SUSE-SU-2025:1178-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Tue Apr 8 20:33:16 UTC 2025



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:1178-1  
Release Date: 2025-04-08T16:32:09Z  
Rating: important  
References:

  * bsc#1207948
  * bsc#1215199
  * bsc#1215211
  * bsc#1218470
  * bsc#1221651
  * bsc#1222649
  * bsc#1223047
  * bsc#1224489
  * bsc#1224610
  * bsc#1225533
  * bsc#1225742
  * bsc#1225770
  * bsc#1226871
  * bsc#1227858
  * bsc#1228653
  * bsc#1229311
  * bsc#1229361
  * bsc#1230497
  * bsc#1230728
  * bsc#1230769
  * bsc#1230832
  * bsc#1231293
  * bsc#1231432
  * bsc#1232364
  * bsc#1232389
  * bsc#1232421
  * bsc#1232743
  * bsc#1232812
  * bsc#1232848
  * bsc#1232895
  * bsc#1233033
  * bsc#1233060
  * bsc#1233259
  * bsc#1233260
  * bsc#1233479
  * bsc#1233551
  * bsc#1233557
  * bsc#1233749
  * bsc#1234222
  * bsc#1234480
  * bsc#1234828
  * bsc#1234936
  * bsc#1235436
  * bsc#1235455
  * bsc#1235501
  * bsc#1235524
  * bsc#1235589
  * bsc#1235591
  * bsc#1235621
  * bsc#1235637
  * bsc#1235698
  * bsc#1235711
  * bsc#1235712
  * bsc#1235715
  * bsc#1235729
  * bsc#1235733
  * bsc#1235761
  * bsc#1235870
  * bsc#1235973
  * bsc#1236099
  * bsc#1236111
  * bsc#1236206
  * bsc#1236333
  * bsc#1236692
  * bsc#1237029
  * bsc#1237164
  * bsc#1237313
  * bsc#1237530
  * bsc#1237558
  * bsc#1237562
  * bsc#1237565
  * bsc#1237571
  * bsc#1237853
  * bsc#1237856
  * bsc#1237873
  * bsc#1237875
  * bsc#1237876
  * bsc#1237877
  * bsc#1237881
  * bsc#1237885
  * bsc#1237890
  * bsc#1237894
  * bsc#1237897
  * bsc#1237900
  * bsc#1237906
  * bsc#1237907
  * bsc#1237911
  * bsc#1237912
  * bsc#1237950
  * bsc#1238212
  * bsc#1238474
  * bsc#1238475
  * bsc#1238479
  * bsc#1238494
  * bsc#1238496
  * bsc#1238497
  * bsc#1238500
  * bsc#1238501
  * bsc#1238502
  * bsc#1238503
  * bsc#1238506
  * bsc#1238507
  * bsc#1238510
  * bsc#1238511
  * bsc#1238512
  * bsc#1238521
  * bsc#1238523
  * bsc#1238526
  * bsc#1238528
  * bsc#1238529
  * bsc#1238531
  * bsc#1238532
  * bsc#1238715
  * bsc#1238716
  * bsc#1238734
  * bsc#1238735
  * bsc#1238736
  * bsc#1238738
  * bsc#1238747
  * bsc#1238754
  * bsc#1238757
  * bsc#1238760
  * bsc#1238762
  * bsc#1238763
  * bsc#1238767
  * bsc#1238768
  * bsc#1238771
  * bsc#1238772
  * bsc#1238773
  * bsc#1238775
  * bsc#1238780
  * bsc#1238781
  * bsc#1238785
  * bsc#1238864
  * bsc#1238865
  * bsc#1238876
  * bsc#1238903
  * bsc#1238904
  * bsc#1238905
  * bsc#1238909
  * bsc#1238911
  * bsc#1238917
  * bsc#1238958
  * bsc#1238959
  * bsc#1238963
  * bsc#1238964
  * bsc#1238969
  * bsc#1238971
  * bsc#1238973
  * bsc#1238975
  * bsc#1238978
  * bsc#1238979
  * bsc#1238981
  * bsc#1238984
  * bsc#1238986
  * bsc#1238993
  * bsc#1238994
  * bsc#1238997
  * bsc#1239015
  * bsc#1239016
  * bsc#1239027
  * bsc#1239029
  * bsc#1239030
  * bsc#1239033
  * bsc#1239034
  * bsc#1239036
  * bsc#1239037
  * bsc#1239038
  * bsc#1239039
  * bsc#1239045
  * bsc#1239065
  * bsc#1239068
  * bsc#1239073
  * bsc#1239076
  * bsc#1239080
  * bsc#1239085
  * bsc#1239087
  * bsc#1239095
  * bsc#1239104
  * bsc#1239105
  * bsc#1239109
  * bsc#1239112
  * bsc#1239114
  * bsc#1239115
  * bsc#1239117
  * bsc#1239167
  * bsc#1239174
  * bsc#1239346
  * bsc#1239349
  * bsc#1239435
  * bsc#1239467
  * bsc#1239468
  * bsc#1239471
  * bsc#1239473
  * bsc#1239474
  * bsc#1239477
  * bsc#1239478
  * bsc#1239479
  * bsc#1239481
  * bsc#1239482
  * bsc#1239483
  * bsc#1239484
  * bsc#1239486
  * bsc#1239508
  * bsc#1239512
  * bsc#1239518
  * bsc#1239573
  * bsc#1239594
  * bsc#1239595
  * bsc#1239600
  * bsc#1239605
  * bsc#1239615
  * bsc#1239644
  * bsc#1239707
  * bsc#1239986
  * bsc#1239994
  * bsc#1240169
  * bsc#1240172
  * bsc#1240173
  * bsc#1240175
  * bsc#1240177
  * bsc#1240179
  * bsc#1240182
  * bsc#1240183
  * bsc#1240186
  * bsc#1240188
  * bsc#1240189
  * bsc#1240191
  * bsc#1240192
  * bsc#1240333
  * bsc#1240334
  * jsc#PED-10701
  * jsc#PED-12251
  * jsc#PED-12416

  
Cross-References:

  * CVE-2023-52831
  * CVE-2023-52926
  * CVE-2023-52927
  * CVE-2024-26634
  * CVE-2024-26873
  * CVE-2024-35826
  * CVE-2024-35910
  * CVE-2024-38606
  * CVE-2024-41005
  * CVE-2024-41077
  * CVE-2024-41149
  * CVE-2024-42307
  * CVE-2024-43820
  * CVE-2024-46736
  * CVE-2024-46782
  * CVE-2024-46796
  * CVE-2024-47408
  * CVE-2024-47794
  * CVE-2024-49571
  * CVE-2024-49924
  * CVE-2024-49940
  * CVE-2024-49994
  * CVE-2024-50056
  * CVE-2024-50126
  * CVE-2024-50140
  * CVE-2024-50152
  * CVE-2024-50290
  * CVE-2024-52559
  * CVE-2024-53057
  * CVE-2024-53063
  * CVE-2024-53140
  * CVE-2024-53163
  * CVE-2024-53680
  * CVE-2024-54683
  * CVE-2024-56638
  * CVE-2024-56640
  * CVE-2024-56702
  * CVE-2024-56703
  * CVE-2024-56718
  * CVE-2024-56719
  * CVE-2024-56751
  * CVE-2024-56758
  * CVE-2024-56770
  * CVE-2024-57807
  * CVE-2024-57834
  * CVE-2024-57900
  * CVE-2024-57947
  * CVE-2024-57973
  * CVE-2024-57974
  * CVE-2024-57978
  * CVE-2024-57979
  * CVE-2024-57980
  * CVE-2024-57981
  * CVE-2024-57986
  * CVE-2024-57990
  * CVE-2024-57993
  * CVE-2024-57996
  * CVE-2024-57997
  * CVE-2024-57999
  * CVE-2024-58002
  * CVE-2024-58005
  * CVE-2024-58006
  * CVE-2024-58007
  * CVE-2024-58009
  * CVE-2024-58011
  * CVE-2024-58012
  * CVE-2024-58013
  * CVE-2024-58014
  * CVE-2024-58017
  * CVE-2024-58019
  * CVE-2024-58020
  * CVE-2024-58034
  * CVE-2024-58051
  * CVE-2024-58052
  * CVE-2024-58054
  * CVE-2024-58055
  * CVE-2024-58056
  * CVE-2024-58057
  * CVE-2024-58058
  * CVE-2024-58061
  * CVE-2024-58063
  * CVE-2024-58069
  * CVE-2024-58072
  * CVE-2024-58076
  * CVE-2024-58078
  * CVE-2024-58079
  * CVE-2024-58080
  * CVE-2024-58083
  * CVE-2024-58085
  * CVE-2024-58086
  * CVE-2025-21631
  * CVE-2025-21635
  * CVE-2025-21659
  * CVE-2025-21671
  * CVE-2025-21693
  * CVE-2025-21701
  * CVE-2025-21703
  * CVE-2025-21704
  * CVE-2025-21706
  * CVE-2025-21708
  * CVE-2025-21711
  * CVE-2025-21714
  * CVE-2025-21718
  * CVE-2025-21723
  * CVE-2025-21726
  * CVE-2025-21727
  * CVE-2025-21731
  * CVE-2025-21732
  * CVE-2025-21733
  * CVE-2025-21734
  * CVE-2025-21735
  * CVE-2025-21736
  * CVE-2025-21738
  * CVE-2025-21739
  * CVE-2025-21741
  * CVE-2025-21742
  * CVE-2025-21743
  * CVE-2025-21744
  * CVE-2025-21745
  * CVE-2025-21749
  * CVE-2025-21750
  * CVE-2025-21753
  * CVE-2025-21754
  * CVE-2025-21756
  * CVE-2025-21759
  * CVE-2025-21760
  * CVE-2025-21761
  * CVE-2025-21762
  * CVE-2025-21763
  * CVE-2025-21764
  * CVE-2025-21765
  * CVE-2025-21766
  * CVE-2025-21772
  * CVE-2025-21773
  * CVE-2025-21775
  * CVE-2025-21776
  * CVE-2025-21779
  * CVE-2025-21780
  * CVE-2025-21781
  * CVE-2025-21782
  * CVE-2025-21784
  * CVE-2025-21785
  * CVE-2025-21791
  * CVE-2025-21793
  * CVE-2025-21794
  * CVE-2025-21796
  * CVE-2025-21804
  * CVE-2025-21810
  * CVE-2025-21815
  * CVE-2025-21819
  * CVE-2025-21820
  * CVE-2025-21821
  * CVE-2025-21823
  * CVE-2025-21825
  * CVE-2025-21828
  * CVE-2025-21829
  * CVE-2025-21830
  * CVE-2025-21831
  * CVE-2025-21832
  * CVE-2025-21835
  * CVE-2025-21838
  * CVE-2025-21844
  * CVE-2025-21846
  * CVE-2025-21847
  * CVE-2025-21848
  * CVE-2025-21850
  * CVE-2025-21855
  * CVE-2025-21856
  * CVE-2025-21857
  * CVE-2025-21858
  * CVE-2025-21859
  * CVE-2025-21861
  * CVE-2025-21862
  * CVE-2025-21864
  * CVE-2025-21865
  * CVE-2025-21866
  * CVE-2025-21869
  * CVE-2025-21870
  * CVE-2025-21871
  * CVE-2025-21876
  * CVE-2025-21877
  * CVE-2025-21878
  * CVE-2025-21883
  * CVE-2025-21885
  * CVE-2025-21886
  * CVE-2025-21888
  * CVE-2025-21890
  * CVE-2025-21891
  * CVE-2025-21892

