsc#1227149).
  * wifi: ath12k: call ath12k_mac_fils_discovery() without condition
    (bsc#1227149).
  * wifi: ath12k: change DMA direction while mapping reinjected packets (git-
    fixes).
  * wifi: ath12k: change MAC buffer ring size to 2048 (bsc#1227149).
  * wifi: ath12k: change WLAN_SCAN_PARAMS_MAX_IE_LEN from 256 to 512
    (bsc#1227149).
  * wifi: ath12k: change interface combination for P2P mode (bsc#1227149).
  * wifi: ath12k: change to initialize recovery variables earlier in
    ath12k_core_reset() (bsc#1227149).
  * wifi: ath12k: change to treat alpha code na as world wide regdomain
    (bsc#1227149).
  * wifi: ath12k: change to use dynamic memory for channel list of scan
    (bsc#1227149).
  * wifi: ath12k: check M3 buffer size as well whey trying to reuse it
    (bsc#1227149).
  * wifi: ath12k: check hardware major version for WCN7850 (bsc#1227149).
  * wifi: ath12k: configure RDDM size to MHI for device recovery (bsc#1227149).
  * wifi: ath12k: configure puncturing bitmap (bsc#1227149).
  * wifi: ath12k: correct the data_type from QMI_OPT_FLAG to QMI_UNSIGNED_1_BYTE
    for mlo_capable (bsc#1227149).
  * wifi: ath12k: delete the timer rx_replenish_retry during rmmod
    (bsc#1227149).
  * wifi: ath12k: designating channel frequency for ROC scan (bsc#1227149).
  * wifi: ath12k: disable QMI PHY capability learn in split-phy QCN9274
    (bsc#1227149).
  * wifi: ath12k: do not drop data frames from unassociated stations
    (bsc#1227149).
  * wifi: ath12k: do not restore ASPM in case of single MSI vector
    (bsc#1227149).
  * wifi: ath12k: drop NULL pointer check in ath12k_update_per_peer_tx_stats()
    (bsc#1227149).
  * wifi: ath12k: drop failed transmitted frames from metric calculation (git-
    fixes).
  * wifi: ath12k: enable 320 MHz bandwidth for 6 GHz band in EHT PHY capability
    for WCN7850 (bsc#1227149).
  * wifi: ath12k: enable 802.11 power save mode in station mode (bsc#1227149).
  * wifi: ath12k: enable IEEE80211_HW_SINGLE_SCAN_ON_ALL_BANDS for WCN7850
    (bsc#1227149).
  * wifi: ath12k: fetch correct pdev id from WMI_SERVICE_READY_EXT_EVENTID
    (bsc#1227149).
  * wifi: ath12k: fix PCI read and write (bsc#1227149).
  * wifi: ath12k: fix WARN_ON during ath12k_mac_update_vif_chan (bsc#1227149).
  * wifi: ath12k: fix broken structure wmi_vdev_create_cmd (bsc#1227149).
  * wifi: ath12k: fix conf_mutex in ath12k_mac_op_unassign_vif_chanctx()
    (bsc#1227149).
  * wifi: ath12k: fix debug messages (bsc#1227149).
  * wifi: ath12k: fix fetching MCBC flag for QCN9274 (bsc#1227149).
  * wifi: ath12k: fix firmware assert during insmod in memory segment mode
    (bsc#1227149).
  * wifi: ath12k: fix firmware crash during reo reinject (git-fixes).
  * wifi: ath12k: fix invalid m3 buffer address (bsc#1227149).
  * wifi: ath12k: fix invalid memory access while processing fragmented packets
    (git-fixes).
  * wifi: ath12k: fix kernel crash during resume (bsc#1227149).
  * wifi: ath12k: fix license in p2p.c and p2p.h (bsc#1227149).
  * wifi: ath12k: fix peer metadata parsing (git-fixes).
  * wifi: ath12k: fix potential wmi_mgmt_tx_queue race condition (bsc#1227149).
  * wifi: ath12k: fix radar detection in 160 MHz (bsc#1227149).
  * wifi: ath12k: fix recovery fail while firmware crash when doing channel
    switch (bsc#1227149).
  * wifi: ath12k: fix the error handler of rfkill config (bsc#1227149).
  * wifi: ath12k: fix the issue that the multicast/broadcast indicator is not
    read correctly for WCN7850 (bsc#1227149).
  * wifi: ath12k: fix the problem that down grade phy mode operation
    (bsc#1227149).
  * wifi: ath12k: fix wrong definition of CE ring's base address (git-fixes).
  * wifi: ath12k: fix wrong definitions of hal_reo_update_rx_queue
    (bsc#1227149).
  * wifi: ath12k: get msi_data again after request_irq is called (bsc#1227149).
  * wifi: ath12k: implement handling of P2P NoA event (bsc#1227149).
  * wifi: ath12k: implement remain on channel for P2P mode (bsc#1227149).
  * wifi: ath12k: increase vdev setup timeout (bsc#1227149).
  * wifi: ath12k: indicate NON MBSSID vdev by default during vdev start
    (bsc#1227149).
  * wifi: ath12k: indicate scan complete for scan canceled when scan running
    (bsc#1227149).
  * wifi: ath12k: indicate to mac80211 scan complete with aborted flag for
    ATH12K_SCAN_STARTING state (bsc#1227149).
  * wifi: ath12k: move HE capabilities processing to a new function
    (bsc#1227149).
  * wifi: ath12k: move peer delete after vdev stop of station for WCN7850
    (bsc#1227149).
  * wifi: ath12k: parse WMI service ready ext2 event (bsc#1227149).
  * wifi: ath12k: peer assoc for 320 MHz (bsc#1227149).
  * wifi: ath12k: prepare EHT peer assoc parameters (bsc#1227149).
  * wifi: ath12k: propagate EHT capabilities to userspace (bsc#1227149).
  * wifi: ath12k: refactor DP Rxdma ring structure (bsc#1227149).
  * wifi: ath12k: refactor QMI MLO host capability helper function
    (bsc#1227149).
  * wifi: ath12k: refactor ath12k_bss_assoc() (bsc#1227149).
  * wifi: ath12k: refactor ath12k_mac_allocate() and ath12k_mac_destroy()
    (bsc#1227149).
  * wifi: ath12k: refactor ath12k_mac_op_ampdu_action() (bsc#1227149).
  * wifi: ath12k: refactor ath12k_mac_op_conf_tx() (bsc#1227149).
  * wifi: ath12k: refactor ath12k_mac_op_config() (bsc#1227149).
  * wifi: ath12k: refactor ath12k_mac_op_configure_filter() (bsc#1227149).
  * wifi: ath12k: refactor ath12k_mac_op_flush() (bsc#1227149).
  * wifi: ath12k: refactor ath12k_mac_op_start() (bsc#1227149).
  * wifi: ath12k: refactor ath12k_mac_op_stop() (bsc#1227149).
  * wifi: ath12k: refactor ath12k_mac_op_update_vif_offload() (bsc#1227149).
  * wifi: ath12k: refactor ath12k_mac_register() and ath12k_mac_unregister()
    (bsc#1227149).
  * wifi: ath12k: refactor ath12k_mac_setup_channels_rates() (bsc#1227149).
  * wifi: ath12k: refactor ath12k_wmi_tlv_parse_alloc() (bsc#1227149).
  * wifi: ath12k: refactor multiple MSI vector implementation (bsc#1227149).
  * wifi: ath12k: refactor the rfkill worker (bsc#1227149).
  * wifi: ath12k: register EHT mesh capabilities (bsc#1227149).
  * wifi: ath12k: relax list iteration in ath12k_mac_vif_unref() (bsc#1227149).
  * wifi: ath12k: relocate ath12k_dp_pdev_pre_alloc() call (bsc#1227149).
  * wifi: ath12k: remove hal_desc_sz from hw params (bsc#1227149).
  * wifi: ath12k: remove redundant memset() in ath12k_hal_reo_qdesc_setup()
    (bsc#1227149).
  * wifi: ath12k: remove the unused scan_events from ath12k_wmi_scan_req_arg
    (bsc#1227149).
  * wifi: ath12k: remove unused ATH12K_BD_IE_BOARD_EXT (bsc#1227149).
  * wifi: ath12k: rename HE capabilities setup/copy functions (bsc#1227149).
  * wifi: ath12k: rename the sc naming convention to ab (bsc#1227149).
  * wifi: ath12k: rename the wmi_sc naming convention to wmi_ab (bsc#1227149).
  * wifi: ath12k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).
  * wifi: ath12k: send WMI_PEER_REORDER_QUEUE_SETUP_CMDID when ADDBA session
    starts (bsc#1227149).
  * wifi: ath12k: set IRQ affinity to CPU0 in case of one MSI vector
    (bsc#1227149).
  * wifi: ath12k: set PERST pin no pull request for WCN7850 (bsc#1227149).
  * wifi: ath12k: split hal_ops to support RX TLVs word mask compaction
    (bsc#1227149).
  * wifi: ath12k: subscribe required word mask from rx tlv (bsc#1227149).
  * wifi: ath12k: support default regdb while searching board-2.bin for WCN7850
    (bsc#1227149).
  * wifi: ath12k: trigger station disconnect on hardware restart (bsc#1227149).
  * wifi: ath12k: use ATH12K_PCI_IRQ_DP_OFFSET for DP IRQ (bsc#1227149).
  * wifi: ath12k: use correct flag field for 320 MHz channels (bsc#1227149).
  * wifi: ath12k: use select for CRYPTO_MICHAEL_MIC (bsc#1227149).
  * wifi: ath5k: Convert to platform remove callback returning void
    (bsc#1227149).
  * wifi: ath5k: Remove redundant dev_err() (bsc#1227149).
  * wifi: ath5k: ath5k_hw_get_median_noise_floor(): use swap() (bsc#1227149).
  * wifi: ath5k: remove phydir check from ath5k_debug_init_device()
    (bsc#1227149).
  * wifi: ath5k: remove unnecessary (void*) conversions (bsc#1227149).
  * wifi: ath5k: remove unused ath5k_eeprom_info::ee_antenna (bsc#1227149).
  * wifi: ath5k: replace deprecated strncpy with strscpy (bsc#1227149).
  * wifi: ath6kl: Remove error checking for debugfs_create_dir() (bsc#1227149).
  * wifi: ath6kl: remove unnecessary (void*) conversions (bsc#1227149).
  * wifi: ath6kl: replace deprecated strncpy with memcpy (bsc#1227149).
  * wifi: ath9k: Convert to platform remove callback returning void
    (bsc#1227149).
  * wifi: ath9k: Remove unnecessary (void*) conversions (bsc#1227149).
  * wifi: ath9k: Remove unnecessary ternary operators (bsc#1227149).
  * wifi: ath9k: Remove unused declarations (bsc#1227149).
  * wifi: ath9k: avoid using uninitialized array (bsc#1227149).
  * wifi: ath9k: clean up function ath9k_hif_usb_resume (bsc#1227149).
  * wifi: ath9k: consistently use kstrtoX_from_user() functions (bsc#1227149).
  * wifi: ath9k: delete some unused/duplicate macros (bsc#1227149).
  * wifi: ath9k: fix parameter check in ath9k_init_debug() (bsc#1227149).
  * wifi: ath9k: remove redundant assignment to variable ret (bsc#1227149).
  * wifi: ath9k: reset survey of current channel after a scan started
    (bsc#1227149).
  * wifi: ath9k: simplify ar9003_hw_process_ini() (bsc#1227149).
  * wifi: ath9k: use u32 for txgain indexes (bsc#1227149).
  * wifi: ath9k: work around memset overflow warning (bsc#1227149).
  * wifi: ath9k_htc: fix format-truncation warning (bsc#1227149).
  * wifi: ath: Use is_multicast_ether_addr() to check multicast Ether address
    (bsc#1227149).
  * wifi: ath: dfs_pattern_detector: Use flex array to simplify code
    (bsc#1227149).
  * wifi: ath: remove unused-but-set parameter (bsc#1227149).
  * wifi: ath: work around false-positive stringop-overread warning
    (bsc#1227149).
  * wifi: atk10k: Do not opencode ath10k_pci_priv() in ath10k_ahb_priv()
    (bsc#1227149).
  * wifi: atmel: remove unused ioctl function (bsc#1227149).
  * wifi: b43: silence sparse warnings (bsc#1227149).
  * wifi: brcm80211: replace deprecated strncpy with strscpy (bsc#1227149).
  * wifi: brcmfmac: Annotate struct brcmf_gscan_config with __counted_by
    (bsc#1227149).
  * wifi: brcmfmac: Detect corner error case earlier with log (bsc#1227149).
  * wifi: brcmfmac: add linefeed at end of file (bsc#1227149).
  * wifi: brcmfmac: allow per-vendor event handling (bsc#1227149).
  * wifi: brcmfmac: do not cast hidden SSID attribute value to boolean
    (bsc#1227149).
  * wifi: brcmfmac: do not pass hidden SSID attribute as value directly
    (bsc#1227149).
  * wifi: brcmfmac: export firmware interface functions (bsc#1227149).
  * wifi: brcmfmac: firmware: Annotate struct brcmf_fw_request with __counted_by
    (bsc#1227149).
  * wifi: brcmfmac: fix format-truncation warnings (bsc#1227149).
  * wifi: brcmfmac: fix gnu_printf warnings (bsc#1227149).
  * wifi: brcmfmac: fweh: Add __counted_by for struct brcmf_fweh_queue_item and
    use struct_size() (bsc#1227149).
  * wifi: brcmfmac: fweh: Fix boot crash on Raspberry Pi 4 (bsc#1227149).
  * wifi: brcmfmac: move feature overrides before feature_disable (bsc#1227149).
  * wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device (git-fixes).
  * wifi: brcmsmac: cleanup SCB-related data types (bsc#1227149).
  * wifi: brcmsmac: fix gnu_printf warnings (bsc#1227149).
  * wifi: brcmsmac: phy: Remove unreachable code (bsc#1227149).
  * wifi: brcmsmac: remove more unused data types (bsc#1227149).
  * wifi: brcmsmac: remove unused data type (bsc#1227149).
  * wifi: brcmsmac: replace deprecated strncpy with memcpy (bsc#1227149).
  * wifi: brcmsmac: silence sparse warnings (bsc#1227149).
  * wifi: brcmutil: use helper function pktq_empty() instead of open code
    (bsc#1227149).
  * wifi: carl9170: Remove redundant assignment to pointer super (bsc#1227149).
  * wifi: carl9170: remove unnecessary (void*) conversions (bsc#1227149).
  * wifi: cfg80211: Add support for setting TID to link mapping (bsc#1227149).
  * wifi: cfg80211: Allow AP/P2PGO to indicate port authorization to peer
    STA/P2PClient (bsc#1227149).
  * wifi: cfg80211: Extend support for scanning while MLO connected
    (bsc#1227149).
  * wifi: cfg80211: Fix typo in documentation (bsc#1227149).
  * wifi: cfg80211: Handle specific BSSID in 6GHz scanning (bsc#1227149).
  * wifi: cfg80211: Include operating class 137 in 6GHz band (bsc#1227149).
  * wifi: cfg80211: Lock wiphy in cfg80211_get_station (git-fixes).
  * wifi: cfg80211: OWE DH IE handling offload (bsc#1227149).
  * wifi: cfg80211: Replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).
  * wifi: cfg80211: Schedule regulatory check on BSS STA channel change
    (bsc#1227149).
  * wifi: cfg80211: Update the default DSCP-to-UP mapping (bsc#1227149).
  * wifi: cfg80211: add BSS usage reporting (bsc#1227149).
  * wifi: cfg80211: add RNR with reporting AP information (bsc#1227149).
  * wifi: cfg80211: add a flag to disable wireless extensions (bsc#1227149).
  * wifi: cfg80211: add local_state_change to deauth trace (bsc#1227149).
  * wifi: cfg80211: add locked debugfs wrappers (bsc#1227149).
  * wifi: cfg80211: add support for SPP A-MSDUs (bsc#1227149).
  * wifi: cfg80211: address several kerneldoc warnings (bsc#1227149).
  * wifi: cfg80211: allow reg update by driver even if wiphy->regd is set
    (bsc#1227149).
  * wifi: cfg80211: annotate iftype_data pointer with sparse (bsc#1227149).
  * wifi: cfg80211: avoid double free if updating BSS fails (bsc#1227149).
  * wifi: cfg80211: call reg_call_notifier on beacon hints (bsc#1227149).
  * wifi: cfg80211: check RTNL when iterating devices (bsc#1227149).
  * wifi: cfg80211: check wiphy mutex is held for wdev mutex (bsc#1227149).
  * wifi: cfg80211: consume both probe response and beacon IEs (bsc#1227149).
  * wifi: cfg80211: detect stuck ECSA element in probe resp (bsc#1227149).
  * wifi: cfg80211: ensure cfg80211_bss_update frees IEs on error (bsc#1227149).
  * wifi: cfg80211: export DFS CAC time and usable state helper functions
    (bsc#1227149).
  * wifi: cfg80211: expose nl80211_chan_width_to_mhz for wide sharing
    (bsc#1227149).
  * wifi: cfg80211: fix 6 GHz scan request building (stable-fixes).
  * wifi: cfg80211: fix CQM for non-range use (bsc#1227149).
  * wifi: cfg80211: fix header kernel-doc typos (bsc#1227149).
  * wifi: cfg80211: fix kernel-doc for wiphy_delayed_work_flush() (bsc#1227149).
  * wifi: cfg80211: fix spelling & punctutation (bsc#1227149).
  * wifi: cfg80211: fix the order of arguments for trace events of the tx_rx_evt
    class (stable-fixes).
  * wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he() (git-fixes).
  * wifi: cfg80211: fully move wiphy work to unbound workqueue (git-fixes).
  * wifi: cfg80211: generate an ML element for per-STA profiles (bsc#1227149).
  * wifi: cfg80211: handle 2x996 RU allocation in
    cfg80211_calculate_bitrate_he() (git-fixes).
  * wifi: cfg80211: handle UHB AP and STA power type (bsc#1227149).
  * wifi: cfg80211: hold wiphy lock in cfg80211_any_wiphy_oper_chan()
    (bsc#1227149).
  * wifi: cfg80211: hold wiphy mutex for send_interface (bsc#1227149).
  * wifi: cfg80211: improve documentation for flag fields (bsc#1227149).
  * wifi: cfg80211: introduce cfg80211_ssid_eq() (bsc#1227149).
  * wifi: cfg80211: make RX assoc data const (bsc#1227149).
  * wifi: cfg80211: make read-only array centers_80mhz static const
    (bsc#1227149).
  * wifi: cfg80211: modify prototype for change_beacon (bsc#1227149).
  * wifi: cfg80211: pmsr: use correct nla_get_uX functions (git-fixes).
  * wifi: cfg80211: reg: Support P2P operation on DFS channels (bsc#1227149).
  * wifi: cfg80211: reg: describe return values in kernel-doc (bsc#1227149).
  * wifi: cfg80211: reg: fix various kernel-doc issues (bsc#1227149).
  * wifi: cfg80211: reg: hold wiphy mutex for wdev iteration (bsc#1227149).
  * wifi: cfg80211: remove scan_width support (bsc#1227149).
  * wifi: cfg80211: remove wdev mutex (bsc#1227149).
  * wifi: cfg80211: rename UHB to 6 GHz (bsc#1227149).
  * wifi: cfg80211: report per-link errors during association (bsc#1227149).
  * wifi: cfg80211: report unprotected deauth/disassoc in wowlan (bsc#1227149).
  * wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (git-fixes).
  * wifi: cfg80211: save power spectral density(psd) of regulatory rule
    (bsc#1227149).
  * wifi: cfg80211: set correct param change count in ML element (bsc#1227149).
  * wifi: cfg80211: sme: hold wiphy lock for wdev iteration (bsc#1227149).
  * wifi: cfg80211: sort certificates in build (bsc#1227149).
  * wifi: cfg80211: split struct cfg80211_ap_settings (bsc#1227149).
  * wifi: cfg80211: validate HE operation element parsing (bsc#1227149).
  * wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (stable-fixes).
  * wifi: cfg80211: wext: convert return value to kernel-doc (bsc#1227149).
  * wifi: cfg80211: wext: set ssids=NULL for passive scans (git-fixes).
  * wifi: cw1200: Avoid processing an invalid TIM IE (bsc#1227149).
  * wifi: cw1200: Convert to GPIO descriptors (bsc#1227149).
  * wifi: cw1200: fix __le16 sparse warnings (bsc#1227149).
  * wifi: cw1200: restore endian swapping (bsc#1227149).
  * wifi: drivers: Explicitly include correct DT includes (bsc#1227149).
  * wifi: fill in MODULE_DESCRIPTION()s for Broadcom WLAN (bsc#1227149).
  * wifi: fill in MODULE_DESCRIPTION()s for ar5523 (bsc#1227149).
  * wifi: fill in MODULE_DESCRIPTION()s for mt76 drivers (bsc#1227149).
  * wifi: fill in MODULE_DESCRIPTION()s for p54spi (bsc#1227149).
  * wifi: fill in MODULE_DESCRIPTION()s for wcn36xx (bsc#1227149).
  * wifi: fill in MODULE_DESCRIPTION()s for wilc1000 (bsc#1227149).
  * wifi: fill in MODULE_DESCRIPTION()s for wl1251 and wl12xx (bsc#1227149).
  * wifi: fill in MODULE_DESCRIPTION()s for wl18xx (bsc#1227149).
  * wifi: fill in MODULE_DESCRIPTION()s for wlcore (bsc#1227149).
  * wifi: hostap: Add __counted_by for struct prism2_download_data and use
    struct_size() (bsc#1227149).
  * wifi: hostap: fix stringop-truncations GCC warning (bsc#1227149).
  * wifi: hostap: remove unused ioctl function (bsc#1227149).
  * wifi: ieee80211: add UL-bandwidth definition of trigger frame (bsc#1227149).
  * wifi: ieee80211: add definitions for negotiated TID to Link map
    (bsc#1227149).
  * wifi: ieee80211: check for NULL in ieee80211_mle_size_ok() (stable-fixes).
  * wifi: iwlmei: do not send SAP messages if AMT is disabled (bsc#1227149).
  * wifi: iwlmei: do not send nic info with invalid mac address (bsc#1227149).
  * wifi: iwlmei: send HOST_GOES_DOWN message even if wiamt is disabled
    (bsc#1227149).
  * wifi: iwlmei: send driver down SAP message only if wiamt is enabled
    (bsc#1227149).
  * wifi: iwlmvm: fw: Add new OEM vendor to tas approved list (bsc#1227149).
  * wifi: iwlwifi: Add rf_mapping of new wifi7 devices (bsc#1227149).
  * wifi: iwlwifi: Add support for PPAG cmd v5 and PPAG revision 3
    (bsc#1227149).
  * wifi: iwlwifi: Add support for new 802.11be device (bsc#1227149).
  * wifi: iwlwifi: Do not mark DFS channels as NO-IR (bsc#1227149).
  * wifi: iwlwifi: Extract common prph mac/phy regions data dump logic
    (bsc#1227149).
  * wifi: iwlwifi: Fix spelling mistake "SESION" -> "SESSION" (bsc#1227149).
  * wifi: iwlwifi: Use request_module_nowait (bsc#1227149).
  * wifi: iwlwifi: abort scan when rfkill on but device enabled (bsc#1227149).
  * wifi: iwlwifi: add HONOR to PPAG approved list (bsc#1227149).
  * wifi: iwlwifi: add Razer to ppag approved list (bsc#1227149).
  * wifi: iwlwifi: add mapping of a periphery register crf for WH RF
    (bsc#1227149).
  * wifi: iwlwifi: add new RF support for wifi7 (bsc#1227149).
  * wifi: iwlwifi: add support for SNPS DPHYIP region type (bsc#1227149).
  * wifi: iwlwifi: add support for a wiphy_work rx handler (bsc#1227149).
  * wifi: iwlwifi: add support for activating UNII-1 in WW via BIOS
    (bsc#1227149).
  * wifi: iwlwifi: add support for new ini region types (bsc#1227149).
  * wifi: iwlwifi: adjust rx_phyinfo debugfs to MLO (bsc#1227149).
  * wifi: iwlwifi: always have 'uats_enabled' (bsc#1227149).
  * wifi: iwlwifi: api: clean up some kernel-doc/typos (bsc#1227149).
  * wifi: iwlwifi: api: dbg-tlv: fix up kernel-doc (bsc#1227149).
  * wifi: iwlwifi: api: fix a small upper/lower-case typo (bsc#1227149).
  * wifi: iwlwifi: api: fix center_freq label in PHY diagram (bsc#1227149).
  * wifi: iwlwifi: api: fix constant version to match FW (bsc#1227149).
  * wifi: iwlwifi: api: fix kernel-doc reference (bsc#1227149).
  * wifi: iwlwifi: bump FW API to 84 for AX/BZ/SC devices (bsc#1227149).
  * wifi: iwlwifi: bump FW API to 86 for AX/BZ/SC devices (bsc#1227149).
  * wifi: iwlwifi: bump FW API to 87 for AX/BZ/SC devices (bsc#1227149).
  * wifi: iwlwifi: bump FW API to 88 for AX/BZ/SC devices (bsc#1227149).
  * wifi: iwlwifi: cancel session protection only if there is one (bsc#1227149).
  * wifi: iwlwifi: change link id in time event to s8 (bsc#1227149).
  * wifi: iwlwifi: check for kmemdup() return value in iwl_parse_tlv_firmware()
    (bsc#1227149).
  * wifi: iwlwifi: cleanup BT Shared Single Antenna code (bsc#1227149).
  * wifi: iwlwifi: cleanup sending PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1227149).
  * wifi: iwlwifi: cleanup uefi variables loading (bsc#1227149).
  * wifi: iwlwifi: clear link_id in time_event (bsc#1227149).
  * wifi: iwlwifi: dbg-tlv: avoid extra allocation/copy (bsc#1227149).
  * wifi: iwlwifi: dbg-tlv: use struct_size() for allocation (bsc#1227149).
  * wifi: iwlwifi: dbg_ini: move iwl_dbg_tlv_free outside of debugfs ifdef (git-
    fixes).
  * wifi: iwlwifi: disable 160 MHz based on subsystem device ID (bsc#1227149).
