SUSE-SU-2025:01964-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Mon Jun 16 16:50:43 UTC 2025



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:01964-1  
Release Date: 2025-06-16T14:54:14Z  
Rating: important  
References:

  * bsc#1215199
  * bsc#1220112
  * bsc#1223096
  * bsc#1223809
  * bsc#1224013
  * bsc#1224597
  * bsc#1224757
  * bsc#1226498
  * bsc#1228659
  * bsc#1229491
  * bsc#1230581
  * bsc#1230764
  * bsc#1231016
  * bsc#1231103
  * bsc#1231910
  * bsc#1232493
  * bsc#1232649
  * bsc#1232882
  * bsc#1233075
  * bsc#1233098
  * bsc#1233192
  * bsc#1234074
  * bsc#1234154
  * bsc#1234157
  * bsc#1234698
  * bsc#1235149
  * bsc#1235501
  * bsc#1235526
  * bsc#1235550
  * bsc#1235870
  * bsc#1235968
  * bsc#1236086
  * bsc#1236142
  * bsc#1236208
  * bsc#1236704
  * bsc#1237111
  * bsc#1237312
  * bsc#1237874
  * bsc#1237882
  * bsc#1238052
  * bsc#1238212
  * bsc#1238471
  * bsc#1238473
  * bsc#1238527
  * bsc#1238565
  * bsc#1238714
  * bsc#1238737
  * bsc#1238742
  * bsc#1238745
  * bsc#1238746
  * bsc#1238774
  * bsc#1238862
  * bsc#1238961
  * bsc#1238970
  * bsc#1238983
  * bsc#1238990
  * bsc#1238992
  * bsc#1239066
  * bsc#1239079
  * bsc#1239108
  * bsc#1239470
  * bsc#1239475
  * bsc#1239476
  * bsc#1239487
  * bsc#1239510
  * bsc#1239684
  * bsc#1239691
  * bsc#1239906
  * bsc#1239925
  * bsc#1239997
  * bsc#1240167
  * bsc#1240168
  * bsc#1240171
  * bsc#1240176
  * bsc#1240181
  * bsc#1240184
  * bsc#1240185
  * bsc#1240375
  * bsc#1240557
  * bsc#1240575
  * bsc#1240576
  * bsc#1240581
  * bsc#1240582
  * bsc#1240583
  * bsc#1240584
  * bsc#1240585
  * bsc#1240587
  * bsc#1240590
  * bsc#1240591
  * bsc#1240592
  * bsc#1240593
  * bsc#1240594
  * bsc#1240595
  * bsc#1240596
  * bsc#1240600
  * bsc#1240612
  * bsc#1240616
  * bsc#1240639
  * bsc#1240643
  * bsc#1240647
  * bsc#1240655
  * bsc#1240691
  * bsc#1240700
  * bsc#1240701
  * bsc#1240703
  * bsc#1240708
  * bsc#1240709
  * bsc#1240712
  * bsc#1240713
  * bsc#1240714
  * bsc#1240715
  * bsc#1240716
  * bsc#1240717
  * bsc#1240718
  * bsc#1240719
  * bsc#1240720
  * bsc#1240722
  * bsc#1240727
  * bsc#1240739
  * bsc#1240740
  * bsc#1240742
  * bsc#1240779
  * bsc#1240783
  * bsc#1240784
  * bsc#1240785
  * bsc#1240795
  * bsc#1240796
  * bsc#1240797
  * bsc#1240799
  * bsc#1240801
  * bsc#1240802
  * bsc#1240806
  * bsc#1240808
  * bsc#1240809
  * bsc#1240811
  * bsc#1240812
  * bsc#1240813
  * bsc#1240815
  * bsc#1240816
  * bsc#1240819
  * bsc#1240821
  * bsc#1240825
  * bsc#1240829
  * bsc#1240835
  * bsc#1240866
  * bsc#1240873
  * bsc#1240934
  * bsc#1240936
  * bsc#1240937
  * bsc#1240938
  * bsc#1240940
  * bsc#1240942
  * bsc#1240943
  * bsc#1240944
  * bsc#1240966
  * bsc#1240978
  * bsc#1240979
  * bsc#1241010
  * bsc#1241038
  * bsc#1241051
  * bsc#1241123
  * bsc#1241148
  * bsc#1241151
  * bsc#1241167
  * bsc#1241175
  * bsc#1241204
  * bsc#1241250
  * bsc#1241265
  * bsc#1241266
  * bsc#1241280
  * bsc#1241282
  * bsc#1241305
  * bsc#1241332
  * bsc#1241333
  * bsc#1241340
  * bsc#1241341
  * bsc#1241343
  * bsc#1241344
  * bsc#1241347
  * bsc#1241351
  * bsc#1241357
  * bsc#1241361
  * bsc#1241369
  * bsc#1241371
  * bsc#1241373
  * bsc#1241376
  * bsc#1241378
  * bsc#1241394
  * bsc#1241402
  * bsc#1241412
  * bsc#1241413
  * bsc#1241416
  * bsc#1241424
  * bsc#1241426
  * bsc#1241433
  * bsc#1241436
  * bsc#1241441
  * bsc#1241442
  * bsc#1241443
  * bsc#1241448
  * bsc#1241451
  * bsc#1241452
  * bsc#1241456
  * bsc#1241457
  * bsc#1241458
  * bsc#1241459
  * bsc#1241492
  * bsc#1241519
  * bsc#1241525
  * bsc#1241526
  * bsc#1241528
  * bsc#1241533
  * bsc#1241537
  * bsc#1241538
  * bsc#1241541
  * bsc#1241545
  * bsc#1241547
  * bsc#1241548
  * bsc#1241550
  * bsc#1241573
  * bsc#1241574
  * bsc#1241575
  * bsc#1241576
  * bsc#1241578
  * bsc#1241590
  * bsc#1241593
  * bsc#1241595
  * bsc#1241596
  * bsc#1241597
  * bsc#1241598
  * bsc#1241599
  * bsc#1241601
  * bsc#1241625
  * bsc#1241626
  * bsc#1241627
  * bsc#1241635
  * bsc#1241638
  * bsc#1241640
  * bsc#1241644
  * bsc#1241648
  * bsc#1241654
  * bsc#1241657
  * bsc#1242006
  * bsc#1242012
  * bsc#1242035
  * bsc#1242044
  * bsc#1242172
  * bsc#1242203
  * bsc#1242283
  * bsc#1242307
  * bsc#1242313
  * bsc#1242314
  * bsc#1242315
  * bsc#1242321
  * bsc#1242326
  * bsc#1242327
  * bsc#1242328
  * bsc#1242332
  * bsc#1242333
  * bsc#1242335
  * bsc#1242336
  * bsc#1242342
  * bsc#1242343
  * bsc#1242344
  * bsc#1242345
  * bsc#1242346
  * bsc#1242347
  * bsc#1242348
  * bsc#1242414
  * bsc#1242417
  * bsc#1242501
  * bsc#1242502
  * bsc#1242506
  * bsc#1242507
  * bsc#1242509
  * bsc#1242510
  * bsc#1242512
  * bsc#1242513
  * bsc#1242514
  * bsc#1242520
  * bsc#1242523
  * bsc#1242524
  * bsc#1242526
  * bsc#1242528
  * bsc#1242529
  * bsc#1242530
  * bsc#1242531
  * bsc#1242532
  * bsc#1242534
  * bsc#1242535
  * bsc#1242536
  * bsc#1242537
  * bsc#1242538
  * bsc#1242539
  * bsc#1242540
  * bsc#1242546
  * bsc#1242556
  * bsc#1242559
  * bsc#1242563
  * bsc#1242564
  * bsc#1242565
  * bsc#1242566
  * bsc#1242567
  * bsc#1242568
  * bsc#1242569
  * bsc#1242574
  * bsc#1242575
  * bsc#1242578
  * bsc#1242584
  * bsc#1242585
  * bsc#1242587
  * bsc#1242591
  * bsc#1242596
  * bsc#1242709
  * bsc#1242710
  * bsc#1242727
  * bsc#1242758
  * bsc#1242760
  * bsc#1242761
  * bsc#1242762
  * bsc#1242763
  * bsc#1242764
  * bsc#1242766
  * bsc#1242770
  * bsc#1242778
  * bsc#1242781
  * bsc#1242782
  * bsc#1242785
  * bsc#1242786
  * bsc#1242792
  * bsc#1242831
  * bsc#1242852
  * bsc#1242854
  * bsc#1242856
  * bsc#1242859
  * bsc#1242860
  * bsc#1242861
  * bsc#1242866
  * bsc#1242867
  * bsc#1242868
  * bsc#1242871
  * bsc#1242873
  * bsc#1242875
  * bsc#1242906
  * bsc#1242908
  * bsc#1242924
  * bsc#1242930
  * bsc#1242944
  * bsc#1242945
  * bsc#1242948
  * bsc#1242949
  * bsc#1242951
  * bsc#1242953
  * bsc#1242955
  * bsc#1242957
  * bsc#1242959
  * bsc#1242961
  * bsc#1242962
  * bsc#1242973
  * bsc#1242974
  * bsc#1242977
  * bsc#1242985
  * bsc#1242990
  * bsc#1242993
  * bsc#1243000
  * bsc#1243006
  * bsc#1243011
  * bsc#1243015
  * bsc#1243044
  * bsc#1243049
  * bsc#1243056
  * bsc#1243074
  * bsc#1243076
  * bsc#1243077
  * bsc#1243082
  * bsc#1243090
  * bsc#1243330
  * bsc#1243342
  * bsc#1243456
  * bsc#1243469
  * bsc#1243470
  * bsc#1243471
  * bsc#1243472
  * bsc#1243473
  * bsc#1243476
  * bsc#1243509
  * bsc#1243511
  * bsc#1243513
  * bsc#1243515
  * bsc#1243516
  * bsc#1243517
  * bsc#1243519
  * bsc#1243522
  * bsc#1243524
  * bsc#1243528
  * bsc#1243529
  * bsc#1243530
  * bsc#1243534
  * bsc#1243536
  * bsc#1243539
  * bsc#1243540
  * bsc#1243541
  * bsc#1243543
  * bsc#1243545
  * bsc#1243547
  * bsc#1243559
  * bsc#1243560
  * bsc#1243562
  * bsc#1243567
  * bsc#1243573
  * bsc#1243574
  * bsc#1243575
  * bsc#1243589
  * bsc#1243621
  * bsc#1243624
  * bsc#1243625
  * bsc#1243626
  * bsc#1243627
  * bsc#1243649
  * bsc#1243657
  * bsc#1243658
  * bsc#1243659
  * bsc#1243660
  * bsc#1243664
  * bsc#1243737
  * bsc#1243805
  * bsc#1243963
  * jsc#PED-12309

  
Cross-References:

  * CVE-2023-53034
  * CVE-2023-53146
  * CVE-2024-27018
  * CVE-2024-27415
  * CVE-2024-28956
  * CVE-2024-35840
  * CVE-2024-43869
  * CVE-2024-46713
  * CVE-2024-46763
  * CVE-2024-46865
  * CVE-2024-50038
  * CVE-2024-50083
  * CVE-2024-50106
  * CVE-2024-50162
  * CVE-2024-50163
  * CVE-2024-50223
  * CVE-2024-53124
  * CVE-2024-53135
  * CVE-2024-53139
  * CVE-2024-54458
  * CVE-2024-56641
  * CVE-2024-56702
  * CVE-2024-57924
  * CVE-2024-57998
  * CVE-2024-58001
  * CVE-2024-58018
  * CVE-2024-58068
  * CVE-2024-58070
  * CVE-2024-58071
  * CVE-2024-58088
  * CVE-2024-58093
  * CVE-2024-58094
  * CVE-2024-58095
  * CVE-2024-58096
  * CVE-2024-58097
  * CVE-2024-58098
  * CVE-2024-58099
  * CVE-2024-58100
  * CVE-2024-58237
  * CVE-2025-21629
  * CVE-2025-21648
  * CVE-2025-21683
  * CVE-2025-21696
  * CVE-2025-21702
  * CVE-2025-21707
  * CVE-2025-21729
  * CVE-2025-21755
  * CVE-2025-21758
  * CVE-2025-21768
  * CVE-2025-21787
  * CVE-2025-21792
  * CVE-2025-21806
  * CVE-2025-21808
  * CVE-2025-21812
  * CVE-2025-21814
  * CVE-2025-21833
  * CVE-2025-21836
  * CVE-2025-21852
  * CVE-2025-21853
  * CVE-2025-21854
  * CVE-2025-21863
  * CVE-2025-21867
  * CVE-2025-21873
  * CVE-2025-21875
  * CVE-2025-21881
  * CVE-2025-21884
  * CVE-2025-21887
  * CVE-2025-21889
  * CVE-2025-21894
  * CVE-2025-21895
  * CVE-2025-21904
  * CVE-2025-21905
  * CVE-2025-21906
  * CVE-2025-21908
  * CVE-2025-21909
  * CVE-2025-21910
  * CVE-2025-21912
  * CVE-2025-21913
  * CVE-2025-21914
  * CVE-2025-21915
  * CVE-2025-21916
  * CVE-2025-21917
  * CVE-2025-21918
  * CVE-2025-21919
  * CVE-2025-21922
  * CVE-2025-21923
  * CVE-2025-21924
  * CVE-2025-21925
  * CVE-2025-21926
  * CVE-2025-21927
  * CVE-2025-21928
  * CVE-2025-21930
  * CVE-2025-21931
  * CVE-2025-21934
  * CVE-2025-21935
  * CVE-2025-21936
  * CVE-2025-21937
  * CVE-2025-21941
  * CVE-2025-21943
  * CVE-2025-21948
  * CVE-2025-21950
  * CVE-2025-21951
  * CVE-2025-21953
  * CVE-2025-21956
  * CVE-2025-21957
  * CVE-2025-21960
  * CVE-2025-21961
  * CVE-2025-21962
  * CVE-2025-21963
  * CVE-2025-21964
  * CVE-2025-21966
  * CVE-2025-21968
  * CVE-2025-21969
  * CVE-2025-21970
  * CVE-2025-21971
  * CVE-2025-21972
  * CVE-2025-21975
  * CVE-2025-21978
  * CVE-2025-21979
  * CVE-2025-21980
  * CVE-2025-21981
  * CVE-2025-21985
  * CVE-2025-21991
  * CVE-2025-21992
  * CVE-2025-21993
  * CVE-2025-21995
  * CVE-2025-21996
  * CVE-2025-21999
  * CVE-2025-22001
  * CVE-2025-22003
  * CVE-2025-22004
  * CVE-2025-22005
  * CVE-2025-22007
  * CVE-2025-22008
  * CVE-2025-22009
  * CVE-2025-22010
  * CVE-2025-22013
  * CVE-2025-22014
  * CVE-2025-22015
  * CVE-2025-22016
  * CVE-2025-22017
  * CVE-2025-22018
  * CVE-2025-22020
  * CVE-2025-22021
  * CVE-2025-22025
  * CVE-2025-22027
  * CVE-2025-22029
  * CVE-2025-22030
  * CVE-2025-22033
  * CVE-2025-22036
  * CVE-2025-22044
  * CVE-2025-22045
  * CVE-2025-22050
  * CVE-2025-22053
  * CVE-2025-22055
  * CVE-2025-22056
  * CVE-2025-22057
  * CVE-2025-22058
  * CVE-2025-22060
  * CVE-2025-22062
  * CVE-2025-22063
  * CVE-2025-22064
  * CVE-2025-22065
  * CVE-2025-22066
  * CVE-2025-22070
  * CVE-2025-22075
  * CVE-2025-22080
  * CVE-2025-22086
  * CVE-2025-22088
  * CVE-2025-22089
  * CVE-2025-22090
  * CVE-2025-22093
  * CVE-2025-22095
  * CVE-2025-22097
  * CVE-2025-22102
  * CVE-2025-22103
  * CVE-2025-22104
  * CVE-2025-22105
  * CVE-2025-22106
  * CVE-2025-22107
  * CVE-2025-22108
  * CVE-2025-22109
  * CVE-2025-22115
  * CVE-2025-22116
  * CVE-2025-22119
  * CVE-2025-22121
  * CVE-2025-22124
  * CVE-2025-22125
  * CVE-2025-22126
  * CVE-2025-22128
  * CVE-2025-2312
  * CVE-2025-23129
  * CVE-2025-23131
  * CVE-2025-23133
  * CVE-2025-23136
  * CVE-2025-23138
  * CVE-2025-23140
  * CVE-2025-23141
  * CVE-2025-23142
  * CVE-2025-23144
  * CVE-2025-23145
  * CVE-2025-23146
  * CVE-2025-23147
  * CVE-2025-23148
  * CVE-2025-23149
  * CVE-2025-23150
  * CVE-2025-23151
  * CVE-2025-23156
  * CVE-2025-23157
  * CVE-2025-23158
  * CVE-2025-23159
  * CVE-2025-23160
  * CVE-2025-23161
  * CVE-2025-37740
  * CVE-2025-37741
  * CVE-2025-37742
  * CVE-2025-37747
  * CVE-2025-37748
  * CVE-2025-37749
  * CVE-2025-37750
  * CVE-2025-37754
  * CVE-2025-37755
  * CVE-2025-37758
  * CVE-2025-37765
  * CVE-2025-37766
  * CVE-2025-37767
  * CVE-2025-37768
  * CVE-2025-37769
  * CVE-2025-37770
  * CVE-2025-37771
  * CVE-2025-37772
  * CVE-2025-37773
  * CVE-2025-37780
  * CVE-2025-37781
  * CVE-2025-37782
  * CVE-2025-37785
  * CVE-2025-37787
  * CVE-2025-37788
  * CVE-2025-37789
  * CVE-2025-37790
  * CVE-2025-37792
  * CVE-2025-37793
  * CVE-2025-37794
  * CVE-2025-37796
  * CVE-2025-37797
  * CVE-2025-37798
  * CVE-2025-37799
  * CVE-2025-37803
  * CVE-2025-37804
  * CVE-2025-37805
  * CVE-2025-37809
  * CVE-2025-37810
  * CVE-2025-37812
  * CVE-2025-37815
  * CVE-2025-37819
  * CVE-2025-37820
  * CVE-2025-37823
  * CVE-2025-37824
  * CVE-2025-37829
  * CVE-2025-37830
  * CVE-2025-37831
  * CVE-2025-37833
  * CVE-2025-37836
  * CVE-2025-37839
  * CVE-2025-37840
  * CVE-2025-37841
  * CVE-2025-37842
  * CVE-2025-37849
  * CVE-2025-37850
  * CVE-2025-37851
  * CVE-2025-37852
  * CVE-2025-37853
  * CVE-2025-37854
  * CVE-2025-37858
  * CVE-2025-37860
  * CVE-2025-37867
  * CVE-2025-37870
  * CVE-2025-37871
  * CVE-2025-37873
  * CVE-2025-37875
  * CVE-2025-37879
  * CVE-2025-37881
  * CVE-2025-37886
  * CVE-2025-37887
  * CVE-2025-37889
  * CVE-2025-37890
  * CVE-2025-37891
  * CVE-2025-37892
  * CVE-2025-37897
  * CVE-2025-37900
  * CVE-2025-37901
  * CVE-2025-37903
  * CVE-2025-37905
  * CVE-2025-37911
  * CVE-2025-37912
  * CVE-2025-37913
  * CVE-2025-37914
  * CVE-2025-37915
  * CVE-2025-37918
  * CVE-2025-37925
  * CVE-2025-37928
  * CVE-2025-37929
  * CVE-2025-37930
  * CVE-2025-37931
  * CVE-2025-37932
  * CVE-2025-37937
  * CVE-2025-37943
  * CVE-2025-37944
  * CVE-2025-37948
  * CVE-2025-37949
  * CVE-2025-37951
  * CVE-2025-37953
  * CVE-2025-37954
  * CVE-2025-37957
  * CVE-2025-37958
  * CVE-2025-37959
  * CVE-2025-37960
  * CVE-2025-37963
  * CVE-2025-37969
  * CVE-2025-37970
  * CVE-2025-37972
  * CVE-2025-37974
  * CVE-2025-37978
  * CVE-2025-37979
  * CVE-2025-37980
  * CVE-2025-37982
  * CVE-2025-37983
  * CVE-2025-37985
  * CVE-2025-37986
  * CVE-2025-37989
  * CVE-2025-37990
  * CVE-2025-38104
  * CVE-2025-38152
  * CVE-2025-38240
  * CVE-2025-38637
  * CVE-2025-39728
  * CVE-2025-39735
  * CVE-2025-40014
  * CVE-2025-40325

  
CVSS scores:

  * CVE-2023-53034 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53034 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-53146 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53146 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27018 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27018 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27415 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-28956 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-28956 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
  * CVE-2024-28956 ( NVD ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  * CVE-2024-28956 ( NVD ):  5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
  * CVE-2024-35840 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43869 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46713 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46763 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46763 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46865 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46865 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50038 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50038 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50083 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50083 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50106 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50106 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50106 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50162 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50162 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50162 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50163 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50163 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50163 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50223 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50223 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53124 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53124 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53135 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53135 ( NVD ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2024-53139 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53139 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53139 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-54458 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-54458 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56641 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56641 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56702 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56702 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56702 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57924 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57924 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57998 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58001 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-58001 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-58018 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58068 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58068 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58070 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58070 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58071 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58071 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58088 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58088 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58088 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58093 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58093 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58094 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58094 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58095 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58096 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58096 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-58097 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58097 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58097 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58099 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58099 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58099 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58100 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58237 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21629 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21629 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21648 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21648 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21683 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-21683 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-21683 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21696 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21696 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21702 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21707 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21707 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21729 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21729 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21755 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21755 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21758 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21768 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21787 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21787 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21792 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21806 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21808 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21812 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21812 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21812 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21814 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21814 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21833 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21833 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21833 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21836 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21852 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21852 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21853 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21854 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21854 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21863 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21867 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21867 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21873 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21875 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21881 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21887 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21889 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21894 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21894 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21895 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21895 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21904 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21904 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21904 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21905 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21905 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21905 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-21906 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21906 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21908 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21908 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21908 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21909 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21909 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21910 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21910 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21912 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21912 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21912 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21913 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21914 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21915 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21915 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21915 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21916 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21916 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21917 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21917 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21917 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21918 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21918 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21918 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21919 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21919 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21922 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21922 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-21922 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21923 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21923 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21923 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21923 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21924 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21924 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21925 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21925 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21926 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21926 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21927 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21927 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21927 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21928 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21928 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21928 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21928 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21930 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21930 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21930 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21931 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21931 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21934 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21934 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21934 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21935 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21935 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21936 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21936 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21936 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21937 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21937 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21937 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21941 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21941 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21941 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21943 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21943 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21943 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21948 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21948 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21948 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21950 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21950 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21951 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21951 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21951 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21953 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21953 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21956 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-21956 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-21957 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21957 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21957 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21960 ( SUSE ):  0.0
    CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-21960 ( SUSE ):  0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-21961 ( SUSE ):  6.0
    CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21961 ( SUSE ):  5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21961 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21962 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21962 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-21962 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21963 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21963 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21963 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21964 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21964 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21964 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21966 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21966 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21966 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21968 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21968 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21968 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21969 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21969 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21970 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21970 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21971 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21971 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21972 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21972 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21975 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21975 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21978 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21978 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21979 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21979 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21979 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21980 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21980 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21980 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21981 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-21981 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-21981 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21985 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21985 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21991 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21991 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21991 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21992 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21992 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21993 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21993 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21993 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-21995 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21995 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21995 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21996 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21996 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21996 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21999 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21999 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21999 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22001 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22001 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-22001 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22003 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22003 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22003 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22004 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22004 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22004 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22005 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22005 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22005 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22007 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22007 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22007 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22008 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22008 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22009 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22009 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22009 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22010 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22010 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22010 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22013 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22013 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22014 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22014 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22014 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22015 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22015 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22016 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22016 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22017 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22017 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22018 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22018 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22018 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22020 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22020 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22020 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22021 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-22021 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-22025 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-22025 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-22027 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22027 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22027 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22029 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22029 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22030 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22030 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22033 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22033 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22033 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22036 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22036 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22036 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22044 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22044 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22045 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22045 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22050 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22050 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22053 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22053 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22055 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22055 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-22056 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22056 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22056 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22057 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22057 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22058 ( SUSE ):  6.9
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-22058 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-22060 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22060 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22062 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22062 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22062 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22063 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22063 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22064 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22064 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22065 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22065 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22065 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22066 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22066 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22066 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22070 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22070 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22070 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22075 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22075 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22080 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22080 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22080 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22086 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22086 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22088 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22088 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22088 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22089 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22089 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-22090 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22090 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22093 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22093 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22095 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22097 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22097 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-22097 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22102 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22102 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22103 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22103 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22104 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22104 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-22105 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22105 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22106 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22106 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22107 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22107 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-22108 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-22108 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2025-22109 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22109 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22115 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22115 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22116 ( SUSE ):  4.6
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-22116 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-22119 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22119 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-22121 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22121 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22124 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22124 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22125 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22125 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22126 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22126 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22128 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22128 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-2312 ( SUSE ):  6.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
  * CVE-2025-2312 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
  * CVE-2025-2312 ( NVD ):  5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
  * CVE-2025-23129 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23129 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23131 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23133 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23133 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-23136 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23136 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23136 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23138 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23138 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23140 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23141 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23141 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23142 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23144 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23145 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23145 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23146 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23146 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23147 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23147 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23148 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23149 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23150 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23151 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23156 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23157 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23158 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23159 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23160 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23161 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23161 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37740 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37741 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37742 ( SUSE ):  1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
  * CVE-2025-37747 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37748 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37749 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-37750 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37754 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37755 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37758 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37765 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37766 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37767 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37768 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37769 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37770 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37771 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37771 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37772 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37773 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37780 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37780 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37781 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37782 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-37785 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37785 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-37785 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-37787 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37788 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37789 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37790 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37792 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37793 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37794 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37796 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37797 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37798 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37799 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37803 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37803 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37803 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-37804 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37804 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37805 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37805 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37809 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37810 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37810 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2025-37812 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37812 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37820 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37823 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37823 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37824 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37829 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37830 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37831 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37833 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37836 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37839 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37839 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37840 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37841 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37842 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37849 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-37850 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37851 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37851 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-37852 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37852 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37853 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37854 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37854 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37858 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37858 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2025-37860 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37860 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37860 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37867 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37870 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37870 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37871 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37873 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37875 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37879 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37879 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37881 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37881 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37889 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37890 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37891 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-37892 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37897 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37897 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37900 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37900 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37901 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37901 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37903 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37903 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-37905 ( SUSE ):  4.6
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37905 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37911 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37911 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-37912 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37912 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37913 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-37914 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-37915 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-37918 ( SUSE ):  7.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37918 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37925 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
  * CVE-2025-37925 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37928 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37928 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37929 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37929 ( SUSE ):  4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2025-37930 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37930 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-37931 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37931 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-37932 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37932 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-37937 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37943 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37944 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37948 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-37949 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37951 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37954 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37954 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-37957 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37959 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37960 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37963 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37963 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37970 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37972 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37974 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37978 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37979 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37980 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37983 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37983 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37985 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37986 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37989 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37990 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38104 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38152 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38152 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38152 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38240 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38240 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38637 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38637 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39728 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39728 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39728 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39735 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39735 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39735 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-40014 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40014 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-40014 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40325 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40325 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * openSUSE Leap 15.6
  * SUSE Linux Enterprise Live Patching 15-SP6
  * SUSE Linux Enterprise Real Time 15 SP6
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6
  * SUSE Real Time Module 15-SP6

  
  