  
CVSS scores:

  * CVE-2023-52831 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52926 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52926 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52926 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52927 ( SUSE ):  8.3
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52927 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-26634 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26634 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26873 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26873 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35826 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35910 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35910 ( NVD ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-38606 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38606 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-41005 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-41077 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41077 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41149 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41149 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41149 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42307 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42307 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43820 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46736 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
  * CVE-2024-46736 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-46782 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46782 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46796 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46796 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46796 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47408 ( SUSE ):  5.9
    CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47408 ( SUSE ):  6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-47794 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47794 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49571 ( SUSE ):  5.9
    CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49571 ( SUSE ):  6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-49924 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49924 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49924 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49940 ( SUSE ):  6.1
    CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49940 ( SUSE ):  6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49940 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49994 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49994 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49994 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50056 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50056 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50056 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50126 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50126 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50126 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50140 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50140 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50140 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50152 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50152 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50290 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-52559 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-52559 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53057 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53057 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53057 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53063 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-53063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53140 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53140 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53163 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53163 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-53163 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53680 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53680 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-54683 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-54683 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-54683 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56638 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-56638 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-56640 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56640 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56640 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56640 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56702 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56702 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56702 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56703 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56703 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56718 ( SUSE ):  5.9
    CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56718 ( SUSE ):  5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-56718 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56719 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56719 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56719 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56751 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-56751 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-56751 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56758 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56758 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56758 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56770 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56770 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-56770 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57807 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57807 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57807 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57834 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57834 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57900 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57900 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-57900 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-57900 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-57947 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57947 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-57973 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57973 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57974 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57978 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57978 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57979 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57979 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-57980 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57980 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-57981 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57981 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57986 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57990 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57993 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57996 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57996 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-57997 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57999 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58002 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58002 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-58005 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58005 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58006 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58007 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58007 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-58009 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58011 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58011 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58011 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58012 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58012 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58012 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58013 ( SUSE ):  7.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58013 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-58013 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-58014 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58014 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-58017 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58017 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-58017 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58019 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58020 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58020 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58020 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58034 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58034 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-58051 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58052 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58052 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58054 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58055 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58055 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-58056 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58057 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58058 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58058 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58061 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58063 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58069 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58069 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-58072 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58076 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58076 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58078 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58079 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58080 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58080 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58083 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58083 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-58085 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58085 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58086 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21631 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21631 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21631 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21631 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21635 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21635 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21659 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-21659 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
  * CVE-2025-21671 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21671 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-21671 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21671 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21693 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21693 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21693 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21701 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21703 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21703 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21704 ( SUSE ):  4.1
    CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-21704 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-21706 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21708 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21708 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21711 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21711 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-21711 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21714 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21714 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21718 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21718 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21718 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21723 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21723 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21726 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21726 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21726 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21727 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21727 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21731 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21731 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21732 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21733 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21734 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21735 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21735 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21736 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21736 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21738 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21738 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-21739 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21739 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21741 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21741 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-21742 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21742 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-21743 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21743 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-21744 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21744 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21744 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21745 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21745 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21749 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-21749 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-21749 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21750 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21750 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21753 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-21753 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21754 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21756 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21756 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21759 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21759 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21760 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21760 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21761 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21761 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21762 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21762 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21763 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21763 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21764 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21764 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21765 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21772 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21772 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21773 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21773 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21775 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21775 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21776 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21776 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21776 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21779 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21779 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21780 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21780 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21781 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21782 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21782 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-21782 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-21784 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21785 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21785 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21785 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21791 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21791 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21791 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21791 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21793 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21793 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21794 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21794 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-21796 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21796 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21804 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21820 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21820 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21823 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21825 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21828 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21829 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21830 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21831 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21832 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21832 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21835 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21838 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21844 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21844 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21844 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21846 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21846 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21846 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21847 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21847 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21848 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21848 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21850 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21850 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21855 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21855 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21855 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21855 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21856 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21856 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21857 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21858 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21858 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21858 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21859 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21859 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21861 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21861 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21862 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21862 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21864 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21865 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21865 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21866 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21866 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21869 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21870 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21871 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21876 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21877 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21878 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21883 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21885 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21888 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21890 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21891 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21892 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * openSUSE Leap 15.6
  * SUSE Linux Enterprise Live Patching 15-SP6
  * SUSE Linux Enterprise Real Time 15 SP6
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6
  * SUSE Real Time Module 15-SP6

  
  
An update that solves 189 vulnerabilities, contains three features and has 42
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2023-52927: netfilter: allow exp not to be removed in
    nf_ct_find_expectation (bsc#1239644).
  * CVE-2024-35910: tcp: properly terminate timers for kernel sockets
    (bsc#1224489).
  * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active
    (bsc#1227858).
  * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769).
  * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal
    msg (bsc#1235711).
  * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace
    kABI workaround (bsc#1235712).
  * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when
    receiving proposal msg (bsc#1235733).
  * CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount
    underflow (bsc#1232812).
  * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c
    (bsc#1232389).
  * CVE-2024-50140: net: sched: use RCU read-side critical section in
    taprio_dump() (bsc#1233060).
  * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
    (bsc#1233551).
  * CVE-2024-53140: netlink: terminate outstanding dump on socket close
    (bsc#1234222).
  * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in
    ip_vs_protocol_init() (bsc#1235715).
  * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock
    (bsc#1235729).
  * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area
    handling under softirq" (bsc#1235524).
  * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue
    (bsc#1235436).
  * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501).
  * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next
    hop churn (bsc#1235455).
  * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed
    (bsc#1235589).
  * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops
    (bsc#1235591).
  * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936).
  * CVE-2024-56758: btrfs: check folio mapping after unlock in
    relocate_one_folio() (bsc#1235621).
  * CVE-2024-56770: net/sched: netem: account for backlog updates from child
    qdisc (bsc#1235637).
  * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks()
    (bsc#1235973).
  * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill
    (bsc#1236333).
  * CVE-2024-57974: udp: Deal with race between UDP socket address change and
    rehash (bsc#1238532).
  * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521).
  * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit
    (bsc#1239076).
  * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during
    params (bsc#1239104).
  * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message
    queue (bsc#1238997).
  * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in
    kvm_get_vcpu() (bsc#1239036).
  * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using
    current->nsproxy (bsc#1236111).
  * CVE-2025-21659: netdev: prevent accessing NAPI instances from another
    namespace (bsc#1236206).
  * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU
    hotunplug (bsc#1237029).
  * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops
    (bsc#1237164).
  * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
    (bsc#1237313).
  * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528).
  * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494).
  * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506).
  * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted
    transaction (bsc#1237875).
  * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent
    after transaction abort (bsc#1238496).
  * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send()
    (bsc#1238738).
  * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb()
    (bsc#1238763).
  * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
    (bsc#1238775).
  * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780).
  * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify()
    (bsc#1237897).
  * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss()
    (bsc#1237906).
  * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu()
    (bsc#1238754).
  * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).
  * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer
    (bsc#1238971).
  * CVE-2025-21844: smb: client: Add check for next_buffer in
    receive_encrypted_standard() (bsc#1239512).
  * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
    (bsc#1239479).
  * CVE-2025-21856: s390/ism: add release function for struct device
    (bsc#1239486).
  * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL
    dereference (bsc#1239478).
  * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in
    migrate_device_finalize() (bsc#1239483).
  * CVE-2025-21862: drop_monitor: fix incorrect initialization order
    (bsc#1239474).
  * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we
    currently drop (bsc#1239482).
  * CVE-2025-21865: gtp: Suppress list corruption splat in
    gtp_net_exit_batch_rtnl() (bsc#1239481).
  * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH
    copiers (bsc#1240191).
  * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183).
  * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189).
  * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173).
  * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part
    (bsc#1240186).

The following non-security bugs were fixed:

  * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes).
  * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes).
  * acpi: processor: idle: Return an error if both P_LVL{2,3} idle states are
    invalid (bsc#1237530).
  * acpi: resource: IRQ override for Eluktronics MECH-17 (stable-fixes).
  * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb()
    (bsc#1239435).
  * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash
    (bsc#1239435).
  * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334).
  * alsa: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes).
  * alsa: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes).
  * alsa: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes).
  * alsa: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable-
    fixes).
  * alsa: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx
    (stable-fixes).
  * alsa: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using
    CS35L41 HDA (stable-fixes).
  * alsa: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using
    CS35L41 HDA (stable-fixes).
  * alsa: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41
    HDA (stable-fixes).
  * alsa: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41
    HDA (stable-fixes).
  * alsa: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using
    CS35L41 HDA (stable-fixes).
  * alsa: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using
    CS35L41 HDA (stable-fixes).
  * alsa: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA
    (stable-fixes).
  * alsa: hda/realtek: Add support for various HP Laptops using CS35L41 HDA
    (stable-fixes).
  * alsa: hda/realtek: Always honor no_shutup_pins (git-fixes).
  * alsa: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes).
  * alsa: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git-
    fixes).
  * alsa: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes).
  * alsa: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes).
  * alsa: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes).
  * alsa: hda/realtek: update ALC222 depop optimize (stable-fixes).
  * alsa: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git-
    fixes).
  * alsa: seq: Avoid module auto-load handling at event delivery (stable-fixes).
  * alsa: usb-audio: Add quirk for Plantronics headsets to fix control names
    (stable-fixes).
  * alsa: usb-audio: separate DJM-A9 cap lvl options (git-fixes).
  * alsa: usx2y: validate nrpacks module parameter on probe (git-fixes).
  * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes)
  * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git-
    fixes)
  * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes)
  * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git-
    fixes)
  * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git-
    fixes)
  * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes)
  * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git-
    fixes)
  * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git-
    fixes)
  * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes)
  * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes)
  * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes)
  * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git-
    fixes)
  * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git-
    fixes)
  * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git-
    fixes)
  * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git-
    fixes)
  * arm64: mm: Populate vmemmap at the page level if not section aligned (git-
    fixes)
  * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes)
  * asoc: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model
    (stable-fixes).
  * asoc: arizona/madera: use fsleep() in up/down DAPM event delays (stable-
    fixes).
  * asoc: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git-
    fixes).
  * asoc: cs35l41: check the return value from spi_setup() (git-fixes).
  * asoc: ops: Consistently treat platform_max as control value (git-fixes).
  * asoc: rt722-sdca: add missing readable registers (git-fixes).
  * asoc: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes).
  * asoc: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable-
    fixes).
  * asoc: tas2764: Fix power control mask (stable-fixes).
  * asoc: tas2764: Set the SDOUT polarity correctly (stable-fixes).
  * asoc: tas2770: Fix volume scale (stable-fixes).
  * asoc: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio
    compatible (git-fixes).
  * ata: ahci: Add mask_port_map module parameter (git-fixes).
  * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git-
    fixes).
  * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes).
  * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes).
  * ata: pata_parport: add custom version of wait_after_reset (git-fixes).
  * ata: pata_parport: fit3: implement IDE command set registers (git-fixes).
  * ata: pata_serverworks: Do not use the term blacklist (git-fixes).
  * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys()
    (git-fixes).
  * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes).
  * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes).
  * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()
    (git-fixes).
  * batman-adv: Ignore own maximum aggregation size during RX (git-fixes).
  * bitmap: introduce generic optimized bitmap_size() (git-fixes).
  * block: cleanup and fix batch completion adding conditions (git-fixes).
  * block: do not revert iter for -EIOCBQUEUED (git-fixes).
  * bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes).
  * bluetooth: hci_event: Fix connection regression between LE and non-LE
    adapters (git-fixes).
  * bluetooth: hci_event: Fix enabling passive scanning (git-fixes).
  * bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes).
  * bluetooth: Improve setsockopt() handling of malformed user input (git-
    fixes).
  * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes).
  * bpf: Fix a verifier verbose message (git-fixes).
  * bpf: prevent r10 register from being marked as precise (git-fixes).
  * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git-
    fixes).
  * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes).
  * broadcom: fix supported flag check in periodic output function (git-fixes).
  * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605).
  * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045).
  * btrfs: drop the backref cache during relocation if we commit (bsc#1239605).
  * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read
    (bsc#1239045).
  * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage
    (bsc#1239045).
  * btrfs: use a separate end_io handler for extent_buffer writing
    (bsc#1239045).
  * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes).
  * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock
    (git-fixes).
  * bus: qcom-ssc-block-bus: Fix the error handling path of
    qcom_ssc_block_bus_probe() (git-fixes).
  * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes).
  * bus: simple-pm-bus: fix forced runtime PM use (git-fixes).
  * can: flexcan: disable transceiver during system PM (git-fixes).
  * can: flexcan: only change CAN state when link up in system PM (git-fixes).
  * can: rcar_canfd: Fix page entries in the AFL list (git-fixes).
  * can: ucan: fix out of bound read in strscpy() source (git-fixes).
  * cdx: Fix possible UAF error in driver_override_show() (git-fixes).
  * char: misc: deallocate static minor in error path (git-fixes).
  * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes).
  * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes).
  * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged
    (bsc#1237856)
  * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error
    (bsc#1237856)
  * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create
    (bsc#1237856)
  * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707).
  * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856)
  * cpufreq/cppc: Move and rename (bsc#1237856)
  * cpumask: add cpumask_weight_andnot() (bsc#1239015).
  * cpumask: define cleanup function for cpumasks (bsc#1239015).
  * crypto: ccp - Fix check for the primary ASP device (git-fixes).
  * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes).
  * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes).
  * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes).
  * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes).
  * crypto: iaa - Add global_stats file and remove individual stat files
    (jsc#PED-12416).
  * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416).
  * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416).
  * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416).
  * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416).
  * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416).
  * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416).
  * crypto: iaa - Remove header table code (jsc#PED-12416).
  * crypto: iaa - Remove potential infinite loop in check_completion()
    (jsc#PED-12416).
  * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in
    iaa_crypto_debugfs_init() (jsc#PED-12416).
  * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns()
    (jsc#PED-12416).
  * crypto: iaa - remove unneeded semicolon (jsc#PED-12416).
  * crypto: iaa - Test the correct request flag (git-fixes).
  * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416).
  * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy()
    (jsc#PED-12416).
  * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes).
  * crypto: qat - add admin msgs for telemetry (jsc#PED-12416).
  * crypto: qat - add auto reset on error (jsc#PED-12416).
  * crypto: qat - add bank save and restore flows (jsc#PED-12416).
  * crypto: qat - add fatal error notification (jsc#PED-12416).
  * crypto: qat - add fatal error notify method (jsc#PED-12416).
  * crypto: qat - add heartbeat error simulator (jsc#PED-12416).
  * crypto: qat - add interface for live migration (jsc#PED-12416).
  * crypto: qat - add support for 420xx devices (jsc#PED-12416).
  * crypto: qat - add support for device telemetry (jsc#PED-12416).
  * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416).
  * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416).
  * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416).
  * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416).
  * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416).
  * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416).
  * crypto: qat - Constify struct pm_status_row (jsc#PED-12416).
  * crypto: qat - disable arbitration before reset (jsc#PED-12416).
  * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416).
  * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416).
  * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416).
  * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
    (jsc#PED-12416).
  * crypto: qat - fix comment structure (jsc#PED-12416).
  * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416).
  * crypto: qat - Fix missing destroy_workqueue in adf_init_aer()
    (jsc#PED-12416).
  * crypto: qat - fix recovery flow for VFs (jsc#PED-12416).
  * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416).
  * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416).
  * crypto: qat - Fix typo "accelaration" (jsc#PED-12416).
  * crypto: qat - Fix typo (jsc#PED-12416).
  * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416).
  * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416).
  * crypto: qat - implement interface for live migration (jsc#PED-12416).
  * crypto: qat - improve aer error reset handling (jsc#PED-12416).
  * crypto: qat - improve error message in adf_get_arbiter_mapping()
    (jsc#PED-12416).
  * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416).
  * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416).
  * crypto: qat - limit heartbeat notifications (jsc#PED-12416).
  * crypto: qat - make adf_ctl_class constant (jsc#PED-12416).
  * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416).
  * crypto: qat - move fw config related structures (jsc#PED-12416).
  * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416).
  * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416).
  * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416).
  * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416).
  * crypto: qat - relocate CSR access code (jsc#PED-12416).
  * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416).
  * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes).
  * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416).
  * crypto: qat - remove unnecessary description from comment (jsc#PED-12416).
  * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416).
  * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416).
  * crypto: qat - set parity error mask for qat_420xx (git-fixes).
  * crypto: qat - uninitialized variable in adf_hb_error_inject_write()
    (jsc#PED-12416).
  * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416).
  * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416).
  * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416).
  * crypto: qat - validate slices count returned by FW (jsc#PED-12416).
  * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416).
  * dlm: prevent NPD when writing a positive value to event_done (git-fixes).
  * dm array: fix cursor index when skipping across block boundaries (git-
    fixes).
  * dm array: fix unreleased btree blocks on closing a faulty array cursor (git-
    fixes).
  * dm init: Handle minors larger than 255 (git-fixes).
  * dm integrity: fix out-of-range warning (git-fixes).
  * dm persistent data: fix memory allocation failure (git-fixes).
  * dm resume: do not return EINVAL when signalled (git-fixes).
  * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes).
  * dm thin: Add missing destroy_work_on_stack() (git-fixes).
  * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit()
    (git-fixes).
  * dm-crypt: track tag_offset in convert_context (git-fixes).
  * dm-delay: fix hung task introduced by kthread mode (git-fixes).
  * dm-delay: fix max_delay calculations (git-fixes).
  * dm-delay: fix workqueue delay_timer race (git-fixes).
  * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes).
  * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git-
    fixes).
  * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes).
  * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes).
  * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes).
  * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t
    overflow (git-fixes).
  * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2)
    (git-fixes). mwilck: some hand editing because d95e2c34a3ca ("dm verity: Fix
    IO priority lost when reading FEC and hash") is missing
  * dm: Fix typo in error message (git-fixes).
  * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes).
  * documentation: qat: fix auto_reset attribute details (git-fixes).
  * documentation: qat: fix auto_reset section (git-fixes).
  * driver core: Remove needless return in void API device_remove_group() (git-
    fixes).
  * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes).
  * drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio()
    (git-fixes).
  * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl
    (git-fixes).
  * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes).
  * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable-
    fixes).
  * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes).
  * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes).
  * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable-
    fixes).
  * drm/amd/display: Fix HPD after gpu reset (stable-fixes).
  * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes).
  * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters()
    (git-fixes).
  * drm/amd/display: Restore correct backlight brightness after a GPU reset
    (stable-fixes).
  * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes).
  * drm/amdgpu: Check extended configuration space register when system uses
    large bar (stable-fixes).
  * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable-
    fixes).
  * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes).
  * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid
    Priority Inversion in SRIOV (git-fixes).
  * drm/amdgpu/umsch: declare umsch firmware (git-fixes).
  * drm/amdkfd: Fix Circular Locking Dependency in
    'svm_range_cpu_invalidate_pagetables' (git-fixes).
  * drm/atomic: Filter out redundant DPMS calls (stable-fixes).
  * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes).
  * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git-
    fixes).
  * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes).
  * drm/dp_mst: Fix drm RAD print (git-fixes).
  * drm/dp_mst: Fix locking when skipping CSN before topology probing (git-
    fixes).
  * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git-
    fixes).
  * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git-
    fixes).
  * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes).
  * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes).
  * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes).
  * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes).
  * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git-
    fixes).
  * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes).
  * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes).
  * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git-
    fixes).
  * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes).
  * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes).
  * drm/msm/dpu: do not use active in atomic_check() (git-fixes).
  * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git-
    fixes).
  * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git-
    fixes).