  * wifi: iwlwifi: disable eSR when BT is active (bsc#1227149).
  * wifi: iwlwifi: disable multi rx queue for 9000 (bsc#1227149).
  * wifi: iwlwifi: do not check TAS block list size twice (bsc#1227149).
  * wifi: iwlwifi: do not use TRUE/FALSE with bool (bsc#1227149).
  * wifi: iwlwifi: drop NULL pointer check in iwl_mvm_tzone_set_trip_temp()
    (bsc#1227149).
  * wifi: iwlwifi: dvm: remove kernel-doc warnings (bsc#1227149).
  * wifi: iwlwifi: error-dump: fix kernel-doc issues (bsc#1227149).
  * wifi: iwlwifi: fail NIC access fast on dead NIC (bsc#1227149).
  * wifi: iwlwifi: fix #ifdef CONFIG_ACPI check (bsc#1227149).
  * wifi: iwlwifi: fix iwl_mvm_get_valid_rx_ant() (git-fixes).
  * wifi: iwlwifi: fix opmode start/stop race (bsc#1227149).
  * wifi: iwlwifi: fix some kernel-doc issues (bsc#1227149).
  * wifi: iwlwifi: fix system commands group ordering (bsc#1227149).
  * wifi: iwlwifi: fix the rf step and flavor bits range (bsc#1227149).
  * wifi: iwlwifi: fw: Add support for UATS table in UHB (bsc#1227149).
  * wifi: iwlwifi: fw: Fix debugfs command sending (bsc#1227149).
  * wifi: iwlwifi: fw: allow vmalloc for PNVM image (bsc#1227149).
  * wifi: iwlwifi: fw: dbg: ensure correct config name sizes (bsc#1227149).
  * wifi: iwlwifi: fw: disable firmware debug asserts (bsc#1227149).
  * wifi: iwlwifi: fw: file: clean up kernel-doc (bsc#1227149).
  * wifi: iwlwifi: fw: file: do not use [0] for variable arrays (bsc#1227149).
  * wifi: iwlwifi: fw: fix compiler warning for NULL string print (bsc#1227149).
  * wifi: iwlwifi: fw: increase fw_version string size (bsc#1227149).
  * wifi: iwlwifi: fw: reconstruct the API/CAPA enum number (bsc#1227149).
  * wifi: iwlwifi: fw: replace deprecated strncpy with strscpy_pad
    (bsc#1227149).
  * wifi: iwlwifi: handle per-phy statistics from fw (bsc#1227149).
  * wifi: iwlwifi: implement GLAI ACPI table loading (bsc#1227149).
  * wifi: iwlwifi: implement can_activate_links callback (bsc#1227149).
  * wifi: iwlwifi: implement enable/disable for China 2022 regulatory
    (bsc#1227149).
  * wifi: iwlwifi: iwl-fh.h: fix kernel-doc issues (bsc#1227149).
  * wifi: iwlwifi: iwl-trans.h: clean up kernel-doc (bsc#1227149).
  * wifi: iwlwifi: iwlmvm: handle unprotected deauth/disassoc in d3
    (bsc#1227149).
  * wifi: iwlwifi: load b0 version of ucode for HR1/HR2 (bsc#1227149).
  * wifi: iwlwifi: make TB reallocation a debug message (bsc#1227149).
  * wifi: iwlwifi: make time_events MLO aware (bsc#1227149).
  * wifi: iwlwifi: mei: return error from register when not built (bsc#1227149).
  * wifi: iwlwifi: mvm: Add basic link selection logic (bsc#1227149).
  * wifi: iwlwifi: mvm: Add support for removing responder TKs (bsc#1227149).
  * wifi: iwlwifi: mvm: Allow DFS concurrent operation (bsc#1227149).
  * wifi: iwlwifi: mvm: Configure the link mapping for non-MLD FW (bsc#1227149).
  * wifi: iwlwifi: mvm: Correctly report TSF data in scan complete
    (bsc#1227149).
  * wifi: iwlwifi: mvm: Declare support for secure LTF measurement
    (bsc#1227149).
  * wifi: iwlwifi: mvm: Do not warn if valid link pair was not found
    (bsc#1227149).
  * wifi: iwlwifi: mvm: Do not warn on invalid link on scan complete
    (bsc#1227149).
  * wifi: iwlwifi: mvm: Extend support for P2P service discovery (bsc#1227149).
  * wifi: iwlwifi: mvm: Fix FTM initiator flags (bsc#1227149).
  * wifi: iwlwifi: mvm: Fix scan abort handling with HW rfkill (stable-fixes).
  * wifi: iwlwifi: mvm: Fix unreachable code path (bsc#1227149).
  * wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd (stable-fixes).
  * wifi: iwlwifi: mvm: Keep connection in case of missed beacons during RX
    (bsc#1227149).
  * wifi: iwlwifi: mvm: Return success if link could not be removed
    (bsc#1227149).
  * wifi: iwlwifi: mvm: Use the link ID provided in scan request (bsc#1227149).
  * wifi: iwlwifi: mvm: add US/Canada MCC to API (bsc#1227149).
  * wifi: iwlwifi: mvm: add a debug print when we get a BAR (bsc#1227149).
  * wifi: iwlwifi: mvm: add a debugfs hook to clear the monitor data
    (bsc#1227149).
  * wifi: iwlwifi: mvm: add a per-link debugfs (bsc#1227149).
  * wifi: iwlwifi: mvm: add a print when sending RLC command (bsc#1227149).
  * wifi: iwlwifi: mvm: add start mac ctdp sum calculation debugfs handler
    (bsc#1227149).
  * wifi: iwlwifi: mvm: add support for TID to link mapping neg request
    (bsc#1227149).
  * wifi: iwlwifi: mvm: add support for new wowlan_info_notif (bsc#1227149).
  * wifi: iwlwifi: mvm: advertise MLO only if EHT is enabled (bsc#1227149).
  * wifi: iwlwifi: mvm: advertise support for SCS traffic description
    (bsc#1227149).
  * wifi: iwlwifi: mvm: advertise support for protected ranging negotiation
    (bsc#1227149).
  * wifi: iwlwifi: mvm: always update keys in D3 exit (bsc#1227149).
  * wifi: iwlwifi: mvm: avoid garbage iPN (bsc#1227149).
  * wifi: iwlwifi: mvm: calculate EMLSR mode after connection (bsc#1227149).
  * wifi: iwlwifi: mvm: check AP supports EMLSR (bsc#1227149).
  * wifi: iwlwifi: mvm: check for iwl_mvm_mld_update_sta() errors (bsc#1227149).
  * wifi: iwlwifi: mvm: check link more carefully (bsc#1227149).
  * wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (git-fixes).
  * wifi: iwlwifi: mvm: check own capabilities for EMLSR (bsc#1227149).
  * wifi: iwlwifi: mvm: cleanup MLO and non-MLO unification code (bsc#1227149).
  * wifi: iwlwifi: mvm: combine condition/warning (bsc#1227149).
  * wifi: iwlwifi: mvm: consider having one active link (bsc#1227149).
  * wifi: iwlwifi: mvm: const-ify chandef pointers (bsc#1227149).
  * wifi: iwlwifi: mvm: cycle FW link on chanctx removal (bsc#1227149).
  * wifi: iwlwifi: mvm: d3: avoid intermediate/early mutex unlock (bsc#1227149).
  * wifi: iwlwifi: mvm: d3: disconnect on GTK rekey failure (bsc#1227149).
  * wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup (stable-fixes).
  * wifi: iwlwifi: mvm: d3: implement suspend with MLO (bsc#1227149).
  * wifi: iwlwifi: mvm: debugfs for fw system stats (bsc#1227149).
  * wifi: iwlwifi: mvm: define RX queue sync timeout as a macro (bsc#1227149).
  * wifi: iwlwifi: mvm: disable MLO for the time being (bsc#1227149).
  * wifi: iwlwifi: mvm: disallow puncturing in US/Canada (bsc#1227149).
  * wifi: iwlwifi: mvm: disconnect long CSA only w/o alternative (bsc#1227149).
  * wifi: iwlwifi: mvm: disconnect station vifs if recovery failed
    (bsc#1227149).
  * wifi: iwlwifi: mvm: do not abort queue sync in CT-kill (bsc#1227149).
  * wifi: iwlwifi: mvm: do not add dummy phy context (bsc#1227149).
  * wifi: iwlwifi: mvm: do not always disable EMLSR due to BT coex
    (bsc#1227149).
  * wifi: iwlwifi: mvm: do not do duplicate detection for nullfunc packets
    (bsc#1227149).
  * wifi: iwlwifi: mvm: do not initialize csa_work twice (git-fixes).
  * wifi: iwlwifi: mvm: do not limit VLP/AFC to UATS-enabled (git-fixes).
  * wifi: iwlwifi: mvm: do not read past the mfuart notifcation (git-fixes).
  * wifi: iwlwifi: mvm: do not send BT_COEX_CI command on new devices
    (bsc#1227149).
  * wifi: iwlwifi: mvm: do not send NDPs for new tx devices (bsc#1227149).
  * wifi: iwlwifi: mvm: do not send STA_DISABLE_TX_CMD for newer firmware
    (bsc#1227149).
  * wifi: iwlwifi: mvm: do not send the smart fifo command if not needed
    (bsc#1227149).
  * wifi: iwlwifi: mvm: do not set trigger frame padding in AP mode
    (bsc#1227149).
  * wifi: iwlwifi: mvm: do not support reduced tx power on ack for new devices
    (bsc#1227149).
  * wifi: iwlwifi: mvm: do not wake up rx_sync_waitq upon RFKILL (git-fixes).
  * wifi: iwlwifi: mvm: enable FILS DF Tx on non-PSC channel (bsc#1227149).
  * wifi: iwlwifi: mvm: enable HE TX/RX <242 tone RU on new RFs
    (bsc#1227149).
  * wifi: iwlwifi: mvm: expand queue sync warning messages (bsc#1227149).
  * wifi: iwlwifi: mvm: extend alive timeout to 2 seconds (bsc#1227149).
  * wifi: iwlwifi: mvm: fix ROC version check (bsc#1227149).
  * wifi: iwlwifi: mvm: fix SB CFG check (bsc#1227149).
  * wifi: iwlwifi: mvm: fix a battery life regression (bsc#1227149).
  * wifi: iwlwifi: mvm: fix a crash on 7265 (bsc#1227149).
  * wifi: iwlwifi: mvm: fix kernel-doc (bsc#1227149).
  * wifi: iwlwifi: mvm: fix link ID management (bsc#1227149).
  * wifi: iwlwifi: mvm: fix recovery flow in CSA (bsc#1227149).
  * wifi: iwlwifi: mvm: fix regdb initialization (bsc#1227149).
  * wifi: iwlwifi: mvm: fix the PHY context resolution for p2p device
    (bsc#1227149).
  * wifi: iwlwifi: mvm: fix the TXF mapping for BZ devices (bsc#1227149).
  * wifi: iwlwifi: mvm: fix the key PN index (bsc#1227149).
  * wifi: iwlwifi: mvm: fix thermal kernel-doc (bsc#1227149).
  * wifi: iwlwifi: mvm: fold the ref++ into iwl_mvm_phy_ctxt_add (bsc#1227149).
  * wifi: iwlwifi: mvm: handle BA session teardown in RF-kill (stable-fixes).
  * wifi: iwlwifi: mvm: handle debugfs names more carefully (bsc#1227149).
  * wifi: iwlwifi: mvm: handle link-STA allocation in restart (bsc#1227149).
  * wifi: iwlwifi: mvm: implement ROC version 3 (bsc#1227149).
  * wifi: iwlwifi: mvm: implement new firmware API for statistics (bsc#1227149).
  * wifi: iwlwifi: mvm: increase session protection after CSA (bsc#1227149).
  * wifi: iwlwifi: mvm: introduce PHY_CONTEXT_CMD_API_VER_5 (bsc#1227149).
  * wifi: iwlwifi: mvm: introduce esr_disable_reason (bsc#1227149).
  * wifi: iwlwifi: mvm: iterate active links for STA queues (bsc#1227149).
  * wifi: iwlwifi: mvm: limit EHT 320 MHz MCS for STEP URM (bsc#1227149).
  * wifi: iwlwifi: mvm: limit pseudo-D3 to 60 seconds (bsc#1227149).
  * wifi: iwlwifi: mvm: log dropped frames (bsc#1227149).
  * wifi: iwlwifi: mvm: log dropped packets due to MIC error (bsc#1227149).
  * wifi: iwlwifi: mvm: make "pldr_sync" mode effective (bsc#1227149).
  * wifi: iwlwifi: mvm: make functions public (bsc#1227149).
  * wifi: iwlwifi: mvm: make pldr_sync AX210 specific (bsc#1227149).
  * wifi: iwlwifi: mvm: move BA notif messages before action (bsc#1227149).
  * wifi: iwlwifi: mvm: move RU alloc B2 placement (bsc#1227149).
  * wifi: iwlwifi: mvm: move listen interval to constants (bsc#1227149).
  * wifi: iwlwifi: mvm: offload IGTK in AP if BIGTK is supported (bsc#1227149).
  * wifi: iwlwifi: mvm: partially support PHY context version 6 (bsc#1227149).
  * wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF
    (bsc#1227149).
  * wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option (stable-
    fixes).
  * wifi: iwlwifi: mvm: reduce maximum RX A-MPDU size (bsc#1227149).
  * wifi: iwlwifi: mvm: refactor TX rate handling (bsc#1227149).
  * wifi: iwlwifi: mvm: refactor duplicate chanctx condition (bsc#1227149).
  * wifi: iwlwifi: mvm: remove EHT code from mac80211.c (bsc#1227149).
  * wifi: iwlwifi: mvm: remove IWL_MVM_STATUS_NEED_FLUSH_P2P (bsc#1227149).
  * wifi: iwlwifi: mvm: remove flags for enable/disable beacon filter
    (bsc#1227149).
  * wifi: iwlwifi: mvm: remove one queue sync on BA session stop (bsc#1227149).
  * wifi: iwlwifi: mvm: remove set_tim callback for MLD ops (bsc#1227149).
  * wifi: iwlwifi: mvm: remove stale STA link data during restart (stable-
    fixes).
  * wifi: iwlwifi: mvm: revert gen2 TX A-MPDU size to 64 (git-fixes).
  * wifi: iwlwifi: mvm: rework debugfs handling (bsc#1227149).
  * wifi: iwlwifi: mvm: set properly mac header (git-fixes).
  * wifi: iwlwifi: mvm: show dump even for pldr_sync (bsc#1227149).
  * wifi: iwlwifi: mvm: show skb_mac_gso_segment() failure reason (bsc#1227149).
  * wifi: iwlwifi: mvm: simplify the reorder buffer (bsc#1227149).
  * wifi: iwlwifi: mvm: skip adding debugfs symlink for reconfig (bsc#1227149).
  * wifi: iwlwifi: mvm: support CSA with MLD (bsc#1227149).
  * wifi: iwlwifi: mvm: support SPP A-MSDUs (bsc#1227149).
  * wifi: iwlwifi: mvm: support flush on AP interfaces (bsc#1227149).
  * wifi: iwlwifi: mvm: support injection antenna control (bsc#1227149).
  * wifi: iwlwifi: mvm: support iwl_dev_tx_power_cmd_v8 (bsc#1227149).
  * wifi: iwlwifi: mvm: support set_antenna() (bsc#1227149).
  * wifi: iwlwifi: mvm: unlock mvm if there is no primary link (bsc#1227149).
  * wifi: iwlwifi: mvm: use fast balance scan in case of an active P2P GO
    (bsc#1227149).
  * wifi: iwlwifi: mvm: use the new command to clear the internal buffer
    (bsc#1227149).
  * wifi: iwlwifi: mvm: work around A-MSDU size problem (bsc#1227149).
  * wifi: iwlwifi: no power save during transition to D3 (bsc#1227149).
  * wifi: iwlwifi: nvm-parse: advertise common packet padding (bsc#1227149).
  * wifi: iwlwifi: nvm: parse the VLP/AFC bit from regulatory (bsc#1227149).
  * wifi: iwlwifi: pcie: (re-)assign BAR0 on driver bind (bsc#1227149).
  * wifi: iwlwifi: pcie: Add new PCI device id and CNVI (bsc#1227149).
  * wifi: iwlwifi: pcie: clean up WFPM control bits (bsc#1227149).
  * wifi: iwlwifi: pcie: clean up device removal work (bsc#1227149).
  * wifi: iwlwifi: pcie: clean up gen1/gen2 TFD unmap (bsc#1227149).
  * wifi: iwlwifi: pcie: do not allow hw-rfkill to stop device on gen2
    (bsc#1227149).
  * wifi: iwlwifi: pcie: dump CSRs before removal (bsc#1227149).
  * wifi: iwlwifi: pcie: enable TOP fatal error interrupt (bsc#1227149).
  * wifi: iwlwifi: pcie: fix kernel-doc issues (bsc#1227149).
  * wifi: iwlwifi: pcie: get_crf_id() can be void (bsc#1227149).
  * wifi: iwlwifi: pcie: give up mem read if HW is dead (bsc#1227149).
  * wifi: iwlwifi: pcie: move gen1 TB handling to header (bsc#1227149).
  * wifi: iwlwifi: pcie: point invalid TFDs to invalid data (bsc#1227149).
  * wifi: iwlwifi: pcie: propagate iwl_pcie_gen2_apm_init() error (bsc#1227149).
  * wifi: iwlwifi: pcie: rescan bus if no parent (bsc#1227149).
  * wifi: iwlwifi: prepare for reading DSM from UEFI (bsc#1227149).
  * wifi: iwlwifi: prepare for reading PPAG table from UEFI (bsc#1227149).
  * wifi: iwlwifi: prepare for reading SAR tables from UEFI (bsc#1227149).
  * wifi: iwlwifi: prepare for reading SPLC from UEFI (bsc#1227149).
  * wifi: iwlwifi: prepare for reading TAS table from UEFI (bsc#1227149).
  * wifi: iwlwifi: properly check if link is active (bsc#1227149).
  * wifi: iwlwifi: properly set WIPHY_FLAG_SUPPORTS_EXT_KEK_KCK (stable-fixes).
  * wifi: iwlwifi: queue: fix kernel-doc (bsc#1227149).
  * wifi: iwlwifi: queue: improve warning for no skb in reclaim (bsc#1227149).
  * wifi: iwlwifi: queue: move iwl_txq_gen2_set_tb() up (bsc#1227149).
  * wifi: iwlwifi: read DSM func 2 for specific RF types (bsc#1227149).
  * wifi: iwlwifi: read DSM functions from UEFI (bsc#1227149).
  * wifi: iwlwifi: read ECKV table from UEFI (bsc#1227149).
  * wifi: iwlwifi: read PPAG table from UEFI (bsc#1227149).
  * wifi: iwlwifi: read SAR tables from UEFI (bsc#1227149).
  * wifi: iwlwifi: read SPLC from UEFI (bsc#1227149).
  * wifi: iwlwifi: read WRDD table from UEFI (bsc#1227149).
  * wifi: iwlwifi: read WTAS table from UEFI (bsc#1227149).
  * wifi: iwlwifi: read mac step from aux register (bsc#1227149).
  * wifi: iwlwifi: refactor RX tracing (bsc#1227149).
  * wifi: iwlwifi: remove 'def_rx_queue' struct member (bsc#1227149).
  * wifi: iwlwifi: remove Gl A-step remnants (bsc#1227149).
  * wifi: iwlwifi: remove WARN from read_mem32() (bsc#1227149).
  * wifi: iwlwifi: remove async command callback (bsc#1227149).
  * wifi: iwlwifi: remove dead-code (bsc#1227149).
  * wifi: iwlwifi: remove extra kernel-doc (bsc#1227149).
  * wifi: iwlwifi: remove memory check for LMAC error address (bsc#1227149).
  * wifi: iwlwifi: remove retry loops in start (bsc#1227149).
  * wifi: iwlwifi: remove unused function prototype (bsc#1227149).
  * wifi: iwlwifi: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).
  * wifi: iwlwifi: return negative -EINVAL instead of positive EINVAL
    (bsc#1227149).
  * wifi: iwlwifi: rfi: use a single DSM function for all RFI configurations
    (bsc#1227149).
  * wifi: iwlwifi: send EDT table to FW (bsc#1227149).
  * wifi: iwlwifi: separate TAS 'read-from-BIOS' and 'send-to-FW' flows
    (bsc#1227149).
  * wifi: iwlwifi: simplify getting DSM from ACPI (bsc#1227149).
  * wifi: iwlwifi: skip affinity setting on non-SMP (bsc#1227149).
  * wifi: iwlwifi: skip opmode start retries on dead transport (bsc#1227149).
  * wifi: iwlwifi: small cleanups in PPAG table flows (bsc#1227149).
  * wifi: iwlwifi: support link command version 2 (bsc#1227149).
  * wifi: iwlwifi: support link id in SESSION_PROTECTION_NOTIF (bsc#1227149).
  * wifi: iwlwifi: support link_id in SESSION_PROTECTION cmd (bsc#1227149).
  * wifi: iwlwifi: take SGOM and UATS code out of ACPI ifdef (bsc#1227149).
  * wifi: iwlwifi: take send-DSM-to-FW flows out of ACPI ifdef (bsc#1227149).
  * wifi: iwlwifi: trace full frames with TX status request (bsc#1227149).
  * wifi: iwlwifi: update context info structure definitions (bsc#1227149).
  * wifi: iwlwifi: use system_unbound_wq for debug dump (bsc#1227149).
  * wifi: iwlwifi: validate PPAG table when sent to FW (bsc#1227149).
  * wifi: lib80211: remove unused variables iv32 and iv16 (bsc#1227149).
  * wifi: libertas: Follow renaming of SPI "master" to "controller"
    (bsc#1227149).
  * wifi: libertas: add missing calls to cancel_work_sync() (bsc#1227149).
  * wifi: libertas: cleanup SDIO reset (bsc#1227149).
  * wifi: libertas: handle possible spu_write_u16() errors (bsc#1227149).
  * wifi: libertas: prefer kstrtoX() for simple integer conversions
    (bsc#1227149).
  * wifi: libertas: simplify list operations in free_if_spi_card()
    (bsc#1227149).
  * wifi: libertas: use convenient lists to manage SDIO packets (bsc#1227149).
  * wifi: mac80211: Add __counted_by for struct ieee802_11_elems and use
    struct_size() (bsc#1227149).
  * wifi: mac80211: Avoid address calculations via out of bounds array indexing
    (stable-fixes).
  * wifi: mac80211: Check if we had first beacon with relevant links
    (bsc#1227149).
  * wifi: mac80211: Do not force off-channel for management Tx with MLO
    (bsc#1227149).
  * wifi: mac80211: Do not include crypto/algapi.h (bsc#1227149).
  * wifi: mac80211: Extend support for scanning while MLO connected
    (bsc#1227149).
  * wifi: mac80211: Fix SMPS handling in the context of MLO (bsc#1227149).
  * wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (git-
    fixes).
  * wifi: mac80211: Notify the low level driver on change in MLO valid links
    (bsc#1227149).
  * wifi: mac80211: Print local link address during authentication
    (bsc#1227149).
  * wifi: mac80211: Recalc offload when monitor stop (git-fixes).
  * wifi: mac80211: Remove unused function declarations (bsc#1227149).
  * wifi: mac80211: Rename and update IEEE80211_VIF_DISABLE_SMPS_OVERRIDE
    (bsc#1227149).
  * wifi: mac80211: Replace ENOTSUPP with EOPNOTSUPP (bsc#1227149).
  * wifi: mac80211: Sanity check tx bitrate if not provided by driver
    (bsc#1227149).
  * wifi: mac80211: Schedule regulatory channels check on bandwith change
    (bsc#1227149).
  * wifi: mac80211: Skip association timeout update after comeback rejection
    (bsc#1227149).
  * wifi: mac80211: add a driver callback to add vif debugfs (bsc#1227149).
  * wifi: mac80211: add a driver callback to check active_links (bsc#1227149).
  * wifi: mac80211: add a flag to disallow puncturing (bsc#1227149).
  * wifi: mac80211: add back SPDX identifier (bsc#1227149).
  * wifi: mac80211: add ieee80211_tdls_sta_link_id() (stable-fixes).
  * wifi: mac80211: add link id to ieee80211_gtk_rekey_add() (bsc#1227149).
  * wifi: mac80211: add link id to mgd_prepare_tx() (bsc#1227149).
  * wifi: mac80211: add more ops assertions (bsc#1227149).
  * wifi: mac80211: add more warnings about inserting sta info (bsc#1227149).
  * wifi: mac80211: add support for SPP A-MSDUs (bsc#1227149).
  * wifi: mac80211: add support for mld in ieee80211_chswitch_done
    (bsc#1227149).
  * wifi: mac80211: add support for parsing TID to Link mapping element
    (bsc#1227149).
  * wifi: mac80211: add/remove driver debugfs entries as appropriate
    (bsc#1227149).
  * wifi: mac80211: additions to change_beacon() (bsc#1227149).
  * wifi: mac80211: address some kerneldoc warnings (bsc#1227149).
  * wifi: mac80211: allow 64-bit radiotap timestamps (bsc#1227149).
  * wifi: mac80211: allow for_each_sta_active_link() under RCU (bsc#1227149).
  * wifi: mac80211: apply mcast rate only if interface is up (stable-fixes).
  * wifi: mac80211: cancel multi-link reconf work on disconnect (git-fixes).
  * wifi: mac80211: chanctx emulation set CHANGE_CHANNEL when in_reconfig (git-
    fixes).
  * wifi: mac80211: check EHT/TTLM action frame length (bsc#1227149).
  * wifi: mac80211: check wiphy mutex in ops (bsc#1227149).
  * wifi: mac80211: cleanup airtime arithmetic with ieee80211_sta_keep_active()
    (bsc#1227149).
  * wifi: mac80211: cleanup auth_data only if association continues
    (bsc#1227149).
  * wifi: mac80211: convert A-MPDU work to wiphy work (bsc#1227149).
  * wifi: mac80211: correctly parse Spatial Reuse Parameter Set element (git-
    fixes).
  * wifi: mac80211: correctly set active links upon TTLM (bsc#1227149).
  * wifi: mac80211: correcty limit wider BW TDLS STAs (git-fixes).