An update that solves 339 vulnerabilities, contains one feature and has 88
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching
    (bsc#1242006).
  * CVE-2024-35840: mptcp: use OPTION_MPTCP_MPJ_SYNACK in
    subflow_finish_connect() (bsc#1224597).
  * CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization
    (bsc#1230581).
  * CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to
    load on IPv6 (bsc#1231910).
  * CVE-2024-50162: bpf: selftests: send packet to devmap redirect XDP
    (bsc#1233075).
  * CVE-2024-50163: bpf: Make sure internal and UAPI bpf_redirect flags do not
    overlap (bsc#1233098).
  * CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in
    (bsc#1233192).
  * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc
    (bsc#1234074).
  * CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode)
    behind CONFIG_BROKEN (bsc#1234154).
  * CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157).
  * CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal
    (bsc#1238992).
  * CVE-2024-57924: fs: relax assertions on failure to encode file handles
    (bsc#1236086).
  * CVE-2024-58018: nvkm: correctly calculate the available space of the GSP
    cmdq buffer (bsc#1238990).
  * CVE-2024-58068: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not
    initialized (bsc#1238961).
  * CVE-2024-58070: bpf: bpf_local_storage: Always use bpf_mem_alloc in
    PREEMPT_RT (bsc#1238983).
  * CVE-2024-58071: team: prevent adding a device which is already a team device
    lower (bsc#1238970).
  * CVE-2024-58088: bpf: Fix deadlock when freeing cgroup storage (bsc#1239510).
  * CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to
    INT_MAX (bsc#1236142).
  * CVE-2025-21683: bpf: Fix bpf_sk_select_reuseport() memory leak
    (bsc#1236704).
  * CVE-2025-21696: mm: clear uffd-wp PTE/PMD state on mremap() (bsc#1237111).
  * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0
    (bsc#1237312).
  * CVE-2025-21707: mptcp: consolidate suboption status (bsc#1238862).
  * CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan
    completion (bsc#1237874).
  * CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882).
  * CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack()
    (bsc#1238737).
  * CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6
    lwtunnels (bsc#1238714).
  * CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation
    (bsc#1238774).
  * CVE-2025-21792: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE
    sockopt (bsc#1238745).
  * CVE-2025-21806: net: let net.core.dev_weight always be non-zero
    (bsc#1238746).
  * CVE-2025-21808: net: xdp: Disallow attaching device-bound programs in
    generic mode (bsc#1238742).
  * CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471).
  * CVE-2025-21814: ptp: Ensure info->enable callback is always set
    (bsc#1238473).
  * CVE-2025-21833: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE
    (bsc#1239108).
  * CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade
    (bsc#1239066).
  * CVE-2025-21854: selftest/bpf: Add vsock test for sockmap rejecting
    unconnected (bsc#1239470).
  * CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475).
  * CVE-2025-21867: bpf, test_run: Fix use-after-free issue in
    eth_skb_pkt_type() (bsc#1240181).
  * CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails
    (bsc#1240184).
  * CVE-2025-21875: mptcp: always handle address removal under msk socket lock
    (bsc#1240168).
  * CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode()
    (bsc#1240185).
  * CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171).
  * CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in
    ovl_link_up (bsc#1240176).
  * CVE-2025-21889: perf/core: Add RCU read lock protection to
    perf_iterate_ctx() (bsc#1240167).
  * CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC
    (bsc#1240581).
  * CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered
    pmu_ctx_list (bsc#1240585).
  * CVE-2025-21904: caif_virtio: fix wrong pointer check in cfv_probe()
    (bsc#1240576).
  * CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587).
  * CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd
    writeback (bsc#1240600).
  * CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()
    (bsc#1240591).
  * CVE-2025-21919: sched/fair: Fix potential memory corruption in
    child_cfs_rq_on_list (bsc#1240593).
  * CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639).
  * CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if
    hclge_ptp_get_cycle returns an error (bsc#1240720).
  * CVE-2025-21925: llc: do not use skb_get() before dev_queue_xmit()
    (bsc#1240713).
  * CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712).
  * CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned
    folio (bsc#1240709).
  * CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2
    (bsc#1240742).
  * CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb()
    (bsc#1240815).
  * CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816).
  * CVE-2025-21962: cifs: Fix integer overflow while processing closetimeo mount
    option (bsc#1240655).
  * CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount
    option (bsc#1240717).
  * CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount
    option (bsc#1240740).
  * CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784).
  * CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check
    (bsc#1240819).
  * CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813).
  * CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table()
    (bsc#1240812).
  * CVE-2025-21980: sched: address a potential NULL pointer dereference in the
    GRED scheduler (bsc#1240809).
  * CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612).
  * CVE-2025-21985: drm/amd/display: Fix out-of-bound accesses (bsc#1240811).
  * CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-
    less NUMA nodes (bsc#1240795).
  * CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in
    ibft_attr_show_nic() (bsc#1240797).
  * CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).
  * CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).
  * CVE-2025-22015: mm/migrate: fix shmem xarray update during migration
    (bsc#1240944).
  * CVE-2025-22016: dpll: fix xa_alloc_cyclic() error handling (bsc#1240934).
  * CVE-2025-22017: devlink: fix xa_alloc_cyclic() error handling (bsc#1240936).
  * CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266).
  * CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT
    (bsc#1241282).
  * CVE-2025-22029: exec: fix the racy usage of fs_struct->in_exec
    (bsc#1241378).
  * CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in
    zswap_cpu_comp_dead() (bsc#1241376).
  * CVE-2025-22036: exfat: fix random stack corruption after get_block
    (bsc#1241426).
  * CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal
    PMDs (bsc#1241433).
  * CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging
    (bsc#1241373).
  * CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).
  * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion
    addition (bsc#1241525).
  * CVE-2025-22057: net: decrease cached dst counters in dst_release
    (bsc#1241533).
  * CVE-2025-22058: udp: Fix memory accounting leak (bsc#1241332).
  * CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption
    (bsc#1241526).
  * CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on
    IPv4 sockets (bsc#1241351).
  * CVE-2025-22064: netfilter: nf_tables: do not unregister hook when table is
    dormant (bsc#1241413).
  * CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305).
  * CVE-2025-22080: fs/ntfs3: Prevent integer overflow in hdr_first_de()
    (bsc#1241416).
  * CVE-2025-22090: mm: (un)track_pfn_copy() fix + doc improvements
    (bsc#1241537).
  * CVE-2025-22102: Bluetooth: btnxpuart: Fix kernel panic during FW release
    (bsc#1241456).
  * CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv
    (bsc#1241448).
  * CVE-2025-22104: ibmvnic: Use kernel helpers for hex dumps (bsc#1241550).
  * CVE-2025-22105, CVE-2025-37860: Add missing bugzilla references (bsc#1241452
    bsc#1241548).
  * CVE-2025-22107: net: dsa: sja1105: fix kasan out-of-bounds warning in
    sja1105_table_delete_entry() (bsc#1241575).
  * CVE-2025-22109: ax25: Remove broken autobind (bsc#1241573).
  * CVE-2025-22115: btrfs: fix block group refcount race in
    btrfs_create_pending_block_groups() (bsc#1241578).
  * CVE-2025-22121: ext4: fix out-of-bound read in
    ext4_xattr_inode_dec_ref_all() (bsc#1241593).
  * CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution
    (bsc#1239684).
  * CVE-2025-23133: wifi: ath11k: update channel list in reg notifier instead
    reg worker (bsc#1241451).
  * CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648).
  * CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining
    after request_irq error (bsc#1242763).
  * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow
    (bsc#1242596).
  * CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513).
  * CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the
    scp device in FW initialization (bsc#1242507).
  * CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in
    mtk_iommu_device_group (bsc#1242523).
  * CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung
    (bsc#1242859).
  * CVE-2025-37750: smb: client: fix UAF in decryption with multichannel
    (bsc#1242510).
  * CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error
    (bsc#1242506).
  * CVE-2025-37773: virtiofs: add filesystem context source name check
    (bsc#1242502).
  * CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786).
  * CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).
  * CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions
    which were never registered (bsc#1242585).
  * CVE-2025-37789: net: openvswitch: fix nested key length validation in the
    set() action (bsc#1242762).
  * CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509).
  * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling
    (bsc#1242417).
  * CVE-2025-37799: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp
    (bsc#1242283).
  * CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf
    creation (bsc#1242852).
  * CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854).
  * CVE-2025-37809: usb: typec: class: Unlocked on error in
    typec_register_partner() (bsc#1242856).
  * CVE-2025-37820: xen-netfront: handle NULL returned by
    xdp_convert_buff_to_frame() (bsc#1242866).
  * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
    (bsc#1242924).
  * CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self()
    (bsc#1242867).
  * CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()
    (bsc#1242875).
  * CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate()
    (bsc#1242860).
  * CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in
    apple_soc_cpufreq_get_rate() (bsc#1242861).
  * CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before
    entry reads (bsc#1242868).
  * CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path
    (bsc#1242951).
  * CVE-2025-37870: drm/amd/display: prevent hang on link training fail
    (bsc#1243056).
  * CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write
    replies (bsc#1243077).
  * CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944).
  * CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result
    (bsc#1242962).
  * CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541).
  * CVE-2025-37954: smb: client: Avoid race in open_cached_dir with lease breaks
    (bsc#1243664).
  * CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception
    (bsc#1243513).
  * CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration
    entry (bsc#1243539).
  * CVE-2025-37960: memblock: Accept allocated memory before use in
    memblock_double_array() (bsc#1243519).
  * CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error
    return (bsc#1243547).
  * CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown
    (bsc#1241627).
  * CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions
    (bsc#1241657).
  * CVE-2025-39728: clk: samsung: Fix UBSAN panic in samsung_clk_init()
    (bsc#1241626).

The following non-security bugs were fixed:

  * ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls (stable-fixes).
  * ACPI: EC: Set ec_no_wakeup for Lenovo Go S (stable-fixes).
  * ACPI: PPTT: Fix processor subtable walk (git-fixes).
  * ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable-
    fixes).
  * ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers
    (git-fixes).
  * ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git-
    fixes).
  * ALSA: hda/realtek - Enable speaker for HP platform (git-fixes).
  * ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes).
  * ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git-
    fixes).
  * ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git-
    fixes).
  * ALSA: hda/realtek: Fix built-mic regression on other ASUS models (git-
    fixes).
  * ALSA: hda: intel: Add Lenovo IdeaPad Z570 to probe denylist (stable-fixes).
  * ALSA: hda: intel: Fix Optimus when GPU has no sound (stable-fixes).
  * ALSA: seq: Fix delivery of UMP events to group ports (git-fixes).
  * ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes).
  * ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes).
  * ALSA: ump: Fix buffer overflow at UMP SysEx message conversion
    (bsc#1242044).
  * ALSA: usb-audio: Add retry on -EPROTO from usb_set_interface() (stable-
    fixes).
  * ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes).
  * ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera
    (stable-fixes).
  * ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset (stable-
    fixes).
  * ALSA: usb-audio: Fix CME quirk for UF series keyboards (stable-fixes).
  * ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe() (git-fixes).
  * ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext
    (git-fixes).
  * ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback
    direction (git-fixes).
  * ASoC: SOF: topology: Use krealloc_array() to replace krealloc() (stable-
    fixes).
  * ASoC: Use of_property_read_bool() (stable-fixes).
  * ASoC: amd: Add DMI quirk for ACP6X mic support (stable-fixes).
  * ASoC: amd: yc: update quirk data for new Lenovo model (stable-fixes).
  * ASoC: codecs:lpass-wsa-macro: Fix logic of enabling vi channels (git-fixes).
  * ASoC: codecs:lpass-wsa-macro: Fix vi feedback rate (git-fixes).
  * ASoC: fsl_audmix: register card device depends on 'dais' property (stable-
    fixes).
  * ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes).
  * ASoC: qcom: Fix sc7280 lpass potential buffer overflow (git-fixes).
  * ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes).
  * ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes).
  * ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git-
    fixes).
  * ASoC: soc-core: Stop using of_property_read_bool() for non-boolean
    properties (stable-fixes).
  * ASoC: soc-pcm: Fix hw_params() and DAPM widget sequence (git-fixes).
  * ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes).
  * Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes).
  * Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes).
  * Bluetooth: btrtl: Prevent potential NULL dereference (git-fixes).
  * Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue() (git-
    fixes).
  * Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling
    (git-fixes).
  * Bluetooth: hci_event: Fix sending MGMT_EV_DEVICE_FOUND for invalid address
    (git-fixes).
  * Bluetooth: hci_uart: Fix another race during initialization (git-fixes).
  * Bluetooth: hci_uart: fix race during initialization (stable-fixes).
  * Bluetooth: l2cap: Check encryption key size on incoming connection (git-
    fixes).
  * Bluetooth: l2cap: Process valid commands in too long frame (stable-fixes).
  * Bluetooth: vhci: Avoid needless snprintf() calls (git-fixes).
  * pci: Drop PCI patch that caused a regression (bsc#1241123)
  * Fix write to cloned skb in ipv6_hop_ioam() (git-fixes).
  * HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable-
    fixes).
  * HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes).
  * HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes).
  * HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes).
  * IB/cm: use rwlock for MAD agent lock (git-fixes)
  * Input: cyttsp5 - ensure minimum reset pulse width (git-fixes).
  * Input: mtk-pmic-keys - fix possible null pointer dereference (git-fixes).
  * Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git-
    fixes).
  * Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes).
  * Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable-
    fixes).
  * Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable-
    fixes).
  * Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5
    (stable-fixes).
  * Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes).
  * Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes).
  * Input: synaptics-rmi - fix crash with unsupported versions of F34 (git-
    fixes).
  * Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable-
    fixes).
  * Input: xpad - fix Share button on Xbox One controllers (stable-fixes).
  * Input: xpad - fix two controller table values (git-fixes).
  * KVM: SVM: Allocate IR data using atomic allocation (git-fixes).
  * KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes).
  * KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes).
  * KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes).
  * KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes).
  * KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes).
  * KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes).
  * KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git-
    fixes).
  * KVM: arm64: Mark some header functions as inline (git-fixes).
  * KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes).
  * KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes).
  * KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git-
    fixes).
  * KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes).
  * KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes).
  * KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git-
    fixes).
  * KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes).
  * KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation
    (git-fixes).
  * KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes).
  * KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation
    (git-fixes).
  * KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657).
  * KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658).
  * KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes).
  * KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses
    (git-fixes).
  * KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend
    notifier (git-fixes).
  * KVM: x86: Explicitly treat routing entry type changes as changes (git-
    fixes).
  * KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM
    (git-fixes).
  * KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes).
  * KVM: x86: Make x2APIC ID 100% readonly (git-fixes).
  * KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git-
    fixes).
  * KVM: x86: Remove the unreachable case for 0x80000022 leaf in
    __do_cpuid_func() (git-fixes).
  * KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found
    (git-fixes).
  * NFS: O_DIRECT writes must check and adjust the file length (git-fixes).
  * NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes).
  * NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes).
  * NFSv4: Do not trigger uneccessary scans for return-on-close delegations
    (git-fixes).
  * OPP: add index check to assert to avoid buffer overflow in _read_freq()
    (bsc#1238961)
  * PCI/MSI: Add an option to write MSIX ENTRY_DATA before any reads (git-
    fixes).
  * PCI: Fix BAR resizing when VF BARs are assigned (git-fixes).
  * PCI: Fix reference leak in pci_register_host_bridge() (git-fixes).
  * PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes).
  * PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type (stable-fixes).
  * RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git-
    fixes)
  * RDMA/cma: Fix workqueue crash in cma_netevent_work_handler (git-fixes)
  * RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device"
    problem (git-fixes)
  * RDMA/core: Silence oversized kvmalloc() warning (git-fixes)
  * RDMA/hns: Fix wrong maximum DMA segment size (git-fixes)
  * RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes)
  * RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git-
    fixes)
  * RDMA/mana_ib: Ensure variable err is initialized (git-fixes).
  * RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git-
    fixes)
  * RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug
    (git-fixes)
  * RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes)
  * RDMA/usnic: Fix passing zero to PTR_ERR in usnic_ib_pci_probe() (git-fixes)
  * mm: Revert commit (bsc#1241051)
  * Squashfs: check return result of sb_min_blocksize (git-fixes).
  * USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02) (stable-fixes).
  * USB: VLI disk crashes if LPM is used (stable-fixes).
  * USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe
    (stable-fixes).
  * USB: serial: option: add Sierra Wireless EM9291 (stable-fixes).
  * USB: serial: simple: add OWON HDS200 series oscilloscope support (stable-
    fixes).
  * USB: storage: quirk for ADATA Portable HDD CH94 (stable-fixes).
  * USB: usbtmc: use interruptible sleep in usbtmc_read (git-fixes).
  * USB: wdm: add annotation (git-fixes).
  * USB: wdm: close race between wdm_open and wdm_wwan_port_stop (git-fixes).
  * USB: wdm: handle IO errors in wdm_wwan_port_start (git-fixes).
  * USB: wdm: wdm_wwan_port_tx_complete mutex in atomic context (git-fixes).
  * RDMA: Update patch RDMA-core-Don-t-expose-hw_counters-outside-of-
    init-n.patch (git-fixes bsc#1239925).
  * kABI: Update patch kABI-fix-for-RDMA-core-Don-t-expose-hw_counters-
    outs.patch (git-fixes bsc#1239925).
  * nvme: Update patch nvme-fixup-scan-failure-for-non-ANA-multipath-
    contro.patch (git-fixes bsc#1235149).
  * Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes).
  * acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes).
  * add bug reference for an existing hv_netvsc change (bsc#1243737).
  * affs: do not write overlarge OFS data block size fields (git-fixes).
  * affs: generate OFS sequence numbers starting at 1 (git-fixes).
  * afs: Fix the server_list to unuse a displaced server rather than putting it
    (git-fixes).
  * afs: Make it possible to find the volumes that are using a server (git-
    fixes).
  * ahci: add PCI ID for Marvell 88SE9215 SATA Controller (stable-fixes).
  * arch_topology: Make register_cpu_capacity_sysctl() tolerant to late
    (bsc#1238052)
  * arch_topology: init capacity_freq_ref to 0 (bsc#1238052)
  * arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052)
  * arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes)
  * arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052)
  * arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052)
  * arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052)
  * arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052)
  * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes)
  * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git-
    fixes)
  * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes)
  * arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes)
  * arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes)
  * arm64: insn: Add support for encoding DSB (git-fixes)
  * arm64: mm: Correct the update of max_pfn (git-fixes)
  * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git-
    fixes)
  * arm64: proton-pack: Expose whether the branchy loop k value (git-fixes)
  * arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes)
  * arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes).
  * asus-laptop: Fix an uninitialized variable (git-fixes).
  * ata: libata-sata: Save all fields from sense data descriptor (git-fixes).
  * ata: libata-scsi: Fix ata_mselect_control_ata_feature() return type (git-
    fixes).
  * ata: libata-scsi: Fix ata_msense_control_ata_feature() (git-fixes).
  * ata: libata-scsi: Improve CDL control (git-fixes).
  * ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe()
    (git-fixes).
  * ata: sata_sx4: Add error handling in pdc20621_i2c_read() (git-fixes).
  * auxdisplay: hd44780: Convert to platform remove callback returning void
    (stable-fixes).
  * auxdisplay: hd44780: Fix an API misuse in hd44780.c (git-fixes).
  * badblocks: Fix error shitf ops (git-fixes).
  * badblocks: fix merge issue when new badblocks align with pre+1 (git-fixes).
  * badblocks: fix missing bad blocks on retry in _badblocks_check() (git-
    fixes).
  * badblocks: fix the using of MAX_BADBLOCKS (git-fixes).
  * badblocks: return error directly when setting badblocks exceeds 512 (git-
    fixes).
  * badblocks: return error if any badblock set fails (git-fixes).
  * blk-throttle: fix lower bps rate by throtl_trim_slice() (git-fixes).
  * block: change blk_mq_add_to_batch() third argument type to bool (git-fixes).
  * block: fix 'kmem_cache of name 'bio-108' already exists' (git-fixes).
  * block: fix conversion of GPT partition name to 7-bit (git-fixes).
  * block: fix resource leak in blk_register_queue() error path (git-fixes).
  * block: integrity: Do not call set_page_dirty_lock() (git-fixes).
  * block: make sure ->nr_integrity_segments is cloned in blk_rq_prep_clone
    (git-fixes).
  * bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes).
  * bnxt_en: Fix coredump logic to free allocated buffer (git-fixes).
  * bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes).
  * bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes).
  * bnxt_en: Linearize TX SKB if the fragments exceed the max (git-fixes).
  * bnxt_en: Mask the bd_cnt field in the TX BD properly (git-fixes).
  * bpf: Add missed var_off setting in coerce_subreg_to_size_sx() (git-fixes).
  * bpf: Add missed var_off setting in set_sext32_default_val() (git-fixes).
  * bpf: Check size for BTF-based ctx access of pointer members (git-fixes).
  * bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes).
  * bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes).
  * bpf: Scrub packet on bpf_redirect_peer (git-fixes).
  * bpf: add find_containing_subprog() utility function (bsc#1241590).
  * bpf: avoid holding freeze_mutex during mmap operation (git-fixes).
  * bpf: check changes_pkt_data property for extension programs (bsc#1241590).
  * bpf: consider that tail calls invalidate packet pointers (bsc#1241590).
  * bpf: fix null dereference when computing changes_pkt_data of prog w/o
    subprogs (bsc#1241590).
  * bpf: fix potential error return (git-fixes).
  * bpf: refactor bpf_helper_changes_pkt_data to use helper number
    (bsc#1241590).
  * bpf: track changes_pkt_data property for global functions (bsc#1241590).
  * bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes).
  * btrfs: add and use helper to verify the calling task has locked the inode
    (bsc#1241204).
  * btrfs: adjust subpage bit start based on sectorsize (bsc#1241492).
  * btrfs: always fallback to buffered write if the inode requires checksum
    (bsc#1242831 bsc#1242710).
  * btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342).
  * btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208).
  * btrfs: avoid monopolizing a core when activating a swap file (git-fixes).
  * btrfs: do not loop for nowait writes when checking for cross references
    (git-fixes).
  * btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes).
  * btrfs: fix discard worker infinite loop after disabling discard
    (bsc#1242012).
  * btrfs: fix hole expansion when writing at an offset beyond EOF
    (bsc#1241151).
  * btrfs: fix missing snapshot drew unlock when root is dead during swap
    activation (bsc#1241204).
  * btrfs: fix non-empty delayed iputs list on unmount due to compressed write
    workers (git-fixes).
  * btrfs: fix race with memory mapped writes when activating swap file
    (bsc#1241204).
  * btrfs: fix swap file activation failure due to extents that used to be
    shared (bsc#1241204).
  * can: bcm: add locking for bcm_op runtime updates (git-fixes).
  * can: bcm: add missing rcu read protection for procfs content (git-fixes).
  * can: gw: fix RCU/BH usage in cgw_create_job() (git-fixes).
  * can: mcan: m_can_class_unregister(): fix order of unregistration calls (git-
    fixes).
  * can: mcp251xfd: fix TDC setting for low data bit rates (git-fixes).
  * can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls (git-
    fixes).
  * can: slcan: allow reception of short error messages (git-fixes).
  * cdc_ether|r8152: ThinkPad Hybrid USB-C/A Dock quirk (stable-fixes).
  * char: misc: register chrdev region with all possible minors (git-fixes).
  * check-for-config-changes: Fix flag name typo
  * cifs: Fix integer overflow while processing actimeo mount option (git-
    fixes).
  * cifs: change tcon status when need_reconnect is set on it (git-fixes).
  * cifs: reduce warning log level for server not advertising interfaces (git-
    fixes).
  * counter: fix privdata alignment (git-fixes).
  * counter: microchip-tcb-capture: Fix undefined counter channel state on probe
    (git-fixes).
  * counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes).
  * cpufreq/cppc: Set the frequency used for computing the capacity
    (bsc#1238052)
  * cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052)
  * cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052)
  * crypto: algif_hash - fix double free in hash_accept (git-fixes).
  * crypto: atmel-sha204a - Set hwrng quality to lowest possible (git-fixes).
  * crypto: caam/qi - Fix drv_ctx refcount bug (git-fixes).
  * crypto: ccp - Add support for PCI device 0x1134 (stable-fixes).
  * cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path (git-
    fixes).
  * devlink: fix port new reply cmd type (git-fixes).
  * dm-bufio: do not schedule in atomic context (git-fixes).
  * dm-ebs: fix prefetch-vs-suspend race (git-fixes).
  * dm-integrity: fix a warning on invalid table line (git-fixes).
  * dm-integrity: set ti->error on memory allocation failure (git-fixes).
  * dm-verity: fix prefetch-vs-suspend race (git-fixes).
  * dm: add missing unlock on in dm_keyslot_evict() (git-fixes).
  * dm: always update the array size in realloc_argv on success (git-fixes).
  * dm: fix copying after src array boundaries (git-fixes).
  * dma-buf: insert memory barrier before updating num_fences (git-fixes).
  * dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when
    interrupted" (git-fixes).
  * dmaengine: dmatest: Fix dmatest waiting less when interrupted (stable-
    fixes).
  * dmaengine: idxd: Add missing cleanup for early error out in
    idxd_setup_internals (git-fixes).
  * dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes).
  * dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call
    (git-fixes).
  * dmaengine: idxd: Fix ->poll() return value (git-fixes).
  * dmaengine: idxd: Fix allowing write() from different address spaces (git-
    fixes).
  * dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git-
    fixes).
  * dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git-
    fixes).
  * dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe
    (git-fixes).
  * dmaengine: idxd: fix memory leak in error handling path of
    idxd_setup_engines (git-fixes).
  * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups
    (git-fixes).
  * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs
    (git-fixes).
  * dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status()
    (git-fixes).
  * dmaengine: mediatek: drop unused variable (git-fixes).
  * dmaengine: ti: k3-udma: Add missing locking (git-fixes).
  * dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure
    instead of a local copy (git-fixes).
  * drivers: base: devres: Allow to release group on device release (stable-
    fixes).
  * drm/amd/display: Add scoped mutexes for amdgpu_dm_dhcp (stable-fixes).
  * drm/amd/display: Avoid flooding unnecessary info messages (git-fixes).
  * drm/amd/display: Copy AUX read reply data whenever length > 0 (git-fixes).
  * drm/amd/display: Correct the reply value when AUX write incomplete (git-
    fixes).
  * drm/amd/display: Fix gpu reset in multidisplay config (git-fixes).
  * drm/amd/display: Fix slab-use-after-free in hdcp (git-fixes).
  * drm/amd/display: Fix the checking condition in dmub aux handling (stable-
    fixes).
  * drm/amd/display: Fix wrong handling for AUX_DEFER case (git-fixes).
  * drm/amd/display: Force full update in gpu reset (stable-fixes).
  * drm/amd/display: Remove incorrect checking in dmub aux handler (git-fixes).
  * drm/amd/display: Shift DMUB AUX reply command if necessary (git-fixes).
  * drm/amd/display: add workaround flag to link to force FFE preset (stable-
    fixes).
  * drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes).
  * drm/amd/pm/smu11: Prevent division by zero (git-fixes).
  * drm/amd/pm: Prevent division by zero (git-fixes).
  * drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes).