  * drm/nouveau: Do not override forced connector status (stable-fixes).
  * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes).
  * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable-
    fixes).
  * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git-
    fixes).
  * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes).
  * drm/repaper: fix integer overflows in repeat functions (git-fixes).
  * drm/sched: Fix fence reference count leak (git-fixes).
  * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes).
  * drm/ssd130x: fix ssd132x encoding (git-fixes).
  * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes).
  * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes).
  * drm/vkms: Fix use after free and double free on init error (git-fixes).
  * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes).
  * dummycon: fix default rows/cols (git-fixes).
  * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes).
  * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349).
  * fbdev: au1100fb: Move a variable assignment behind a null pointer check
    (git-fixes).
  * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
  * fbdev: sm501fb: Add some geometry checks (git-fixes).
  * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before
    comparison (git-fixes).
  * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes).
  * firmware: cs_dsp: Remove async regmap writes (git-fixes).
  * firmware: imx-scu: fix OF node leak in .probe() (git-fixes).
  * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994).
  * gpio: aggregator: protect driver attr handlers against module unload (git-
    fixes).
  * gpio: rcar: Fix missing of_node_put() call (git-fixes).
  * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes).
  * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git-
    fixes).
  * hid: apple: disable Fn key handling on the Omoton KB066 (git-fixes).
  * hid: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes).
  * hid: appleir: Fix potential NULL dereference at raw event handle (git-
    fixes).
  * hid: Enable playstation driver independently of sony driver (git-fixes).
  * hid: google: fix unused variable warning under !CONFIG_ACPI (git-fixes).
  * hid: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes).
  * hid: hid-steam: Fix use-after-free when detaching device (git-fixes).
  * hid: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend
    (stable-fixes).
  * hid: ignore non-functional sensor in HP 5MP Camera (stable-fixes).
  * hid: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable-
    fixes).
  * hid: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git-
    fixes).
  * hid: intel-ish-hid: Send clock sync message immediately after reset (stable-
    fixes).
  * hid: remove superfluous (and wrong) Makefile entry for
    CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes).
  * hid: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes).
  * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes).
  * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes).
  * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes).
  * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git-
    fixes).
  * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes).
  * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes).
  * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git-
    fixes).
  * i2c: omap: fix IRQ storms (git-fixes).
  * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes).
  * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes).
  * i3c: master: svc: Fix missing the IBI rules (git-fixes).
  * i3c: master: svc: Use readsb helper for reading MDB (git-fixes).
  * ib/mad: Check available slots before posting receive WRs (git-fixes)
  * ice: Remove and readd netdev during devlink reload (bsc#1230497
    bsc#1239518).
  * iio: accel: mma8452: Ensure error return on failure to matching oversampling
    ratio (git-fixes).
  * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim
    fails (git-fixes).
  * iio: adc: ad4130: Fix comparison of channel setups (git-fixes).
  * iio: adc: ad7124: Fix comparison of channel configs (git-fixes).
  * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes).
  * iio: dac: ad3552r: clear reset status flag (git-fixes).
  * iio: filter: admv8818: Force initialization of SDO (git-fixes).
  * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes).
  * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600).
  * init: add initramfs_internal.h (bsc#1232848).
  * initramfs: allocate heap buffers together (bsc#1232848).
  * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848).
  * input: ads7846 - fix gpiod allocation (git-fixes).
  * input: i8042 - add required quirks for missing old boardnames (stable-
    fixes).
  * input: i8042 - swap old quirk combination with new quirk for more devices
    (stable-fixes).
  * input: i8042 - swap old quirk combination with new quirk for NHxxRZQ
    (stable-fixes).
  * input: i8042 - swap old quirk combination with new quirk for several devices
    (stable-fixes).
  * input: iqs7222 - add support for Azoteq IQS7222D (git-fixes).
  * input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes).
  * input: iqs7222 - preserve system status register (git-fixes).
  * input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE
    controllers (stable-fixes).
  * input: xpad - add multiple supported devices (stable-fixes).
  * input: xpad - add support for TECNO Pocket Go (stable-fixes).
  * input: xpad - add support for ZOTAC Gaming Zone (stable-fixes).
  * input: xpad - rename QH controller to Legion Go S (stable-fixes).
  * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes).
  * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes).
  * intel_th: pci: Add Arrow Lake support (stable-fixes).
  * intel_th: pci: Add Panther Lake-H support (stable-fixes).
  * intel_th: pci: Add Panther Lake-P/U support (stable-fixes).
  * ioam6: improve checks on user data (git-fixes).
  * iommu/vt-d: Fix suspicious RCU usage (git-fixes).
  * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994).
  * ipv4: use RCU protection in inet_select_addr() (bsc#1239994).
  * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994).
  * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994).
  * ipv4: use RCU protection in rt_is_expired() (bsc#1239994).
  * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes).
  * ipv6: avoid atomic fragment on GSO packets (git-fixes).
  * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses
    (git-fixes).
  * ipv6: fib: hide unused 'pn' variable (git-fixes).
  * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes).
  * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git-
    fixes).
  * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes).
  * ipv6: fix potential NULL deref in fib6_add() (git-fixes).
  * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994).
  * ipv6: introduce dst_rt6_info() helper (git-fixes).
  * ipv6: ioam: block BH from ioam6_output() (git-fixes).
  * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes).
  * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes).
  * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git-
    fixes).
  * ipv6: sr: add missing seg6_local_exit (git-fixes).
  * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes).
  * ipv6: take care of scope when choosing the src addr (git-fixes).
  * ipv6: Use RCU in ip6_input() (bsc#1239994).
  * jfs: add check read-only before truncation in jfs_truncate_nolock() (git-
    fixes).
  * jfs: add check read-only before txBeginAnon() call (git-fixes).
  * jfs: add index corruption check to DT_GETPAGE() (git-fixes).
  * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes).
  * jfs: reject on-disk inodes of an unsupported type (git-fixes).
  * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes).
  * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in
    RTM_NEWPREFIX (git-fixes).
  * kABI fix for netlink: terminate outstanding dump on socket close (git-
    fixes).
  * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes)
  * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes).
  * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes).
  * kABI workaround for intel-ish-hid (git-fixes).
  * kABI workaround for soc_mixer_control changes (git-fixes).
  * kbuild: hdrcheck: fix cross build with clang (git-fixes).
  * kunit: qemu_configs: sparc: use Zilog console (git-fixes).
  * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes).
  * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt()
    function (git-fixes).
  * l2tp: fix lockdep splat (git-fixes).
  * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git-
    fixes).
  * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git-
    fixes).
  * lib: 842: Improve error handling in sw842_compress() (git-fixes).
  * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*()
    (git-fixes).
  * mdacon: rework dependency list (git-fixes).
  * media: i2c: adv748x: Fix test pattern selection mask (git-fixes).
  * media: i2c: ccs: Set the device's runtime PM status correctly in remove
    (git-fixes).
  * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO
    (git-fixes).
  * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes).
  * media: platform: allgro-dvt: unregister v4l2_device on the error path (git-
    fixes).
  * media: platform: stm32: Add check for clk_enable() (git-fixes).
  * media: siano: Fix error handling in smsdvb_module_init() (git-fixes).
  * media: streamzap: fix race between device disconnection and urb callback
    (git-fixes).
  * media: streamzap: prevent processing IR data on URB failure (git-fixes).
  * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git-
    fixes).
  * media: venus: hfi_parser: add check to avoid out of bound access (git-
    fixes).
  * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes).
  * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes).
  * media: venus: hfi: add check to handle incorrect queue size (git-fixes).
  * media: verisilicon: HEVC: Initialize start_bit field (git-fixes).
  * media: vim2m: print device name after registering device (git-fixes).
  * media: visl: Fix ERANGE error when setting enum controls (git-fixes).
  * mei: me: add panther lake P DID (stable-fixes).
  * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). Fix
    tools/ build breakage introduced by suse commit 3d6cb93162fd "bitmap:
    introduce generic optimized bitmap_size() (git-fixes)"
  * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes).
  * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
    (git-fixes).
  * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes).
  * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes).
  * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes).
  * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes).
  * mfd: syscon: Remove extern from function prototypes (stable-fixes).
  * mfd: syscon: Use scoped variables with memory allocators to simplify error
    paths (stable-fixes).
  * mm: accept to promo watermark (bsc#1239600).
  * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600).
  * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600).
  * mm: zswap: move allocations during CPU init outside the lock (git-fixes).
  * mm/page_alloc: fix memory accept before watermarks gets initialized
    (bsc#1239600).
  * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes).
  * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes).
  * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes).
  * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes).
  * Move upstreamed nfsd and sunrpc patches into sorted section
  * Move upstreamed PCI and initramfs patches into sorted section
  * Move upstreamed powerpc and SCSI patches into sorted section
  * mtd: Add check for devm_kcalloc() (git-fixes).
  * mtd: nand: Fix a kdoc comment (git-fixes).
  * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes).
  * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes).
  * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994).
  * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994).
  * net l2tp: drop flow hash on forward (git-fixes).
  * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes).
  * net_sched: sch_sfq: annotate data-races around q->perturb_period (git-
    fixes).
  * net_sched: sch_sfq: handle bigger packets (git-fixes).
  * net: add dev_net_rcu() helper (bsc#1239994).
  * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes).
  * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes).
  * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes).
  * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes).
  * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes).
  * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes).
  * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git-
    fixes).
  * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes).
  * net: ipv6: ioam6: code alignment (git-fixes).
  * net: ipv6: ioam6: new feature tunsrc (git-fixes).
  * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git-
    fixes).
  * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes).
  * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes).
  * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes).
  * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes).
  * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX
    (git-fixes).
  * net: mana: add a function to spread IRQs per CPUs (bsc#1239015).
  * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
  * net: mana: Allow variable size indirection table (bsc#1239016).
  * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015).
  * net: mana: Avoid open coded arithmetic (bsc#1239016).
  * net: mana: cleanup mana struct after debugfs_remove() (git-fixes).
  * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015).
  * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015).
  * net: mana: Support holes in device list reply msg (git-fixes).
  * net: usb: usbnet: restore usb%d name exception for local mac addresses
    (bsc#1234480).
  * net: use unrcu_pointer() helper (git-fixes).
  * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable-
    fixes).
  * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions
    created by classifiers (git-fixes).
  * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes).
  * net/sched: adjust device watchdog timer to detect stopped queue at right
    time (git-fixes).
  * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes).
  * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes).
  * net/sched: flower: Add lock protection when remove filter handle (git-
    fixes).
  * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry()
    (git-fixes).
  * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes).
  * nfsd: clear acl_access/acl_default after releasing them (git-fixes).
  * nvme-fc: do not ignore connectivity loss during connecting (git-fixes
    bsc#1222649).
  * nvme-fc: go straight to connecting state when initializing (git-fixes
    bsc#1222649).
  * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes
    bsc#1222649).
  * nvme-ioctl: fix leaked requests on mapping error (git-fixes).
  * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes).
  * nvme-pci: remove stale comment (git-fixes).
  * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes).
  * nvme-tcp: Fix a C2HTermReq error message (git-fixes).
  * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git-
    fixes).
  * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes).
  * nvme: introduce nvme_disk_is_ns_head helper (git-fixes).
  * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git-
    fixes).
  * nvme: move passthrough logging attribute to head (git-fixes).
  * nvme: only allow entering LIVE from CONNECTING state (git-fixes
    bsc#1222649).
  * nvmet-fc: Remove unused functions (git-fixes).
  * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git-
    fixes).
  * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch
    (git-fixes).
  * nvmet: remove old function prototype (git-fixes).
  * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes).
  * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes).
  * ocfs2: handle a symlink read error correctly (git-fixes).
  * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot
    (git-fixes).
  * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes).
  * orangefs: fix a oob in orangefs_debug_write (git-fixes).
  * packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).
  * packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).
  * padata: fix sysfs store callback check (git-fixes).
  * partitions: mac: fix handling of bogus partition table (git-fixes).
  * pci: Avoid reset when disabled via sysfs (git-fixes).
  * pci: brcmstb: Fix error path after a call to regulator_bulk_get() (git-
    fixes).
  * pci: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes).
  * pci: brcmstb: Fix potential premature regulator disabling (git-fixes).
  * pci: brcmstb: Set generation limit before PCIe link up (git-fixes).
  * pci: brcmstb: Use internal register to change link capability (git-fixes).
  * pci: cadence-ep: Fix the driver to send MSG TLP for INTx without data
    payload (git-fixes).
  * pci: dwc: ep: Return -ENOMEM for allocation failures (git-fixes).
  * pci: Fix reference leak in pci_alloc_child_bus() (git-fixes).
  * pci: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes).
  * pci: Remove stray put_device() in pci_register_host_bridge() (git-fixes).
  * pci: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes).
  * pci/acs: Fix 'pci=config_acs=' parameter (git-fixes).
  * pci/aspm: Fix link state exit during switch upstream function removal (git-
    fixes).
  * pci/doe: Poll DOE Busy bit for up to 1 second in pci_doe_send_req()
    (bsc#1237853)
  * pci/doe: Support discovery version 2 (bsc#1237853)
  * pci/portdrv: Only disable pciehp interrupts early when needed (git-fixes).
  * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes).
  * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm()
    (git-fixes).
  * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git-
    fixes).
  * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes).
  * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes).
  * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes).
  * platform/x86: dell-ddv: Fix temperature calculation (git-fixes).
  * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable-
    fixes).
  * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e
    (stable-fixes).
  * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable-
    fixes).
  * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable-
    fixes).
  * pm: sleep: Adjust check before setting power.must_resume (git-fixes).
  * pm: sleep: Fix handling devices with direct_complete set on errors (git-
    fixes).
  * pnfs/flexfiles: retry getting layout segment for reads (git-fixes).
  * power: supply: max77693: Fix wrong conversion of charge input threshold
    value (git-fixes).
  * powerpc: Stop using no_llseek (bsc#1239573).
  * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573).
  * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS
    block (bsc#1239573).
  * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory
    (bsc#1239167 ltc#211055).
  * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes).
  * rapidio: fix an API misues when rio_add_net() fails (git-fixes).
  * ras: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
  * rdma/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes)
  * rdma/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes)
  * rdma/core: Do not expose hw_counters outside of init net namespace (git-
    fixes)
  * rdma/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes)
  * rdma/hns: Fix a missing rollback in error path of
    hns_roce_create_qp_common() (git-fixes)
  * rdma/hns: Fix missing xa_destroy() (git-fixes)
  * rdma/hns: Fix soft lockup during bt pages loop (git-fixes)
  * rdma/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git-
    fixes)
  * rdma/hns: Fix wrong value of max_sge_rd (git-fixes)
  * rdma/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
  * rdma/mlx5: Fix cache entry update on dereg error (git-fixes)
  * rdma/mlx5: Fix calculation of total invalidated pages (git-fixes)
  * rdma/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes)
  * rdma/mlx5: Fix MR cache initialization error flow (git-fixes)
  * rdma/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes)
  * rdma/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex()
    tests (git-fixes)
  * Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948).
  * regulator: check that dummy regulator has been probed before using it
    (stable-fixes).
  * regulator: core: Fix deadlock in create_regulator() (git-fixes).
  * regulator: dummy: force synchronous probing (git-fixes).
  * Revert "dm: requeue IO if mapping table not yet available" (git-fixes).
  * Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection"
    (git-fixes).
  * Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()"
    (stable-fixes).
  * Revert "wifi: ath11k: restore country code during resume" (bsc#1207948).
  * Revert "wifi: ath11k: support hibernation" (bsc#1207948).
  * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes).
  * rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf
    (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined
    with suse_version check.
  * rpm/release-projects: Update the ALP projects again (bsc#1231293).
  * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes
    bsc#1239594).
  * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595).
  * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743).
  * selftests: mptcp: close fd_in before returning in main_loop (git-fixes).
  * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes).
  * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes).
  * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes).
  * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes).
  * selftests/bpf: Prevent client connect before server bind in
    test_tc_tunnel.sh (git-fixes).
  * selftests/mm/cow: fix the incorrect error handling (git-fixes).
  * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of
    ARRAY_SIZE() (git-fixes).
  * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416).
  * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git-
    fixes).
  * smb: client: destroy cfid_put_wq on module exit (git-fixes).
  * soc: imx8m: Remove global soc_uid (stable-fixes).
  * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes).
  * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes).
  * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes).
  * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes).
  * soc: qcom: pdr: Fix the potential deadlock (git-fixes).
  * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe()
    (git-fixes).
  * soundwire: slave: fix an OF node reference leak in soundwire slave device
    (git-fixes).
  * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes).
  * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes).
  * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes).
  * splice: do not checksum AF_UNIX sockets (bsc#1240333).
  * sunrpc: convert RPC_TASK_* constants to enum (git-fixes).
  * sunrpc: Handle -ETIMEDOUT return from tlshd (git-fixes).
  * sunrpc: Prevent looping due to rpc_signal_task() races (git-fixes).
  * sunrpc: suppress warnings for unused procfs functions (git-fixes).
  * supported.conf: add now-included qat_420xx (external, intel)
  * tcp: Add memory barrier to tcp_push() (git-fixes).
  * tcp: add tcp_done_with_error() helper (git-fixes).
  * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git-
    fixes).
  * tcp: adjust rcvq_space after updating scaling ratio (git-fixes).
  * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes).
  * tcp: annotate data-races around tp->window_clamp (git-fixes).
  * tcp: avoid premature drops in tcp_add_backlog() (git-fixes).
  * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process
    (git-fixes).
  * tcp: check mptcp-level constraints for backlog coalescing (git-fixes).
  * tcp: check space before adding MPTCP SYN options (git-fixes).
  * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes).
  * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes).
  * tcp: Defer ts_recent changes until req is owned (git-fixes).
  * tcp: define initial scaling factor value as a macro (git-fixes).
  * tcp: derive delack_max from rto_min (git-fixes).
  * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes).
  * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non-
    wildcard addresses (git-fixes).
  * tcp: fix cookie_init_timestamp() overflows (git-fixes).
  * tcp: fix forever orphan socket caused by tcp_abort (git-fixes).
  * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function
    (git-fixes).
  * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes).
  * tcp: fix mid stream window clamp (git-fixes).
  * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes).
  * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes).
  * tcp: fix race in tcp_write_err() (git-fixes).
  * tcp: fix races in tcp_abort() (git-fixes).
  * tcp: fix races in tcp_v_err() (git-fixes).
  * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git-
    fixes).
  * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git-
    fixes).
  * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git-
    fixes).
  * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes).
  * tcp: increase the default TCP scaling ratio (git-fixes).
  * tcp: introduce tcp_clock_ms() (git-fixes).
  * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes).
  * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes).
  * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes).
  * tcp: replace tcp_time_stamp_raw() (git-fixes).
  * tcp: Update window clamping condition (git-fixes).
  * thermal: int340x: Add NULL check for adev (git-fixes).
  * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes).
  * tools: move alignment-related macros to new <linux/align.h> (git-fixes).
    Fix tools/ build breakage introduced by suse commit 3d6cb93162fd "bitmap:
    introduce generic optimized bitmap_size() (git-fixes)"
  * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind
    (git-fixes).
  * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes).
  * tpm: do not start chip while suspended (git-fixes).
  * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870).
  * ubi: Add a check for ubi_num (git-fixes).
  * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes).
  * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes).
  * ubi: correct the calculation of fastmap size (stable-fixes).
  * ubi: eba: properly rollback inside self_check_eba (git-fixes).
  * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block
    (git-fixes).
  * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists
    (git-fixes).
  * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git-
    fixes).
  * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git-
    fixes).
  * upstream: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open()
    (git-fixes).
  * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes).
  * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes).
  * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes).
  * usb: gadget: Fix setting self-powered state on suspend (git-fixes).
  * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git-
    fixes).
  * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git-
    fixes).
  * usb: hub: lack of clearing xHC resources (git-fixes).
  * usb: phy: generic: Use proper helper for property detection (stable-fixes).
  * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader
    (stable-fixes).
  * usb: renesas_usbhs: Call clk_put() (git-fixes).
  * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes).
  * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes).
  * usb: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes).
  * usb: serial: option: add Telit Cinterion FE990B compositions (stable-fixes).
  * usb: serial: option: fix Telit Cinterion FE990A name (stable-fixes).
  * usb: serial: option: match on interface class for Telit FN990B (stable-
    fixes).
  * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality
    (git-fixes).
  * usb: typec: ucsi: Fix NULL pointer access (git-fixes).
  * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes).
  * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes).
  * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes).
  * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes).
  * vboxsf: fix building with GCC 15 (stable-fixes).
  * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git-
    fixes).
  * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948).
  * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in
    error path (git-fixes).
  * wifi: ath11k: determine PM policy based on machine model (bsc#1207948).
  * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git-
    fixes).
  * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git-
    fixes).
  * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948).
  * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948).
  * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948).
  * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in
    error path (git-fixes).
  * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes).
  * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes).
  * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes).
  * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes).
  * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes).
  * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes).
  * wifi: mt76: Add check for devm_kstrdup() (git-fixes).
  * wifi: mt76: mt7915: fix possible integer overflows in
    mt7915_muru_stats_show() (git-fixes).
  * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes).
  * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes).
  * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes).
  * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes).
  * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git-
    fixes).
  * wifi: rtw89: fw: correct debug message format in
    rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes).
  * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes).
  * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes).
  * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes).
  * x86/boot/32: De-uglify the 2/3 level paging difference in
    mk_early_pgtbl_32() (git-fixes).
  * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32()
    (git-fixes).
  * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes).
  * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes).
  * x86/coco: Replace 'static const cc_mask' with the newly introduced
    cc_get_mask() function (git-fixes).
  * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git-
    fixes).
  * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers
    (git-fixes).
  * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes).
  * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes).
  * x86/hyperv: Fix output argument to hypercall that changes page visibility
    (git-fixes).
  * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes).
  * x86/idle: Disable IBRS when CPU is offline to improve single-threaded
    performance (git-fixes).
  * x86/microcode: Add per CPU control field (git-fixes).
  * x86/microcode: Add per CPU result state (git-fixes).
  * x86/microcode: Clarify the late load logic (git-fixes).
  * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes).
  * x86/microcode: Get rid of the schedule work indirection (git-fixes).
  * x86/microcode: Handle "nosmt" correctly (git-fixes).
  * x86/microcode: Handle "offline" CPUs correctly (git-fixes).
  * x86/microcode: Hide the config knob (git-fixes).
  * x86/microcode: Include vendor headers into microcode.h (git-fixes).
  * x86/microcode: Make reload_early_microcode() static (git-fixes).
  * x86/microcode: Mop up early loading leftovers (git-fixes).
  * x86/microcode: Move core specific defines to local header (git-fixes).
  * x86/microcode: Prepare for minimal revision check (git-fixes).
  * x86/microcode: Protect against instrumentation (git-fixes).
  * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes).
  * x86/microcode: Provide new control functions (git-fixes).
  * x86/microcode: Remove microcode_mutex (git-fixes).
  * x86/microcode: Remove pointless apply() invocation (git-fixes).
  * x86/microcode: Rendezvous and load in NMI (git-fixes).
  * x86/microcode: Replace the all-in-one rendevous handler (git-fixes).
  * x86/microcode: Sanitize __wait_for_cpus() (git-fixes).
  * x86/microcode/32: Move early loading after paging enable (git-fixes).
  * x86/microcode/amd: Cache builtin microcode too (git-fixes).
  * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes).
  * x86/microcode/amd: Use cached microcode for AP load (git-fixes).
  * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes).
  * x86/microcode/intel: Add a minimum required revision for late loading (git-
    fixes).
  * x86/microcode/intel: Cleanup code further (git-fixes).
  * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git-
    fixes).
  * x86/microcode/intel: Remove debug code (git-fixes).
  * x86/microcode/intel: Remove pointless mutex (git-fixes).
  * x86/microcode/intel: Rename get_datasize() since its used externally (git-
    fixes).
  * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes).
  * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes).
  * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes).
  * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git-
    fixes).
  * x86/microcode/intel: Save the microcode only after a successful late-load
    (git-fixes).
  * x86/microcode/intel: Simplify and rename generic_load_microcode() (git-
    fixes).
  * x86/microcode/intel: Simplify early loading (git-fixes).
  * x86/microcode/intel: Simplify scan_microcode() (git-fixes).
  * x86/microcode/intel: Switch to kvmalloc() (git-fixes).
  * x86/microcode/intel: Unify microcode apply() functions (git-fixes).
  * x86/mm: Remove unused microcode.h include (git-fixes).
  * x86/platform/olpc: Remove unused variable 'len' in
    olpc_dt_compatible_match() (git-fixes).
  * x86/speculation: Add __update_spec_ctrl() helper (git-fixes).
  * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s
    description (git-fixes).
  * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes).
  * xhci: Cleanup Candence controller PCI device and vendor ID usage (git-
    fixes).
  * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701).
  * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701).
  * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes).
  * xhci: dbc: Convert to use sysfs_streq() (git-fixes).
  * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes).
  * xhci: dbc: Fix STALL transfer event handling (git-fixes).
  * xhci: dbc: Replace custom return value with proper Linux error code (git-
    fixes).
  * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes).
  * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes).
  * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701).
  * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701).
  * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes).
  * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes).
  * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes).
  * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes).
  * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes).
  * xhci: pci: Use standard pattern for device IDs (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.6  
    zypper in -t patch openSUSE-SLE-15.6-2025-1178=1