  * wifi: mac80211: debugfs: lock wiphy instead of RTNL (bsc#1227149).
  * wifi: mac80211: describe return values in kernel-doc (bsc#1227149).
  * wifi: mac80211: disable softirqs for queued frame handling (git-fixes).
  * wifi: mac80211: do not connect to an AP while it's in a CSA process
    (bsc#1227149).
  * wifi: mac80211: do not re-add debugfs entries during resume (bsc#1227149).
  * wifi: mac80211: do not select link ID if not provided in scan request
    (bsc#1227149).
  * wifi: mac80211: do not set ESS capab bit in assoc request (bsc#1227149).
  * wifi: mac80211: do not use rate mask for scanning (stable-fixes).
  * wifi: mac80211: drop robust action frames before assoc (bsc#1227149).
  * wifi: mac80211: drop spurious WARN_ON() in ieee80211_ibss_csa_beacon()
    (bsc#1227149).
  * wifi: mac80211: ensure beacon is non-S1G prior to extracting the beacon
    timestamp field (stable-fixes).
  * wifi: mac80211: ethtool: always hold wiphy mutex (bsc#1227149).
  * wifi: mac80211: ethtool: hold wiphy mutex (bsc#1227149).
  * wifi: mac80211: expand __ieee80211_data_to_8023() status (bsc#1227149).
  * wifi: mac80211: extend wiphy lock in interface removal (bsc#1227149).
  * wifi: mac80211: fix BA session teardown race (bsc#1227149).
  * wifi: mac80211: fix BSS_CHANGED_UNSOL_BCAST_PROBE_RESP (bsc#1227149).
  * wifi: mac80211: fix SMPS status handling (bsc#1227149).
  * wifi: mac80211: fix TXQ error path and cleanup (bsc#1227149).
  * wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan() (stable-fixes).
  * wifi: mac80211: fix a expired vs. cancel race in roc (bsc#1227149).
  * wifi: mac80211: fix advertised TTLM scheduling (bsc#1227149).
  * wifi: mac80211: fix another key installation error path (bsc#1227149).
  * wifi: mac80211: fix change_address deadlock during unregister (bsc#1227149).
  * wifi: mac80211: fix channel switch link data (bsc#1227149).
  * wifi: mac80211: fix driver debugfs for vif type change (bsc#1227149).
  * wifi: mac80211: fix error path key leak (bsc#1227149).
  * wifi: mac80211: fix header kernel-doc typos (bsc#1227149).
  * wifi: mac80211: fix ieee80211_drop_unencrypted_mgmt return type/value
    (bsc#1227149).
  * wifi: mac80211: fix monitor channel with chanctx emulation (bsc#1227149).
  * wifi: mac80211: fix potential key leak (bsc#1227149).
  * wifi: mac80211: fix spelling typo in comment (bsc#1227149).
  * wifi: mac80211: fix unsolicited broadcast probe config (bsc#1227149).
  * wifi: mac80211: fix various kernel-doc issues (bsc#1227149).
  * wifi: mac80211: fixes in FILS discovery updates (bsc#1227149).
  * wifi: mac80211: flush STA queues on unauthorization (bsc#1227149).
  * wifi: mac80211: flush wiphy work where appropriate (bsc#1227149).
  * wifi: mac80211: handle debugfs when switching to/from MLO (bsc#1227149).
  * wifi: mac80211: handle tasklet frames before stopping (stable-fixes).
  * wifi: mac80211: hold wiphy lock in netdev/link debugfs (bsc#1227149).
  * wifi: mac80211: hold wiphy_lock around concurrency checks (bsc#1227149).
  * wifi: mac80211: improve CSA/ECSA connection refusal (bsc#1227149).
  * wifi: mac80211: initialize SMPS mode correctly (bsc#1227149).
  * wifi: mac80211: lock wiphy for aggregation debugfs (bsc#1227149).
  * wifi: mac80211: lock wiphy in IP address notifier (bsc#1227149).
  * wifi: mac80211: make mgd_protect_tdls_discover MLO-aware (bsc#1227149).
  * wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (git-fixes).
  * wifi: mac80211: mesh: Remove unused function declaration
    mesh_ids_set_default() (bsc#1227149).
  * wifi: mac80211: mesh: fix some kdoc warnings (bsc#1227149).
  * wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh sdata
    (stable-fixes).
  * wifi: mac80211: move CSA finalize to wiphy work (bsc#1227149).
  * wifi: mac80211: move DFS CAC work to wiphy work (bsc#1227149).
  * wifi: mac80211: move TDLS work to wiphy work (bsc#1227149).
  * wifi: mac80211: move color change finalize to wiphy work (bsc#1227149).
  * wifi: mac80211: move dynamic PS to wiphy work (bsc#1227149).
  * wifi: mac80211: move filter reconfig to wiphy work (bsc#1227149).
  * wifi: mac80211: move key tailroom work to wiphy work (bsc#1227149).
  * wifi: mac80211: move link activation work to wiphy work (bsc#1227149).
  * wifi: mac80211: move monitor work to wiphy work (bsc#1227149).
  * wifi: mac80211: move tspec work to wiphy work (bsc#1227149).
  * wifi: mac80211: process and save negotiated TID to Link mapping request
    (bsc#1227149).
  * wifi: mac80211: purge TX queues in flush_queues flow (bsc#1227149).
  * wifi: mac80211: reduce iflist_mtx (bsc#1227149).
  * wifi: mac80211: reject MLO channel configuration if not supported
    (bsc#1227149).
  * wifi: mac80211: relax RCU check in for_each_vif_active_link() (bsc#1227149).
  * wifi: mac80211: remove RX_DROP_UNUSABLE (bsc#1227149).
  * wifi: mac80211: remove ampdu_mlme.mtx (bsc#1227149).
  * wifi: mac80211: remove chanctx_mtx (bsc#1227149).
  * wifi: mac80211: remove key_mtx (bsc#1227149).
  * wifi: mac80211: remove local->mtx (bsc#1227149).
  * wifi: mac80211: remove redundant ML element check (bsc#1227149).
  * wifi: mac80211: remove shifted rate support (bsc#1227149).
  * wifi: mac80211: remove sta_mtx (bsc#1227149).
  * wifi: mac80211: remove unnecessary struct forward declaration (bsc#1227149).
  * wifi: mac80211: rename ieee80211_tx_status() to ieee80211_tx_status_skb()
    (bsc#1227149).
  * wifi: mac80211: rename struct cfg80211_rx_assoc_resp to
    cfg80211_rx_assoc_resp_data (bsc#1227149).
  * wifi: mac80211: report per-link error during association (bsc#1227149).
  * wifi: mac80211: reset negotiated TTLM on disconnect (git-fixes).
  * wifi: mac80211: rework RX timestamp flags (bsc#1227149).
  * wifi: mac80211: rework ack_frame_id handling a bit (bsc#1227149).
  * wifi: mac80211: rx.c: fix sentence grammar (bsc#1227149).
  * wifi: mac80211: set wiphy for virtual monitors (bsc#1227149).
  * wifi: mac80211: simplify non-chanctx drivers (bsc#1227149).
  * wifi: mac80211: split ieee80211_drop_unencrypted_mgmt() return value
    (bsc#1227149).
  * wifi: mac80211: sta_info.c: fix sentence grammar (bsc#1227149).
  * wifi: mac80211: support antenna control in injection (bsc#1227149).
  * wifi: mac80211: support handling of advertised TID-to-link mapping
    (bsc#1227149).
  * wifi: mac80211: take MBSSID/EHT data also from probe resp (bsc#1227149).
  * wifi: mac80211: take wiphy lock for MAC addr change (bsc#1227149).
  * wifi: mac80211: tx: clarify conditions in if statement (bsc#1227149).
  * wifi: mac80211: update beacon counters per link basis (bsc#1227149).
  * wifi: mac80211: update some locking documentation (bsc#1227149).
  * wifi: mac80211: update the rx_chains after set_antenna() (bsc#1227149).
  * wifi: mac80211: use bandwidth indication element for CSA (bsc#1227149).
  * wifi: mac80211: use deflink and fix typo in link ID check (bsc#1227149).
  * wifi: mac80211: use wiphy locked debugfs for sdata/link (bsc#1227149).
  * wifi: mac80211: use wiphy locked debugfs helpers for agg_status
    (bsc#1227149).
  * wifi: mt7601u: delete dead code checking debugfs returns (bsc#1227149).
  * wifi: mt7601u: replace strlcpy() with strscpy() (bsc#1227149).
  * wifi: mt76: Annotate struct mt76_rx_tid with __counted_by (bsc#1227149).
  * wifi: mt76: Convert to platform remove callback returning void
    (bsc#1227149).
  * wifi: mt76: Remove redundant assignment to variable tidno (bsc#1227149).
  * wifi: mt76: Remove unnecessary (void*) conversions (bsc#1227149).
  * wifi: mt76: Replace strlcpy() with strscpy() (bsc#1227149).
  * wifi: mt76: Use PTR_ERR_OR_ZERO() to simplify code (bsc#1227149).
  * wifi: mt76: add DMA mapping error check in mt76_alloc_txwi() (bsc#1227149).
  * wifi: mt76: add ability to explicitly forbid LED registration with DT
    (bsc#1227149).
  * wifi: mt76: add support for providing eeprom in nvmem cells (bsc#1227149).
  * wifi: mt76: add tx_nss histogram to ethtool stats (bsc#1227149).
  * wifi: mt76: change txpower init to per-phy (bsc#1227149).
  * wifi: mt76: check sta rx control frame to multibss capability (bsc#1227149).
  * wifi: mt76: check txs format before getting skb by pid (bsc#1227149).
  * wifi: mt76: check vif type before reporting cca and csa (bsc#1227149).
  * wifi: mt76: connac: add MBSSID support for mt7996 (bsc#1227149).
  * wifi: mt76: connac: add beacon duplicate TX mode support for mt7996
    (bsc#1227149).
  * wifi: mt76: connac: add beacon protection support for mt7996 (bsc#1227149).
  * wifi: mt76: connac: add connac3 mac library (bsc#1227149).
  * wifi: mt76: connac: add data field in struct tlv (bsc#1227149).
  * wifi: mt76: connac: add eht support for phy mode config (bsc#1227149).
  * wifi: mt76: connac: add eht support for tx power (bsc#1227149).
  * wifi: mt76: connac: add firmware support for mt7992 (bsc#1227149).
  * wifi: mt76: connac: add more unified command IDs (bsc#1227149).
  * wifi: mt76: connac: add more unified event IDs (bsc#1227149).
  * wifi: mt76: connac: add new definition of tx descriptor (bsc#1227149).
  * wifi: mt76: connac: add support for dsp firmware download (bsc#1227149).
  * wifi: mt76: connac: add support to set ifs time by mcu command
    (bsc#1227149).
  * wifi: mt76: connac: add thermal protection support for mt7996 (bsc#1227149).
  * wifi: mt76: connac: check for null before dereferencing (bsc#1227149).
  * wifi: mt76: connac: export functions for mt7925 (bsc#1227149).
  * wifi: mt76: connac: introduce helper for mt7925 chipset (bsc#1227149).
  * wifi: mt76: connac: set correct muar_idx for mt799x chipsets (bsc#1227149).
  * wifi: mt76: connac: set fixed_bw bit in TX descriptor for fixed rate frames
    (bsc#1227149).
  * wifi: mt76: connac: use muar idx 0xe for non-mt799x as well (bsc#1227149).
  * wifi: mt76: disable HW AMSDU when using fixed rate (bsc#1227149).
  * wifi: mt76: dma: introduce __mt76_dma_queue_reset utility routine
    (bsc#1227149).
  * wifi: mt76: enable UNII-4 channel 177 support (bsc#1227149).
  * wifi: mt76: fix race condition related to checking tx queue fill status
    (bsc#1227149).
  * wifi: mt76: fix the issue of missing txpwr settings from ch153 to ch177
    (bsc#1227149).
  * wifi: mt76: fix typo in mt76_get_of_eeprom_from_nvmem function
    (bsc#1227149).
  * wifi: mt76: increase MT_QFLAG_WED_TYPE size (bsc#1227149).
  * wifi: mt76: introduce mt76_queue_is_wed_tx_free utility routine
    (bsc#1227149).
  * wifi: mt76: introduce wed pointer in mt76_queue (bsc#1227149).
  * wifi: mt76: limit support of precal loading for mt7915 to MTD only
    (bsc#1227149).
  * wifi: mt76: make mt76_get_of_eeprom static again (bsc#1227149).
  * wifi: mt76: mmio: move mt76_mmio_wed_{init,release}_rx_buf in common code
    (bsc#1227149).
  * wifi: mt76: move ampdu_state in mt76_wcid (bsc#1227149).
  * wifi: mt76: move mt76_mmio_wed_offload_{enable,disable} in common code
    (bsc#1227149).
  * wifi: mt76: move mt76_net_setup_tc in common code (bsc#1227149).
  * wifi: mt76: move rate info in mt76_vif (bsc#1227149).
  * wifi: mt76: move wed reset common code in mt76 module (bsc#1227149).
  * wifi: mt76: mt7603: add missing register initialization for MT7628
    (bsc#1227149).
  * wifi: mt76: mt7603: disable A-MSDU tx support on MT7628 (bsc#1227149).
  * wifi: mt76: mt7603: fix beacon interval after disabling a single vif
    (bsc#1227149).
  * wifi: mt76: mt7603: fix tx filter/flush function (bsc#1227149).
  * wifi: mt76: mt7603: rely on shared poll_list field (bsc#1227149).
  * wifi: mt76: mt7603: rely on shared sta_poll_list and sta_poll_lock
    (bsc#1227149).
  * wifi: mt76: mt7615: add missing chanctx ops (bsc#1227149).
  * wifi: mt76: mt7615: enable BSS_CHANGED_MU_GROUPS support (bsc#1227149).
  * wifi: mt76: mt7615: rely on shared poll_list field (bsc#1227149).
  * wifi: mt76: mt7615: rely on shared sta_poll_list and sta_poll_lock
    (bsc#1227149).
  * wifi: mt76: mt76_connac3: move lmac queue enumeration in mt76_connac3_mac.h
    (bsc#1227149).
  * wifi: mt76: mt76x02: fix return value check in mt76x02_mac_process_rx
    (bsc#1227149).
  * wifi: mt76: mt76x2u: add netgear wdna3100v3 to device table (bsc#1227149).
  * wifi: mt76: mt7915 add tc offloading support (bsc#1227149).
  * wifi: mt76: mt7915: accumulate mu-mimo ofdma muru stats (bsc#1227149).
  * wifi: mt76: mt7915: add locking for accessing mapped registers
    (bsc#1227149).
  * wifi: mt76: mt7915: add missing chanctx ops (bsc#1227149).
  * wifi: mt76: mt7915: add support for MT7981 (bsc#1227149).
  * wifi: mt76: mt7915: also MT7981 is 3T3R but nss2 on 5 GHz band
    (bsc#1227149).
  * wifi: mt76: mt7915: disable WFDMA Tx/Rx during SER recovery (bsc#1227149).
  * wifi: mt76: mt7915: drop return in mt7915_sta_statistics (bsc#1227149).
  * wifi: mt76: mt7915: fix EEPROM offset of TSSI flag on MT7981 (bsc#1227149).
  * wifi: mt76: mt7915: fix error recovery with WED enabled (bsc#1227149).
  * wifi: mt76: mt7915: fix monitor mode issues (bsc#1227149).
  * wifi: mt76: mt7915: move mib_stats structure in mt76.h (bsc#1227149).
  * wifi: mt76: mt7915: move poll_list in mt76_wcid (bsc#1227149).
  * wifi: mt76: mt7915: move sta_poll_list and sta_poll_lock in mt76_dev
    (bsc#1227149).
  * wifi: mt76: mt7915: report tx retries/failed counts for non-WED path
    (bsc#1227149).
  * wifi: mt76: mt7915: update mpdu density capability (bsc#1227149).
  * wifi: mt76: mt7915: update mt798x_wmac_adie_patch_7976 (bsc#1227149).
  * wifi: mt76: mt7921: Support temp sensor (bsc#1227149).
  * wifi: mt76: mt7921: add 6GHz power type support for clc (bsc#1227149).
  * wifi: mt76: mt7921: convert acpisar and clc pointers to void (bsc#1227149).
  * wifi: mt76: mt7921: enable set txpower for UNII-4 (bsc#1227149).
  * wifi: mt76: mt7921: fix 6GHz disabled by the missing default CLC config
    (bsc#1227149).
  * wifi: mt76: mt7921: fix CLC command timeout when suspend/resume
    (bsc#1227149).
  * wifi: mt76: mt7921: fix a potential association failure upon resuming
    (bsc#1227149).
  * wifi: mt76: mt7921: fix kernel panic by accessing invalid 6GHz channel info
    (bsc#1227149).
  * wifi: mt76: mt7921: fix suspend issue on MediaTek COB platform
    (bsc#1227149).
  * wifi: mt76: mt7921: fix the unfinished command of regd_notifier before
    suspend (bsc#1227149).
  * wifi: mt76: mt7921: fix wrong 6Ghz power type (bsc#1227149).
  * wifi: mt76: mt7921: get regulatory information from the clc event
    (bsc#1227149).
  * wifi: mt76: mt7921: get rid of MT7921_RESET_TIMEOUT marco (bsc#1227149).
  * wifi: mt76: mt7921: make mt7921_mac_sta_poll static (bsc#1227149).
  * wifi: mt76: mt7921: move acpi_sar code in mt792x-lib module (bsc#1227149).
  * wifi: mt76: mt7921: move common register definition in mt792x_regs.h
    (bsc#1227149).
  * wifi: mt76: mt7921: move connac nic capability handling to mt7921
    (bsc#1227149).
  * wifi: mt76: mt7921: move debugfs shared code in mt792x-lib module
    (bsc#1227149).
  * wifi: mt76: mt7921: move dma shared code in mt792x-lib module (bsc#1227149).
  * wifi: mt76: mt7921: move hif_ops macro in mt792x.h (bsc#1227149).
  * wifi: mt76: mt7921: move init shared code in mt792x-lib module
    (bsc#1227149).
  * wifi: mt76: mt7921: move mac shared code in mt792x-lib module (bsc#1227149).
  * wifi: mt76: mt7921: move mt7921_dma_init in pci.c (bsc#1227149).
  * wifi: mt76: mt7921: move mt7921u_disconnect mt792x-lib (bsc#1227149).
  * wifi: mt76: mt7921: move mt792x_hw_dev in mt792x.h (bsc#1227149).
  * wifi: mt76: mt7921: move mt792x_mutex_{acquire/release} in mt792x.h
    (bsc#1227149).
  * wifi: mt76: mt7921: move runtime-pm pci code in mt792x-lib (bsc#1227149).
  * wifi: mt76: mt7921: move shared runtime-pm code on mt792x-lib (bsc#1227149).
  * wifi: mt76: mt7921: reduce the size of MCU firmware download Rx queue
    (bsc#1227149).
  * wifi: mt76: mt7921: rely on mib_stats shared definition (bsc#1227149).
  * wifi: mt76: mt7921: rely on shared poll_list field (bsc#1227149).
  * wifi: mt76: mt7921: rely on shared sta_poll_list and sta_poll_lock
    (bsc#1227149).
  * wifi: mt76: mt7921: remove macro duplication in regs.h (bsc#1227149).
  * wifi: mt76: mt7921: rename mt7921_dev in mt792x_dev (bsc#1227149).
  * wifi: mt76: mt7921: rename mt7921_hif_ops in mt792x_hif_ops (bsc#1227149).
  * wifi: mt76: mt7921: rename mt7921_phy in mt792x_phy (bsc#1227149).
  * wifi: mt76: mt7921: rename mt7921_sta in mt792x_sta (bsc#1227149).
  * wifi: mt76: mt7921: rename mt7921_vif in mt792x_vif (bsc#1227149).
  * wifi: mt76: mt7921: support 5.9/6GHz channel config in acpi (bsc#1227149).
  * wifi: mt76: mt7921: update the channel usage when the regd domain changed
    (bsc#1227149).
  * wifi: mt76: mt7921e: report tx retries/failed counts in tx free event
    (bsc#1227149).
  * wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (stable-
    fixes).
  * wifi: mt76: mt7925: add Mediatek Wi-Fi7 driver for mt7925 chips
    (bsc#1227149).
  * wifi: mt76: mt7925: add flow to avoid chip bt function fail (bsc#1227149).
  * wifi: mt76: mt7925: add support to set ifs time by mcu command
    (bsc#1227149).
  * wifi: mt76: mt7925: ensure 4-byte alignment for suspend & wow command
    (bsc#1227149).
  * wifi: mt76: mt7925: fix SAP no beacon issue in 5Ghz and 6Ghz band
    (bsc#1227149).
  * wifi: mt76: mt7925: fix WoW failed in encrypted mode (bsc#1227149).
  * wifi: mt76: mt7925: fix connect to 80211b mode fail in 2Ghz band
    (bsc#1227149).
  * wifi: mt76: mt7925: fix fw download fail (bsc#1227149).
  * wifi: mt76: mt7925: fix mcu query command fail (bsc#1227149).
  * wifi: mt76: mt7925: fix the wrong data type for scan command (bsc#1227149).
  * wifi: mt76: mt7925: fix the wrong header translation config (bsc#1227149).
  * wifi: mt76: mt7925: fix typo in mt7925_init_he_caps (bsc#1227149).
  * wifi: mt76: mt7925: fix wmm queue mapping (bsc#1227149).
  * wifi: mt76: mt7925: remove iftype from mt7925_init_eht_caps signature
    (bsc#1227149).
  * wifi: mt76: mt7925: support temperature sensor (bsc#1227149).
  * wifi: mt76: mt7925: update PCIe DMA settings (bsc#1227149).
  * wifi: mt76: mt7925e: fix use-after-free in free_irq() (bsc#1227149).
  * wifi: mt76: mt792x: add the illegal value check for mtcl table of acpi
    (bsc#1227149).
  * wifi: mt76: mt792x: fix ethtool warning (bsc#1227149).
  * wifi: mt76: mt792x: introduce mt792x-lib module (bsc#1227149).
  * wifi: mt76: mt792x: introduce mt792x-usb module (bsc#1227149).
  * wifi: mt76: mt792x: introduce mt792x_irq_map (bsc#1227149).
  * wifi: mt76: mt792x: move MT7921_PM_TIMEOUT and MT7921_HW_SCAN_TIMEOUT in
    common code (bsc#1227149).
  * wifi: mt76: mt792x: move more dma shared code in mt792x_dma (bsc#1227149).
  * wifi: mt76: mt792x: move mt7921_load_firmware in mt792x-lib module
    (bsc#1227149).
  * wifi: mt76: mt792x: move mt7921_skb_add_usb_sdio_hdr in mt792x module
    (bsc#1227149).
  * wifi: mt76: mt792x: move shared structure definition in mt792x.h
    (bsc#1227149).
  * wifi: mt76: mt792x: move some common usb code in mt792x module
    (bsc#1227149).
  * wifi: mt76: mt792x: support mt7925 chip init (bsc#1227149).
  * wifi: mt76: mt792x: update the country list of EU for ACPI SAR
    (bsc#1227149).
  * wifi: mt76: mt792xu: enable dmashdl support (bsc#1227149).
  * wifi: mt76: mt7996: Add mcu commands for getting sta tx statistic
    (bsc#1227149).
  * wifi: mt76: mt7996: Use DECLARE_FLEX_ARRAY() and fix -Warray-bounds warnings
    (bsc#1227149).
  * wifi: mt76: mt7996: add DMA support for mt7992 (bsc#1227149).
  * wifi: mt76: mt7996: add TX statistics for EHT mode in debugfs (bsc#1227149).
  * wifi: mt76: mt7996: add muru support (bsc#1227149).
  * wifi: mt76: mt7996: add sanity checks for background radar trigger (stable-
    fixes).
  * wifi: mt76: mt7996: add support for variants with auxiliary RX path
    (bsc#1227149).
  * wifi: mt76: mt7996: add thermal sensor device support (bsc#1227149).
  * wifi: mt76: mt7996: add txpower setting support (bsc#1227149).
  * wifi: mt76: mt7996: adjust WFDMA settings to improve performance
    (bsc#1227149).
  * wifi: mt76: mt7996: adjust interface num and wtbl size for mt7992
    (bsc#1227149).
  * wifi: mt76: mt7996: align the format of fixed rate command (bsc#1227149).
  * wifi: mt76: mt7996: check txs format before getting skb by pid
    (bsc#1227149).
  * wifi: mt76: mt7996: disable WFDMA Tx/Rx during SER recovery (bsc#1227149).
  * wifi: mt76: mt7996: drop return in mt7996_sta_statistics (bsc#1227149).
  * wifi: mt76: mt7996: enable BSS_CHANGED_MU_GROUPS support (bsc#1227149).
  * wifi: mt76: mt7996: enable PPDU-TxS to host (bsc#1227149).
  * wifi: mt76: mt7996: enable VHT extended NSS BW feature (bsc#1227149).
  * wifi: mt76: mt7996: ensure 4-byte alignment for beacon commands
    (bsc#1227149).
  * wifi: mt76: mt7996: fix alignment of sta info event (bsc#1227149).
  * wifi: mt76: mt7996: fix fortify warning (bsc#1227149).
  * wifi: mt76: mt7996: fix fw loading timeout (bsc#1227149).
  * wifi: mt76: mt7996: fix mt7996_mcu_all_sta_info_event struct packing
    (bsc#1227149).
  * wifi: mt76: mt7996: fix potential memory leakage when reading chip
    temperature (bsc#1227149).
  * wifi: mt76: mt7996: fix size of txpower MCU command (bsc#1227149).
  * wifi: mt76: mt7996: fix uninitialized variable in mt7996_irq_tasklet()
    (bsc#1227149).
  * wifi: mt76: mt7996: fix uninitialized variable in parsing txfree
    (bsc#1227149).
  * wifi: mt76: mt7996: get tx_retries and tx_failed from txfree (bsc#1227149).
  * wifi: mt76: mt7996: handle IEEE80211_RC_SMPS_CHANGED (bsc#1227149).
  * wifi: mt76: mt7996: increase tx token size (bsc#1227149).