  * drm/amd: Handle being compiled without SI or CIK support better (stable-
    fixes).
  * drm/amd: Keep display off while going into S4 (stable-fixes).
  * drm/amdgpu/dma_buf: fix page_link check (git-fixes).
  * drm/amdgpu/gfx11: fix num_mec (git-fixes).
  * drm/amdgpu/hdp5.2: use memcfg register to post the write for HDP flush (git-
    fixes).
  * drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes).
  * drm/amdgpu: fix pm notifier handling (git-fixes).
  * drm/amdgpu: handle amdgpu_cgs_create_device() errors in
    amd_powerplay_create() (stable-fixes).
  * drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes).
  * drm/amdkfd: Fix mode1 reset crash issue (stable-fixes).
  * drm/amdkfd: Fix pqm_destroy_queue race with GPU reset (stable-fixes).
  * drm/amdkfd: clamp queue size to minimum (stable-fixes).
  * drm/amdkfd: debugfs hang_hws skip GPU with MES (stable-fixes).
  * drm/bridge: panel: forbid initializing a panel with unknown connector type
    (stable-fixes).
  * drm/dp_mst: Add a helper to queue a topology probe (stable-fixes).
  * drm/dp_mst: Factor out function to queue a topology probe work (stable-
    fixes).
  * drm/edid: fixed the bug that hdr metadata was not reset (git-fixes).
  * drm/fdinfo: Protect against driver unbind (git-fixes).
  * drm/i915/dg2: wait for HuC load completion before running selftests (stable-
    fixes).
  * drm/i915/gvt: fix unterminated-string-initialization warning (stable-fixes).
  * drm/i915/huc: Fix fence not released on early probe errors (git-fixes).
  * drm/i915/pxp: fix undefined reference to
    `intel_pxp_gsccs_is_ready_for_sessions' (git-fixes).
  * drm/i915/xelpg: Extend driver code of Xe_LPG to Xe_LPG+ (stable-fixes).
  * drm/i915: Disable RPG during live selftest (git-fixes).
  * drm/mediatek: mtk_dpi: Explicitly manage TVD clock in power on/off (stable-
    fixes).
  * drm/mediatek: mtk_dpi: Move the input_2p_en bit to platform data (stable-
    fixes).
  * drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() (git-fixes).
  * drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes).
  * drm/panel: simple: Update timings for AUO G101EVN010 (git-fixes).
  * drm/sti: remove duplicate object names (git-fixes).
  * drm/tests: Add helper to create mock crtc (stable-fixes).
  * drm/tests: Add helper to create mock plane (stable-fixes).
  * drm/tests: Build KMS helpers when DRM_KUNIT_TEST_HELPERS is enabled (git-
    fixes).
  * drm/tests: cmdline: Fix drm_display_mode memory leak (git-fixes).
  * drm/tests: helpers: Add atomic helpers (stable-fixes).
  * drm/tests: helpers: Add helper for drm_display_mode_from_cea_vic() (stable-
    fixes).
  * drm/tests: helpers: Create kunit helper to destroy a drm_display_mode
    (stable-fixes).
  * drm/tests: helpers: Fix compiler warning (git-fixes).
  * drm/tests: modes: Fix drm_display_mode memory leak (git-fixes).
  * drm/tests: probe-helper: Fix drm_display_mode memory leak (git-fixes).
  * drm/v3d: Add job to pending list if the reset was skipped (stable-fixes).
  * drm: Select DRM_KMS_HELPER from DRM_DEBUG_DP_MST_TOPOLOGY_REFS (git-fixes).
  * drm: allow encoder mode_set even when connectors change for crtc (stable-
    fixes).
  * drm: panel-orientation-quirks: Add new quirk for GPD Win 2 (stable-fixes).
  * drm: panel-orientation-quirks: Add quirk for AYA NEO Slide (stable-fixes).
  * drm: panel-orientation-quirks: Add quirk for OneXPlayer Mini (Intel)
    (stable-fixes).
  * drm: panel-orientation-quirks: Add quirks for AYA NEO Flip DS and KB
    (stable-fixes).
  * drm: panel-orientation-quirks: Add support for AYANEO 2S (stable-fixes).
  * e1000e: change k1 configuration on MTP and later platforms (git-fixes).
  * eth: bnxt: fix missing ring index trim on error path (git-fixes).
  * ethtool: Fix context creation with no parameters (git-fixes).
  * ethtool: Fix set RXNFC command with symmetric RSS hash (git-fixes).
  * ethtool: Fix wrong mod state in case of verbose and no_mask bitset (git-
    fixes).
  * ethtool: do not propagate EOPNOTSUPP from dumps (git-fixes).
  * ethtool: fix setting key and resetting indir at once (git-fixes).
  * ethtool: netlink: Add missing ethnl_ops_begin/complete (git-fixes).
  * ethtool: netlink: do not return SQI value if link is down (git-fixes).
  * ethtool: plca: fix plca enable data type while parsing the value (git-
    fixes).
  * ethtool: rss: echo the context number back (git-fixes).
  * exfat: do not fallback to buffered write (git-fixes).
  * exfat: drop ->i_size_ondisk (git-fixes).
  * exfat: fix potential wrong error return from get_block (git-fixes).
  * exfat: fix soft lockup in exfat_clear_bitmap (git-fixes).
  * exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes).
  * exfat: short-circuit zero-byte writes in exfat_file_write_iter (git-fixes).
  * ext4: add missing brelse() for bh2 in ext4_dx_add_entry() (bsc#1242342).
  * ext4: correct encrypted dentry name hash when not casefolded (bsc#1242540).
  * ext4: do not over-report free space or inodes in statvfs (bsc#1242345).
  * ext4: do not treat fhandle lookup of ea_inode as FS corruption
    (bsc#1242347).
  * ext4: fix FS_IOC_GETFSMAP handling (bsc#1240557).
  * ext4: goto right label 'out_mmap_sem' in ext4_setattr() (bsc#1242556).
  * ext4: make block validity check resistent to sb bh corruption (bsc#1242348).
  * ext4: partial zero eof block on unaligned inode size extension
    (bsc#1242336).
  * ext4: protect ext4_release_dquot against freezing (bsc#1242335).
  * ext4: replace the traditional ternary conditional operator with with
    max()/min() (bsc#1242536).
  * ext4: treat end of range as exclusive in ext4_zero_range() (bsc#1242539).
  * ext4: unify the type of flexbg_size to unsigned int (bsc#1242538).
  * fbdev: omapfb: Add 'plane' value check (stable-fixes).
  * firmware: arm_ffa: Skip Rx buffer ownership release if not acquired (git-
    fixes).
  * firmware: arm_scmi: Balance device refcount when destroying devices (git-
    fixes).
  * firmware: cs_dsp: Ensure cs_dsp_load_coeff returns 0 on success (git-fixes).
  * fs/jfs: Prevent integer overflow in AG size calculation (git-fixes).
  * fs/jfs: cast inactags to s64 to prevent potential overflow (git-fixes).
  * fs/ntfs3: add prefix to bitmap_size() and use BITS_TO_U64() (bsc#1241250).
  * fs: better handle deep ancestor chains in is_subdir() (bsc#1242528).
  * fs: consistently deref the files table with rcu_dereference_raw()
    (bsc#1242535).
  * fs: do not allow non-init s_user_ns for filesystems without FS_USERNS_MOUNT
    (bsc#1242526).
  * fs: support relative paths with FSCONFIG_SET_STRING (git-fixes).
  * gpio: tegra186: fix resource handling in ACPI probe path (git-fixes).
  * gpio: zynq: Fix wakeup source leaks on device unbind (stable-fixes).
  * gve: handle overflow when reporting TX consumed descriptors (git-fixes).
  * gve: set xdp redirect target only when it is available (git-fixes).
  * hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key (git-fixes).
  * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git-
    fixes).
  * hv_netvsc: Remove rmsg_pgcnt (git-fixes).
  * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git-
    fixes).
  * hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable-
    fixes).
  * i2c: cros-ec-tunnel: defer probe if parent EC is not present (git-fixes).
  * i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git-
    fixes).
  * i2c: imx-lpi2c: Fix clock count when probe defers (git-fixes).
  * ice: Add check for devm_kzalloc() (git-fixes).
  * ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes).
  * ice: fix reservation of resources for RDMA when disabled (git-fixes).
  * ice: stop truncating queue ids when checking (git-fixes).
  * idpf: check error for register_netdev() on init (git-fixes).
  * idpf: fix adapter NULL pointer dereference on reboot (git-fixes).
  * idpf: fix offloads support for encapsulated packets (git-fixes).
  * idpf: fix potential memory leak on kcalloc() failure (git-fixes).
  * idpf: protect shutdown from reset (git-fixes).
  * igb: reject invalid external timestamp requests for 82580-based HW (git-
    fixes).
  * igc: add lock preventing multiple simultaneous PTM transactions (git-fixes).
  * igc: cleanup PTP module if probe fails (git-fixes).
  * igc: fix PTM cycle trigger logic (git-fixes).
  * igc: fix lock order in igc_ptp_reset (git-fixes).
  * igc: handle the IGC_PTP_ENABLED flag correctly (git-fixes).
  * igc: increase wait time before retrying PTM (git-fixes).
  * igc: move ktime snapshot into PTM retry loop (git-fixes).
  * iio: accel: adxl367: fix setting odr for activity time update (git-fixes).
  * iio: adc: ad7606: fix serial register access (git-fixes).
  * iio: adc: ad7768-1: Fix conversion result sign (git-fixes).
  * iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary
    return value check (stable-fixes).
  * iio: adis16201: Correct inclinometer channel resolution (git-fixes).
  * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo (git-
    fixes).
  * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo
    (git-fixes).
  * iio: temp: maxim-thermocouple: Fix potential lack of DMA safe buffer (git-
    fixes).
  * inetpeer: remove create argument of inet_getpeer_v() (git-fixes).
  * inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes).
  * iommu: Fix two issues in iommu_copy_struct_from_user() (git-fixes).
  * ipv4/route: avoid unused-but-set-variable warning (git-fixes).
  * ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes).
  * ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes).
  * ipv4: Fix incorrect source address in Record Route option (git-fixes).
  * ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git-
    fixes).
  * ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr (git-
    fixes).
  * ipv4: fix source address selection with route leak (git-fixes).
  * ipv4: give an IPv4 dev to blackhole_netdev (git-fixes).
  * ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes).
  * ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes).
  * ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes).
  * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes).
  * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes).
  * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes).
  * ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes).
  * ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git-
    fixes).
  * ipv6: Align behavior across nexthops during path selection (git-fixes).
  * ipv6: Do not consider link down nexthops in path selection (git-fixes).
  * ipv6: Start path selection from the first nexthop (git-fixes).
  * ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS
    (git-fixes).
  * irqchip/davinci: Remove leftover header (git-fixes).
  * irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() (git-fixes).
  * irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs (git-
    fixes).
  * isofs: fix KMSAN uninit-value bug in do_isofs_readdir() (bsc#1242307).
  * jbd2: add a missing data flush during file and fs synchronization
    (bsc#1242346).
  * jbd2: fix off-by-one while erasing journal (bsc#1242344).
  * jbd2: flush filesystem device before updating tail sequence (bsc#1242333).
  * jbd2: increase IO priority for writing revoke records (bsc#1242332).
  * jbd2: increase the journal IO's priority (bsc#1242537).
  * jbd2: remove wrong sb->s_sequence check (bsc#1242343).
  * jfs: Fix uninit-value access of imap allocated in the diMount() function
    (git-fixes).
  * jfs: Prevent copying of nlink with value 0 from disk inode (git-fixes).
  * jfs: add sanity check for agwidth in dbMount (git-fixes).
  * jiffies: Cast to unsigned long in secs_to_jiffies() conversion
    (bsc#1242993).
  * jiffies: Define secs_to_jiffies() (bsc#1242993).
  * kABI fix for sctp: detect and prevent references to a freed transport in
    sendmsg (git-fixes).
  * kABI workaround for powercap update (bsc#1241010).
  * kernel-binary: Support livepatch_rt with merged RT branch
  * kernel-obs-qa: Use srchash for dependency as well
  * ktest: Fix Test Failures Due to Missing LOG_FILE Directories (stable-fixes).
  * kunit: qemu_configs: SH: Respect kunit cmdline (git-fixes).
  * lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets
    (git-fixes).
  * libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698
    jsc#PED-12309).
  * libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698
    jsc#PED-12309).
  * libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698
    jsc#PED-12309).
  * libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698
    jsc#PED-12309).
  * libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698
    jsc#PED-12309).
  * libperf cpumap: Rename perf_cpu_map__default_new() to
    perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698
    jsc#PED-12309).
  * libperf cpumap: Rename perf_cpu_map__dummy_new() to
    perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309).
  * libperf cpumap: Rename perf_cpu_map__empty() to
    perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309).
  * loop: Add sanity check for read/write_iter (git-fixes).
  * loop: LOOP_SET_FD: send uevents for partitions (git-fixes).
  * loop: aio inherit the ioprio of original request (git-fixes).
  * loop: do not require ->write_iter for writable files in loop_configure (git-
    fixes).
  * loop: properly send KOBJ_CHANGED uevent for disk device (git-fixes).
  * loop: stop using vfs_iter_{read,write} for buffered I/O (git-fixes).
  * md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb
    (bsc#1238212)
  * md/raid1,raid10: do not ignore IO flags (git-fixes).
  * md/raid10: fix missing discard IO accounting (git-fixes).
  * md/raid10: wait barrier before returning discard request with REQ_NOWAIT
    (git-fixes).
  * md/raid1: Add check for missing source disk in process_checks() (git-fixes).
  * md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes).
  * md/raid5: implement pers->bitmap_sector() (git-fixes).
  * md: add a new callback pers->bitmap_sector() (git-fixes).
  * md: ensure resync is prioritized over recovery (git-fixes).
  * md: fix mddev uaf while iterating all_mddevs list (git-fixes).
  * md: preserve KABI in struct md_personality v2 (git-fixes).
  * media: uvcvideo: Add quirk for Actions UVC05 (stable-fixes).
  * media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes).
  * mei: me: add panther lake H DID (stable-fixes).
  * misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration
    (git-fixes).
  * misc: microchip: pci1xxxx: Fix incorrect IRQ status handling during ack
    (git-fixes).
  * mm/readahead: fix large folio support in async readahead (bsc#1242321).
  * mm: fix error handling in __filemap_get_folio() with FGP_NOWAIT
    (bsc#1242326).
  * mm: fix filemap_get_folios_contig returning batches of identical folios
    (bsc#1242327).
  * mm: fix oops when filemap_map_pmd() without prealloc_pte (bsc#1242546).
  * mmc: dw_mmc: add a quirk for accessing 64-bit FIFOs in two halves (stable-
    fixes).
  * mmc: renesas_sdhi: Fix error handling in renesas_sdhi_probe (git-fixes).
  * mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes).
  * mptcp: mptcp_parse_option() fix for MPTCPOPT_MP_JOIN (git-fixes).
  * mptcp: refine opt_mp_capable determination (git-fixes).
  * mptcp: relax check on MPC passive fallback (git-fixes).
  * mptcp: strict validation before using mp_opt->hmac (git-fixes).
  * mptcp: use OPTION_MPTCP_MPJ_SYN in subflow_check_req() (git-fixes).
  * mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes).
  * mtd: phram: Add the kernel lock down check (bsc#1232649).
  * mtd: rawnand: Add status chack in r852_ready() (git-fixes).
  * neighbour: delete redundant judgment statements (git-fixes).
  * net/handshake: Fix handshake_req_destroy_test1 (git-fixes).
  * net/handshake: Fix memory leak in __sock_create() and sock_alloc_file()
    (git-fixes).
  * net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes).
  * net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git-
    fixes).
  * net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged
    (git-fixes).
  * net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes).
  * net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes).
  * net/mlx5: Fill out devlink dev info only for PFs (git-fixes).
  * net/mlx5: IRQ, Fix null string in debug print (git-fixes).
  * net/mlx5: Lag, Check shared fdb before creating MultiPort E-Switch (git-
    fixes).
  * net/mlx5: Start health poll after enable hca (git-fixes).
  * net/mlx5e: Disable MACsec offload for uplink representor profile (git-
    fixes).
  * net/mlx5e: Fix ethtool -N flow-type ip4 to RSS context (git-fixes).
  * net/mlx5e: Prevent bridge link show failure for non-eswitch-allowed devices
    (git-fixes).
  * net/mlx5e: SHAMPO, Make reserved size independent of page size (git-fixes).
  * net/tcp: refactor tcp_inet6_sk() (git-fixes).
  * net: Add non-RCU dev_getbyhwaddr() helper (git-fixes).
  * net: Clear old fragment checksum value in napi_reuse_skb (git-fixes).
  * net: Handle napi_schedule() calls from non-interrupt (git-fixes).
  * net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes).
  * net: Remove acked SYN flag from packet in the transmit queue correctly (git-
    fixes).
  * net: annotate data-races around sk->sk_dst_pending_confirm (git-fixes).
  * net: annotate data-races around sk->sk_tx_queue_mapping (git-fixes).
  * net: blackhole_dev: fix build warning for ethh set but not used (git-fixes).
  * net: do not dump stack on queue timeout (git-fixes).
  * net: ethtool: Do not call .cleanup_data when prepare_data fails (git-fixes).
  * net: ethtool: Fix RSS setting (git-fixes).
  * net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes).
  * net: ipv6: fix UDPv6 GSO segmentation with NAT (git-fixes).
  * net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes).
  * net: loopback: Avoid sending IP packets without an Ethernet header (git-
    fixes).
  * net: mana: Switch to page pool for jumbo frames (git-fixes).
  * net: mark racy access on sk->sk_rcvbuf (git-fixes).
  * net: phy: leds: fix memory leak (git-fixes).
  * net: phy: microchip: force IRQ polling mode for lan88xx (git-fixes).
  * net: qede: Initialize qede_ll_ops with designated initializer (git-fixes).
  * net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes).
  * net: sctp: fix skb leak in sctp_inq_free() (git-fixes).
  * net: set SOCK_RCU_FREE before inserting socket into hashtable (git-fixes).
  * net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes).
  * net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension
    (git-fixes).
  * net: usb: asix_devices: add FiberGecko DeviceID (stable-fixes).
  * net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes).
  * net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes).
  * net_sched: drr: Fix double list add in class with netem as child qdisc (git-
    fixes).
  * net_sched: ets: Fix double list add in class with netem as child qdisc (git-
    fixes).
  * net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
    (git-fixes).
  * net_sched: qfq: Fix double list add in class with netem as child qdisc (git-
    fixes).
  * netdev-genl: avoid empty messages in queue dump (git-fixes).
  * netdev: fix repeated netlink messages in queue dump (git-fixes).
  * netlink: annotate data-races around sk->sk_err (git-fixes).
  * netpoll: Ensure clean state on setup failures (git-fixes).
  * netpoll: Use rcu_access_pointer() in netpoll_poll_lock (git-fixes).
  * nfs: add missing selections of CONFIG_CRC32 (git-fixes).
  * nfs: clear SB_RDONLY before getting superblock (bsc#1238565).
  * nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes).
  * nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565).
  * nfsd: add list_head nf_gc to struct nfsd_file (git-fixes).
  * nfsd: decrease sc_count directly if fail to queue dl_recall (git-fixes).
  * nfsd: put dl_stid if fail to queue dl_recall (git-fixes).
  * nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes).
  * nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git-
    fixes).
  * ntb: Force physically contiguous allocation of rx ring buffers (git-fixes).
  * ntb: intel: Fix using link status DB's (git-fixes).
  * ntb: reduce stack usage in idt_scan_mws (stable-fixes).
  * ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes).
  * ntb_hw_amd: Add NTB PCI ID for new gen CPU (stable-fixes).
  * ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans
    (git-fixes).
  * ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk()
    (git-fixes).
  * ntb_perf: Fix printk format (git-fixes).
  * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes
    bsc#1223096).
  * nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148).
  * nvme-pci: clean up CMBMSC when registering CMB fails (git-fixes).
  * nvme-pci: fix queue unquiesce check on slot_reset (git-fixes).
  * nvme-pci: fix stuck reset on concurrent DPC and HP (git-fixes).
  * nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes).
  * nvme-pci: skip CMB blocks incompatible with PCI P2P DMA (git-fixes).
  * nvme-pci: skip nvme_write_sq_db on empty rqlist (git-fixes).
  * nvme-tcp: fix possible UAF in nvme_tcp_poll (git-fixes).
  * nvme-tcp: fix premature queue removal and I/O failover (git-fixes).
  * nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes).
  * nvme/ioctl: do not warn on vectorized uring_cmd with fixed buffer (git-
    fixes).
  * nvme: Add 'partial_nid' quirk (bsc#1241148).
  * nvme: Add warning when a partiually unique NID is detected (bsc#1241148).
  * nvme: fixup scan failure for non-ANA multipath controllers (git-fixes).
  * nvme: multipath: fix return value of nvme_available_path (git-fixes).
  * nvme: re-read ANA log page after ns scan completes (git-fixes).
  * nvme: requeue namespace scan on missed AENs (git-fixes).
  * nvme: unblock ctrl state transition for firmware update (git-fixes).
  * nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes).
  * nvmet-fc: inline nvmet_fc_free_hostport (git-fixes).
  * nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes).
  * nvmet-fc: take tgtport reference only once (git-fixes).
  * nvmet-fc: update tgtport ref per assoc (git-fixes).
  * nvmet-fcloop: Remove remote port from list when unlinking (git-fixes).
  * nvmet-fcloop: add ref counting to lport (git-fixes).
  * nvmet-fcloop: replace kref with refcount (git-fixes).
  * nvmet-fcloop: swap list_add_tail arguments (git-fixes).
  * nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes).
  * objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git-
    fixes).
  * objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963).
  * objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq()
    (git-fixes).
  * objtool: Fix segfault in ignore_unreachable_insn() (git-fixes).
  * ocfs2: fix the issue with discontiguous allocation in the global_bitmap
    (git-fixes).
  * octeontx2-pf: qos: fix VF root node parent queue index (git-fixes).
  * padata: do not leak refcount in reorder_work (git-fixes).
  * perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS
    (bsc#1234698 jsc#PED-12309).
  * perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309).
  * perf tools: annotate asm_pure_loop.S (bsc#1239906).
  * perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309).
  * perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering (bsc#1242172)
  * perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc (bsc#1242172)
  * perf: arm_cspmu: nvidia: monitor all ports by default (bsc#1242172)
  * perf: arm_cspmu: nvidia: remove unsupported SCF events (bsc#1242172)
  * phy: Fix error handling in tegra_xusb_port_init (git-fixes).
  * phy: freescale: imx8m-pcie: assert phy reset and perst in power off (git-
    fixes).
  * phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes).
  * phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes).
  * phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git-
    fixes).
  * phy: tegra: xusb: remove a stray unlock (git-fixes).
  * pinctrl: renesas: rza2: Fix potential NULL pointer dereference (stable-
    fixes).
  * platform/x86/amd/pmc: Declare quirk_spurious_8042 for MECHREVO Wujie 14XA
    (GX4HRXL) (git-fixes).
  * platform/x86/amd: pmc: Require at least 2.5 seconds between HW sleep cycles
    (stable-fixes).
  * platform/x86/intel-uncore-freq: Fix missing uncore sysfs during CPU hotplug
    (git-fixes).
  * platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes).
  * platform/x86: ISST: Correct command storage data length (git-fixes).
  * platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection (git-fixes).
  * platform/x86: dell-wmi-sysman: Avoid buffer overflow in
    current_password_store() (git-fixes).
  * platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet
    (stable-fixes).
  * pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable-
    fixes).
  * powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request()
    (git-fixes).
  * powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes).
  * powercap: intel_rapl: Introduce APIs for PMU support (bsc#1241010).
  * powercap: intel_rapl_tpmi: Enable PMU support (bsc#1241010).
  * powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes).
  * powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes).
  * powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes).
  * powerpc/boot: Check for ld-option support (bsc#1215199).
  * powerpc/boot: Fix dash warning (bsc#1215199).
  * powerpc/pseries/iommu: create DDW for devices with DMA mask less than
    64-bits (bsc#1239691 bsc#1243044 ltc#212555).
  * pwm: fsl-ftm: Handle clk_get_rate() returning 0 (git-fixes).
  * pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config() (git-fixes).
  * pwm: rcar: Improve register calculation (git-fixes).
  * qibfs: fix _another_ leak (git-fixes)
  * rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes)
  * rcu/tasks: Handle new PF_IDLE semantics (git-fixes)
  * rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes)
  * rcu: Introduce rcu_cpu_online() (git-fixes)
  * regulator: max20086: fix invalid memory access (git-fixes).
  * rpm/kernel-binary.spec.in: Also order against update-bootloader
    (boo#1228659, boo#1240785, boo#1241038).
  * rtc: pcf85063: do a SW reset if POR failed (stable-fixes).
  * rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013).
  * s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805).
  * s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979).
  * s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978).
  * sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052)
  * scsi: Improve CDL control (git-fixes).
  * scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes).
  * scsi: core: Use GFP_NOIO to avoid circular locking dependency (git-fixes).
  * scsi: hisi_sas: Enable force phy when SATA disk directly connected (git-
    fixes).
  * scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git-
    fixes).
  * scsi: iscsi: Fix missing scsi_host_put() in error path (git-fixes).
  * scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk
    (bsc#1242993).
  * scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993).
  * scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993).
  * scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993).
  * scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands
    (bsc#1242993).
  * scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993).
  * scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset
    (bsc#1242993).
  * scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI
    retry (bsc#1242993).
  * scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset
    (bsc#1242993).
  * scsi: lpfc: Restore clearing of NLP_UNREG_INP in ndlp->nlp_flag (git-fixes).
  * scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993).
  * scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966).
  * scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993).
  * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes).
  * scsi: mpi3mr: Fix locking in an error path (git-fixes).
  * scsi: mpt3sas: Fix a locking bug in an error path (git-fixes).
  * scsi: mpt3sas: Reduce log level of ignore_delay_remove message to KERN_INFO
    (git-fixes).
  * scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes).
  * scsi: qla2xxx: Fix typos in a comment (bsc#1243090).
  * scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090).
  * scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090).
  * scsi: qla2xxx: Remove unused module parameters (bsc#1243090).
  * scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090).
  * scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090).
  * scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090).
  * scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090).
  * scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090).
  * scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090).
  * scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090).
  * scsi: scsi_debug: Remove a reference to in_use_bm (git-fixes).
  * sctp: Fix undefined behavior in left shift operation (git-fixes).
  * sctp: add mutual exclusion in proc_sctp_do_udp_port() (git-fixes).
  * sctp: detect and prevent references to a freed transport in sendmsg (git-
    fixes).
  * sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start
    (git-fixes).
  * sctp: fix association labeling in the duplicate COOKIE-ECHO case (git-
    fixes).
  * sctp: fix busy polling (git-fixes).
  * sctp: prefer struct_size over open coded arithmetic (git-fixes).
  * sctp: support MSG_ERRQUEUE flag in recvmsg() (git-fixes).
  * security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375).
  * selftests/bpf: Add a few tests to cover (git-fixes).
  * selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes).
  * selftests/bpf: extend changes_pkt_data with cases w/o subprograms
    (bsc#1241590).
  * selftests/bpf: freplace tests for tracking of changes_packet_data
    (bsc#1241590).
  * selftests/bpf: test for changing packet data from global functions
    (bsc#1241590).
  * selftests/bpf: validate that tail call invalidates packet pointers
    (bsc#1241590).
  * selftests/futex: futex_waitv wouldblock test should fail (git-fixes).
  * selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test
    (bsc#1242203).
  * selftests/mm: generate a temporary mountpoint for cgroup filesystem (git-
    fixes).
  * selinux: Implement mptcp_add_subflow hook (bsc#1240375).
  * serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes).
  * serial: msm: Configure correct working mode before starting earlycon (git-
    fixes).
  * serial: sifive: lock port in startup()/shutdown() callbacks (git-fixes).
  * smb3: fix Open files on server counter going negative (git-fixes).
  * smb: client: Use str_yes_no() helper function (git-fixes).
  * smb: client: allow more DFS referrals to be cached (git-fixes).
  * smb: client: avoid unnecessary reconnects when refreshing referrals (git-
    fixes).
  * smb: client: change return value in open_cached_dir_by_dentry() if !cfids
    (git-fixes).
  * smb: client: do not retry DFS targets on server shutdown (git-fixes).
  * smb: client: do not trust DFSREF_STORAGE_SERVER bit (git-fixes).
  * smb: client: do not try following DFS links in cifs_tree_connect() (git-
    fixes).
  * smb: client: fix DFS interlink failover (git-fixes).
  * smb: client: fix DFS mount against old servers with NTLMSSP (git-fixes).
  * smb: client: fix folio leaks and perf improvements (bsc#1239997,
    bsc1241265).
  * smb: client: fix hang in wait_for_response() for negproto (bsc#1242709).
  * smb: client: fix open_cached_dir retries with 'hard' mount option
    (bsc#1240616).
  * smb: client: fix potential race in cifs_put_tcon() (git-fixes).
  * smb: client: fix return value of parse_dfs_referrals() (git-fixes).
  * smb: client: get rid of @nlsc param in cifs_tree_connect() (git-fixes).
  * smb: client: get rid of TCP_Server_Info::refpath_lock (git-fixes).
  * smb: client: get rid of kstrdup() in get_ses_refpath() (git-fixes).
  * smb: client: improve purging of cached referrals (git-fixes).
  * smb: client: introduce av_for_each_entry() helper (git-fixes).
  * smb: client: optimize referral walk on failed link targets (git-fixes).
  * smb: client: parse DNS domain name from domain= option (git-fixes).
  * smb: client: parse av pair type 4 in CHALLENGE_MESSAGE (git-fixes).
  * smb: client: provide dns_resolve_{unc,name} helpers (git-fixes).
  * smb: client: refresh referral without acquiring refpath_lock (git-fixes).
  * smb: client: remove unnecessary checks in open_cached_dir() (git-fixes).
  * sound/virtio: Fix cancel_sync warnings on uninitialized work_structs
    (stable-fixes).
  * spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes).
  * spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes).
  * spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes).
  * spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes).
  * spi: tegra114: Do not fail set_cs_timing when delays are zero (git-fixes).
  * spi: tegra114: Use value to check for invalid delays (git-fixes).
  * spi: tegra210-quad: add rate limiting and simplify timeout error message
    (stable-fixes).
  * spi: tegra210-quad: use WARN_ON_ONCE instead of WARN_ON for timeouts
    (stable-fixes).
  * splice: remove duplicate noinline from pipe_clear_nowait (bsc#1242328).
  * staging: axis-fifo: Correct handling of tx_fifo_depth for size validation
    (git-fixes).
  * staging: axis-fifo: Remove hardware resets for user errors (git-fixes).
  * staging: iio: adc: ad7816: Correct conditional logic for store mode (git-
    fixes).
  * staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes).
  * string: Add load_unaligned_zeropad() code path to sized_strscpy() (git-
    fixes).
  * tcp: fix mptcp DSS corruption due to large pmtu xmit (git-fixes).
  * tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes).
  * tcp_cubic: fix incorrect HyStart round start detection (git-fixes).
  * thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git-
    fixes).
  * thunderbolt: Scan retimers after device router has been enumerated (stable-
    fixes).
  * tools/hv: update route parsing in kvp daemon (git-fixes).
  * tools/power turbostat: Increase CPU_SUBSET_MAXCPUS to 8192 (bsc#1241175).
  * tools/power turbostat: report CoreThr per measurement interval (git-fixes).
  * topology: Set capacity_freq_ref in all cases (bsc#1238052)
  * tpm, tpm_tis: Workaround failed command reception on Infineon devices
    (bsc#1235870).
  * tpm: tis: Double the timeout B to 4s (bsc#1235870).
  * tpm_tis: Move CRC check to generic send routine (bsc#1235870).
  * tpm_tis: Use responseRetry to recover from data transfer errors
    (bsc#1235870).
  * tty: n_tty: use uint for space returned by tty_write_room() (git-fixes).
  * tty: serial: 8250: Add Brainboxes XC devices (stable-fixes).
  * tty: serial: 8250: Add some more device IDs (stable-fixes).
  * tty: serial: fsl_lpuart: disable transmitter before changing RS485 related
    registers (git-fixes).
  * tty: serial: lpuart: only disable CTS instead of overwriting the whole
    UARTMODIR register (git-fixes).
  * ublk: set_params: properly check if parameters can be applied (git-fixes).
  * ucsi_ccg: Do not show failed to get FW build information error (git-fixes).
  * udf: Fix inode_getblk() return value (bsc#1242313).
  * udf: Skip parent dir link count update if corrupted (bsc#1242315).
  * udf: Verify inode link counts before performing rename (bsc#1242314).
  * usb: cdns3: Fix deadlock when using NCM gadget (git-fixes).
  * usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version (git-
    fixes).
  * usb: chipidea: ci_hdrc_imx: fix call balance of regulator routines (git-
    fixes).
  * usb: chipidea: ci_hdrc_imx: implement usb_phy_init() error handling (git-
    fixes).
  * usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes).
  * usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield
    (stable-fixes).
  * usb: dwc3: gadget: Refactor loop to avoid NULL endpoints (stable-fixes).
  * usb: dwc3: gadget: check that event count does not exceed event buffer
    length (git-fixes).
  * usb: dwc3: xilinx: Prevent spike in reset signal (git-fixes).
  * usb: gadget: Use get_status callback to set remote wakeup capability (git-
    fixes).
  * usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev() (stable-
    fixes).
  * usb: gadget: f_ecm: Add get_status callback (git-fixes).
  * usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN (git-fixes).
  * usb: host: max3421-hcd: Add missing spi_device_id table (stable-fixes).
  * usb: host: tegra: Prevent host controller crash when OTG port is used (git-
    fixes).
  * usb: host: xhci-plat: mvebu: use ->quirks instead of ->init_quirk() func
    (stable-fixes).
  * usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive (stable-
    fixes).
  * usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive (stable-
    fixes).
  * usb: typec: class: Invalidate USB device pointers on partner unregistration
    (git-fixes).
  * usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition
    (git-fixes).
  * usb: typec: ucsi: displayport: Fix NULL pointer access (git-fixes).
  * usb: uhci-platform: Make the clock really optional (git-fixes).
  * usb: usbtmc: Fix erroneous generic_read ioctl return (git-fixes).
  * usb: usbtmc: Fix erroneous get_stb ioctl error returns (git-fixes).
  * usb: usbtmc: Fix erroneous wait_srq ioctl return (git-fixes).
  * usb: xhci: correct debug message page size calculation (git-fixes).
  * usbnet:fix NPE during rx_complete (git-fixes).
  * vdpa/mlx5: Fix oversized null mkey longer than 32bit (git-fixes).
  * vfs: do not mod negative dentry count when on shrinker list (bsc#1242534).
  * vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git-
    fixes).
  * virtchnl: make proto and filter action count unsigned (git-fixes).
  * virtio_console: fix missing byte order handling for cols and rows (git-
    fixes).
  * vmxnet3: Fix tx queue race condition with XDP (bsc#1241394).
  * vmxnet3: unregister xdp rxq info in the reset path (bsc#1241394).
  * wifi: at76c50x: fix use after free access in at76_disconnect (git-fixes).
  * wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes).
  * wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi
    (stable-fixes).
  * wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process (stable-
    fixes).
  * wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()
    (git-fixes).
  * wifi: brcmfmac: keep power during suspend if board requires it (stable-
    fixes).
  * wifi: cfg80211: fix out-of-bounds access during multi-link element
    defragmentation (git-fixes).
  * wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes).
  * wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes).
  * wifi: mac80211: Purge vif txq in ieee80211_do_stop() (git-fixes).
  * wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request
    (git-fixes).
  * wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()
    (git-fixes).
  * wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state
    (stable-fixes).
  * wifi: mt76: disable napi on driver removal (git-fixes).
  * wifi: mt76: mt76x2u: add TP-Link TL-WDN6200 ID to device table (stable-
    fixes).
  * wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release (git-fixes).
  * wifi: wl1251: fix memory leak in wl1251_tx_work (git-fixes).
  * x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
  * x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
  * x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).
  * x86/bugs: Add RSB mitigation document (git-fixes).
  * x86/bugs: Do not fill RSB on VMEXIT with eIBRS+retpoline (git-fixes).
  * x86/bugs: Do not fill RSB on context switch with eIBRS (git-fixes).
  * x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git-
    fixes).
  * x86/bugs: Rename entry_ibpb() to write_ibpb() (git-fixes).
  * x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes).
  * x86/dumpstack: Fix inaccurate unwinding from exception stacks due to
    misplaced assignment (git-fixes).
  * x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes).
  * x86/hyperv: Fix check of return value from snp_set_vmsa() (git-fixes).
  * x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes).
  * x86/microcode/AMD: Fix a -Wsometimes-uninitialized clang false positive
    (git-fixes).
  * x86/microcode/AMD: Flush patch buffer mapping after application (git-fixes).
  * x86/microcode/AMD: Pay attention to the stepping dynamically (git-fixes).
  * x86/microcode/AMD: Split load_microcode_amd() (git-fixes).
  * x86/microcode/AMD: Use the family,model,stepping encoded in the patch ID
    (git-fixes).
  * x86/microcode/intel: Set new revision only after a successful update (git-
    fixes).
  * x86/microcode: Remove the driver announcement and version (git-fixes).
  * x86/microcode: Rework early revisions reporting (git-fixes).
  * x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes).
  * x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git-
    fixes).
  * x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes).
  * x86/uaccess: Improve performance by aligning writes to 8 bytes in
    copy_user_generic(), on non-FSRM/ERMS CPUs (git-fixes).
  * x86/xen: move xen_reserve_extra_memory() (git-fixes).
  * xen/mcelog: Add __nonstring annotations for unterminated strings (git-
    fixes).
  * xen: Change xen-acpi-processor dom0 dependency (git-fixes).
  * xenfs/xensyms: respect hypervisor's "next" indication (git-fixes).
  * xfs: flush inodegc before swapon (git-fixes).
  * xhci: Add helper to set an interrupters interrupt moderation interval (git-
    fixes).
  * xhci: Clean up stale comment on ERST_SIZE macro (stable-fixes).
  * xhci: Fix null pointer dereference during S4 resume when resetting ep0
    (bsc#1235550).
  * xhci: Reconfigure endpoint 0 max packet size only during endpoint reset
    (bsc#1235550).
  * xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550).
  * xhci: split free interrupter into separate remove and free parts (git-
    fixes).
  * xsk: Add truesize to skb_add_rx_frag() (git-fixes).
  * xsk: Do not assume metadata is always requested in TX completion (git-
    fixes).
  * zap_pid_ns_processes: clear TIF_NOTIFY_SIGNAL along with TIF_SIGPENDING
    (bsc#1241167).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.6  
    zypper in -t patch openSUSE-SLE-15.6-2025-1964=1