  * SUSE Linux Enterprise Live Patching 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1178=1

  * SUSE Real Time Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2025-1178=1

## Package List:

  * openSUSE Leap 15.6 (x86_64)
    * kernel-rt-devel-debuginfo-6.4.0-150600.10.34.1
    * kernel-rt-vdso-6.4.0-150600.10.34.1
    * kernel-rt-devel-6.4.0-150600.10.34.1
    * kernel-rt-extra-6.4.0-150600.10.34.1
    * kernel-rt_debug-vdso-6.4.0-150600.10.34.1
    * kernel-rt-optional-6.4.0-150600.10.34.1
    * kernel-rt_debug-debuginfo-6.4.0-150600.10.34.1
    * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1
    * kernel-rt-extra-debuginfo-6.4.0-150600.10.34.1
    * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.34.1
    * cluster-md-kmp-rt-6.4.0-150600.10.34.1
    * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1
    * reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.34.1
    * kernel-rt-vdso-debuginfo-6.4.0-150600.10.34.1
    * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.34.1
    * dlm-kmp-rt-6.4.0-150600.10.34.1
    * kernel-rt-optional-debuginfo-6.4.0-150600.10.34.1
    * dlm-kmp-rt-debuginfo-6.4.0-150600.10.34.1
    * kselftests-kmp-rt-debuginfo-6.4.0-150600.10.34.1
    * kernel-rt-debuginfo-6.4.0-150600.10.34.1
    * kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.34.1
    * kernel-rt-livepatch-devel-6.4.0-150600.10.34.1
    * kernel-syms-rt-6.4.0-150600.10.34.1
    * kselftests-kmp-rt-6.4.0-150600.10.34.1
    * kernel-rt-debugsource-6.4.0-150600.10.34.1
    * gfs2-kmp-rt-6.4.0-150600.10.34.1
    * kernel-rt_debug-debugsource-6.4.0-150600.10.34.1
    * reiserfs-kmp-rt-6.4.0-150600.10.34.1
    * ocfs2-kmp-rt-6.4.0-150600.10.34.1
    * kernel-rt_debug-devel-6.4.0-150600.10.34.1
  * openSUSE Leap 15.6 (noarch)
    * kernel-devel-rt-6.4.0-150600.10.34.1
    * kernel-source-rt-6.4.0-150600.10.34.1
  * openSUSE Leap 15.6 (nosrc x86_64)
    * kernel-rt_debug-6.4.0-150600.10.34.1
    * kernel-rt-6.4.0-150600.10.34.1
  * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
    * kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource-1-150600.1.5.1
    * kernel-livepatch-6_4_0-150600_10_34-rt-1-150600.1.5.1
    * kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo-1-150600.1.5.1
  * SUSE Real Time Module 15-SP6 (x86_64)
    * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.34.1
    * cluster-md-kmp-rt-6.4.0-150600.10.34.1
    * kernel-rt-debuginfo-6.4.0-150600.10.34.1
    * kernel-rt-devel-debuginfo-6.4.0-150600.10.34.1
    * gfs2-kmp-rt-6.4.0-150600.10.34.1
    * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1
    * kernel-rt_debug-devel-6.4.0-150600.10.34.1
    * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1
    * kernel-rt_debug-debugsource-6.4.0-150600.10.34.1
    * ocfs2-kmp-rt-6.4.0-150600.10.34.1
    * kernel-rt-devel-6.4.0-150600.10.34.1
    * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.34.1
    * kernel-syms-rt-6.4.0-150600.10.34.1
    * dlm-kmp-rt-6.4.0-150600.10.34.1
    * kernel-rt-debugsource-6.4.0-150600.10.34.1
    * kernel-rt_debug-debuginfo-6.4.0-150600.10.34.1
    * dlm-kmp-rt-debuginfo-6.4.0-150600.10.34.1
  * SUSE Real Time Module 15-SP6 (noarch)
    * kernel-devel-rt-6.4.0-150600.10.34.1
    * kernel-source-rt-6.4.0-150600.10.34.1
  * SUSE Real Time Module 15-SP6 (nosrc x86_64)
    * kernel-rt_debug-6.4.0-150600.10.34.1
    * kernel-rt-6.4.0-150600.10.34.1