  * wifi: mt76: mt7996: introduce mt7996_band_valid() (bsc#1227149).
  * wifi: mt76: mt7996: mark GCMP IGTK unsupported (bsc#1227149).
  * wifi: mt76: mt7996: move radio ctrl commands to proper functions
    (bsc#1227149).
  * wifi: mt76: mt7996: only set vif teardown cmds at remove interface
    (bsc#1227149).
  * wifi: mt76: mt7996: rely on mib_stats shared definition (bsc#1227149).
  * wifi: mt76: mt7996: rely on shared poll_list field (bsc#1227149).
  * wifi: mt76: mt7996: rely on shared sta_poll_list and sta_poll_lock
    (bsc#1227149).
  * wifi: mt76: mt7996: remove TXS queue setting (bsc#1227149).
  * wifi: mt76: mt7996: remove periodic MPDU TXS request (bsc#1227149).
  * wifi: mt76: mt7996: rework ampdu params setting (bsc#1227149).
  * wifi: mt76: mt7996: rework register offsets for mt7992 (bsc#1227149).
  * wifi: mt76: mt7996: set DMA mask to 36 bits for boards with more than 4GB of
    RAM (bsc#1227149).
  * wifi: mt76: mt7996: support more options for mt7996_set_bitrate_mask()
    (bsc#1227149).
  * wifi: mt76: mt7996: support mt7992 eeprom loading (bsc#1227149).
  * wifi: mt76: mt7996: support per-band LED control (bsc#1227149).
  * wifi: mt76: mt7996: switch to mcu command for TX GI report (bsc#1227149).
  * wifi: mt76: mt7996: use u16 for val field in mt7996_mcu_set_rro signature
    (bsc#1227149).
  * wifi: mt76: permit to load precal from NVMEM cell for mt7915 (bsc#1227149).
  * wifi: mt76: permit to use alternative cell name to eeprom NVMEM load
    (bsc#1227149).
  * wifi: mt76: reduce spin_lock_bh held up in mt76_dma_rx_cleanup
    (bsc#1227149).
  * wifi: mt76: replace skb_put with skb_put_zero (stable-fixes).
  * wifi: mt76: report non-binding skb tx rate when WED is active (bsc#1227149).
  * wifi: mt76: set page_pool napi pointer for mmio devices (bsc#1227149).
  * wifi: mt76: split get_of_eeprom in subfunction (bsc#1227149).
  * wifi: mt76: usb: create a dedicated queue for psd traffic (bsc#1227149).
  * wifi: mt76: usb: store usb endpoint in mt76_queue (bsc#1227149).
  * wifi: mt76: use atomic iface iteration for pre-TBTT work (bsc#1227149).
  * wifi: mt76: use chainmask for power delta calculation (bsc#1227149).
  * wifi: mwifiex: Drop unused headers (bsc#1227149).
  * wifi: mwifiex: Fix interface type change (git-fixes).
  * wifi: mwifiex: Refactor 1-element array into flexible array in struct
    mwifiex_ie_types_chan_list_param_set (bsc#1227149).
  * wifi: mwifiex: Replace one-element array with flexible-array member in
    struct mwifiex_ie_types_rxba_sync (bsc#1227149).
  * wifi: mwifiex: Set WIPHY_FLAG_NETNS_OK flag (bsc#1227149).
  * wifi: mwifiex: Use default @max_active for workqueues (bsc#1227149).
  * wifi: mwifiex: Use helpers to check multicast addresses (bsc#1227149).
  * wifi: mwifiex: Use list_count_nodes() (bsc#1227149).
  * wifi: mwifiex: cleanup adapter data (bsc#1227149).
  * wifi: mwifiex: cleanup private data structures (bsc#1227149).
  * wifi: mwifiex: cleanup struct mwifiex_sdio_mpa_rx (bsc#1227149).
  * wifi: mwifiex: drop BUG_ON from TX paths (bsc#1227149).
  * wifi: mwifiex: fix comment typos in SDIO module (bsc#1227149).
  * wifi: mwifiex: followup PCIE and related cleanups (bsc#1227149).
  * wifi: mwifiex: handle possible mwifiex_write_reg() errors (bsc#1227149).
  * wifi: mwifiex: handle possible sscanf() errors (bsc#1227149).
  * wifi: mwifiex: mwifiex_process_sleep_confirm_resp(): remove unused priv
    variable (bsc#1227149).
  * wifi: mwifiex: prefer strscpy() over strlcpy() (bsc#1227149).
  * wifi: mwifiex: simplify PCIE write operations (bsc#1227149).
  * wifi: mwifiex: use MODULE_FIRMWARE to add firmware files metadata
    (bsc#1227149).
  * wifi: mwifiex: use cfg80211_ssid_eq() instead of mwifiex_ssid_cmp()
    (bsc#1227149).
  * wifi: mwifiex: use is_zero_ether_addr() instead of ether_addr_equal()
    (bsc#1227149).
  * wifi: mwifiex: use kstrtoX_from_user() in debugfs handlers (bsc#1227149).
  * wifi: nl80211: Avoid address calculations via out of bounds array indexing
    (git-fixes).
  * wifi: nl80211: Extend del pmksa support for SAE and OWE security
    (bsc#1227149).
  * wifi: nl80211: Remove unused declaration nl80211_pmsr_dump_results()
    (bsc#1227149).
  * wifi: nl80211: additions to NL80211_CMD_SET_BEACON (bsc#1227149).
  * wifi: nl80211: allow reporting wakeup for unprot deauth/disassoc
    (bsc#1227149).
  * wifi: nl80211: fixes to FILS discovery updates (bsc#1227149).
  * wifi: nl80211: refactor nl80211_send_mlme_event() arguments (bsc#1227149).
  * wifi: p54: Add missing MODULE_FIRMWARE macro (bsc#1227149).
  * wifi: p54: Annotate struct p54_cal_database with __counted_by (bsc#1227149).
  * wifi: p54: fix GCC format truncation warning with wiphy->fw_version
    (bsc#1227149).
  * wifi: plfxlc: Drop unused include (bsc#1227149).
  * wifi: radiotap: add bandwidth definition of EHT U-SIG (bsc#1227149).
  * wifi: remove unused argument of ieee80211_get_tdls_action() (bsc#1227149).
  * wifi: rsi: fix restricted __le32 degrades to integer sparse warnings
    (bsc#1227149).
  * wifi: rsi: rsi_91x_coex: Remove unnecessary (void*) conversions
    (bsc#1227149).
  * wifi: rsi: rsi_91x_debugfs: Remove unnecessary (void*) conversions
    (bsc#1227149).
  * wifi: rsi: rsi_91x_hal: Remove unnecessary conversions (bsc#1227149).
  * wifi: rsi: rsi_91x_mac80211: Remove unnecessary conversions (bsc#1227149).
  * wifi: rsi: rsi_91x_main: Remove unnecessary (void*) conversions
    (bsc#1227149).
  * wifi: rsi: rsi_91x_sdio: Remove unnecessary (void*) conversions
    (bsc#1227149).
  * wifi: rsi: rsi_91x_sdio_ops: Remove unnecessary (void*) conversions
    (bsc#1227149).
  * wifi: rsi: rsi_91x_usb: Remove unnecessary (void*) conversions
    (bsc#1227149).
  * wifi: rsi: rsi_91x_usb_ops: Remove unnecessary (void*) conversions
    (bsc#1227149).
  * wifi: rt2x00: Simplify bool conversion (bsc#1227149).
  * wifi: rt2x00: correct MAC_SYS_CTRL register RX mask in R-Calibration
    (bsc#1227149).
  * wifi: rt2x00: disable RTS threshold for rt2800 by default (bsc#1227149).
  * wifi: rt2x00: fix MT7620 low RSSI issue (bsc#1227149).
  * wifi: rt2x00: fix rt2800 watchdog function (bsc#1227149).
  * wifi: rt2x00: fix the typo in comments (bsc#1227149).
  * wifi: rt2x00: improve MT7620 register initialization (bsc#1227149).
  * wifi: rt2x00: introduce DMA busy check watchdog for rt2800 (bsc#1227149).
  * wifi: rt2x00: limit MT7620 TX power based on eeprom calibration
    (bsc#1227149).
  * wifi: rt2x00: make watchdog param per device (bsc#1227149).
  * wifi: rt2x00: remove redundant check if u8 array element is less than zero
    (bsc#1227149).
  * wifi: rt2x00: remove useless code in rt2x00queue_create_tx_descriptor()
    (bsc#1227149).
  * wifi: rt2x00: rework MT7620 PA/LNA RF calibration (bsc#1227149).
  * wifi: rt2x00: rework MT7620 channel config function (bsc#1227149).
  * wifi: rt2x00: silence sparse warnings (bsc#1227149).
  * wifi: rt2x00: simplify rt2x00crypto_rx_insert_iv() (bsc#1227149).
  * wifi: rtl8xxxu: 8188e: convert usage of priv->vif to priv->vifs[0]
    (bsc#1227149).
  * wifi: rtl8xxxu: 8188f: Limit TX power index (git-fixes).
  * wifi: rtl8xxxu: Actually use macid in rtl8xxxu_gen2_report_connect
    (bsc#1227149).
  * wifi: rtl8xxxu: Add TP-Link TL-WN823N V2 (bsc#1227149).
  * wifi: rtl8xxxu: Add a description about the device ID 0x7392:0xb722
    (bsc#1227149).
  * wifi: rtl8xxxu: Add beacon functions (bsc#1227149).
  * wifi: rtl8xxxu: Add parameter force to rtl8xxxu_refresh_rate_mask
    (bsc#1227149).
  * wifi: rtl8xxxu: Add parameter macid to update_rate_mask (bsc#1227149).
  * wifi: rtl8xxxu: Add parameter role to report_connect (bsc#1227149).
  * wifi: rtl8xxxu: Add set_tim() callback (bsc#1227149).
  * wifi: rtl8xxxu: Add sta_add() and sta_remove() callbacks (bsc#1227149).
  * wifi: rtl8xxxu: Add start_ap() callback (bsc#1227149).
  * wifi: rtl8xxxu: Allow creating interface in AP mode (bsc#1227149).
  * wifi: rtl8xxxu: Allow setting rts threshold to -1 (bsc#1227149).
  * wifi: rtl8xxxu: Clean up filter configuration (bsc#1227149).
  * wifi: rtl8xxxu: Declare AP mode support for 8188f (bsc#1227149).
  * wifi: rtl8xxxu: Enable AP mode for RTL8192EU (bsc#1227149).
  * wifi: rtl8xxxu: Enable AP mode for RTL8192FU (bsc#1227149).
  * wifi: rtl8xxxu: Enable AP mode for RTL8710BU (RTL8188GU) (bsc#1227149).
  * wifi: rtl8xxxu: Enable AP mode for RTL8723BU (bsc#1227149).
  * wifi: rtl8xxxu: Enable hw seq for mgmt/non-QoS data frames (bsc#1227149).
  * wifi: rtl8xxxu: Fix LED control code of RTL8192FU (bsc#1227149).
  * wifi: rtl8xxxu: Fix off by one initial RTS rate (bsc#1227149).
  * wifi: rtl8xxxu: Fix the TX power of RTL8192CU, RTL8723AU (stable-fixes).
  * wifi: rtl8xxxu: Put the macid in txdesc (bsc#1227149).
  * wifi: rtl8xxxu: Remove usage of ieee80211_get_tx_rate() (bsc#1227149).
  * wifi: rtl8xxxu: Remove usage of tx_info->control.rates[0].flags
    (bsc#1227149).
  * wifi: rtl8xxxu: Rename some registers (bsc#1227149).
  * wifi: rtl8xxxu: Select correct queue for beacon frames (bsc#1227149).
  * wifi: rtl8xxxu: Set maximum number of supported stations (bsc#1227149).
  * wifi: rtl8xxxu: Support USB RX aggregation for the newer chips
    (bsc#1227149).
  * wifi: rtl8xxxu: Support new chip RTL8192FU (bsc#1227149).
  * wifi: rtl8xxxu: add hw crypto support for AP mode (bsc#1227149).
  * wifi: rtl8xxxu: add macids for STA mode (bsc#1227149).
  * wifi: rtl8xxxu: add missing number of sec cam entries for all variants
    (bsc#1227149).
  * wifi: rtl8xxxu: check vif before using in rtl8xxxu_tx() (bsc#1227149).
  * wifi: rtl8xxxu: convert EN_DESC_ID of TX descriptor to le32 type
    (bsc#1227149).
  * wifi: rtl8xxxu: declare concurrent mode support for 8188f (bsc#1227149).
  * wifi: rtl8xxxu: do not parse CFO, if both interfaces are connected in STA
    mode (bsc#1227149).
  * wifi: rtl8xxxu: enable MFP support with security flag of RX descriptor
    (bsc#1227149).
  * wifi: rtl8xxxu: enable channel switch support (bsc#1227149).
  * wifi: rtl8xxxu: extend check for matching bssid to both interfaces
    (bsc#1227149).
  * wifi: rtl8xxxu: extend wifi connected check to both interfaces
    (bsc#1227149).
  * wifi: rtl8xxxu: fix error messages (bsc#1227149).
  * wifi: rtl8xxxu: fix mixed declarations in rtl8xxxu_set_aifs() (bsc#1227149).
  * wifi: rtl8xxxu: make instances of iface limit and combination to be static
    const (bsc#1227149).
  * wifi: rtl8xxxu: make supporting AP mode only on port 0 transparent
    (bsc#1227149).
  * wifi: rtl8xxxu: mark TOTOLINK N150UA V5/N150UA-B as tested (bsc#1227149).
  * wifi: rtl8xxxu: prepare supporting two virtual interfaces (bsc#1227149).
  * wifi: rtl8xxxu: remove assignment of priv->vif in
    rtl8xxxu_bss_info_changed() (bsc#1227149).
  * wifi: rtl8xxxu: remove obsolete priv->vif (bsc#1227149).
  * wifi: rtl8xxxu: rtl8xxxu_rx_complete(): remove unnecessary return
    (bsc#1227149).
  * wifi: rtl8xxxu: support multiple interface in start_ap() (bsc#1227149).
  * wifi: rtl8xxxu: support multiple interfaces in bss_info_changed()
    (bsc#1227149).
  * wifi: rtl8xxxu: support multiple interfaces in configure_filter()
    (bsc#1227149).
  * wifi: rtl8xxxu: support multiple interfaces in set_aifs() (bsc#1227149).
  * wifi: rtl8xxxu: support multiple interfaces in update_beacon_work_callback()
    (bsc#1227149).
  * wifi: rtl8xxxu: support multiple interfaces in watchdog_callback()
    (bsc#1227149).
  * wifi: rtl8xxxu: support multiple interfaces in {add,remove}_interface()
    (bsc#1227149).
  * wifi: rtl8xxxu: support setting bssid register for multiple interfaces
    (bsc#1227149).
  * wifi: rtl8xxxu: support setting linktype for both interfaces (bsc#1227149).
  * wifi: rtl8xxxu: support setting mac address register for both interfaces
    (bsc#1227149).
  * wifi: rtl8xxxu: update rate mask per sta (bsc#1227149).
  * wifi: rtlwifi: Convert to use PCIe capability accessors (bsc#1227149).
  * wifi: rtlwifi: Ignore IEEE80211_CONF_CHANGE_RETRY_LIMITS (bsc#1227149).
  * wifi: rtlwifi: Remove bridge vendor/device ids (bsc#1227149).
  * wifi: rtlwifi: Remove rtl_intf_ops.read_efuse_byte (bsc#1227149).
  * wifi: rtlwifi: Remove unused PCI related defines and struct (bsc#1227149).
  * wifi: rtlwifi: Speed up firmware loading for USB (bsc#1227149).
  * wifi: rtlwifi: cleanup USB interface (bsc#1227149).
  * wifi: rtlwifi: cleanup few rtlxxx_tx_fill_desc() routines (bsc#1227149).
  * wifi: rtlwifi: cleanup few rtlxxxx_set_hw_reg() routines (bsc#1227149).
  * wifi: rtlwifi: cleanup struct rtl_hal (bsc#1227149).
  * wifi: rtlwifi: cleanup struct rtl_phy (bsc#1227149).
  * wifi: rtlwifi: cleanup struct rtl_ps_ctl (bsc#1227149).
  * wifi: rtlwifi: drop chk_switch_dmdp() from HAL interface (bsc#1227149).
  * wifi: rtlwifi: drop fill_fake_txdesc() from HAL interface (bsc#1227149).
  * wifi: rtlwifi: drop pre_fill_tx_bd_desc() from HAL interface (bsc#1227149).
  * wifi: rtlwifi: drop unused const_amdpci_aspm (bsc#1227149).
  * wifi: rtlwifi: remove misused flag from HAL data (bsc#1227149).
  * wifi: rtlwifi: remove unreachable code in rtl92d_dm_check_edca_turbo()
    (bsc#1227149).
  * wifi: rtlwifi: remove unused dualmac control leftovers (bsc#1227149).
  * wifi: rtlwifi: remove unused timer and related code (bsc#1227149).
  * wifi: rtlwifi: rtl8192cu: Fix 2T2R chip type detection (bsc#1227149).
  * wifi: rtlwifi: rtl8192cu: Fix TX aggregation (bsc#1227149).
  * wifi: rtlwifi: rtl8192de: Do not read register in _rtl92de_query_rxphystatus
    (bsc#1227149).
  * wifi: rtlwifi: rtl8192de: Fix 5 GHz TX power (stable-fixes).
  * wifi: rtlwifi: rtl8192de: Fix endianness issue in RX path (stable-fixes).
  * wifi: rtlwifi: rtl8192de: Fix low speed with WPA3-SAE (stable-fixes).
  * wifi: rtlwifi: rtl8723: Remove unused function rtl8723_cmd_send_packet()
    (bsc#1227149).
  * wifi: rtlwifi: rtl8821ae: Access full PMCS reg and use pci_regs.h
    (bsc#1227149).
  * wifi: rtlwifi: rtl8821ae: Add pdev into _rtl8821ae_clear_pci_pme_status()
    (bsc#1227149).
  * wifi: rtlwifi: rtl8821ae: Remove unnecessary PME_Status bit set
    (bsc#1227149).
  * wifi: rtlwifi: rtl8821ae: Reverse PM Capability exists check (bsc#1227149).
  * wifi: rtlwifi: rtl8821ae: Use pci_find_capability() (bsc#1227149).
  * wifi: rtlwifi: rtl8821ae: phy: remove some useless code (bsc#1227149).
  * wifi: rtlwifi: rtl8821ae: phy: using calculate_bit_shift() (bsc#1227149).
  * wifi: rtlwifi: rtl92ee_dm_dynamic_primary_cca_check(): fix typo in function
    name (bsc#1227149).
  * wifi: rtlwifi: rtl_usb: Store the endpoint addresses (bsc#1227149).
  * wifi: rtlwifi: rtl_usb: Use sync register writes (bsc#1227149).
  * wifi: rtlwifi: set initial values for unexpected cases of USB endpoint
    priority (bsc#1227149).
  * wifi: rtlwifi: simplify LED management (bsc#1227149).
  * wifi: rtlwifi: simplify TX command fill callbacks (bsc#1227149).
  * wifi: rtlwifi: simplify rtl_action_proc() and rtl_tx_agg_start()
    (bsc#1227149).
  * wifi: rtlwifi: use convenient list_count_nodes() (bsc#1227149).
  * wifi: rtlwifi: use eth_broadcast_addr() to assign broadcast address
    (bsc#1227149).
  * wifi: rtlwifi: use helper function rtl_get_hdr() (bsc#1227149).
  * wifi: rtlwifi: use unsigned long for bt_coexist_8723 timestamp
    (bsc#1227149).
  * wifi: rtlwifi: use unsigned long for rtl_bssid_entry timestamp
    (bsc#1227149).
  * wifi: rtw88: 8821c: tweak CCK TX filter setting for SRRC regulation
    (bsc#1227149).
  * wifi: rtw88: 8821c: update TX power limit to V67 (bsc#1227149).
  * wifi: rtw88: 8822c: update TX power limit to V70 (bsc#1227149).
  * wifi: rtw88: 8822ce: refine power parameters for RFE type 5 (bsc#1227149).
  * wifi: rtw88: Add support for the SDIO based RTL8723DS chipset (bsc#1227149).
  * wifi: rtw88: Fix AP mode incorrect DTIM behavior (bsc#1227149).
  * wifi: rtw88: Fix action frame transmission fail before association
    (bsc#1227149).
  * wifi: rtw88: Skip high queue in hci_flush (bsc#1227149).
  * wifi: rtw88: Stop high queue during scan (bsc#1227149).
  * wifi: rtw88: Use random MAC when efuse MAC invalid (bsc#1227149).
  * wifi: rtw88: add missing unwind goto for __rtw_download_firmware()
    (bsc#1227149).
  * wifi: rtw88: debug: add to check if debug mask is enabled (bsc#1227149).
  * wifi: rtw88: debug: remove wrapper of rtw_dbg() (bsc#1227149).
  * wifi: rtw88: dump firmware debug information in abnormal state
    (bsc#1227149).
  * wifi: rtw88: fix incorrect error codes in rtw_debugfs_copy_from_user
    (bsc#1227149).
  * wifi: rtw88: fix incorrect error codes in rtw_debugfs_set_* (bsc#1227149).
  * wifi: rtw88: fix not entering PS mode after AP stops (bsc#1227149).
  * wifi: rtw88: fix typo rtw8822cu_probe (bsc#1227149).
  * wifi: rtw88: process VO packets without workqueue to avoid PTK rekey failed
    (bsc#1227149).
  * wifi: rtw88: refine register based H2C command (bsc#1227149).
  * wifi: rtw88: regd: configure QATAR and UK (bsc#1227149).
  * wifi: rtw88: regd: update regulatory map to R64-R42 (bsc#1227149).
  * wifi: rtw88: remove unused USB bulkout size set (bsc#1227149).
  * wifi: rtw88: remove unused and set but unused leftovers (bsc#1227149).
  * wifi: rtw88: rtw8723d: Implement RTL8723DS (SDIO) efuse parsing
    (bsc#1227149).
  * wifi: rtw88: simplify __rtw_tx_work() (bsc#1227149).
  * wifi: rtw88: simplify vif iterators (bsc#1227149).
  * wifi: rtw88: use cfg80211_ssid_eq() instead of rtw_ssid_equal()
    (bsc#1227149).
  * wifi: rtw88: use kstrtoX_from_user() in debugfs handlers (bsc#1227149).
  * wifi: rtw88: use struct instead of macros to set TX desc (bsc#1227149).
  * wifi: rtw89: 52c: rfk: disable DPK during MCC (bsc#1227149).
  * wifi: rtw89: 52c: rfk: refine MCC channel info notification (bsc#1227149).
  * wifi: rtw89: 8851b: add 8851B basic chip_info (bsc#1227149).
  * wifi: rtw89: 8851b: add 8851be to Makefile and Kconfig (bsc#1227149).
  * wifi: rtw89: 8851b: add BT coexistence support function (bsc#1227149).
  * wifi: rtw89: 8851b: add DLE mem and HFC quota (bsc#1227149).
  * wifi: rtw89: 8851b: add MAC configurations to chip_info (bsc#1227149).
  * wifi: rtw89: 8851b: add NCTL post table (bsc#1227149).
  * wifi: rtw89: 8851b: add RF configurations (bsc#1227149).
  * wifi: rtw89: 8851b: add TX power related functions (bsc#1227149).
  * wifi: rtw89: 8851b: add basic power on function (bsc#1227149).
  * wifi: rtw89: 8851b: add set channel function (bsc#1227149).
  * wifi: rtw89: 8851b: add set_channel_rf() (bsc#1227149).
  * wifi: rtw89: 8851b: add support WoWLAN to 8851B (bsc#1227149).
  * wifi: rtw89: 8851b: add to parse efuse content (bsc#1227149).
  * wifi: rtw89: 8851b: add to read efuse version to recognize hardware version
    B (bsc#1227149).
  * wifi: rtw89: 8851b: configure CRASH_TRIGGER feature for 8851B (bsc#1227149).
  * wifi: rtw89: 8851b: configure GPIO according to RFE type (bsc#1227149).
  * wifi: rtw89: 8851b: configure to force 1 TX power value (bsc#1227149).
  * wifi: rtw89: 8851b: enable hw_scan support (bsc#1227149).
  * wifi: rtw89: 8851b: fill BB related capabilities to chip_info (bsc#1227149).
  * wifi: rtw89: 8851b: rfk: Fix spelling mistake KIP_RESOTRE -> KIP_RESTORE
    (bsc#1227149).
  * wifi: rtw89: 8851b: rfk: add AACK (bsc#1227149).
  * wifi: rtw89: 8851b: rfk: add DACK (bsc#1227149).
  * wifi: rtw89: 8851b: rfk: add DPK (bsc#1227149).
  * wifi: rtw89: 8851b: rfk: add IQK (bsc#1227149).
  * wifi: rtw89: 8851b: rfk: add LCK track (bsc#1227149).
  * wifi: rtw89: 8851b: rfk: add RCK (bsc#1227149).
  * wifi: rtw89: 8851b: rfk: add RX DCK (bsc#1227149).
  * wifi: rtw89: 8851b: rfk: add TSSI (bsc#1227149).
  * wifi: rtw89: 8851b: rfk: update IQK to version 0x8 (bsc#1227149).
  * wifi: rtw89: 8851b: update RF radio A parameters to R28 (bsc#1227149).
  * wifi: rtw89: 8851b: update TX power tables to R28 (bsc#1227149).
  * wifi: rtw89: 8851b: update TX power tables to R34 (bsc#1227149).
  * wifi: rtw89: 8851b: update TX power tables to R37 (bsc#1227149).
  * wifi: rtw89: 8851be: add 8851BE PCI entry and fill PCI capabilities
    (bsc#1227149).
  * wifi: rtw89: 8852b: fix definition of KIP register number (git-fixes).
  * wifi: rtw89: 8852b: update TX power tables to R35 (bsc#1227149).
  * wifi: rtw89: 8852b: update TX power tables to R36 (bsc#1227149).
  * wifi: rtw89: 8852c: Fix TSSI causes transmit power inaccuracy (bsc#1227149).
  * wifi: rtw89: 8852c: Update bandedge parameters for better performance
    (bsc#1227149).