  * SUSE Linux Enterprise Live Patching 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1964=1

  * SUSE Real Time Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2025-1964=1

## Package List:

  * openSUSE Leap 15.6 (x86_64)
    * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.39.1
    * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.39.1
    * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.39.1
    * kselftests-kmp-rt-debuginfo-6.4.0-150600.10.39.1
    * kernel-rt-livepatch-devel-6.4.0-150600.10.39.1
    * kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.39.1
    * gfs2-kmp-rt-6.4.0-150600.10.39.1
    * reiserfs-kmp-rt-6.4.0-150600.10.39.1
    * kernel-rt-devel-debuginfo-6.4.0-150600.10.39.1
    * reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.39.1
    * kernel-rt-optional-debuginfo-6.4.0-150600.10.39.1
    * kernel-rt-vdso-debuginfo-6.4.0-150600.10.39.1
    * dlm-kmp-rt-debuginfo-6.4.0-150600.10.39.1
    * cluster-md-kmp-rt-6.4.0-150600.10.39.1
    * kernel-rt-debugsource-6.4.0-150600.10.39.1
    * kernel-rt-extra-6.4.0-150600.10.39.1
    * kernel-rt-vdso-6.4.0-150600.10.39.1
    * kernel-rt_debug-devel-6.4.0-150600.10.39.1
    * kselftests-kmp-rt-6.4.0-150600.10.39.1
    * kernel-rt_debug-debugsource-6.4.0-150600.10.39.1
    * dlm-kmp-rt-6.4.0-150600.10.39.1
    * kernel-rt-optional-6.4.0-150600.10.39.1
    * ocfs2-kmp-rt-6.4.0-150600.10.39.1
    * kernel-rt-debuginfo-6.4.0-150600.10.39.1
    * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.39.1
    * kernel-rt_debug-vdso-6.4.0-150600.10.39.1
    * kernel-rt_debug-debuginfo-6.4.0-150600.10.39.1
    * kernel-syms-rt-6.4.0-150600.10.39.1
    * kernel-rt-extra-debuginfo-6.4.0-150600.10.39.1
    * kernel-rt-devel-6.4.0-150600.10.39.1
  * openSUSE Leap 15.6 (noarch)
    * kernel-devel-rt-6.4.0-150600.10.39.1
    * kernel-source-rt-6.4.0-150600.10.39.1
  * openSUSE Leap 15.6 (nosrc x86_64)
    * kernel-rt-6.4.0-150600.10.39.1
    * kernel-rt_debug-6.4.0-150600.10.39.1
  * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
    * kernel-livepatch-6_4_0-150600_10_39-rt-1-150600.1.3.2
    * kernel-livepatch-6_4_0-150600_10_39-rt-debuginfo-1-150600.1.3.2
    * kernel-livepatch-SLE15-SP6-RT_Update_11-debugsource-1-150600.1.3.2
  * SUSE Real Time Module 15-SP6 (x86_64)
    * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.39.1
    * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.39.1
    * kernel-rt_debug-devel-6.4.0-150600.10.39.1
    * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.39.1
    * kernel-rt_debug-debugsource-6.4.0-150600.10.39.1
    * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.39.1
    * dlm-kmp-rt-debuginfo-6.4.0-150600.10.39.1
    * dlm-kmp-rt-6.4.0-150600.10.39.1
    * cluster-md-kmp-rt-6.4.0-150600.10.39.1
    * gfs2-kmp-rt-6.4.0-150600.10.39.1
    * kernel-rt-debugsource-6.4.0-150600.10.39.1
    * kernel-rt_debug-debuginfo-6.4.0-150600.10.39.1
    * kernel-syms-rt-6.4.0-150600.10.39.1
    * ocfs2-kmp-rt-6.4.0-150600.10.39.1
    * kernel-rt-devel-debuginfo-6.4.0-150600.10.39.1
    * kernel-rt-debuginfo-6.4.0-150600.10.39.1
    * kernel-rt-devel-6.4.0-150600.10.39.1
  * SUSE Real Time Module 15-SP6 (noarch)
    * kernel-devel-rt-6.4.0-150600.10.39.1
    * kernel-source-rt-6.4.0-150600.10.39.1
  * SUSE Real Time Module 15-SP6 (nosrc x86_64)
    * kernel-rt-6.4.0-150600.10.39.1
    * kernel-rt_debug-6.4.0-150600.10.39.1