## References:

  * https://www.suse.com/security/cve/CVE-2023-52831.html
  * https://www.suse.com/security/cve/CVE-2023-52926.html
  * https://www.suse.com/security/cve/CVE-2023-52927.html
  * https://www.suse.com/security/cve/CVE-2024-26634.html
  * https://www.suse.com/security/cve/CVE-2024-26873.html
  * https://www.suse.com/security/cve/CVE-2024-35826.html
  * https://www.suse.com/security/cve/CVE-2024-35910.html
  * https://www.suse.com/security/cve/CVE-2024-38606.html
  * https://www.suse.com/security/cve/CVE-2024-41005.html
  * https://www.suse.com/security/cve/CVE-2024-41077.html
  * https://www.suse.com/security/cve/CVE-2024-41149.html
  * https://www.suse.com/security/cve/CVE-2024-42307.html
  * https://www.suse.com/security/cve/CVE-2024-43820.html
  * https://www.suse.com/security/cve/CVE-2024-46736.html
  * https://www.suse.com/security/cve/CVE-2024-46782.html
  * https://www.suse.com/security/cve/CVE-2024-46796.html
  * https://www.suse.com/security/cve/CVE-2024-47408.html
  * https://www.suse.com/security/cve/CVE-2024-47794.html
  * https://www.suse.com/security/cve/CVE-2024-49571.html
  * https://www.suse.com/security/cve/CVE-2024-49924.html
  * https://www.suse.com/security/cve/CVE-2024-49940.html
  * https://www.suse.com/security/cve/CVE-2024-49994.html
  * https://www.suse.com/security/cve/CVE-2024-50056.html
  * https://www.suse.com/security/cve/CVE-2024-50126.html
  * https://www.suse.com/security/cve/CVE-2024-50140.html
  * https://www.suse.com/security/cve/CVE-2024-50152.html
  * https://www.suse.com/security/cve/CVE-2024-50290.html
  * https://www.suse.com/security/cve/CVE-2024-52559.html
  * https://www.suse.com/security/cve/CVE-2024-53057.html
  * https://www.suse.com/security/cve/CVE-2024-53063.html
  * https://www.suse.com/security/cve/CVE-2024-53140.html
  * https://www.suse.com/security/cve/CVE-2024-53163.html
  * https://www.suse.com/security/cve/CVE-2024-53680.html
  * https://www.suse.com/security/cve/CVE-2024-54683.html
  * https://www.suse.com/security/cve/CVE-2024-56638.html
  * https://www.suse.com/security/cve/CVE-2024-56640.html
  * https://www.suse.com/security/cve/CVE-2024-56702.html
  * https://www.suse.com/security/cve/CVE-2024-56703.html
  * https://www.suse.com/security/cve/CVE-2024-56718.html
  * https://www.suse.com/security/cve/CVE-2024-56719.html
  * https://www.suse.com/security/cve/CVE-2024-56751.html
  * https://www.suse.com/security/cve/CVE-2024-56758.html
  * https://www.suse.com/security/cve/CVE-2024-56770.html
  * https://www.suse.com/security/cve/CVE-2024-57807.html
  * https://www.suse.com/security/cve/CVE-2024-57834.html
  * https://www.suse.com/security/cve/CVE-2024-57900.html
  * https://www.suse.com/security/cve/CVE-2024-57947.html
  * https://www.suse.com/security/cve/CVE-2024-57973.html
  * https://www.suse.com/security/cve/CVE-2024-57974.html
  * https://www.suse.com/security/cve/CVE-2024-57978.html
  * https://www.suse.com/security/cve/CVE-2024-57979.html
  * https://www.suse.com/security/cve/CVE-2024-57980.html
  * https://www.suse.com/security/cve/CVE-2024-57981.html
  * https://www.suse.com/security/cve/CVE-2024-57986.html
  * https://www.suse.com/security/cve/CVE-2024-57990.html
  * https://www.suse.com/security/cve/CVE-2024-57993.html
  * https://www.suse.com/security/cve/CVE-2024-57996.html
  * https://www.suse.com/security/cve/CVE-2024-57997.html
  * https://www.suse.com/security/cve/CVE-2024-57999.html
  * https://www.suse.com/security/cve/CVE-2024-58002.html
  * https://www.suse.com/security/cve/CVE-2024-58005.html
  * https://www.suse.com/security/cve/CVE-2024-58006.html
  * https://www.suse.com/security/cve/CVE-2024-58007.html
  * https://www.suse.com/security/cve/CVE-2024-58009.html
  * https://www.suse.com/security/cve/CVE-2024-58011.html
  * https://www.suse.com/security/cve/CVE-2024-58012.html
  * https://www.suse.com/security/cve/CVE-2024-58013.html
  * https://www.suse.com/security/cve/CVE-2024-58014.html
  * https://www.suse.com/security/cve/CVE-2024-58017.html
  * https://www.suse.com/security/cve/CVE-2024-58019.html
  * https://www.suse.com/security/cve/CVE-2024-58020.html
  * https://www.suse.com/security/cve/CVE-2024-58034.html
  * https://www.suse.com/security/cve/CVE-2024-58051.html
  * https://www.suse.com/security/cve/CVE-2024-58052.html
  * https://www.suse.com/security/cve/CVE-2024-58054.html
  * https://www.suse.com/security/cve/CVE-2024-58055.html
  * https://www.suse.com/security/cve/CVE-2024-58056.html
  * https://www.suse.com/security/cve/CVE-2024-58057.html
  * https://www.suse.com/security/cve/CVE-2024-58058.html
  * https://www.suse.com/security/cve/CVE-2024-58061.html
  * https://www.suse.com/security/cve/CVE-2024-58063.html
  * https://www.suse.com/security/cve/CVE-2024-58069.html
  * https://www.suse.com/security/cve/CVE-2024-58072.html
  * https://www.suse.com/security/cve/CVE-2024-58076.html
  * https://www.suse.com/security/cve/CVE-2024-58078.html
  * https://www.suse.com/security/cve/CVE-2024-58079.html
  * https://www.suse.com/security/cve/CVE-2024-58080.html
  * https://www.suse.com/security/cve/CVE-2024-58083.html
  * https://www.suse.com/security/cve/CVE-2024-58085.html
  * https://www.suse.com/security/cve/CVE-2024-58086.html
  * https://www.suse.com/security/cve/CVE-2025-21631.html
  * https://www.suse.com/security/cve/CVE-2025-21635.html
  * https://www.suse.com/security/cve/CVE-2025-21659.html
  * https://www.suse.com/security/cve/CVE-2025-21671.html
  * https://www.suse.com/security/cve/CVE-2025-21693.html
  * https://www.suse.com/security/cve/CVE-2025-21701.html
  * https://www.suse.com/security/cve/CVE-2025-21703.html
  * https://www.suse.com/security/cve/CVE-2025-21704.html
  * https://www.suse.com/security/cve/CVE-2025-21706.html
  * https://www.suse.com/security/cve/CVE-2025-21708.html
  * https://www.suse.com/security/cve/CVE-2025-21711.html
  * https://www.suse.com/security/cve/CVE-2025-21714.html
  * https://www.suse.com/security/cve/CVE-2025-21718.html
  * https://www.suse.com/security/cve/CVE-2025-21723.html
  * https://www.suse.com/security/cve/CVE-2025-21726.html
  * https://www.suse.com/security/cve/CVE-2025-21727.html
  * https://www.suse.com/security/cve/CVE-2025-21731.html
  * https://www.suse.com/security/cve/CVE-2025-21732.html
  * https://www.suse.com/security/cve/CVE-2025-21733.html
  * https://www.suse.com/security/cve/CVE-2025-21734.html
  * https://www.suse.com/security/cve/CVE-2025-21735.html
  * https://www.suse.com/security/cve/CVE-2025-21736.html
  * https://www.suse.com/security/cve/CVE-2025-21738.html
  * https://www.suse.com/security/cve/CVE-2025-21739.html
  * https://www.suse.com/security/cve/CVE-2025-21741.html
  * https://www.suse.com/security/cve/CVE-2025-21742.html
  * https://www.suse.com/security/cve/CVE-2025-21743.html
  * https://www.suse.com/security/cve/CVE-2025-21744.html
  * https://www.suse.com/security/cve/CVE-2025-21745.html
  * https://www.suse.com/security/cve/CVE-2025-21749.html
  * https://www.suse.com/security/cve/CVE-2025-21750.html
  * https://www.suse.com/security/cve/CVE-2025-21753.html
  * https://www.suse.com/security/cve/CVE-2025-21754.html
  * https://www.suse.com/security/cve/CVE-2025-21756.html
  * https://www.suse.com/security/cve/CVE-2025-21759.html
  * https://www.suse.com/security/cve/CVE-2025-21760.html
  * https://www.suse.com/security/cve/CVE-2025-21761.html
  * https://www.suse.com/security/cve/CVE-2025-21762.html
  * https://www.suse.com/security/cve/CVE-2025-21763.html
  * https://www.suse.com/security/cve/CVE-2025-21764.html
  * https://www.suse.com/security/cve/CVE-2025-21765.html
  * https://www.suse.com/security/cve/CVE-2025-21766.html
  * https://www.suse.com/security/cve/CVE-2025-21772.html
  * https://www.suse.com/security/cve/CVE-2025-21773.html
  * https://www.suse.com/security/cve/CVE-2025-21775.html
  * https://www.suse.com/security/cve/CVE-2025-21776.html
  * https://www.suse.com/security/cve/CVE-2025-21779.html
  * https://www.suse.com/security/cve/CVE-2025-21780.html
  * https://www.suse.com/security/cve/CVE-2025-21781.html
  * https://www.suse.com/security/cve/CVE-2025-21782.html
  * https://www.suse.com/security/cve/CVE-2025-21784.html
  * https://www.suse.com/security/cve/CVE-2025-21785.html
  * https://www.suse.com/security/cve/CVE-2025-21791.html
  * https://www.suse.com/security/cve/CVE-2025-21793.html
  * https://www.suse.com/security/cve/CVE-2025-21794.html
  * https://www.suse.com/security/cve/CVE-2025-21796.html
  * https://www.suse.com/security/cve/CVE-2025-21804.html
  * https://www.suse.com/security/cve/CVE-2025-21810.html
  * https://www.suse.com/security/cve/CVE-2025-21815.html
  * https://www.suse.com/security/cve/CVE-2025-21819.html
  * https://www.suse.com/security/cve/CVE-2025-21820.html
  * https://www.suse.com/security/cve/CVE-2025-21821.html
  * https://www.suse.com/security/cve/CVE-2025-21823.html
  * https://www.suse.com/security/cve/CVE-2025-21825.html
  * https://www.suse.com/security/cve/CVE-2025-21828.html
  * https://www.suse.com/security/cve/CVE-2025-21829.html
  * https://www.suse.com/security/cve/CVE-2025-21830.html
  * https://www.suse.com/security/cve/CVE-2025-21831.html
  * https://www.suse.com/security/cve/CVE-2025-21832.html
  * https://www.suse.com/security/cve/CVE-2025-21835.html
  * https://www.suse.com/security/cve/CVE-2025-21838.html
  * https://www.suse.com/security/cve/CVE-2025-21844.html
  * https://www.suse.com/security/cve/CVE-2025-21846.html
  * https://www.suse.com/security/cve/CVE-2025-21847.html
  * https://www.suse.com/security/cve/CVE-2025-21848.html
  * https://www.suse.com/security/cve/CVE-2025-21850.html
  * https://www.suse.com/security/cve/CVE-2025-21855.html
  * https://www.suse.com/security/cve/CVE-2025-21856.html
  * https://www.suse.com/security/cve/CVE-2025-21857.html
  * https://www.suse.com/security/cve/CVE-2025-21858.html
  * https://www.suse.com/security/cve/CVE-2025-21859.html
  * https://www.suse.com/security/cve/CVE-2025-21861.html
  * https://www.suse.com/security/cve/CVE-2025-21862.html
  * https://www.suse.com/security/cve/CVE-2025-21864.html
  * https://www.suse.com/security/cve/CVE-2025-21865.html
  * https://www.suse.com/security/cve/CVE-2025-21866.html
  * https://www.suse.com/security/cve/CVE-2025-21869.html
  * https://www.suse.com/security/cve/CVE-2025-21870.html
  * https://www.suse.com/security/cve/CVE-2025-21871.html
  * https://www.suse.com/security/cve/CVE-2025-21876.html
  * https://www.suse.com/security/cve/CVE-2025-21877.html
  * https://www.suse.com/security/cve/CVE-2025-21878.html
  * https://www.suse.com/security/cve/CVE-2025-21883.html
  * https://www.suse.com/security/cve/CVE-2025-21885.html
  * https://www.suse.com/security/cve/CVE-2025-21886.html
  * https://www.suse.com/security/cve/CVE-2025-21888.html
  * https://www.suse.com/security/cve/CVE-2025-21890.html
  * https://www.suse.com/security/cve/CVE-2025-21891.html
  * https://www.suse.com/security/cve/CVE-2025-21892.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1207948
  * https://bugzilla.suse.com/show_bug.cgi?id=1215199
  * https://bugzilla.suse.com/show_bug.cgi?id=1215211
  * https://bugzilla.suse.com/show_bug.cgi?id=1218470
  * https://bugzilla.suse.com/show_bug.cgi?id=1221651
  * https://bugzilla.suse.com/show_bug.cgi?id=1222649
  * https://bugzilla.suse.com/show_bug.cgi?id=1223047
  * https://bugzilla.suse.com/show_bug.cgi?id=1224489
  * https://bugzilla.suse.com/show_bug.cgi?id=1224610
  * https://bugzilla.suse.com/show_bug.cgi?id=1225533
  * https://bugzilla.suse.com/show_bug.cgi?id=1225742
  * https://bugzilla.suse.com/show_bug.cgi?id=1225770
  * https://bugzilla.suse.com/show_bug.cgi?id=1226871
  * https://bugzilla.suse.com/show_bug.cgi?id=1227858
  * https://bugzilla.suse.com/show_bug.cgi?id=1228653
  * https://bugzilla.suse.com/show_bug.cgi?id=1229311