  * wifi: rtw89: 8852c: add quirk to set PCI BER for certain platforms
    (bsc#1227149).
  * wifi: rtw89: 8852c: declare to support two chanctx (bsc#1227149).
  * wifi: rtw89: 8852c: read RX gain offset from efuse for 6GHz channels
    (bsc#1227149).
  * wifi: rtw89: 8852c: update RF radio A/B parameters to R63 (bsc#1227149).
  * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (1
    of 3) (bsc#1227149).
  * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (2
    of 3) (bsc#1227149).
  * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (3
    of 3) (bsc#1227149).
  * wifi: rtw89: 8852c: update TX power tables to R67 (bsc#1227149).
  * wifi: rtw89: 8922a: add 8922A basic chip info (bsc#1227149).
  * wifi: rtw89: 8922a: add BTG functions to assist BT coexistence to control
    TX/RX (bsc#1227149).
  * wifi: rtw89: 8922a: add NCTL pre-settings for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: 8922a: add RF read/write v2 (bsc#1227149).
  * wifi: rtw89: 8922a: add SER IMR tables (bsc#1227149).
  * wifi: rtw89: 8922a: add TX power related ops (bsc#1227149).
  * wifi: rtw89: 8922a: add chip_ops related to BB init (bsc#1227149).
  * wifi: rtw89: 8922a: add chip_ops to get thermal value (bsc#1227149).
  * wifi: rtw89: 8922a: add chip_ops::bb_preinit to enable BB before downloading
    firmware (bsc#1227149).
  * wifi: rtw89: 8922a: add chip_ops::cfg_txrx_path (bsc#1227149).
  * wifi: rtw89: 8922a: add chip_ops::rfk_hw_init (bsc#1227149).
  * wifi: rtw89: 8922a: add chip_ops::rfk_init_late to do initial RF
    calibrations later (bsc#1227149).
  * wifi: rtw89: 8922a: add chip_ops::{enable,disable}_bb_rf (bsc#1227149).
  * wifi: rtw89: 8922a: add coexistence helpers of SW grant (bsc#1227149).
  * wifi: rtw89: 8922a: add helper of set_channel (bsc#1227149).
  * wifi: rtw89: 8922a: add ieee80211_ops::hw_scan (bsc#1227149).
  * wifi: rtw89: 8922a: add more fields to beacon H2C command to support multi-
    links (bsc#1227149).
  * wifi: rtw89: 8922a: add power on/off functions (bsc#1227149).
  * wifi: rtw89: 8922a: add register definitions of H2C, C2H, page, RRSR and
    EDCCA (bsc#1227149).
  * wifi: rtw89: 8922a: add set_channel BB part (bsc#1227149).
  * wifi: rtw89: 8922a: add set_channel MAC part (bsc#1227149).
  * wifi: rtw89: 8922a: add set_channel RF part (bsc#1227149).
  * wifi: rtw89: 8922a: configure CRASH_TRIGGER FW feature (bsc#1227149).
  * wifi: rtw89: 8922a: correct register definition and merge IO for
    ctrl_nbtg_bt_tx() (bsc#1227149).
  * wifi: rtw89: 8922a: declare to support two chanctx (bsc#1227149).
  * wifi: rtw89: 8922a: dump MAC registers when SER occurs (bsc#1227149).
  * wifi: rtw89: 8922a: extend and add quota number (bsc#1227149).
  * wifi: rtw89: 8922a: hook handlers of TX/RX descriptors to chip_ops
    (bsc#1227149).
  * wifi: rtw89: 8922a: implement AP mode related reg for BE generation
    (bsc#1227149).
  * wifi: rtw89: 8922a: implement {stop,resume}_sch_tx and cfg_ppdu
    (bsc#1227149).
  * wifi: rtw89: 8922a: read efuse content from physical map (bsc#1227149).
  * wifi: rtw89: 8922a: read efuse content via efuse map struct from logic map
    (bsc#1227149).
  * wifi: rtw89: 8922a: rfk: implement chip_ops to call RF calibrations
    (bsc#1227149).
  * wifi: rtw89: 8922a: set RX gain along with set_channel operation
    (bsc#1227149).
  * wifi: rtw89: 8922a: set chip_ops FEM and GPIO to NULL (bsc#1227149).
  * wifi: rtw89: 8922a: set memory heap address for secure firmware
    (bsc#1227149).
  * wifi: rtw89: 8922a: update BA CAM number to 24 (bsc#1227149).
  * wifi: rtw89: 8922a: update the register used in DIG and the DIG flow
    (bsc#1227149).
  * wifi: rtw89: 8922ae: add 8922AE PCI entry and basic info (bsc#1227149).
  * wifi: rtw89: 8922ae: add v2 interrupt handlers for 8922AE (bsc#1227149).
  * wifi: rtw89: Add EHT rate mask as parameters of RA H2C command
    (bsc#1227149).
  * wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (git-
    fixes).
  * wifi: rtw89: Fix clang -Wimplicit-fallthrough in rtw89_query_sar()
    (bsc#1227149).
  * wifi: rtw89: Introduce Time Averaged SAR (TAS) feature (bsc#1227149).
  * wifi: rtw89: Refine active scan behavior in 6 GHz (bsc#1227149).
  * wifi: rtw89: Set default CQM config if not present (bsc#1227149).
  * wifi: rtw89: TX power stuffs replace confusing naming of _max with _num
    (bsc#1227149).
  * wifi: rtw89: Update EHT PHY beamforming capability (bsc#1227149).
  * wifi: rtw89: acpi: process 6 GHz band policy from DSM (bsc#1227149).
  * wifi: rtw89: add C2H RA event V1 to support WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: add C2H event handlers of RFK log and report (bsc#1227149).
  * wifi: rtw89: add CFO XTAL registers field to support 8851B (bsc#1227149).
  * wifi: rtw89: add DBCC H2C to notify firmware the status (bsc#1227149).
  * wifi: rtw89: add EHT capabilities for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: add EHT radiotap in monitor mode (bsc#1227149).
  * wifi: rtw89: add EVM and SNR statistics to debugfs (bsc#1227149).
  * wifi: rtw89: add EVM for antenna diversity (bsc#1227149).
  * wifi: rtw89: add H2C RA command V1 to support WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: add H2C command to download beacon frame for WiFi 7 chips
    (bsc#1227149).
  * wifi: rtw89: add RSSI based antenna diversity (bsc#1227149).
  * wifi: rtw89: add RSSI statistics for the case of antenna diversity to
    debugfs (bsc#1227149).
  * wifi: rtw89: add XTAL SI for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: add chip_info::chip_gen to determine chip generation
    (bsc#1227149).
  * wifi: rtw89: add chip_info::txwd_info size to generalize TX WD submit
    (bsc#1227149).
  * wifi: rtw89: add chip_ops::h2c_ba_cam() to configure BA CAM (bsc#1227149).
  * wifi: rtw89: add chip_ops::query_rxdesc() and rxd_len as helpers to support
    newer chips (bsc#1227149).
  * wifi: rtw89: add chip_ops::update_beacon to abstract update beacon operation
    (bsc#1227149).
  * wifi: rtw89: add firmware H2C command of BA CAM V1 (bsc#1227149).
  * wifi: rtw89: add firmware parser for v1 format (bsc#1227149).
  * wifi: rtw89: add firmware suit for BB MCU 0/1 (bsc#1227149).
  * wifi: rtw89: add function prototype for coex request duration (bsc#1227149).
  * wifi: rtw89: add mac_gen pointer to access mac port registers (bsc#1227149).
  * wifi: rtw89: add mlo_dbcc_mode for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: add new H2C command to pause/sleep transmitting by MAC ID
    (bsc#1227149).
  * wifi: rtw89: add new H2C for PS mode in 802.11be chip (bsc#1227149).
  * wifi: rtw89: add reserved size as factor of DLE used size (bsc#1227149).
  * wifi: rtw89: add subband index of primary channel to struct rtw89_chan
    (bsc#1227149).
  * wifi: rtw89: add to display hardware rates v1 histogram in debugfs
    (bsc#1227149).
  * wifi: rtw89: add to fill TX descriptor for firmware command v2
    (bsc#1227149).
  * wifi: rtw89: add to fill TX descriptor v2 (bsc#1227149).
  * wifi: rtw89: add to parse firmware elements of BB and RF tables
    (bsc#1227149).
  * wifi: rtw89: add to query RX descriptor format v2 (bsc#1227149).
  * wifi: rtw89: add tx_wake notify for 8851B (bsc#1227149).
  * wifi: rtw89: add wait/completion for abort scan (bsc#1227149).
  * wifi: rtw89: adjust init_he_cap() to add EHT cap into iftype_data
    (bsc#1227149).
  * wifi: rtw89: advertise missing extended scan feature (bsc#1227149).
  * wifi: rtw89: avoid stringop-overflow warning (bsc#1227149).
  * wifi: rtw89: call rtw89_chan_get() by vif chanctx if aware of vif
    (bsc#1227149).
  * wifi: rtw89: chan: MCC take reconfig into account (bsc#1227149).
  * wifi: rtw89: chan: add sub-entity swap function to cover replacing
    (bsc#1227149).
  * wifi: rtw89: chan: move handling from add/remove to assign/unassign for MLO
    (bsc#1227149).
  * wifi: rtw89: chan: support MCC on Wi-Fi 7 chips (bsc#1227149).
  * wifi: rtw89: chan: tweak bitmap recalc ahead before MLO (bsc#1227149).
  * wifi: rtw89: chan: tweak weight recalc ahead before MLO (bsc#1227149).
  * wifi: rtw89: change naming of BA CAM from V1 to V0_EXT (bsc#1227149).
  * wifi: rtw89: change qutoa to DBCC by default for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: change supported bandwidths of chip_info to bit mask
    (bsc#1227149).
  * wifi: rtw89: cleanup firmware elements parsing (bsc#1227149).
  * wifi: rtw89: cleanup private data structures (bsc#1227149).
  * wifi: rtw89: cleanup rtw89_iqk_info and related code (bsc#1227149).
  * wifi: rtw89: coex: Add Bluetooth RSSI level information (bsc#1227149).
  * wifi: rtw89: coex: Add Pre-AGC control to enhance Wi-Fi RX performance
    (bsc#1227149).
  * wifi: rtw89: coex: Add coexistence policy to decrease WiFi packet CRC-ERR
    (bsc#1227149).
  * wifi: rtw89: coex: Fix wrong Wi-Fi role info and FDDT parameter members
    (bsc#1227149).
  * wifi: rtw89: coex: Record down Wi-Fi initial mode information (bsc#1227149).
  * wifi: rtw89: coex: Reorder H2C command index to align with firmware
    (bsc#1227149).
  * wifi: rtw89: coex: Set Bluetooth scan low-priority when Wi-Fi link/scan
    (bsc#1227149).
  * wifi: rtw89: coex: Still show hardware grant signal info even Wi-Fi is PS
    (bsc#1227149).
  * wifi: rtw89: coex: To improve Wi-Fi performance while BT is idle
    (bsc#1227149).
  * wifi: rtw89: coex: Translate antenna configuration from ID to string
    (bsc#1227149).
  * wifi: rtw89: coex: Update BTG control related logic (bsc#1227149).
  * wifi: rtw89: coex: Update RF parameter control setting logic (bsc#1227149).
  * wifi: rtw89: coex: Update coexistence policy for Wi-Fi LPS (bsc#1227149).
  * wifi: rtw89: coex: When Bluetooth not available do not set power/gain
    (bsc#1227149).
  * wifi: rtw89: coex: add BTC ctrl_info version 7 and related logic
    (bsc#1227149).
  * wifi: rtw89: coex: add annotation __counted_by() for struct
    rtw89_btc_btf_set_slot_table (bsc#1227149).
  * wifi: rtw89: coex: add annotation __counted_by() to struct
    rtw89_btc_btf_set_mon_reg (bsc#1227149).
  * wifi: rtw89: coex: add init_info H2C command format version 7 (bsc#1227149).
  * wifi: rtw89: coex: add return value to ensure H2C command is success or not
    (bsc#1227149).
  * wifi: rtw89: coex: fix configuration for shared antenna for 8922A
    (bsc#1227149).
  * wifi: rtw89: coex: use struct assignment to replace memcpy() to append TDMA
    content (bsc#1227149).
  * wifi: rtw89: configure PPDU max user by chip (bsc#1227149).
  * wifi: rtw89: consider RX info for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: consolidate registers of mac port to struct (bsc#1227149).
  * wifi: rtw89: correct PHY register offset for PHY-1 (bsc#1227149).
  * wifi: rtw89: correct aSIFSTime for 6GHz band (stable-fixes).
  * wifi: rtw89: correct the DCFO tracking flow to improve CFO compensation
    (bsc#1227149).
  * wifi: rtw89: debug: add FW log component for scan (bsc#1227149).
  * wifi: rtw89: debug: add debugfs entry to disable dynamic mechanism
    (bsc#1227149).
  * wifi: rtw89: debug: add to check if debug mask is enabled (bsc#1227149).
  * wifi: rtw89: debug: remove wrapper of rtw89_debug() (bsc#1227149).
  * wifi: rtw89: debug: show txpwr table according to chip gen (bsc#1227149).
  * wifi: rtw89: debug: txpwr table access only valid page according to chip
    (bsc#1227149).
  * wifi: rtw89: debug: txpwr table supports Wi-Fi 7 chips (bsc#1227149).
  * wifi: rtw89: declare EXT NSS BW of VHT capability (bsc#1227149).
  * wifi: rtw89: declare MCC in interface combination (bsc#1227149).
  * wifi: rtw89: define hardware rate v1 for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: differentiate narrow_bw_ru_dis setting according to chip gen
    (bsc#1227149).
  * wifi: rtw89: disable RTS when broadcast/multicast (bsc#1227149).
  * wifi: rtw89: download firmware with five times retry (bsc#1227149).
  * wifi: rtw89: drop TIMING_BEACON_ONLY and sync beacon TSF by self
    (bsc#1227149).
  * wifi: rtw89: enlarge supported length of read_reg debugfs entry
    (bsc#1227149).
  * wifi: rtw89: extend PHY status parser to support WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: fix HW scan not aborting properly (git-fixes).
  * wifi: rtw89: fix HW scan timeout due to TSF sync issue (bsc#1227149).
  * wifi: rtw89: fix a width vs precision bug (bsc#1227149).
  * wifi: rtw89: fix disabling concurrent mode TX hang issue (bsc#1227149).
  * wifi: rtw89: fix misbehavior of TX beacon in concurrent mode (bsc#1227149).
  * wifi: rtw89: fix not entering PS mode after AP stops (bsc#1227149).
  * wifi: rtw89: fix spelling typo of IQK debug messages (bsc#1227149).
  * wifi: rtw89: fix typo of rtw89_fw_h2c_mcc_macid_bitmap() (bsc#1227149).
  * wifi: rtw89: fw: add H2C command to reset CMAC table for WiFi 7
    (bsc#1227149).
  * wifi: rtw89: fw: add H2C command to reset DMAC table for WiFi 7
    (bsc#1227149).
  * wifi: rtw89: fw: add H2C command to update security CAM v2 (bsc#1227149).
  * wifi: rtw89: fw: add checking type for variant type of firmware
    (bsc#1227149).
  * wifi: rtw89: fw: add chip_ops to update CMAC table to associated station
    (bsc#1227149).
  * wifi: rtw89: fw: add definition of H2C command and C2H event for MRC series
    (bsc#1227149).
  * wifi: rtw89: fw: add version field to BB MCU firmware element (bsc#1227149).
  * wifi: rtw89: fw: consider checksum length of security data (bsc#1227149).
  * wifi: rtw89: fw: download firmware with key data for secure boot
    (bsc#1227149).
  * wifi: rtw89: fw: extend JOIN H2C command to support WiFi 7 chips
    (bsc#1227149).
  * wifi: rtw89: fw: extend program counter dump for Wi-Fi 7 chip (bsc#1227149).
  * wifi: rtw89: fw: fill CMAC table to associated station for WiFi 7 chips
    (bsc#1227149).
  * wifi: rtw89: fw: generalize download firmware flow by mac_gen pointers
    (bsc#1227149).
  * wifi: rtw89: fw: implement MRC H2C command functions (bsc#1227149).
  * wifi: rtw89: fw: implement supported functions of download firmware for WiFi
    7 chips (bsc#1227149).
  * wifi: rtw89: fw: load TX power track tables from fw_element (bsc#1227149).
  * wifi: rtw89: fw: move polling function of firmware path ready to an
    individual function (bsc#1227149).
  * wifi: rtw89: fw: parse secure section from firmware file (bsc#1227149).
  * wifi: rtw89: fw: propagate an argument include_bb for BB MCU firmware
    (bsc#1227149).
  * wifi: rtw89: fw: read firmware secure information from efuse (bsc#1227149).
  * wifi: rtw89: fw: refine download flow to support variant firmware suits
    (bsc#1227149).
  * wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband
    (bsc#1227149).
  * wifi: rtw89: fw: update TX AMPDU parameter to CMAC table (bsc#1227149).
  * wifi: rtw89: fw: use struct to fill BA CAM H2C commands (bsc#1227149).
  * wifi: rtw89: fw: use struct to fill JOIN H2C command (bsc#1227149).
  * wifi: rtw89: get data rate mode/NSS/MCS v1 from RX descriptor (bsc#1227149).
  * wifi: rtw89: indicate TX power by rate table inside RFE parameter
    (bsc#1227149).
  * wifi: rtw89: indicate TX shape table inside RFE parameter (bsc#1227149).
  * wifi: rtw89: initialize antenna for antenna diversity (bsc#1227149).
  * wifi: rtw89: initialize multi-channel handling (bsc#1227149).
  * wifi: rtw89: introduce infrastructure of firmware elements (bsc#1227149).
  * wifi: rtw89: introduce realtek ACPI DSM method (bsc#1227149).
  * wifi: rtw89: introduce v1 format of firmware header (bsc#1227149).
  * wifi: rtw89: load BB parameters to PHY-1 (bsc#1227149).
  * wifi: rtw89: load RFK log format string from firmware file (bsc#1227149).
  * wifi: rtw89: load TX power by rate when RFE parms setup (bsc#1227149).
  * wifi: rtw89: load TX power related tables from FW elements (bsc#1227149).
  * wifi: rtw89: mac: Fix spelling mistakes "notfify" -> "notify" (bsc#1227149).
  * wifi: rtw89: mac: add coexistence helpers {cfg/get}_plt (bsc#1227149).
  * wifi: rtw89: mac: add feature_init to initialize BA CAM V1 (bsc#1227149).
  * wifi: rtw89: mac: add flags to check if CMAC and DMAC are enabled
    (bsc#1227149).
  * wifi: rtw89: mac: add mac_gen_def::band1_offset to map MAC band1 register
    address (bsc#1227149).
  * wifi: rtw89: mac: add registers of MU-EDCA parameters for WiFi 7 chips
    (bsc#1227149).
  * wifi: rtw89: mac: add suffix _ax to MAC functions (bsc#1227149).
  * wifi: rtw89: mac: add sys_init and filter option for WiFi 7 chips
    (bsc#1227149).
  * wifi: rtw89: mac: add to access efuse for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: mac: add to get DLE reserved quota (bsc#1227149).
  * wifi: rtw89: mac: check queue empty according to chip gen (bsc#1227149).
  * wifi: rtw89: mac: correct MUEDCA setting for MAC-1 (bsc#1227149).
  * wifi: rtw89: mac: define internal memory address for WiFi 7 chip
    (bsc#1227149).
  * wifi: rtw89: mac: define register address of rx_filter to generalize code
    (bsc#1227149).
  * wifi: rtw89: mac: do bf_monitor only if WiFi 6 chips (bsc#1227149).
  * wifi: rtw89: mac: functions to configure hardware engine and quota for WiFi
    7 chips (bsc#1227149).
  * wifi: rtw89: mac: generalize code to indirectly access WiFi internal memory
    (bsc#1227149).
  * wifi: rtw89: mac: generalize register of MU-EDCA switch according to chip
    gen (bsc#1227149).
  * wifi: rtw89: mac: get TX power control register according to chip gen
    (bsc#1227149).
  * wifi: rtw89: mac: handle C2H receive/done ACK in interrupt context
    (bsc#1227149).
  * wifi: rtw89: mac: implement MRC C2H event handling (bsc#1227149).
  * wifi: rtw89: mac: implement to configure TX/RX engines for WiFi 7 chips
    (bsc#1227149).
  * wifi: rtw89: mac: move code related to hardware engine to individual
    functions (bsc#1227149).
  * wifi: rtw89: mac: refine SER setting during WiFi CPU power on (bsc#1227149).
  * wifi: rtw89: mac: reset PHY-1 hardware when going to enable/disable
    (bsc#1227149).
  * wifi: rtw89: mac: return held quota of DLE when changing MAC-1
    (bsc#1227149).
  * wifi: rtw89: mac: set bf_assoc capabilities according to chip gen
    (bsc#1227149).
  * wifi: rtw89: mac: set bfee_ctrl() according to chip gen (bsc#1227149).
  * wifi: rtw89: mac: update RTS threshold according to chip gen (bsc#1227149).
  * wifi: rtw89: mac: use mac_gen pointer to access about efuse (bsc#1227149).
  * wifi: rtw89: mac: use pointer to access functions of hardware engine and
    quota (bsc#1227149).
  * wifi: rtw89: mcc: consider and determine BT duration (bsc#1227149).
  * wifi: rtw89: mcc: deal with BT slot change (bsc#1227149).
  * wifi: rtw89: mcc: deal with P2P PS change (bsc#1227149).
  * wifi: rtw89: mcc: deal with beacon NoA if GO exists (bsc#1227149).
  * wifi: rtw89: mcc: decide pattern and calculate parameters (bsc#1227149).
  * wifi: rtw89: mcc: fill fundamental configurations (bsc#1227149).
  * wifi: rtw89: mcc: fix NoA start time when GO is auxiliary (bsc#1227149).
  * wifi: rtw89: mcc: initialize start flow (bsc#1227149).
  * wifi: rtw89: mcc: track beacon offset and update when needed (bsc#1227149).
  * wifi: rtw89: mcc: trigger FW to start/stop MCC (bsc#1227149).
  * wifi: rtw89: mcc: update role bitmap when changed (bsc#1227149).
  * wifi: rtw89: modify the register setting and the flow of CFO tracking
    (bsc#1227149).
  * wifi: rtw89: move software DCFO compensation setting to proper position
    (bsc#1227149).
  * wifi: rtw89: only reset BB/RF for existing WiFi 6 chips while starting up
    (bsc#1227149).
  * wifi: rtw89: packet offload wait for FW response (bsc#1227149).
  * wifi: rtw89: parse EHT information from RX descriptor and PPDU status packet
    (bsc#1227149).
  * wifi: rtw89: parse TX EHT rate selected by firmware from RA C2H report
    (bsc#1227149).
  * wifi: rtw89: parse and print out RFK log from C2H events (bsc#1227149).
  * wifi: rtw89: pause/proceed MCC for ROC and HW scan (bsc#1227149).
  * wifi: rtw89: pci: add LTR v2 for WiFi 7 chip (bsc#1227149).
  * wifi: rtw89: pci: add PCI generation information to pci_info for each chip
    (bsc#1227149).
  * wifi: rtw89: pci: add new RX ring design to determine full RX ring
    efficiently (bsc#1227149).
  * wifi: rtw89: pci: add pre_deinit to be called after probe complete
    (bsc#1227149).
  * wifi: rtw89: pci: correct interrupt mitigation register for 8852CE
    (bsc#1227149).
  * wifi: rtw89: pci: define PCI ring address for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: pci: fix interrupt enable mask for HALT C2H of RTL8851B
    (bsc#1227149).
  * wifi: rtw89: pci: generalize code of PCI control DMA IO for WiFi 7
    (bsc#1227149).
  * wifi: rtw89: pci: generalize interrupt status bits of interrupt handlers
    (bsc#1227149).
  * wifi: rtw89: pci: implement PCI CLK/ASPM/L1SS for WiFi 7 chips
    (bsc#1227149).
  * wifi: rtw89: pci: implement PCI mac_post_init for WiFi 7 chips
    (bsc#1227149).
  * wifi: rtw89: pci: implement PCI mac_pre_init for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: pci: interrupt v2 refine IMR for SER (bsc#1227149).
  * wifi: rtw89: pci: reset BDRAM according to chip gen (bsc#1227149).
  * wifi: rtw89: pci: stop/start DMA for level 1 recovery according to chip gen
    (bsc#1227149).
  * wifi: rtw89: pci: update SER timer unit and timeout time (bsc#1227149).
  * wifi: rtw89: pci: update interrupt mitigation register for 8922AE
    (bsc#1227149).
  * wifi: rtw89: pci: use DBI function for 8852AE/8852BE/8851BE (bsc#1227149).
  * wifi: rtw89: pci: use gen_def pointer to configure mac_{pre,post}_init and
    clear PCI ring index (bsc#1227149).
  * wifi: rtw89: pci: validate RX tag for RXQ and RPQ (bsc#1227149).
  * wifi: rtw89: phy: add BB wrapper of TX power for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: phy: add parser to support RX gain dynamic setting flow
    (bsc#1227149).
  * wifi: rtw89: phy: add phy_gen_def::cr_base to support WiFi 7 chips
    (bsc#1227149).
  * wifi: rtw89: phy: change naming related BT coexistence functions
    (bsc#1227149).
  * wifi: rtw89: phy: dynamically adjust EDCCA threshold (bsc#1227149).
  * wifi: rtw89: phy: extend TX power common stuffs for Wi-Fi 7 chips
    (bsc#1227149).
  * wifi: rtw89: phy: generalize valid bit of BSS color (bsc#1227149).
  * wifi: rtw89: phy: ignore special data from BB parameter file (bsc#1227149).
  * wifi: rtw89: phy: modify register setting of ENV_MNTR, PHYSTS and DIG
    (bsc#1227149).
  * wifi: rtw89: phy: move bb_gain_info used by WiFi 6 chips to union
    (bsc#1227149).
  * wifi: rtw89: phy: print out RFK log with formatted string (bsc#1227149).
  * wifi: rtw89: phy: rate pattern handles HW rate by chip gen (bsc#1227149).
  * wifi: rtw89: phy: refine helpers used for raw TX power (bsc#1227149).
  * wifi: rtw89: phy: set TX power RU limit according to chip gen (bsc#1227149).
  * wifi: rtw89: phy: set TX power by rate according to chip gen (bsc#1227149).
  * wifi: rtw89: phy: set TX power limit according to chip gen (bsc#1227149).
  * wifi: rtw89: phy: set TX power offset according to chip gen (bsc#1227149).
  * wifi: rtw89: phy: set channel_info for WiFi 7 chips (bsc#1227149).
  * wifi: rtw89: prepare scan leaf functions for wifi 7 ICs (bsc#1227149).
  * wifi: rtw89: process regulatory for 6 GHz power type (bsc#1227149).
  * wifi: rtw89: provide functions to configure NoA for beacon update
    (bsc#1227149).
  * wifi: rtw89: recognize log format from firmware file (bsc#1227149).
  * wifi: rtw89: reference quota mode when setting Tx power (bsc#1227149).
  * wifi: rtw89: refine H2C command that pause transmitting by MAC ID
    (bsc#1227149).
  * wifi: rtw89: refine add_chan H2C command to encode_bits (bsc#1227149).
  * wifi: rtw89: refine bandwidth 160MHz uplink OFDMA performance (bsc#1227149).
  * wifi: rtw89: refine clearing supported bands to check 2/5 GHz first
    (bsc#1227149).
  * wifi: rtw89: refine element naming used by queue empty check (bsc#1227149).
  * wifi: rtw89: refine hardware scan C2H events (bsc#1227149).
  * wifi: rtw89: refine packet offload delete flow of 6 GHz probe (bsc#1227149).
  * wifi: rtw89: refine packet offload handling under SER (bsc#1227149).
  * wifi: rtw89: refine remain on channel flow to improve P2P connection
    (bsc#1227149).
  * wifi: rtw89: refine rtw89_correct_cck_chan() by rtw89_hw_to_nl80211_band()
    (bsc#1227149).
  * wifi: rtw89: refine uplink trigger based control mechanism (bsc#1227149).
  * wifi: rtw89: regd: configure Thailand in regulation type (bsc#1227149).
  * wifi: rtw89: regd: handle policy of 6 GHz according to BIOS (bsc#1227149).
  * wifi: rtw89: regd: judge 6 GHz according to chip and BIOS (bsc#1227149).
  * wifi: rtw89: regd: judge UNII-4 according to BIOS and chip (bsc#1227149).
  * wifi: rtw89: regd: update regulatory map to R64-R40 (bsc#1227149).
  * wifi: rtw89: regd: update regulatory map to R64-R43 (bsc#1227149).
  * wifi: rtw89: regd: update regulatory map to R65-R44 (bsc#1227149).
  * wifi: rtw89: release bit in rtw89_fw_h2c_del_pkt_offload() (bsc#1227149).
  * wifi: rtw89: return failure if needed firmware elements are not recognized
    (bsc#1227149).
  * wifi: rtw89: rfk: add H2C command to trigger DACK (bsc#1227149).
  * wifi: rtw89: rfk: add H2C command to trigger DPK (bsc#1227149).
  * wifi: rtw89: rfk: add H2C command to trigger IQK (bsc#1227149).
  * wifi: rtw89: rfk: add H2C command to trigger RX DCK (bsc#1227149).
  * wifi: rtw89: rfk: add H2C command to trigger TSSI (bsc#1227149).
  * wifi: rtw89: rfk: add H2C command to trigger TXGAPK (bsc#1227149).
  * wifi: rtw89: rfk: add a completion to wait RF calibration report from C2H
    event (bsc#1227149).
  * wifi: rtw89: rfk: disable driver tracking during MCC (bsc#1227149).
  * wifi: rtw89: rfk: send channel information to firmware for RF calibrations
    (bsc#1227149).
  * wifi: rtw89: sar: let caller decide the center frequency to query
    (bsc#1227149).
  * wifi: rtw89: scan offload wait for FW done ACK (bsc#1227149).
  * wifi: rtw89: ser: L1 add pre-M0 and post-M0 states (bsc#1227149).
  * wifi: rtw89: ser: reset total_sta_assoc and tdls_peer when L2 (bsc#1227149).
  * wifi: rtw89: set TX power without precondition during setting channel
    (bsc#1227149).
  * wifi: rtw89: set capability of TX antenna diversity (bsc#1227149).
  * wifi: rtw89: set entry size of address CAM to H2C field by chip
    (bsc#1227149).
  * wifi: rtw89: show EHT rate in debugfs (bsc#1227149).
  * wifi: rtw89: support U-NII-4 channels on 5GHz band (bsc#1227149).
  * wifi: rtw89: support firmware log with formatted text (bsc#1227149).
  * wifi: rtw89: suppress the log for specific SER called CMDPSR_FRZTO
    (bsc#1227149).
  * wifi: rtw89: tweak H2C TX waiting function for SER (bsc#1227149).
  * wifi: rtw89: update DMA function with different generation (bsc#1227149).
  * wifi: rtw89: update ps_state register for chips with different generation
    (bsc#1227149).
  * wifi: rtw89: update scan C2H messages for wifi 7 IC (bsc#1227149).
  * wifi: rtw89: update suspend/resume for different generation (bsc#1227149).
  * wifi: rtw89: use PLCP information to match BSS_COLOR and AID (bsc#1227149).
  * wifi: rtw89: use chip_info::small_fifo_size to choose debug_mask
    (bsc#1227149).
  * wifi: rtw89: use flexible array member in rtw89_btc_btf_tlv (bsc#1227149).
  * wifi: rtw89: use struct and le32_get_bits to access RX info (bsc#1227149).
  * wifi: rtw89: use struct and le32_get_bits() to access RX descriptor
    (bsc#1227149).
  * wifi: rtw89: use struct and le32_get_bits() to access received PHY status
    IEs (bsc#1227149).
  * wifi: rtw89: use struct rtw89_phy_sts_ie0 instead of macro to access PHY IE0
    status (bsc#1227149).
  * wifi: rtw89: use struct to access RA report (bsc#1227149).
  * wifi: rtw89: use struct to access firmware C2H event header (bsc#1227149).
  * wifi: rtw89: use struct to access register-based H2C/C2H (bsc#1227149).
  * wifi: rtw89: use struct to fill H2C command to download beacon frame
    (bsc#1227149).
  * wifi: rtw89: use struct to parse firmware header (bsc#1227149).
  * wifi: rtw89: use struct to set RA H2C command (bsc#1227149).
  * wifi: rtw89: wow: move release offload packet earlier for WoWLAN mode
    (bsc#1227149).
  * wifi: rtw89: wow: refine WoWLAN flows of HCI interrupts and low power mode
    (bsc#1227149).
  * wifi: rtw89: wow: set security engine options for 802.11ax chips only
    (bsc#1227149).
  * wifi: rtw89: wow: update WoWLAN reason register for different chips
    (bsc#1227149).
  * wifi: rtw89: wow: update WoWLAN status register for different generation
    (bsc#1227149).
  * wifi: rtw89: wow: update config mac function with different generation
    (bsc#1227149).
  * wifi: ti: wlcore: sdio: Drop unused include (bsc#1227149).
  * wifi: virt_wifi: avoid reporting connection success with wrong SSID (git-
    fixes).
  * wifi: virt_wifi: do not use strlen() in const context (git-fixes).
  * wifi: wcn36xx: Annotate struct wcn36xx_hal_ind_msg with __counted_by
    (bsc#1227149).
  * wifi: wcn36xx: Convert to platform remove callback returning void
    (bsc#1227149).
  * wifi: wcn36xx: remove unnecessary (void*) conversions (bsc#1227149).
  * wifi: wext: avoid extra calls to strlen() in ieee80211_bss() (bsc#1227149).
  * wifi: wfx: Use devm_kmemdup to replace devm_kmalloc + memcpy (bsc#1227149).
  * wifi: wfx: allow to send frames during ROC (bsc#1227149).
  * wifi: wfx: fix power_save setting when AP is stopped (bsc#1227149).
  * wifi: wfx: implement wfx_remain_on_channel() (bsc#1227149).
  * wifi: wfx: introduce hif_scan_uniq() (bsc#1227149).
  * wifi: wfx: move wfx_skb_*() out of the header file (bsc#1227149).
  * wifi: wfx: relocate wfx_rate_mask_to_hw() (bsc#1227149).
  * wifi: wfx: scan_lock is global to the device (bsc#1227149).
  * wifi: wfx: simplify exclusion between scan and Rx filters (bsc#1227149).
  * wifi: wil6210: fw: Replace zero-length arrays with DECLARE_FLEX_ARRAY()
    helper (bsc#1227149).
  * wifi: wil6210: wmi: Replace zero-length array with DECLARE_FLEX_ARRAY()
    helper (bsc#1227149).
  * wifi: wilc1000: Increase ASSOC response buffer (bsc#1227149).
  * wifi: wilc1000: Remove unused declarations (bsc#1227149).
  * wifi: wilc1000: add SPI commands retry mechanism (bsc#1227149).
  * wifi: wilc1000: add back-off algorithm to balance tx queue packets
    (bsc#1227149).
  * wifi: wilc1000: add missing read critical sections around vif list traversal
    (bsc#1227149).
  * wifi: wilc1000: always release SDIO host in wilc_sdio_cmd53() (bsc#1227149).
  * wifi: wilc1000: cleanup struct wilc_conn_info (bsc#1227149).
  * wifi: wilc1000: correct CRC7 calculation (bsc#1227149).
  * wifi: wilc1000: fix declarations ordering (bsc#1227149).
  * wifi: wilc1000: fix driver_handler when committing initial configuration
    (bsc#1227149).
  * wifi: wilc1000: fix ies_len type in connect path (git-fixes).
  * wifi: wilc1000: fix incorrect power down sequence (bsc#1227149).
  * wifi: wilc1000: remove AKM suite be32 conversion for external auth request
    (bsc#1227149).
  * wifi: wilc1000: remove setting msg.spi (bsc#1227149).
  * wifi: wilc1000: remove use of has_thrpt_enh3 flag (bsc#1227149).
  * wifi: wilc1000: set preamble size to auto as default in
    wilc_init_fw_config() (bsc#1227149).
  * wifi: wilc1000: simplify remain on channel support (bsc#1227149).
  * wifi: wilc1000: simplify wilc_scan() (bsc#1227149).
  * wifi: wilc1000: split deeply nested RCU list traversal in dedicated helper
    (bsc#1227149).
  * wifi: wilc1000: use SRCU instead of RCU for vif list traversal
    (bsc#1227149).
  * wifi: wilc1000: validate chip id during bus probe (bsc#1227149).
  * wifi: wl1251: replace deprecated strncpy with strscpy (bsc#1227149).
  * wifi: wl18xx: replace deprecated strncpy with strscpy (bsc#1227149).
  * wifi: wlcore: boot: replace deprecated strncpy with strscpy (bsc#1227149).
  * wifi: wlcore: main: replace deprecated strncpy with strscpy (bsc#1227149).
  * wifi: wlcore: sdio: Rate limit wl12xx_sdio_raw_{read,write}() failures warns
    (bsc#1227149).
  * wifi: wlcore: sdio: Use module_sdio_driver macro to simplify the code
    (bsc#1227149).
  * wifi: zd1211rw: fix typo "tranmits" (bsc#1227149).
  * wifi: zd1211rw: remove __nocast from zd_addr_t (bsc#1227149).
  * wifi: zd1211rw: silence sparse warnings (bsc#1227149).
  * wlcore: spi: Remove redundant of_match_ptr() (bsc#1227149).
  * work around gcc bugs with 'asm goto' with outputs (git-fixes).
  * x86/amd_nb: Check for invalid SMN reads (git-fixes).
  * x86/apic: Force native_apic_mem_read() to use the MOV instruction (git-
    fixes).
  * x86/asm: Fix build of UML with KASAN (git-fixes).
  * x86/asm: Remove the __iomem annotation of movdir64b()'s dst argument (git-
    fixes).
  * x86/bhi: Avoid warning in #DB handler due to BHI mitigation :(git-fixes).
  * x86/boot: Ignore NMIs during very early boot (git-fixes).
  * x86/cpu: Provide default cache line size if not enumerated (git-fixes).
  * x86/csum: Fix clang -Wuninitialized in csum_partial() (git-fixes).
  * x86/csum: Improve performance of `csum_partial` (git-fixes).
  * x86/csum: Remove unnecessary odd handling (git-fixes).
  * x86/csum: clean up `csum_partial' further (git-fixes).
  * x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes).
  * x86/head/64: Move the __head definition to <asm/init.h> (git-fixes).
  * x86/insn: Add VEX versions of VPDPBUSD, VPDPBUSDS, VPDPWSSD and VPDPWSSDS
    (git-fixes).
  * x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git-
    fixes).
  * x86/kconfig: Add as-instr64 macro to properly evaluate AS_WRUSS (git-fixes).
  * x86/kexec: Fix bug with call depth tracking (git-fixes).
  * x86/mce: Dynamically size space for machine check records (bsc#1222241).
  * x86/mce: Mark fatal MCE's page as poison to avoid panic in the kdump kernel
    (git-fixes).
  * x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
  * x86/resctrl: Read supported bandwidth sources from CPUID (git-fixes).
  * x86/resctrl: Remove redundant variable in mbm_config_write_domain() (git-
    fixes).
  * x86/sev: Fix position dependent variable references in startup code (git-
    fixes).
  * x86/shstk: Make return uprobe work with shadow stack (git-fixes).
  * x86/speculation, objtool: Use absolute relocations for annotations (git-
    fixes).
  * x86/tdx: Preserve shared bit on mprotect() (git-fixes).
  * x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015
    bsc#1226962).
  * x86/uaccess: Fix missed zeroing of ia32 u64 get_user() range checking (git-
    fixes).
  * x86: Stop using weak symbols for __iowrite32_copy() (bsc#1226502)
  * xen/x86: add extra pages to unpopulated-alloc if available (git-fixes).
  * xfs: Add cond_resched to block unmap range and reflink remap path
    (bsc#1228211).
  * xfs: use roundup_pow_of_two instead of ffs during xlog_find_tail (git-
    fixes).
  * xhci: Apply broken streams quirk to Etron EJ188 xHCI host (stable-fixes).
  * xhci: Apply reset resume quirk to Etron EJ188 xHCI host (stable-fixes).
  * xhci: Handle TD clearing for multiple streams case (git-fixes).
  * xhci: Set correct transferred length for cancelled bulk transfers (stable-
    fixes).
  * xhci: always resume roothubs if xHC was reset during resume (stable-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.6  
    zypper in -t patch SUSE-2024-2896=1 openSUSE-SLE-15.6-2024-2896=1

  * Public Cloud Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2896=1

## Package List:

  * openSUSE Leap 15.6 (aarch64 x86_64)
    * kernel-syms-azure-6.4.0-150600.8.8.1
    * kselftests-kmp-azure-debuginfo-6.4.0-150600.8.8.2
    * kselftests-kmp-azure-6.4.0-150600.8.8.2
    * gfs2-kmp-azure-6.4.0-150600.8.8.2
    * kernel-azure-debuginfo-6.4.0-150600.8.8.2
    * kernel-azure-optional-debuginfo-6.4.0-150600.8.8.2
    * kernel-azure-debugsource-6.4.0-150600.8.8.2
    * ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.8.2
    * cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.8.2
    * reiserfs-kmp-azure-6.4.0-150600.8.8.2
    * ocfs2-kmp-azure-6.4.0-150600.8.8.2
    * kernel-azure-extra-debuginfo-6.4.0-150600.8.8.2
    * kernel-azure-extra-6.4.0-150600.8.8.2
    * reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.8.2
    * kernel-azure-optional-6.4.0-150600.8.8.2
    * gfs2-kmp-azure-debuginfo-6.4.0-150600.8.8.2
    * kernel-azure-devel-6.4.0-150600.8.8.2
    * cluster-md-kmp-azure-6.4.0-150600.8.8.2
    * kernel-azure-livepatch-devel-6.4.0-150600.8.8.2
    * dlm-kmp-azure-6.4.0-150600.8.8.2
    * kernel-azure-devel-debuginfo-6.4.0-150600.8.8.2
    * dlm-kmp-azure-debuginfo-6.4.0-150600.8.8.2
  * openSUSE Leap 15.6 (aarch64 nosrc x86_64)
    * kernel-azure-6.4.0-150600.8.8.2
  * openSUSE Leap 15.6 (x86_64)
    * kernel-azure-vdso-6.4.0-150600.8.8.2
    * kernel-azure-vdso-debuginfo-6.4.0-150600.8.8.2
  * openSUSE Leap 15.6 (noarch)
    * kernel-devel-azure-6.4.0-150600.8.8.2
    * kernel-source-azure-6.4.0-150600.8.8.2
  * Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
    * kernel-azure-6.4.0-150600.8.8.2
  * Public Cloud Module 15-SP6 (aarch64 x86_64)
    * kernel-syms-azure-6.4.0-150600.8.8.1
    * kernel-azure-debuginfo-6.4.0-150600.8.8.2
    * kernel-azure-devel-6.4.0-150600.8.8.2
    * kernel-azure-debugsource-6.4.0-150600.8.8.2
    * kernel-azure-devel-debuginfo-6.4.0-150600.8.8.2
  * Public Cloud Module 15-SP6 (noarch)
    * kernel-devel-azure-6.4.0-150600.8.8.2
    * kernel-source-azure-6.4.0-150600.8.8.2

## References:

  * https://www.suse.com/security/cve/CVE-2021-47432.html
  * https://www.suse.com/security/cve/CVE-2022-48772.html
  * https://www.suse.com/security/cve/CVE-2023-38417.html
  * https://www.suse.com/security/cve/CVE-2023-47210.html
  * https://www.suse.com/security/cve/CVE-2023-51780.html
  * https://www.suse.com/security/cve/CVE-2023-52435.html
  * https://www.suse.com/security/cve/CVE-2023-52472.html
  * https://www.suse.com/security/cve/CVE-2023-52622.html
  * https://www.suse.com/security/cve/CVE-2023-52656.html
  * https://www.suse.com/security/cve/CVE-2023-52672.html
  * https://www.suse.com/security/cve/CVE-2023-52699.html
  * https://www.suse.com/security/cve/CVE-2023-52735.html
  * https://www.suse.com/security/cve/CVE-2023-52749.html
  * https://www.suse.com/security/cve/CVE-2023-52750.html
  * https://www.suse.com/security/cve/CVE-2023-52751.html
  * https://www.suse.com/security/cve/CVE-2023-52753.html
  * https://www.suse.com/security/cve/CVE-2023-52754.html
  * https://www.suse.com/security/cve/CVE-2023-52757.html
  * https://www.suse.com/security/cve/CVE-2023-52759.html
  * https://www.suse.com/security/cve/CVE-2023-52762.html
  * https://www.suse.com/security/cve/CVE-2023-52763.html
  * https://www.suse.com/security/cve/CVE-2023-52764.html
  * https://www.suse.com/security/cve/CVE-2023-52765.html
  * https://www.suse.com/security/cve/CVE-2023-52766.html
  * https://www.suse.com/security/cve/CVE-2023-52767.html
  * https://www.suse.com/security/cve/CVE-2023-52768.html
  * https://www.suse.com/security/cve/CVE-2023-52769.html
  * https://www.suse.com/security/cve/CVE-2023-52773.html
  * https://www.suse.com/security/cve/CVE-2023-52774.html
  * https://www.suse.com/security/cve/CVE-2023-52775.html
  * https://www.suse.com/security/cve/CVE-2023-52776.html
  * https://www.suse.com/security/cve/CVE-2023-52777.html
  * https://www.suse.com/security/cve/CVE-2023-52780.html
  * https://www.suse.com/security/cve/CVE-2023-52781.html
  * https://www.suse.com/security/cve/CVE-2023-52782.html
  * https://www.suse.com/security/cve/CVE-2023-52783.html
  * https://www.suse.com/security/cve/CVE-2023-52784.html
  * https://www.suse.com/security/cve/CVE-2023-52786.html
  * https://www.suse.com/security/cve/CVE-2023-52787.html
  * https://www.suse.com/security/cve/CVE-2023-52788.html
  * https://www.suse.com/security/cve/CVE-2023-52789.html
  * https://www.suse.com/security/cve/CVE-2023-52791.html
  * https://www.suse.com/security/cve/CVE-2023-52792.html
  * https://www.suse.com/security/cve/CVE-2023-52794.html
  * https://www.suse.com/security/cve/CVE-2023-52795.html
  * https://www.suse.com/security/cve/CVE-2023-52796.html
  * https://www.suse.com/security/cve/CVE-2023-52798.html
  * https://www.suse.com/security/cve/CVE-2023-52799.html
  * https://www.suse.com/security/cve/CVE-2023-52800.html
  * https://www.suse.com/security/cve/CVE-2023-52801.html
  * https://www.suse.com/security/cve/CVE-2023-52803.html
  * https://www.suse.com/security/cve/CVE-2023-52804.html
  * https://www.suse.com/security/cve/CVE-2023-52805.html
  * https://www.suse.com/security/cve/CVE-2023-52806.html
  * https://www.suse.com/security/cve/CVE-2023-52807.html
  * https://www.suse.com/security/cve/CVE-2023-52808.html
  * https://www.suse.com/security/cve/CVE-2023-52809.html
  * https://www.suse.com/security/cve/CVE-2023-52810.html
  * https://www.suse.com/security/cve/CVE-2023-52811.html
  * https://www.suse.com/security/cve/CVE-2023-52812.html
  * https://www.suse.com/security/cve/CVE-2023-52813.html
  * https://www.suse.com/security/cve/CVE-2023-52814.html
  * https://www.suse.com/security/cve/CVE-2023-52815.html
  * https://www.suse.com/security/cve/CVE-2023-52816.html
  * https://www.suse.com/security/cve/CVE-2023-52817.html
  * https://www.suse.com/security/cve/CVE-2023-52818.html
  * https://www.suse.com/security/cve/CVE-2023-52819.html
  * https://www.suse.com/security/cve/CVE-2023-52821.html
  * https://www.suse.com/security/cve/CVE-2023-52825.html
  * https://www.suse.com/security/cve/CVE-2023-52826.html
  * https://www.suse.com/security/cve/CVE-2023-52827.html
  * https://www.suse.com/security/cve/CVE-2023-52829.html
  * https://www.suse.com/security/cve/CVE-2023-52832.html
  * https://www.suse.com/security/cve/CVE-2023-52833.html
  * https://www.suse.com/security/cve/CVE-2023-52834.html
  * https://www.suse.com/security/cve/CVE-2023-52835.html
  * https://www.suse.com/security/cve/CVE-2023-52836.html
  * https://www.suse.com/security/cve/CVE-2023-52837.html
  * https://www.suse.com/security/cve/CVE-2023-52838.html
  * https://www.suse.com/security/cve/CVE-2023-52840.html
  * https://www.suse.com/security/cve/CVE-2023-52841.html
  * https://www.suse.com/security/cve/CVE-2023-52842.html
  * https://www.suse.com/security/cve/CVE-2023-52843.html
  * https://www.suse.com/security/cve/CVE-2023-52844.html
  * https://www.suse.com/security/cve/CVE-2023-52845.html
  * https://www.suse.com/security/cve/CVE-2023-52846.html
  * https://www.suse.com/security/cve/CVE-2023-52847.html
  * https://www.suse.com/security/cve/CVE-2023-52849.html
  * https://www.suse.com/security/cve/CVE-2023-52850.html
  * https://www.suse.com/security/cve/CVE-2023-52851.html
  * https://www.suse.com/security/cve/CVE-2023-52853.html
  * https://www.suse.com/security/cve/CVE-2023-52854.html
  * https://www.suse.com/security/cve/CVE-2023-52855.html
  * https://www.suse.com/security/cve/CVE-2023-52856.html
  * https://www.suse.com/security/cve/CVE-2023-52857.html
  * https://www.suse.com/security/cve/CVE-2023-52858.html
  * https://www.suse.com/security/cve/CVE-2023-52861.html
  * https://www.suse.com/security/cve/CVE-2023-52862.html
  * https://www.suse.com/security/cve/CVE-2023-52863.html
  * https://www.suse.com/security/cve/CVE-2023-52864.html
  * https://www.suse.com/security/cve/CVE-2023-52865.html
  * https://www.suse.com/security/cve/CVE-2023-52866.html
  * https://www.suse.com/security/cve/CVE-2023-52867.html
  * https://www.suse.com/security/cve/CVE-2023-52868.html
  * https://www.suse.com/security/cve/CVE-2023-52869.html
  * https://www.suse.com/security/cve/CVE-2023-52870.html
  * https://www.suse.com/security/cve/CVE-2023-52871.html
  * https://www.suse.com/security/cve/CVE-2023-52872.html
  * https://www.suse.com/security/cve/CVE-2023-52873.html