  * https://bugzilla.suse.com/show_bug.cgi?id=1229361
  * https://bugzilla.suse.com/show_bug.cgi?id=1230497
  * https://bugzilla.suse.com/show_bug.cgi?id=1230728
  * https://bugzilla.suse.com/show_bug.cgi?id=1230769
  * https://bugzilla.suse.com/show_bug.cgi?id=1230832
  * https://bugzilla.suse.com/show_bug.cgi?id=1231293
  * https://bugzilla.suse.com/show_bug.cgi?id=1231432
  * https://bugzilla.suse.com/show_bug.cgi?id=1232364
  * https://bugzilla.suse.com/show_bug.cgi?id=1232389
  * https://bugzilla.suse.com/show_bug.cgi?id=1232421
  * https://bugzilla.suse.com/show_bug.cgi?id=1232743
  * https://bugzilla.suse.com/show_bug.cgi?id=1232812
  * https://bugzilla.suse.com/show_bug.cgi?id=1232848
  * https://bugzilla.suse.com/show_bug.cgi?id=1232895
  * https://bugzilla.suse.com/show_bug.cgi?id=1233033
  * https://bugzilla.suse.com/show_bug.cgi?id=1233060
  * https://bugzilla.suse.com/show_bug.cgi?id=1233259
  * https://bugzilla.suse.com/show_bug.cgi?id=1233260
  * https://bugzilla.suse.com/show_bug.cgi?id=1233479
  * https://bugzilla.suse.com/show_bug.cgi?id=1233551
  * https://bugzilla.suse.com/show_bug.cgi?id=1233557
  * https://bugzilla.suse.com/show_bug.cgi?id=1233749
  * https://bugzilla.suse.com/show_bug.cgi?id=1234222
  * https://bugzilla.suse.com/show_bug.cgi?id=1234480
  * https://bugzilla.suse.com/show_bug.cgi?id=1234828
  * https://bugzilla.suse.com/show_bug.cgi?id=1234936
  * https://bugzilla.suse.com/show_bug.cgi?id=1235436
  * https://bugzilla.suse.com/show_bug.cgi?id=1235455
  * https://bugzilla.suse.com/show_bug.cgi?id=1235501
  * https://bugzilla.suse.com/show_bug.cgi?id=1235524
  * https://bugzilla.suse.com/show_bug.cgi?id=1235589
  * https://bugzilla.suse.com/show_bug.cgi?id=1235591
  * https://bugzilla.suse.com/show_bug.cgi?id=1235621
  * https://bugzilla.suse.com/show_bug.cgi?id=1235637
  * https://bugzilla.suse.com/show_bug.cgi?id=1235698
  * https://bugzilla.suse.com/show_bug.cgi?id=1235711
  * https://bugzilla.suse.com/show_bug.cgi?id=1235712
  * https://bugzilla.suse.com/show_bug.cgi?id=1235715
  * https://bugzilla.suse.com/show_bug.cgi?id=1235729
  * https://bugzilla.suse.com/show_bug.cgi?id=1235733
  * https://bugzilla.suse.com/show_bug.cgi?id=1235761
  * https://bugzilla.suse.com/show_bug.cgi?id=1235870
  * https://bugzilla.suse.com/show_bug.cgi?id=1235973
  * https://bugzilla.suse.com/show_bug.cgi?id=1236099
  * https://bugzilla.suse.com/show_bug.cgi?id=1236111
  * https://bugzilla.suse.com/show_bug.cgi?id=1236206
  * https://bugzilla.suse.com/show_bug.cgi?id=1236333
  * https://bugzilla.suse.com/show_bug.cgi?id=1236692
  * https://bugzilla.suse.com/show_bug.cgi?id=1237029
  * https://bugzilla.suse.com/show_bug.cgi?id=1237164
  * https://bugzilla.suse.com/show_bug.cgi?id=1237313
  * https://bugzilla.suse.com/show_bug.cgi?id=1237530
  * https://bugzilla.suse.com/show_bug.cgi?id=1237558
  * https://bugzilla.suse.com/show_bug.cgi?id=1237562
  * https://bugzilla.suse.com/show_bug.cgi?id=1237565
  * https://bugzilla.suse.com/show_bug.cgi?id=1237571
  * https://bugzilla.suse.com/show_bug.cgi?id=1237853
  * https://bugzilla.suse.com/show_bug.cgi?id=1237856
  * https://bugzilla.suse.com/show_bug.cgi?id=1237873
  * https://bugzilla.suse.com/show_bug.cgi?id=1237875
  * https://bugzilla.suse.com/show_bug.cgi?id=1237876
  * https://bugzilla.suse.com/show_bug.cgi?id=1237877
  * https://bugzilla.suse.com/show_bug.cgi?id=1237881
  * https://bugzilla.suse.com/show_bug.cgi?id=1237885
  * https://bugzilla.suse.com/show_bug.cgi?id=1237890
  * https://bugzilla.suse.com/show_bug.cgi?id=1237894
  * https://bugzilla.suse.com/show_bug.cgi?id=1237897
  * https://bugzilla.suse.com/show_bug.cgi?id=1237900
  * https://bugzilla.suse.com/show_bug.cgi?id=1237906
  * https://bugzilla.suse.com/show_bug.cgi?id=1237907
  * https://bugzilla.suse.com/show_bug.cgi?id=1237911
  * https://bugzilla.suse.com/show_bug.cgi?id=1237912
  * https://bugzilla.suse.com/show_bug.cgi?id=1237950
  * https://bugzilla.suse.com/show_bug.cgi?id=1238212
  * https://bugzilla.suse.com/show_bug.cgi?id=1238474
  * https://bugzilla.suse.com/show_bug.cgi?id=1238475
  * https://bugzilla.suse.com/show_bug.cgi?id=1238479
  * https://bugzilla.suse.com/show_bug.cgi?id=1238494
  * https://bugzilla.suse.com/show_bug.cgi?id=1238496
  * https://bugzilla.suse.com/show_bug.cgi?id=1238497
  * https://bugzilla.suse.com/show_bug.cgi?id=1238500
  * https://bugzilla.suse.com/show_bug.cgi?id=1238501
  * https://bugzilla.suse.com/show_bug.cgi?id=1238502
  * https://bugzilla.suse.com/show_bug.cgi?id=1238503
  * https://bugzilla.suse.com/show_bug.cgi?id=1238506
  * https://bugzilla.suse.com/show_bug.cgi?id=1238507
  * https://bugzilla.suse.com/show_bug.cgi?id=1238510
  * https://bugzilla.suse.com/show_bug.cgi?id=1238511
  * https://bugzilla.suse.com/show_bug.cgi?id=1238512
  * https://bugzilla.suse.com/show_bug.cgi?id=1238521
  * https://bugzilla.suse.com/show_bug.cgi?id=1238523
  * https://bugzilla.suse.com/show_bug.cgi?id=1238526
  * https://bugzilla.suse.com/show_bug.cgi?id=1238528
  * https://bugzilla.suse.com/show_bug.cgi?id=1238529
  * https://bugzilla.suse.com/show_bug.cgi?id=1238531
  * https://bugzilla.suse.com/show_bug.cgi?id=1238532
  * https://bugzilla.suse.com/show_bug.cgi?id=1238715
  * https://bugzilla.suse.com/show_bug.cgi?id=1238716
  * https://bugzilla.suse.com/show_bug.cgi?id=1238734
  * https://bugzilla.suse.com/show_bug.cgi?id=1238735
  * https://bugzilla.suse.com/show_bug.cgi?id=1238736
  * https://bugzilla.suse.com/show_bug.cgi?id=1238738
  * https://bugzilla.suse.com/show_bug.cgi?id=1238747
  * https://bugzilla.suse.com/show_bug.cgi?id=1238754
  * https://bugzilla.suse.com/show_bug.cgi?id=1238757
  * https://bugzilla.suse.com/show_bug.cgi?id=1238760
  * https://bugzilla.suse.com/show_bug.cgi?id=1238762
  * https://bugzilla.suse.com/show_bug.cgi?id=1238763
  * https://bugzilla.suse.com/show_bug.cgi?id=1238767
  * https://bugzilla.suse.com/show_bug.cgi?id=1238768
  * https://bugzilla.suse.com/show_bug.cgi?id=1238771
  * https://bugzilla.suse.com/show_bug.cgi?id=1238772
  * https://bugzilla.suse.com/show_bug.cgi?id=1238773
  * https://bugzilla.suse.com/show_bug.cgi?id=1238775
  * https://bugzilla.suse.com/show_bug.cgi?id=1238780
  * https://bugzilla.suse.com/show_bug.cgi?id=1238781
  * https://bugzilla.suse.com/show_bug.cgi?id=1238785
  * https://bugzilla.suse.com/show_bug.cgi?id=1238864
  * https://bugzilla.suse.com/show_bug.cgi?id=1238865
  * https://bugzilla.suse.com/show_bug.cgi?id=1238876
  * https://bugzilla.suse.com/show_bug.cgi?id=1238903
  * https://bugzilla.suse.com/show_bug.cgi?id=1238904
  * https://bugzilla.suse.com/show_bug.cgi?id=1238905
  * https://bugzilla.suse.com/show_bug.cgi?id=1238909
  * https://bugzilla.suse.com/show_bug.cgi?id=1238911
  * https://bugzilla.suse.com/show_bug.cgi?id=1238917
  * https://bugzilla.suse.com/show_bug.cgi?id=1238958
  * https://bugzilla.suse.com/show_bug.cgi?id=1238959
  * https://bugzilla.suse.com/show_bug.cgi?id=1238963
  * https://bugzilla.suse.com/show_bug.cgi?id=1238964
  * https://bugzilla.suse.com/show_bug.cgi?id=1238969
  * https://bugzilla.suse.com/show_bug.cgi?id=1238971
  * https://bugzilla.suse.com/show_bug.cgi?id=1238973
  * https://bugzilla.suse.com/show_bug.cgi?id=1238975
  * https://bugzilla.suse.com/show_bug.cgi?id=1238978
  * https://bugzilla.suse.com/show_bug.cgi?id=1238979
  * https://bugzilla.suse.com/show_bug.cgi?id=1238981
  * https://bugzilla.suse.com/show_bug.cgi?id=1238984
  * https://bugzilla.suse.com/show_bug.cgi?id=1238986
  * https://bugzilla.suse.com/show_bug.cgi?id=1238993
  * https://bugzilla.suse.com/show_bug.cgi?id=1238994
  * https://bugzilla.suse.com/show_bug.cgi?id=1238997
  * https://bugzilla.suse.com/show_bug.cgi?id=1239015
  * https://bugzilla.suse.com/show_bug.cgi?id=1239016
  * https://bugzilla.suse.com/show_bug.cgi?id=1239027
  * https://bugzilla.suse.com/show_bug.cgi?id=1239029
  * https://bugzilla.suse.com/show_bug.cgi?id=1239030
  * https://bugzilla.suse.com/show_bug.cgi?id=1239033
  * https://bugzilla.suse.com/show_bug.cgi?id=1239034
  * https://bugzilla.suse.com/show_bug.cgi?id=1239036
  * https://bugzilla.suse.com/show_bug.cgi?id=1239037
  * https://bugzilla.suse.com/show_bug.cgi?id=1239038
  * https://bugzilla.suse.com/show_bug.cgi?id=1239039
  * https://bugzilla.suse.com/show_bug.cgi?id=1239045
  * https://bugzilla.suse.com/show_bug.cgi?id=1239065
  * https://bugzilla.suse.com/show_bug.cgi?id=1239068
  * https://bugzilla.suse.com/show_bug.cgi?id=1239073
  * https://bugzilla.suse.com/show_bug.cgi?id=1239076
  * https://bugzilla.suse.com/show_bug.cgi?id=1239080
  * https://bugzilla.suse.com/show_bug.cgi?id=1239085
  * https://bugzilla.suse.com/show_bug.cgi?id=1239087
  * https://bugzilla.suse.com/show_bug.cgi?id=1239095
  * https://bugzilla.suse.com/show_bug.cgi?id=1239104
  * https://bugzilla.suse.com/show_bug.cgi?id=1239105
  * https://bugzilla.suse.com/show_bug.cgi?id=1239109
  * https://bugzilla.suse.com/show_bug.cgi?id=1239112
  * https://bugzilla.suse.com/show_bug.cgi?id=1239114
  * https://bugzilla.suse.com/show_bug.cgi?id=1239115
  * https://bugzilla.suse.com/show_bug.cgi?id=1239117
  * https://bugzilla.suse.com/show_bug.cgi?id=1239167
  * https://bugzilla.suse.com/show_bug.cgi?id=1239174
  * https://bugzilla.suse.com/show_bug.cgi?id=1239346
  * https://bugzilla.suse.com/show_bug.cgi?id=1239349
  * https://bugzilla.suse.com/show_bug.cgi?id=1239435
  * https://bugzilla.suse.com/show_bug.cgi?id=1239467
  * https://bugzilla.suse.com/show_bug.cgi?id=1239468
  * https://bugzilla.suse.com/show_bug.cgi?id=1239471
  * https://bugzilla.suse.com/show_bug.cgi?id=1239473
  * https://bugzilla.suse.com/show_bug.cgi?id=1239474
  * https://bugzilla.suse.com/show_bug.cgi?id=1239477
  * https://bugzilla.suse.com/show_bug.cgi?id=1239478
  * https://bugzilla.suse.com/show_bug.cgi?id=1239479
  * https://bugzilla.suse.com/show_bug.cgi?id=1239481
  * https://bugzilla.suse.com/show_bug.cgi?id=1239482
  * https://bugzilla.suse.com/show_bug.cgi?id=1239483
  * https://bugzilla.suse.com/show_bug.cgi?id=1239484
  * https://bugzilla.suse.com/show_bug.cgi?id=1239486
  * https://bugzilla.suse.com/show_bug.cgi?id=1239508
  * https://bugzilla.suse.com/show_bug.cgi?id=1239512
  * https://bugzilla.suse.com/show_bug.cgi?id=1239518
  * https://bugzilla.suse.com/show_bug.cgi?id=1239573
  * https://bugzilla.suse.com/show_bug.cgi?id=1239594
  * https://bugzilla.suse.com/show_bug.cgi?id=1239595
  * https://bugzilla.suse.com/show_bug.cgi?id=1239600
  * https://bugzilla.suse.com/show_bug.cgi?id=1239605
  * https://bugzilla.suse.com/show_bug.cgi?id=1239615
  * https://bugzilla.suse.com/show_bug.cgi?id=1239644
  * https://bugzilla.suse.com/show_bug.cgi?id=1239707
  * https://bugzilla.suse.com/show_bug.cgi?id=1239986
  * https://bugzilla.suse.com/show_bug.cgi?id=1239994
  * https://bugzilla.suse.com/show_bug.cgi?id=1240169
  * https://bugzilla.suse.com/show_bug.cgi?id=1240172
  * https://bugzilla.suse.com/show_bug.cgi?id=1240173
  * https://bugzilla.suse.com/show_bug.cgi?id=1240175
  * https://bugzilla.suse.com/show_bug.cgi?id=1240177
  * https://bugzilla.suse.com/show_bug.cgi?id=1240179
  * https://bugzilla.suse.com/show_bug.cgi?id=1240182
  * https://bugzilla.suse.com/show_bug.cgi?id=1240183
  * https://bugzilla.suse.com/show_bug.cgi?id=1240186
  * https://bugzilla.suse.com/show_bug.cgi?id=1240188
  * https://bugzilla.suse.com/show_bug.cgi?id=1240189
  * https://bugzilla.suse.com/show_bug.cgi?id=1240191
  * https://bugzilla.suse.com/show_bug.cgi?id=1240192
  * https://bugzilla.suse.com/show_bug.cgi?id=1240333
  * https://bugzilla.suse.com/show_bug.cgi?id=1240334
  * https://jira.suse.com/browse/PED-10701
  * https://jira.suse.com/browse/PED-12251
  * https://jira.suse.com/browse/PED-12416

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250408/3feec39c/attachment.htm>


More information about the sle-security-updates mailing list