  * https://www.suse.com/security/cve/CVE-2023-52874.html
  * https://www.suse.com/security/cve/CVE-2023-52875.html
  * https://www.suse.com/security/cve/CVE-2023-52876.html
  * https://www.suse.com/security/cve/CVE-2023-52877.html
  * https://www.suse.com/security/cve/CVE-2023-52878.html
  * https://www.suse.com/security/cve/CVE-2023-52879.html
  * https://www.suse.com/security/cve/CVE-2023-52880.html
  * https://www.suse.com/security/cve/CVE-2023-52881.html
  * https://www.suse.com/security/cve/CVE-2023-52883.html
  * https://www.suse.com/security/cve/CVE-2023-52884.html
  * https://www.suse.com/security/cve/CVE-2024-25741.html
  * https://www.suse.com/security/cve/CVE-2024-26615.html
  * https://www.suse.com/security/cve/CVE-2024-26623.html
  * https://www.suse.com/security/cve/CVE-2024-26625.html
  * https://www.suse.com/security/cve/CVE-2024-26633.html
  * https://www.suse.com/security/cve/CVE-2024-26635.html
  * https://www.suse.com/security/cve/CVE-2024-26636.html
  * https://www.suse.com/security/cve/CVE-2024-26641.html
  * https://www.suse.com/security/cve/CVE-2024-26663.html
  * https://www.suse.com/security/cve/CVE-2024-26665.html
  * https://www.suse.com/security/cve/CVE-2024-26676.html
  * https://www.suse.com/security/cve/CVE-2024-26691.html
  * https://www.suse.com/security/cve/CVE-2024-26734.html
  * https://www.suse.com/security/cve/CVE-2024-26750.html
  * https://www.suse.com/security/cve/CVE-2024-26758.html
  * https://www.suse.com/security/cve/CVE-2024-26767.html
  * https://www.suse.com/security/cve/CVE-2024-26780.html
  * https://www.suse.com/security/cve/CVE-2024-26785.html
  * https://www.suse.com/security/cve/CVE-2024-26813.html
  * https://www.suse.com/security/cve/CVE-2024-26814.html
  * https://www.suse.com/security/cve/CVE-2024-26826.html
  * https://www.suse.com/security/cve/CVE-2024-26845.html
  * https://www.suse.com/security/cve/CVE-2024-26863.html
  * https://www.suse.com/security/cve/CVE-2024-26889.html
  * https://www.suse.com/security/cve/CVE-2024-26920.html
  * https://www.suse.com/security/cve/CVE-2024-26944.html
  * https://www.suse.com/security/cve/CVE-2024-27012.html
  * https://www.suse.com/security/cve/CVE-2024-27015.html
  * https://www.suse.com/security/cve/CVE-2024-27016.html
  * https://www.suse.com/security/cve/CVE-2024-27019.html
  * https://www.suse.com/security/cve/CVE-2024-27020.html
  * https://www.suse.com/security/cve/CVE-2024-27025.html
  * https://www.suse.com/security/cve/CVE-2024-27064.html
  * https://www.suse.com/security/cve/CVE-2024-27065.html
  * https://www.suse.com/security/cve/CVE-2024-27402.html
  * https://www.suse.com/security/cve/CVE-2024-27404.html
  * https://www.suse.com/security/cve/CVE-2024-27414.html
  * https://www.suse.com/security/cve/CVE-2024-27419.html
  * https://www.suse.com/security/cve/CVE-2024-33619.html
  * https://www.suse.com/security/cve/CVE-2024-34777.html
  * https://www.suse.com/security/cve/CVE-2024-35247.html
  * https://www.suse.com/security/cve/CVE-2024-35805.html
  * https://www.suse.com/security/cve/CVE-2024-35807.html
  * https://www.suse.com/security/cve/CVE-2024-35827.html
  * https://www.suse.com/security/cve/CVE-2024-35831.html
  * https://www.suse.com/security/cve/CVE-2024-35843.html
  * https://www.suse.com/security/cve/CVE-2024-35848.html
  * https://www.suse.com/security/cve/CVE-2024-35853.html
  * https://www.suse.com/security/cve/CVE-2024-35854.html
  * https://www.suse.com/security/cve/CVE-2024-35857.html
  * https://www.suse.com/security/cve/CVE-2024-35880.html
  * https://www.suse.com/security/cve/CVE-2024-35884.html
  * https://www.suse.com/security/cve/CVE-2024-35886.html
  * https://www.suse.com/security/cve/CVE-2024-35890.html
  * https://www.suse.com/security/cve/CVE-2024-35892.html
  * https://www.suse.com/security/cve/CVE-2024-35893.html
  * https://www.suse.com/security/cve/CVE-2024-35896.html
  * https://www.suse.com/security/cve/CVE-2024-35898.html
  * https://www.suse.com/security/cve/CVE-2024-35899.html
  * https://www.suse.com/security/cve/CVE-2024-35900.html
  * https://www.suse.com/security/cve/CVE-2024-35908.html
  * https://www.suse.com/security/cve/CVE-2024-35925.html
  * https://www.suse.com/security/cve/CVE-2024-35926.html
  * https://www.suse.com/security/cve/CVE-2024-35934.html
  * https://www.suse.com/security/cve/CVE-2024-35942.html
  * https://www.suse.com/security/cve/CVE-2024-35957.html
  * https://www.suse.com/security/cve/CVE-2024-35962.html
  * https://www.suse.com/security/cve/CVE-2024-35970.html
  * https://www.suse.com/security/cve/CVE-2024-35976.html
  * https://www.suse.com/security/cve/CVE-2024-35979.html
  * https://www.suse.com/security/cve/CVE-2024-35998.html
  * https://www.suse.com/security/cve/CVE-2024-36003.html
  * https://www.suse.com/security/cve/CVE-2024-36004.html
  * https://www.suse.com/security/cve/CVE-2024-36005.html
  * https://www.suse.com/security/cve/CVE-2024-36008.html
  * https://www.suse.com/security/cve/CVE-2024-36010.html
  * https://www.suse.com/security/cve/CVE-2024-36017.html
  * https://www.suse.com/security/cve/CVE-2024-36024.html
  * https://www.suse.com/security/cve/CVE-2024-36281.html
  * https://www.suse.com/security/cve/CVE-2024-36477.html
  * https://www.suse.com/security/cve/CVE-2024-36478.html
  * https://www.suse.com/security/cve/CVE-2024-36479.html
  * https://www.suse.com/security/cve/CVE-2024-36882.html
  * https://www.suse.com/security/cve/CVE-2024-36887.html
  * https://www.suse.com/security/cve/CVE-2024-36889.html
  * https://www.suse.com/security/cve/CVE-2024-36899.html
  * https://www.suse.com/security/cve/CVE-2024-36900.html
  * https://www.suse.com/security/cve/CVE-2024-36901.html
  * https://www.suse.com/security/cve/CVE-2024-36902.html
  * https://www.suse.com/security/cve/CVE-2024-36903.html
  * https://www.suse.com/security/cve/CVE-2024-36904.html
  * https://www.suse.com/security/cve/CVE-2024-36909.html
  * https://www.suse.com/security/cve/CVE-2024-36910.html
  * https://www.suse.com/security/cve/CVE-2024-36911.html
  * https://www.suse.com/security/cve/CVE-2024-36912.html
  * https://www.suse.com/security/cve/CVE-2024-36913.html
  * https://www.suse.com/security/cve/CVE-2024-36914.html
  * https://www.suse.com/security/cve/CVE-2024-36915.html
  * https://www.suse.com/security/cve/CVE-2024-36916.html
  * https://www.suse.com/security/cve/CVE-2024-36917.html
  * https://www.suse.com/security/cve/CVE-2024-36919.html
  * https://www.suse.com/security/cve/CVE-2024-36922.html
  * https://www.suse.com/security/cve/CVE-2024-36923.html
  * https://www.suse.com/security/cve/CVE-2024-36924.html
  * https://www.suse.com/security/cve/CVE-2024-36926.html
  * https://www.suse.com/security/cve/CVE-2024-36930.html
  * https://www.suse.com/security/cve/CVE-2024-36934.html
  * https://www.suse.com/security/cve/CVE-2024-36935.html
  * https://www.suse.com/security/cve/CVE-2024-36937.html
  * https://www.suse.com/security/cve/CVE-2024-36938.html
  * https://www.suse.com/security/cve/CVE-2024-36940.html
  * https://www.suse.com/security/cve/CVE-2024-36941.html
  * https://www.suse.com/security/cve/CVE-2024-36942.html
  * https://www.suse.com/security/cve/CVE-2024-36944.html
  * https://www.suse.com/security/cve/CVE-2024-36945.html
  * https://www.suse.com/security/cve/CVE-2024-36946.html
  * https://www.suse.com/security/cve/CVE-2024-36947.html
  * https://www.suse.com/security/cve/CVE-2024-36949.html
  * https://www.suse.com/security/cve/CVE-2024-36950.html
  * https://www.suse.com/security/cve/CVE-2024-36951.html
  * https://www.suse.com/security/cve/CVE-2024-36952.html
  * https://www.suse.com/security/cve/CVE-2024-36955.html
  * https://www.suse.com/security/cve/CVE-2024-36957.html
  * https://www.suse.com/security/cve/CVE-2024-36959.html
  * https://www.suse.com/security/cve/CVE-2024-36960.html
  * https://www.suse.com/security/cve/CVE-2024-36962.html
  * https://www.suse.com/security/cve/CVE-2024-36964.html
  * https://www.suse.com/security/cve/CVE-2024-36965.html
  * https://www.suse.com/security/cve/CVE-2024-36967.html
  * https://www.suse.com/security/cve/CVE-2024-36969.html
  * https://www.suse.com/security/cve/CVE-2024-36971.html
  * https://www.suse.com/security/cve/CVE-2024-36972.html
  * https://www.suse.com/security/cve/CVE-2024-36973.html
  * https://www.suse.com/security/cve/CVE-2024-36974.html
  * https://www.suse.com/security/cve/CVE-2024-36975.html
  * https://www.suse.com/security/cve/CVE-2024-36977.html
  * https://www.suse.com/security/cve/CVE-2024-36978.html
  * https://www.suse.com/security/cve/CVE-2024-37021.html
  * https://www.suse.com/security/cve/CVE-2024-37078.html
  * https://www.suse.com/security/cve/CVE-2024-37353.html
  * https://www.suse.com/security/cve/CVE-2024-37354.html
  * https://www.suse.com/security/cve/CVE-2024-38381.html
  * https://www.suse.com/security/cve/CVE-2024-38384.html
  * https://www.suse.com/security/cve/CVE-2024-38385.html
  * https://www.suse.com/security/cve/CVE-2024-38388.html
  * https://www.suse.com/security/cve/CVE-2024-38390.html
  * https://www.suse.com/security/cve/CVE-2024-38391.html
  * https://www.suse.com/security/cve/CVE-2024-38539.html
  * https://www.suse.com/security/cve/CVE-2024-38540.html
  * https://www.suse.com/security/cve/CVE-2024-38541.html
  * https://www.suse.com/security/cve/CVE-2024-38543.html
  * https://www.suse.com/security/cve/CVE-2024-38544.html
  * https://www.suse.com/security/cve/CVE-2024-38545.html
  * https://www.suse.com/security/cve/CVE-2024-38546.html
  * https://www.suse.com/security/cve/CVE-2024-38547.html
  * https://www.suse.com/security/cve/CVE-2024-38548.html
  * https://www.suse.com/security/cve/CVE-2024-38549.html
  * https://www.suse.com/security/cve/CVE-2024-38550.html
  * https://www.suse.com/security/cve/CVE-2024-38551.html
  * https://www.suse.com/security/cve/CVE-2024-38552.html
  * https://www.suse.com/security/cve/CVE-2024-38553.html
  * https://www.suse.com/security/cve/CVE-2024-38554.html
  * https://www.suse.com/security/cve/CVE-2024-38555.html
  * https://www.suse.com/security/cve/CVE-2024-38556.html
  * https://www.suse.com/security/cve/CVE-2024-38557.html
  * https://www.suse.com/security/cve/CVE-2024-38558.html
  * https://www.suse.com/security/cve/CVE-2024-38559.html
  * https://www.suse.com/security/cve/CVE-2024-38560.html
  * https://www.suse.com/security/cve/CVE-2024-38562.html
  * https://www.suse.com/security/cve/CVE-2024-38564.html
  * https://www.suse.com/security/cve/CVE-2024-38565.html
  * https://www.suse.com/security/cve/CVE-2024-38566.html
  * https://www.suse.com/security/cve/CVE-2024-38567.html
  * https://www.suse.com/security/cve/CVE-2024-38568.html
  * https://www.suse.com/security/cve/CVE-2024-38569.html
  * https://www.suse.com/security/cve/CVE-2024-38570.html
  * https://www.suse.com/security/cve/CVE-2024-38571.html
  * https://www.suse.com/security/cve/CVE-2024-38572.html
  * https://www.suse.com/security/cve/CVE-2024-38573.html
  * https://www.suse.com/security/cve/CVE-2024-38575.html
  * https://www.suse.com/security/cve/CVE-2024-38578.html
  * https://www.suse.com/security/cve/CVE-2024-38579.html
  * https://www.suse.com/security/cve/CVE-2024-38580.html
  * https://www.suse.com/security/cve/CVE-2024-38581.html
  * https://www.suse.com/security/cve/CVE-2024-38582.html
  * https://www.suse.com/security/cve/CVE-2024-38583.html
  * https://www.suse.com/security/cve/CVE-2024-38586.html
  * https://www.suse.com/security/cve/CVE-2024-38587.html
  * https://www.suse.com/security/cve/CVE-2024-38588.html
  * https://www.suse.com/security/cve/CVE-2024-38590.html
  * https://www.suse.com/security/cve/CVE-2024-38591.html
  * https://www.suse.com/security/cve/CVE-2024-38592.html
  * https://www.suse.com/security/cve/CVE-2024-38594.html
  * https://www.suse.com/security/cve/CVE-2024-38595.html
  * https://www.suse.com/security/cve/CVE-2024-38597.html
  * https://www.suse.com/security/cve/CVE-2024-38598.html
  * https://www.suse.com/security/cve/CVE-2024-38599.html
  * https://www.suse.com/security/cve/CVE-2024-38600.html
  * https://www.suse.com/security/cve/CVE-2024-38601.html
  * https://www.suse.com/security/cve/CVE-2024-38602.html
  * https://www.suse.com/security/cve/CVE-2024-38603.html
  * https://www.suse.com/security/cve/CVE-2024-38604.html
  * https://www.suse.com/security/cve/CVE-2024-38605.html
  * https://www.suse.com/security/cve/CVE-2024-38608.html
  * https://www.suse.com/security/cve/CVE-2024-38610.html
  * https://www.suse.com/security/cve/CVE-2024-38611.html
  * https://www.suse.com/security/cve/CVE-2024-38615.html
  * https://www.suse.com/security/cve/CVE-2024-38616.html
  * https://www.suse.com/security/cve/CVE-2024-38617.html
  * https://www.suse.com/security/cve/CVE-2024-38618.html
  * https://www.suse.com/security/cve/CVE-2024-38619.html
  * https://www.suse.com/security/cve/CVE-2024-38621.html
  * https://www.suse.com/security/cve/CVE-2024-38622.html
  * https://www.suse.com/security/cve/CVE-2024-38627.html
  * https://www.suse.com/security/cve/CVE-2024-38628.html
  * https://www.suse.com/security/cve/CVE-2024-38629.html
  * https://www.suse.com/security/cve/CVE-2024-38630.html
  * https://www.suse.com/security/cve/CVE-2024-38633.html
  * https://www.suse.com/security/cve/CVE-2024-38634.html
  * https://www.suse.com/security/cve/CVE-2024-38635.html
  * https://www.suse.com/security/cve/CVE-2024-38636.html
  * https://www.suse.com/security/cve/CVE-2024-38659.html
  * https://www.suse.com/security/cve/CVE-2024-38661.html
  * https://www.suse.com/security/cve/CVE-2024-38663.html
  * https://www.suse.com/security/cve/CVE-2024-38664.html
  * https://www.suse.com/security/cve/CVE-2024-38780.html
  * https://www.suse.com/security/cve/CVE-2024-39276.html
  * https://www.suse.com/security/cve/CVE-2024-39277.html
  * https://www.suse.com/security/cve/CVE-2024-39291.html
  * https://www.suse.com/security/cve/CVE-2024-39296.html
  * https://www.suse.com/security/cve/CVE-2024-39301.html
  * https://www.suse.com/security/cve/CVE-2024-39362.html
  * https://www.suse.com/security/cve/CVE-2024-39371.html
  * https://www.suse.com/security/cve/CVE-2024-39463.html
  * https://www.suse.com/security/cve/CVE-2024-39466.html
  * https://www.suse.com/security/cve/CVE-2024-39468.html
  * https://www.suse.com/security/cve/CVE-2024-39469.html
  * https://www.suse.com/security/cve/CVE-2024-39471.html
  * https://www.suse.com/security/cve/CVE-2024-39472.html
  * https://www.suse.com/security/cve/CVE-2024-39473.html
  * https://www.suse.com/security/cve/CVE-2024-39474.html
  * https://www.suse.com/security/cve/CVE-2024-39475.html
  * https://www.suse.com/security/cve/CVE-2024-39479.html
  * https://www.suse.com/security/cve/CVE-2024-39481.html
  * https://www.suse.com/security/cve/CVE-2024-39482.html
  * https://www.suse.com/security/cve/CVE-2024-39487.html
  * https://www.suse.com/security/cve/CVE-2024-39490.html
  * https://www.suse.com/security/cve/CVE-2024-39494.html
  * https://www.suse.com/security/cve/CVE-2024-39496.html
  * https://www.suse.com/security/cve/CVE-2024-39498.html
  * https://www.suse.com/security/cve/CVE-2024-39502.html
  * https://www.suse.com/security/cve/CVE-2024-39504.html
  * https://www.suse.com/security/cve/CVE-2024-39507.html
  * https://www.suse.com/security/cve/CVE-2024-40901.html
  * https://www.suse.com/security/cve/CVE-2024-40906.html
  * https://www.suse.com/security/cve/CVE-2024-40908.html
  * https://www.suse.com/security/cve/CVE-2024-40919.html
  * https://www.suse.com/security/cve/CVE-2024-40923.html
  * https://www.suse.com/security/cve/CVE-2024-40925.html
  * https://www.suse.com/security/cve/CVE-2024-40928.html
  * https://www.suse.com/security/cve/CVE-2024-40931.html
  * https://www.suse.com/security/cve/CVE-2024-40935.html
  * https://www.suse.com/security/cve/CVE-2024-40937.html
  * https://www.suse.com/security/cve/CVE-2024-40940.html
  * https://www.suse.com/security/cve/CVE-2024-40947.html
  * https://www.suse.com/security/cve/CVE-2024-40948.html
  * https://www.suse.com/security/cve/CVE-2024-40953.html
  * https://www.suse.com/security/cve/CVE-2024-40960.html
  * https://www.suse.com/security/cve/CVE-2024-40961.html
  * https://www.suse.com/security/cve/CVE-2024-40966.html
  * https://www.suse.com/security/cve/CVE-2024-40970.html
  * https://www.suse.com/security/cve/CVE-2024-40972.html
  * https://www.suse.com/security/cve/CVE-2024-40975.html
  * https://www.suse.com/security/cve/CVE-2024-40979.html
  * https://www.suse.com/security/cve/CVE-2024-40998.html
  * https://www.suse.com/security/cve/CVE-2024-40999.html
  * https://www.suse.com/security/cve/CVE-2024-41006.html
  * https://www.suse.com/security/cve/CVE-2024-41011.html
  * https://www.suse.com/security/cve/CVE-2024-41013.html
  * https://www.suse.com/security/cve/CVE-2024-41014.html
  * https://www.suse.com/security/cve/CVE-2024-41017.html
  * https://www.suse.com/security/cve/CVE-2024-41090.html
  * https://www.suse.com/security/cve/CVE-2024-41091.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1186716
  * https://bugzilla.suse.com/show_bug.cgi?id=1194869
  * https://bugzilla.suse.com/show_bug.cgi?id=1195775
  * https://bugzilla.suse.com/show_bug.cgi?id=1204562
  * https://bugzilla.suse.com/show_bug.cgi?id=1209834
  * https://bugzilla.suse.com/show_bug.cgi?id=1215199
  * https://bugzilla.suse.com/show_bug.cgi?id=1215587
  * https://bugzilla.suse.com/show_bug.cgi?id=1217481
  * https://bugzilla.suse.com/show_bug.cgi?id=1217912
  * https://bugzilla.suse.com/show_bug.cgi?id=1218442
  * https://bugzilla.suse.com/show_bug.cgi?id=1218730
  * https://bugzilla.suse.com/show_bug.cgi?id=1218820
  * https://bugzilla.suse.com/show_bug.cgi?id=1219224
  * https://bugzilla.suse.com/show_bug.cgi?id=1219478
  * https://bugzilla.suse.com/show_bug.cgi?id=1219596
  * https://bugzilla.suse.com/show_bug.cgi?id=1219633
  * https://bugzilla.suse.com/show_bug.cgi?id=1219832
  * https://bugzilla.suse.com/show_bug.cgi?id=1219847
  * https://bugzilla.suse.com/show_bug.cgi?id=1219953
  * https://bugzilla.suse.com/show_bug.cgi?id=1220138
  * https://bugzilla.suse.com/show_bug.cgi?id=1220427
  * https://bugzilla.suse.com/show_bug.cgi?id=1220430
  * https://bugzilla.suse.com/show_bug.cgi?id=1220942
  * https://bugzilla.suse.com/show_bug.cgi?id=1221057
  * https://bugzilla.suse.com/show_bug.cgi?id=1221086
  * https://bugzilla.suse.com/show_bug.cgi?id=1221647
  * https://bugzilla.suse.com/show_bug.cgi?id=1221654
  * https://bugzilla.suse.com/show_bug.cgi?id=1221656
  * https://bugzilla.suse.com/show_bug.cgi?id=1221659
  * https://bugzilla.suse.com/show_bug.cgi?id=1221777
  * https://bugzilla.suse.com/show_bug.cgi?id=1221958
  * https://bugzilla.suse.com/show_bug.cgi?id=1222011
  * https://bugzilla.suse.com/show_bug.cgi?id=1222015
  * https://bugzilla.suse.com/show_bug.cgi?id=1222080
  * https://bugzilla.suse.com/show_bug.cgi?id=1222241
  * https://bugzilla.suse.com/show_bug.cgi?id=1222326
  * https://bugzilla.suse.com/show_bug.cgi?id=1222328
  * https://bugzilla.suse.com/show_bug.cgi?id=1222380
  * https://bugzilla.suse.com/show_bug.cgi?id=1222438
  * https://bugzilla.suse.com/show_bug.cgi?id=1222463
  * https://bugzilla.suse.com/show_bug.cgi?id=1222588
  * https://bugzilla.suse.com/show_bug.cgi?id=1222617
  * https://bugzilla.suse.com/show_bug.cgi?id=1222619
  * https://bugzilla.suse.com/show_bug.cgi?id=1222768
  * https://bugzilla.suse.com/show_bug.cgi?id=1222775
  * https://bugzilla.suse.com/show_bug.cgi?id=1222779
  * https://bugzilla.suse.com/show_bug.cgi?id=1222809
  * https://bugzilla.suse.com/show_bug.cgi?id=1222810
  * https://bugzilla.suse.com/show_bug.cgi?id=1222893
  * https://bugzilla.suse.com/show_bug.cgi?id=1223010
  * https://bugzilla.suse.com/show_bug.cgi?id=1223018
  * https://bugzilla.suse.com/show_bug.cgi?id=1223021
  * https://bugzilla.suse.com/show_bug.cgi?id=1223265
  * https://bugzilla.suse.com/show_bug.cgi?id=1223570
  * https://bugzilla.suse.com/show_bug.cgi?id=1223731
  * https://bugzilla.suse.com/show_bug.cgi?id=1223740
  * https://bugzilla.suse.com/show_bug.cgi?id=1223778
  * https://bugzilla.suse.com/show_bug.cgi?id=1223804
  * https://bugzilla.suse.com/show_bug.cgi?id=1223806
  * https://bugzilla.suse.com/show_bug.cgi?id=1223807
  * https://bugzilla.suse.com/show_bug.cgi?id=1223813
  * https://bugzilla.suse.com/show_bug.cgi?id=1223815
  * https://bugzilla.suse.com/show_bug.cgi?id=1223836
  * https://bugzilla.suse.com/show_bug.cgi?id=1223863
  * https://bugzilla.suse.com/show_bug.cgi?id=1224049
  * https://bugzilla.suse.com/show_bug.cgi?id=1224187
  * https://bugzilla.suse.com/show_bug.cgi?id=1224414
  * https://bugzilla.suse.com/show_bug.cgi?id=1224422
  * https://bugzilla.suse.com/show_bug.cgi?id=1224439
  * https://bugzilla.suse.com/show_bug.cgi?id=1224490
  * https://bugzilla.suse.com/show_bug.cgi?id=1224497
  * https://bugzilla.suse.com/show_bug.cgi?id=1224498
  * https://bugzilla.suse.com/show_bug.cgi?id=1224499
  * https://bugzilla.suse.com/show_bug.cgi?id=1224512
  * https://bugzilla.suse.com/show_bug.cgi?id=1224515
  * https://bugzilla.suse.com/show_bug.cgi?id=1224516
  * https://bugzilla.suse.com/show_bug.cgi?id=1224520
  * https://bugzilla.suse.com/show_bug.cgi?id=1224523
  * https://bugzilla.suse.com/show_bug.cgi?id=1224539
  * https://bugzilla.suse.com/show_bug.cgi?id=1224540
  * https://bugzilla.suse.com/show_bug.cgi?id=1224544
  * https://bugzilla.suse.com/show_bug.cgi?id=1224545
  * https://bugzilla.suse.com/show_bug.cgi?id=1224549
  * https://bugzilla.suse.com/show_bug.cgi?id=1224572
  * https://bugzilla.suse.com/show_bug.cgi?id=1224575
  * https://bugzilla.suse.com/show_bug.cgi?id=1224583
  * https://bugzilla.suse.com/show_bug.cgi?id=1224584
  * https://bugzilla.suse.com/show_bug.cgi?id=1224589
  * https://bugzilla.suse.com/show_bug.cgi?id=1224604
  * https://bugzilla.suse.com/show_bug.cgi?id=1224606
  * https://bugzilla.suse.com/show_bug.cgi?id=1224612
  * https://bugzilla.suse.com/show_bug.cgi?id=1224614
  * https://bugzilla.suse.com/show_bug.cgi?id=1224619
  * https://bugzilla.suse.com/show_bug.cgi?id=1224636
  * https://bugzilla.suse.com/show_bug.cgi?id=1224641
  * https://bugzilla.suse.com/show_bug.cgi?id=1224655
  * https://bugzilla.suse.com/show_bug.cgi?id=1224659
  * https://bugzilla.suse.com/show_bug.cgi?id=1224661
  * https://bugzilla.suse.com/show_bug.cgi?id=1224662
  * https://bugzilla.suse.com/show_bug.cgi?id=1224670
  * https://bugzilla.suse.com/show_bug.cgi?id=1224673
  * https://bugzilla.suse.com/show_bug.cgi?id=1224698
  * https://bugzilla.suse.com/show_bug.cgi?id=1224735
  * https://bugzilla.suse.com/show_bug.cgi?id=1224743
  * https://bugzilla.suse.com/show_bug.cgi?id=1224751
  * https://bugzilla.suse.com/show_bug.cgi?id=1224759
  * https://bugzilla.suse.com/show_bug.cgi?id=1224767
  * https://bugzilla.suse.com/show_bug.cgi?id=1224928
  * https://bugzilla.suse.com/show_bug.cgi?id=1224930
  * https://bugzilla.suse.com/show_bug.cgi?id=1224932
  * https://bugzilla.suse.com/show_bug.cgi?id=1224933
  * https://bugzilla.suse.com/show_bug.cgi?id=1224935
  * https://bugzilla.suse.com/show_bug.cgi?id=1224937
  * https://bugzilla.suse.com/show_bug.cgi?id=1224939
  * https://bugzilla.suse.com/show_bug.cgi?id=1224941
  * https://bugzilla.suse.com/show_bug.cgi?id=1224944
  * https://bugzilla.suse.com/show_bug.cgi?id=1224946
  * https://bugzilla.suse.com/show_bug.cgi?id=1224947
  * https://bugzilla.suse.com/show_bug.cgi?id=1224949
  * https://bugzilla.suse.com/show_bug.cgi?id=1224951
  * https://bugzilla.suse.com/show_bug.cgi?id=1224988
  * https://bugzilla.suse.com/show_bug.cgi?id=1224992
  * https://bugzilla.suse.com/show_bug.cgi?id=1224998
  * https://bugzilla.suse.com/show_bug.cgi?id=1225000
  * https://bugzilla.suse.com/show_bug.cgi?id=1225001
  * https://bugzilla.suse.com/show_bug.cgi?id=1225004
  * https://bugzilla.suse.com/show_bug.cgi?id=1225006
  * https://bugzilla.suse.com/show_bug.cgi?id=1225008
  * https://bugzilla.suse.com/show_bug.cgi?id=1225009
  * https://bugzilla.suse.com/show_bug.cgi?id=1225014
  * https://bugzilla.suse.com/show_bug.cgi?id=1225015
  * https://bugzilla.suse.com/show_bug.cgi?id=1225022
  * https://bugzilla.suse.com/show_bug.cgi?id=1225025
  * https://bugzilla.suse.com/show_bug.cgi?id=1225028
  * https://bugzilla.suse.com/show_bug.cgi?id=1225029
  * https://bugzilla.suse.com/show_bug.cgi?id=1225031
  * https://bugzilla.suse.com/show_bug.cgi?id=1225036
  * https://bugzilla.suse.com/show_bug.cgi?id=1225041
  * https://bugzilla.suse.com/show_bug.cgi?id=1225044
  * https://bugzilla.suse.com/show_bug.cgi?id=1225049
  * https://bugzilla.suse.com/show_bug.cgi?id=1225050
  * https://bugzilla.suse.com/show_bug.cgi?id=1225076
  * https://bugzilla.suse.com/show_bug.cgi?id=1225077
  * https://bugzilla.suse.com/show_bug.cgi?id=1225078
  * https://bugzilla.suse.com/show_bug.cgi?id=1225081
  * https://bugzilla.suse.com/show_bug.cgi?id=1225085
  * https://bugzilla.suse.com/show_bug.cgi?id=1225086
  * https://bugzilla.suse.com/show_bug.cgi?id=1225088
  * https://bugzilla.suse.com/show_bug.cgi?id=1225090
  * https://bugzilla.suse.com/show_bug.cgi?id=1225092
  * https://bugzilla.suse.com/show_bug.cgi?id=1225096
  * https://bugzilla.suse.com/show_bug.cgi?id=1225097
  * https://bugzilla.suse.com/show_bug.cgi?id=1225098
  * https://bugzilla.suse.com/show_bug.cgi?id=1225101
  * https://bugzilla.suse.com/show_bug.cgi?id=1225103
  * https://bugzilla.suse.com/show_bug.cgi?id=1225104
  * https://bugzilla.suse.com/show_bug.cgi?id=1225105
  * https://bugzilla.suse.com/show_bug.cgi?id=1225106
  * https://bugzilla.suse.com/show_bug.cgi?id=1225108
  * https://bugzilla.suse.com/show_bug.cgi?id=1225120
  * https://bugzilla.suse.com/show_bug.cgi?id=1225132
  * https://bugzilla.suse.com/show_bug.cgi?id=1225172
  * https://bugzilla.suse.com/show_bug.cgi?id=1225180
  * https://bugzilla.suse.com/show_bug.cgi?id=1225272
  * https://bugzilla.suse.com/show_bug.cgi?id=1225300
  * https://bugzilla.suse.com/show_bug.cgi?id=1225391
  * https://bugzilla.suse.com/show_bug.cgi?id=1225472
  * https://bugzilla.suse.com/show_bug.cgi?id=1225475
  * https://bugzilla.suse.com/show_bug.cgi?id=1225476
  * https://bugzilla.suse.com/show_bug.cgi?id=1225477
  * https://bugzilla.suse.com/show_bug.cgi?id=1225478
  * https://bugzilla.suse.com/show_bug.cgi?id=1225485
  * https://bugzilla.suse.com/show_bug.cgi?id=1225489
  * https://bugzilla.suse.com/show_bug.cgi?id=1225490
  * https://bugzilla.suse.com/show_bug.cgi?id=1225527
  * https://bugzilla.suse.com/show_bug.cgi?id=1225529
  * https://bugzilla.suse.com/show_bug.cgi?id=1225530
  * https://bugzilla.suse.com/show_bug.cgi?id=1225532
  * https://bugzilla.suse.com/show_bug.cgi?id=1225534
  * https://bugzilla.suse.com/show_bug.cgi?id=1225548
  * https://bugzilla.suse.com/show_bug.cgi?id=1225550
  * https://bugzilla.suse.com/show_bug.cgi?id=1225553
  * https://bugzilla.suse.com/show_bug.cgi?id=1225554
  * https://bugzilla.suse.com/show_bug.cgi?id=1225555
  * https://bugzilla.suse.com/show_bug.cgi?id=1225556
  * https://bugzilla.suse.com/show_bug.cgi?id=1225557
  * https://bugzilla.suse.com/show_bug.cgi?id=1225559
  * https://bugzilla.suse.com/show_bug.cgi?id=1225560
  * https://bugzilla.suse.com/show_bug.cgi?id=1225564
  * https://bugzilla.suse.com/show_bug.cgi?id=1225565
  * https://bugzilla.suse.com/show_bug.cgi?id=1225566
  * https://bugzilla.suse.com/show_bug.cgi?id=1225568
  * https://bugzilla.suse.com/show_bug.cgi?id=1225569
  * https://bugzilla.suse.com/show_bug.cgi?id=1225570
  * https://bugzilla.suse.com/show_bug.cgi?id=1225571
  * https://bugzilla.suse.com/show_bug.cgi?id=1225572
  * https://bugzilla.suse.com/show_bug.cgi?id=1225573
  * https://bugzilla.suse.com/show_bug.cgi?id=1225577
  * https://bugzilla.suse.com/show_bug.cgi?id=1225581
  * https://bugzilla.suse.com/show_bug.cgi?id=1225583
  * https://bugzilla.suse.com/show_bug.cgi?id=1225584
  * https://bugzilla.suse.com/show_bug.cgi?id=1225585
  * https://bugzilla.suse.com/show_bug.cgi?id=1225586
  * https://bugzilla.suse.com/show_bug.cgi?id=1225587
  * https://bugzilla.suse.com/show_bug.cgi?id=1225588
  * https://bugzilla.suse.com/show_bug.cgi?id=1225589
  * https://bugzilla.suse.com/show_bug.cgi?id=1225590
  * https://bugzilla.suse.com/show_bug.cgi?id=1225591
  * https://bugzilla.suse.com/show_bug.cgi?id=1225592
  * https://bugzilla.suse.com/show_bug.cgi?id=1225594
  * https://bugzilla.suse.com/show_bug.cgi?id=1225595
  * https://bugzilla.suse.com/show_bug.cgi?id=1225599
  * https://bugzilla.suse.com/show_bug.cgi?id=1225600
  * https://bugzilla.suse.com/show_bug.cgi?id=1225601
  * https://bugzilla.suse.com/show_bug.cgi?id=1225602
  * https://bugzilla.suse.com/show_bug.cgi?id=1225605
  * https://bugzilla.suse.com/show_bug.cgi?id=1225609
  * https://bugzilla.suse.com/show_bug.cgi?id=1225611
  * https://bugzilla.suse.com/show_bug.cgi?id=1225681
  * https://bugzilla.suse.com/show_bug.cgi?id=1225702
  * https://bugzilla.suse.com/show_bug.cgi?id=1225711
  * https://bugzilla.suse.com/show_bug.cgi?id=1225717
  * https://bugzilla.suse.com/show_bug.cgi?id=1225719
  * https://bugzilla.suse.com/show_bug.cgi?id=1225723
  * https://bugzilla.suse.com/show_bug.cgi?id=1225726
  * https://bugzilla.suse.com/show_bug.cgi?id=1225731
  * https://bugzilla.suse.com/show_bug.cgi?id=1225732
  * https://bugzilla.suse.com/show_bug.cgi?id=1225737
  * https://bugzilla.suse.com/show_bug.cgi?id=1225741
  * https://bugzilla.suse.com/show_bug.cgi?id=1225744
  * https://bugzilla.suse.com/show_bug.cgi?id=1225745
  * https://bugzilla.suse.com/show_bug.cgi?id=1225746
  * https://bugzilla.suse.com/show_bug.cgi?id=1225752
  * https://bugzilla.suse.com/show_bug.cgi?id=1225753
  * https://bugzilla.suse.com/show_bug.cgi?id=1225757
  * https://bugzilla.suse.com/show_bug.cgi?id=1225758
  * https://bugzilla.suse.com/show_bug.cgi?id=1225759
  * https://bugzilla.suse.com/show_bug.cgi?id=1225760
  * https://bugzilla.suse.com/show_bug.cgi?id=1225761
  * https://bugzilla.suse.com/show_bug.cgi?id=1225762
  * https://bugzilla.suse.com/show_bug.cgi?id=1225763
  * https://bugzilla.suse.com/show_bug.cgi?id=1225767
  * https://bugzilla.suse.com/show_bug.cgi?id=1225770
  * https://bugzilla.suse.com/show_bug.cgi?id=1225805
  * https://bugzilla.suse.com/show_bug.cgi?id=1225810
  * https://bugzilla.suse.com/show_bug.cgi?id=1225815
  * https://bugzilla.suse.com/show_bug.cgi?id=1225820
  * https://bugzilla.suse.com/show_bug.cgi?id=1225823
  * https://bugzilla.suse.com/show_bug.cgi?id=1225827
  * https://bugzilla.suse.com/show_bug.cgi?id=1225829
  * https://bugzilla.suse.com/show_bug.cgi?id=1225830
  * https://bugzilla.suse.com/show_bug.cgi?id=1225834
  * https://bugzilla.suse.com/show_bug.cgi?id=1225835
  * https://bugzilla.suse.com/show_bug.cgi?id=1225839
  * https://bugzilla.suse.com/show_bug.cgi?id=1225840
  * https://bugzilla.suse.com/show_bug.cgi?id=1225843
  * https://bugzilla.suse.com/show_bug.cgi?id=1225847
  * https://bugzilla.suse.com/show_bug.cgi?id=1225851
  * https://bugzilla.suse.com/show_bug.cgi?id=1225856
  * https://bugzilla.suse.com/show_bug.cgi?id=1225866
  * https://bugzilla.suse.com/show_bug.cgi?id=1225872
  * https://bugzilla.suse.com/show_bug.cgi?id=1225894
  * https://bugzilla.suse.com/show_bug.cgi?id=1225895
  * https://bugzilla.suse.com/show_bug.cgi?id=1225896
  * https://bugzilla.suse.com/show_bug.cgi?id=1225898
  * https://bugzilla.suse.com/show_bug.cgi?id=1225903
  * https://bugzilla.suse.com/show_bug.cgi?id=1226022
  * https://bugzilla.suse.com/show_bug.cgi?id=1226131
  * https://bugzilla.suse.com/show_bug.cgi?id=1226145
  * https://bugzilla.suse.com/show_bug.cgi?id=1226149
  * https://bugzilla.suse.com/show_bug.cgi?id=1226155
  * https://bugzilla.suse.com/show_bug.cgi?id=1226158
  * https://bugzilla.suse.com/show_bug.cgi?id=1226163
  * https://bugzilla.suse.com/show_bug.cgi?id=1226202
  * https://bugzilla.suse.com/show_bug.cgi?id=1226211
  * https://bugzilla.suse.com/show_bug.cgi?id=1226212
  * https://bugzilla.suse.com/show_bug.cgi?id=1226213
  * https://bugzilla.suse.com/show_bug.cgi?id=1226226
  * https://bugzilla.suse.com/show_bug.cgi?id=1226457
  * https://bugzilla.suse.com/show_bug.cgi?id=1226502
  * https://bugzilla.suse.com/show_bug.cgi?id=1226503
  * https://bugzilla.suse.com/show_bug.cgi?id=1226513
  * https://bugzilla.suse.com/show_bug.cgi?id=1226514
  * https://bugzilla.suse.com/show_bug.cgi?id=1226519
  * https://bugzilla.suse.com/show_bug.cgi?id=1226520
  * https://bugzilla.suse.com/show_bug.cgi?id=1226582
  * https://bugzilla.suse.com/show_bug.cgi?id=1226587
  * https://bugzilla.suse.com/show_bug.cgi?id=1226588
  * https://bugzilla.suse.com/show_bug.cgi?id=1226592
  * https://bugzilla.suse.com/show_bug.cgi?id=1226593
  * https://bugzilla.suse.com/show_bug.cgi?id=1226594
  * https://bugzilla.suse.com/show_bug.cgi?id=1226595
  * https://bugzilla.suse.com/show_bug.cgi?id=1226597
  * https://bugzilla.suse.com/show_bug.cgi?id=1226607
  * https://bugzilla.suse.com/show_bug.cgi?id=1226608
  * https://bugzilla.suse.com/show_bug.cgi?id=1226610
  * https://bugzilla.suse.com/show_bug.cgi?id=1226612
  * https://bugzilla.suse.com/show_bug.cgi?id=1226613
  * https://bugzilla.suse.com/show_bug.cgi?id=1226630
  * https://bugzilla.suse.com/show_bug.cgi?id=1226632
  * https://bugzilla.suse.com/show_bug.cgi?id=1226633
  * https://bugzilla.suse.com/show_bug.cgi?id=1226634
  * https://bugzilla.suse.com/show_bug.cgi?id=1226637
  * https://bugzilla.suse.com/show_bug.cgi?id=1226657
  * https://bugzilla.suse.com/show_bug.cgi?id=1226658
  * https://bugzilla.suse.com/show_bug.cgi?id=1226734
  * https://bugzilla.suse.com/show_bug.cgi?id=1226735
  * https://bugzilla.suse.com/show_bug.cgi?id=1226737
  * https://bugzilla.suse.com/show_bug.cgi?id=1226738
  * https://bugzilla.suse.com/show_bug.cgi?id=1226739
  * https://bugzilla.suse.com/show_bug.cgi?id=1226740
  * https://bugzilla.suse.com/show_bug.cgi?id=1226741
  * https://bugzilla.suse.com/show_bug.cgi?id=1226742
  * https://bugzilla.suse.com/show_bug.cgi?id=1226744
  * https://bugzilla.suse.com/show_bug.cgi?id=1226746
  * https://bugzilla.suse.com/show_bug.cgi?id=1226747
  * https://bugzilla.suse.com/show_bug.cgi?id=1226749
  * https://bugzilla.suse.com/show_bug.cgi?id=1226750
  * https://bugzilla.suse.com/show_bug.cgi?id=1226754
  * https://bugzilla.suse.com/show_bug.cgi?id=1226757
  * https://bugzilla.suse.com/show_bug.cgi?id=1226758
  * https://bugzilla.suse.com/show_bug.cgi?id=1226760
  * https://bugzilla.suse.com/show_bug.cgi?id=1226761
  * https://bugzilla.suse.com/show_bug.cgi?id=1226764
  * https://bugzilla.suse.com/show_bug.cgi?id=1226767
  * https://bugzilla.suse.com/show_bug.cgi?id=1226768
  * https://bugzilla.suse.com/show_bug.cgi?id=1226769
  * https://bugzilla.suse.com/show_bug.cgi?id=1226771
  * https://bugzilla.suse.com/show_bug.cgi?id=1226772
  * https://bugzilla.suse.com/show_bug.cgi?id=1226774
  * https://bugzilla.suse.com/show_bug.cgi?id=1226775
  * https://bugzilla.suse.com/show_bug.cgi?id=1226776
  * https://bugzilla.suse.com/show_bug.cgi?id=1226777
  * https://bugzilla.suse.com/show_bug.cgi?id=1226780
  * https://bugzilla.suse.com/show_bug.cgi?id=1226781
  * https://bugzilla.suse.com/show_bug.cgi?id=1226783
  * https://bugzilla.suse.com/show_bug.cgi?id=1226785
  * https://bugzilla.suse.com/show_bug.cgi?id=1226786
  * https://bugzilla.suse.com/show_bug.cgi?id=1226788
  * https://bugzilla.suse.com/show_bug.cgi?id=1226789
  * https://bugzilla.suse.com/show_bug.cgi?id=1226790
  * https://bugzilla.suse.com/show_bug.cgi?id=1226791
  * https://bugzilla.suse.com/show_bug.cgi?id=1226796
  * https://bugzilla.suse.com/show_bug.cgi?id=1226799
  * https://bugzilla.suse.com/show_bug.cgi?id=1226837
  * https://bugzilla.suse.com/show_bug.cgi?id=1226839
  * https://bugzilla.suse.com/show_bug.cgi?id=1226840
  * https://bugzilla.suse.com/show_bug.cgi?id=1226841
  * https://bugzilla.suse.com/show_bug.cgi?id=1226842
  * https://bugzilla.suse.com/show_bug.cgi?id=1226844
  * https://bugzilla.suse.com/show_bug.cgi?id=1226848
  * https://bugzilla.suse.com/show_bug.cgi?id=1226852
  * https://bugzilla.suse.com/show_bug.cgi?id=1226856
  * https://bugzilla.suse.com/show_bug.cgi?id=1226857
  * https://bugzilla.suse.com/show_bug.cgi?id=1226859
  * https://bugzilla.suse.com/show_bug.cgi?id=1226861
  * https://bugzilla.suse.com/show_bug.cgi?id=1226863
  * https://bugzilla.suse.com/show_bug.cgi?id=1226864
  * https://bugzilla.suse.com/show_bug.cgi?id=1226866
  * https://bugzilla.suse.com/show_bug.cgi?id=1226867
  * https://bugzilla.suse.com/show_bug.cgi?id=1226868
  * https://bugzilla.suse.com/show_bug.cgi?id=1226875
  * https://bugzilla.suse.com/show_bug.cgi?id=1226876
  * https://bugzilla.suse.com/show_bug.cgi?id=1226878
  * https://bugzilla.suse.com/show_bug.cgi?id=1226879
  * https://bugzilla.suse.com/show_bug.cgi?id=1226883
  * https://bugzilla.suse.com/show_bug.cgi?id=1226886
  * https://bugzilla.suse.com/show_bug.cgi?id=1226890
  * https://bugzilla.suse.com/show_bug.cgi?id=1226891
  * https://bugzilla.suse.com/show_bug.cgi?id=1226894
  * https://bugzilla.suse.com/show_bug.cgi?id=1226895
  * https://bugzilla.suse.com/show_bug.cgi?id=1226905
  * https://bugzilla.suse.com/show_bug.cgi?id=1226908
  * https://bugzilla.suse.com/show_bug.cgi?id=1226909
  * https://bugzilla.suse.com/show_bug.cgi?id=1226911
  * https://bugzilla.suse.com/show_bug.cgi?id=1226915
  * https://bugzilla.suse.com/show_bug.cgi?id=1226928
  * https://bugzilla.suse.com/show_bug.cgi?id=1226934
  * https://bugzilla.suse.com/show_bug.cgi?id=1226938
  * https://bugzilla.suse.com/show_bug.cgi?id=1226939
  * https://bugzilla.suse.com/show_bug.cgi?id=1226941
  * https://bugzilla.suse.com/show_bug.cgi?id=1226948
  * https://bugzilla.suse.com/show_bug.cgi?id=1226949
  * https://bugzilla.suse.com/show_bug.cgi?id=1226950
  * https://bugzilla.suse.com/show_bug.cgi?id=1226962
  * https://bugzilla.suse.com/show_bug.cgi?id=1226976
  * https://bugzilla.suse.com/show_bug.cgi?id=1226989
  * https://bugzilla.suse.com/show_bug.cgi?id=1226990
  * https://bugzilla.suse.com/show_bug.cgi?id=1226992
  * https://bugzilla.suse.com/show_bug.cgi?id=1226993
  * https://bugzilla.suse.com/show_bug.cgi?id=1226994
  * https://bugzilla.suse.com/show_bug.cgi?id=1226995
  * https://bugzilla.suse.com/show_bug.cgi?id=1226996
  * https://bugzilla.suse.com/show_bug.cgi?id=1227066
  * https://bugzilla.suse.com/show_bug.cgi?id=1227072
  * https://bugzilla.suse.com/show_bug.cgi?id=1227085
  * https://bugzilla.suse.com/show_bug.cgi?id=1227089
  * https://bugzilla.suse.com/show_bug.cgi?id=1227090
  * https://bugzilla.suse.com/show_bug.cgi?id=1227096
  * https://bugzilla.suse.com/show_bug.cgi?id=1227101
  * https://bugzilla.suse.com/show_bug.cgi?id=1227103
  * https://bugzilla.suse.com/show_bug.cgi?id=1227149
  * https://bugzilla.suse.com/show_bug.cgi?id=1227190
  * https://bugzilla.suse.com/show_bug.cgi?id=1227282
  * https://bugzilla.suse.com/show_bug.cgi?id=1227362
  * https://bugzilla.suse.com/show_bug.cgi?id=1227363
  * https://bugzilla.suse.com/show_bug.cgi?id=1227383
  * https://bugzilla.suse.com/show_bug.cgi?id=1227432
  * https://bugzilla.suse.com/show_bug.cgi?id=1227433
  * https://bugzilla.suse.com/show_bug.cgi?id=1227434
  * https://bugzilla.suse.com/show_bug.cgi?id=1227435
  * https://bugzilla.suse.com/show_bug.cgi?id=1227443
  * https://bugzilla.suse.com/show_bug.cgi?id=1227446
  * https://bugzilla.suse.com/show_bug.cgi?id=1227447
  * https://bugzilla.suse.com/show_bug.cgi?id=1227487
  * https://bugzilla.suse.com/show_bug.cgi?id=1227573
  * https://bugzilla.suse.com/show_bug.cgi?id=1227626
  * https://bugzilla.suse.com/show_bug.cgi?id=1227716
  * https://bugzilla.suse.com/show_bug.cgi?id=1227719
  * https://bugzilla.suse.com/show_bug.cgi?id=1227723
  * https://bugzilla.suse.com/show_bug.cgi?id=1227730
  * https://bugzilla.suse.com/show_bug.cgi?id=1227736
  * https://bugzilla.suse.com/show_bug.cgi?id=1227755
  * https://bugzilla.suse.com/show_bug.cgi?id=1227757
  * https://bugzilla.suse.com/show_bug.cgi?id=1227762
  * https://bugzilla.suse.com/show_bug.cgi?id=1227763
  * https://bugzilla.suse.com/show_bug.cgi?id=1227779
  * https://bugzilla.suse.com/show_bug.cgi?id=1227780
  * https://bugzilla.suse.com/show_bug.cgi?id=1227783
  * https://bugzilla.suse.com/show_bug.cgi?id=1227786
  * https://bugzilla.suse.com/show_bug.cgi?id=1227788
  * https://bugzilla.suse.com/show_bug.cgi?id=1227789
  * https://bugzilla.suse.com/show_bug.cgi?id=1227797
  * https://bugzilla.suse.com/show_bug.cgi?id=1227800
  * https://bugzilla.suse.com/show_bug.cgi?id=1227801
  * https://bugzilla.suse.com/show_bug.cgi?id=1227803
  * https://bugzilla.suse.com/show_bug.cgi?id=1227806
  * https://bugzilla.suse.com/show_bug.cgi?id=1227813
  * https://bugzilla.suse.com/show_bug.cgi?id=1227814
  * https://bugzilla.suse.com/show_bug.cgi?id=1227836
  * https://bugzilla.suse.com/show_bug.cgi?id=1227855
  * https://bugzilla.suse.com/show_bug.cgi?id=1227862
  * https://bugzilla.suse.com/show_bug.cgi?id=1227866
  * https://bugzilla.suse.com/show_bug.cgi?id=1227886
  * https://bugzilla.suse.com/show_bug.cgi?id=1227899
  * https://bugzilla.suse.com/show_bug.cgi?id=1227910
  * https://bugzilla.suse.com/show_bug.cgi?id=1227913
  * https://bugzilla.suse.com/show_bug.cgi?id=1227926
  * https://bugzilla.suse.com/show_bug.cgi?id=1228090
  * https://bugzilla.suse.com/show_bug.cgi?id=1228192
  * https://bugzilla.suse.com/show_bug.cgi?id=1228193
  * https://bugzilla.suse.com/show_bug.cgi?id=1228211
  * https://bugzilla.suse.com/show_bug.cgi?id=1228269
  * https://bugzilla.suse.com/show_bug.cgi?id=1228289
  * https://bugzilla.suse.com/show_bug.cgi?id=1228327
  * https://bugzilla.suse.com/show_bug.cgi?id=1228328
  * https://bugzilla.suse.com/show_bug.cgi?id=1228403
  * https://bugzilla.suse.com/show_bug.cgi?id=1228405
  * https://bugzilla.suse.com/show_bug.cgi?id=1228408
  * https://bugzilla.suse.com/show_bug.cgi?id=1228417
  * https://jira.suse.com/browse/PED-8491
  * https://jira.suse.com/browse/PED-8570
  * https://jira.suse.com/browse/PED-8644
  * https://jira.suse.com/browse/PED-8688
  * https://jira.suse.com/browse/PED-8701
  * https://jira.suse.com/browse/PED-8954

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20240813/20834399/attachment.htm>


More information about the sle-security-updates mailing list