## References:

  * https://www.suse.com/security/cve/CVE-2023-53034.html
  * https://www.suse.com/security/cve/CVE-2023-53146.html
  * https://www.suse.com/security/cve/CVE-2024-27018.html
  * https://www.suse.com/security/cve/CVE-2024-27415.html
  * https://www.suse.com/security/cve/CVE-2024-28956.html
  * https://www.suse.com/security/cve/CVE-2024-35840.html
  * https://www.suse.com/security/cve/CVE-2024-43869.html
  * https://www.suse.com/security/cve/CVE-2024-46713.html
  * https://www.suse.com/security/cve/CVE-2024-46763.html
  * https://www.suse.com/security/cve/CVE-2024-46865.html
  * https://www.suse.com/security/cve/CVE-2024-50038.html
  * https://www.suse.com/security/cve/CVE-2024-50083.html
  * https://www.suse.com/security/cve/CVE-2024-50106.html
  * https://www.suse.com/security/cve/CVE-2024-50162.html
  * https://www.suse.com/security/cve/CVE-2024-50163.html
  * https://www.suse.com/security/cve/CVE-2024-50223.html
  * https://www.suse.com/security/cve/CVE-2024-53124.html
  * https://www.suse.com/security/cve/CVE-2024-53135.html
  * https://www.suse.com/security/cve/CVE-2024-53139.html
  * https://www.suse.com/security/cve/CVE-2024-54458.html
  * https://www.suse.com/security/cve/CVE-2024-56641.html
  * https://www.suse.com/security/cve/CVE-2024-56702.html
  * https://www.suse.com/security/cve/CVE-2024-57924.html
  * https://www.suse.com/security/cve/CVE-2024-57998.html
  * https://www.suse.com/security/cve/CVE-2024-58001.html
  * https://www.suse.com/security/cve/CVE-2024-58018.html
  * https://www.suse.com/security/cve/CVE-2024-58068.html
  * https://www.suse.com/security/cve/CVE-2024-58070.html
  * https://www.suse.com/security/cve/CVE-2024-58071.html
  * https://www.suse.com/security/cve/CVE-2024-58088.html
  * https://www.suse.com/security/cve/CVE-2024-58093.html
  * https://www.suse.com/security/cve/CVE-2024-58094.html
  * https://www.suse.com/security/cve/CVE-2024-58095.html
  * https://www.suse.com/security/cve/CVE-2024-58096.html
  * https://www.suse.com/security/cve/CVE-2024-58097.html
  * https://www.suse.com/security/cve/CVE-2024-58098.html
  * https://www.suse.com/security/cve/CVE-2024-58099.html
  * https://www.suse.com/security/cve/CVE-2024-58100.html
  * https://www.suse.com/security/cve/CVE-2024-58237.html
  * https://www.suse.com/security/cve/CVE-2025-21629.html
  * https://www.suse.com/security/cve/CVE-2025-21648.html
  * https://www.suse.com/security/cve/CVE-2025-21683.html
  * https://www.suse.com/security/cve/CVE-2025-21696.html
  * https://www.suse.com/security/cve/CVE-2025-21702.html
  * https://www.suse.com/security/cve/CVE-2025-21707.html
  * https://www.suse.com/security/cve/CVE-2025-21729.html
  * https://www.suse.com/security/cve/CVE-2025-21755.html
  * https://www.suse.com/security/cve/CVE-2025-21758.html
  * https://www.suse.com/security/cve/CVE-2025-21768.html
  * https://www.suse.com/security/cve/CVE-2025-21787.html
  * https://www.suse.com/security/cve/CVE-2025-21792.html
  * https://www.suse.com/security/cve/CVE-2025-21806.html
  * https://www.suse.com/security/cve/CVE-2025-21808.html
  * https://www.suse.com/security/cve/CVE-2025-21812.html
  * https://www.suse.com/security/cve/CVE-2025-21814.html
  * https://www.suse.com/security/cve/CVE-2025-21833.html
  * https://www.suse.com/security/cve/CVE-2025-21836.html
  * https://www.suse.com/security/cve/CVE-2025-21852.html
  * https://www.suse.com/security/cve/CVE-2025-21853.html
  * https://www.suse.com/security/cve/CVE-2025-21854.html
  * https://www.suse.com/security/cve/CVE-2025-21863.html
  * https://www.suse.com/security/cve/CVE-2025-21867.html
  * https://www.suse.com/security/cve/CVE-2025-21873.html
  * https://www.suse.com/security/cve/CVE-2025-21875.html
  * https://www.suse.com/security/cve/CVE-2025-21881.html
  * https://www.suse.com/security/cve/CVE-2025-21884.html
  * https://www.suse.com/security/cve/CVE-2025-21887.html
  * https://www.suse.com/security/cve/CVE-2025-21889.html
  * https://www.suse.com/security/cve/CVE-2025-21894.html
  * https://www.suse.com/security/cve/CVE-2025-21895.html
  * https://www.suse.com/security/cve/CVE-2025-21904.html
  * https://www.suse.com/security/cve/CVE-2025-21905.html
  * https://www.suse.com/security/cve/CVE-2025-21906.html
  * https://www.suse.com/security/cve/CVE-2025-21908.html
  * https://www.suse.com/security/cve/CVE-2025-21909.html
  * https://www.suse.com/security/cve/CVE-2025-21910.html
  * https://www.suse.com/security/cve/CVE-2025-21912.html
  * https://www.suse.com/security/cve/CVE-2025-21913.html
  * https://www.suse.com/security/cve/CVE-2025-21914.html
  * https://www.suse.com/security/cve/CVE-2025-21915.html
  * https://www.suse.com/security/cve/CVE-2025-21916.html
  * https://www.suse.com/security/cve/CVE-2025-21917.html
  * https://www.suse.com/security/cve/CVE-2025-21918.html
  * https://www.suse.com/security/cve/CVE-2025-21919.html
  * https://www.suse.com/security/cve/CVE-2025-21922.html
  * https://www.suse.com/security/cve/CVE-2025-21923.html
  * https://www.suse.com/security/cve/CVE-2025-21924.html
  * https://www.suse.com/security/cve/CVE-2025-21925.html
  * https://www.suse.com/security/cve/CVE-2025-21926.html
  * https://www.suse.com/security/cve/CVE-2025-21927.html
  * https://www.suse.com/security/cve/CVE-2025-21928.html
  * https://www.suse.com/security/cve/CVE-2025-21930.html
  * https://www.suse.com/security/cve/CVE-2025-21931.html
  * https://www.suse.com/security/cve/CVE-2025-21934.html
  * https://www.suse.com/security/cve/CVE-2025-21935.html
  * https://www.suse.com/security/cve/CVE-2025-21936.html
  * https://www.suse.com/security/cve/CVE-2025-21937.html
  * https://www.suse.com/security/cve/CVE-2025-21941.html
  * https://www.suse.com/security/cve/CVE-2025-21943.html
  * https://www.suse.com/security/cve/CVE-2025-21948.html
  * https://www.suse.com/security/cve/CVE-2025-21950.html
  * https://www.suse.com/security/cve/CVE-2025-21951.html
  * https://www.suse.com/security/cve/CVE-2025-21953.html
  * https://www.suse.com/security/cve/CVE-2025-21956.html
  * https://www.suse.com/security/cve/CVE-2025-21957.html
  * https://www.suse.com/security/cve/CVE-2025-21960.html
  * https://www.suse.com/security/cve/CVE-2025-21961.html
  * https://www.suse.com/security/cve/CVE-2025-21962.html
  * https://www.suse.com/security/cve/CVE-2025-21963.html
  * https://www.suse.com/security/cve/CVE-2025-21964.html
  * https://www.suse.com/security/cve/CVE-2025-21966.html
  * https://www.suse.com/security/cve/CVE-2025-21968.html
  * https://www.suse.com/security/cve/CVE-2025-21969.html
  * https://www.suse.com/security/cve/CVE-2025-21970.html
  * https://www.suse.com/security/cve/CVE-2025-21971.html
  * https://www.suse.com/security/cve/CVE-2025-21972.html
  * https://www.suse.com/security/cve/CVE-2025-21975.html
  * https://www.suse.com/security/cve/CVE-2025-21978.html
  * https://www.suse.com/security/cve/CVE-2025-21979.html
  * https://www.suse.com/security/cve/CVE-2025-21980.html
  * https://www.suse.com/security/cve/CVE-2025-21981.html
  * https://www.suse.com/security/cve/CVE-2025-21985.html
  * https://www.suse.com/security/cve/CVE-2025-21991.html
  * https://www.suse.com/security/cve/CVE-2025-21992.html
  * https://www.suse.com/security/cve/CVE-2025-21993.html
  * https://www.suse.com/security/cve/CVE-2025-21995.html
  * https://www.suse.com/security/cve/CVE-2025-21996.html
  * https://www.suse.com/security/cve/CVE-2025-21999.html
  * https://www.suse.com/security/cve/CVE-2025-22001.html
  * https://www.suse.com/security/cve/CVE-2025-22003.html
  * https://www.suse.com/security/cve/CVE-2025-22004.html
  * https://www.suse.com/security/cve/CVE-2025-22005.html
  * https://www.suse.com/security/cve/CVE-2025-22007.html
  * https://www.suse.com/security/cve/CVE-2025-22008.html
  * https://www.suse.com/security/cve/CVE-2025-22009.html
  * https://www.suse.com/security/cve/CVE-2025-22010.html
  * https://www.suse.com/security/cve/CVE-2025-22013.html
  * https://www.suse.com/security/cve/CVE-2025-22014.html
  * https://www.suse.com/security/cve/CVE-2025-22015.html
  * https://www.suse.com/security/cve/CVE-2025-22016.html
  * https://www.suse.com/security/cve/CVE-2025-22017.html
  * https://www.suse.com/security/cve/CVE-2025-22018.html
  * https://www.suse.com/security/cve/CVE-2025-22020.html
  * https://www.suse.com/security/cve/CVE-2025-22021.html
  * https://www.suse.com/security/cve/CVE-2025-22025.html
  * https://www.suse.com/security/cve/CVE-2025-22027.html
  * https://www.suse.com/security/cve/CVE-2025-22029.html
  * https://www.suse.com/security/cve/CVE-2025-22030.html
  * https://www.suse.com/security/cve/CVE-2025-22033.html
  * https://www.suse.com/security/cve/CVE-2025-22036.html
  * https://www.suse.com/security/cve/CVE-2025-22044.html
  * https://www.suse.com/security/cve/CVE-2025-22045.html
  * https://www.suse.com/security/cve/CVE-2025-22050.html
  * https://www.suse.com/security/cve/CVE-2025-22053.html
  * https://www.suse.com/security/cve/CVE-2025-22055.html
  * https://www.suse.com/security/cve/CVE-2025-22056.html
  * https://www.suse.com/security/cve/CVE-2025-22057.html
  * https://www.suse.com/security/cve/CVE-2025-22058.html
  * https://www.suse.com/security/cve/CVE-2025-22060.html
  * https://www.suse.com/security/cve/CVE-2025-22062.html
  * https://www.suse.com/security/cve/CVE-2025-22063.html
  * https://www.suse.com/security/cve/CVE-2025-22064.html
  * https://www.suse.com/security/cve/CVE-2025-22065.html
  * https://www.suse.com/security/cve/CVE-2025-22066.html
  * https://www.suse.com/security/cve/CVE-2025-22070.html
  * https://www.suse.com/security/cve/CVE-2025-22075.html
  * https://www.suse.com/security/cve/CVE-2025-22080.html
  * https://www.suse.com/security/cve/CVE-2025-22086.html
  * https://www.suse.com/security/cve/CVE-2025-22088.html
  * https://www.suse.com/security/cve/CVE-2025-22089.html
  * https://www.suse.com/security/cve/CVE-2025-22090.html
  * https://www.suse.com/security/cve/CVE-2025-22093.html
  * https://www.suse.com/security/cve/CVE-2025-22095.html
  * https://www.suse.com/security/cve/CVE-2025-22097.html
  * https://www.suse.com/security/cve/CVE-2025-22102.html
  * https://www.suse.com/security/cve/CVE-2025-22103.html
  * https://www.suse.com/security/cve/CVE-2025-22104.html
  * https://www.suse.com/security/cve/CVE-2025-22105.html
  * https://www.suse.com/security/cve/CVE-2025-22106.html
  * https://www.suse.com/security/cve/CVE-2025-22107.html
  * https://www.suse.com/security/cve/CVE-2025-22108.html
  * https://www.suse.com/security/cve/CVE-2025-22109.html
  * https://www.suse.com/security/cve/CVE-2025-22115.html
  * https://www.suse.com/security/cve/CVE-2025-22116.html
  * https://www.suse.com/security/cve/CVE-2025-22119.html
  * https://www.suse.com/security/cve/CVE-2025-22121.html
  * https://www.suse.com/security/cve/CVE-2025-22124.html
  * https://www.suse.com/security/cve/CVE-2025-22125.html
  * https://www.suse.com/security/cve/CVE-2025-22126.html
  * https://www.suse.com/security/cve/CVE-2025-22128.html
  * https://www.suse.com/security/cve/CVE-2025-2312.html
  * https://www.suse.com/security/cve/CVE-2025-23129.html
  * https://www.suse.com/security/cve/CVE-2025-23131.html
  * https://www.suse.com/security/cve/CVE-2025-23133.html
  * https://www.suse.com/security/cve/CVE-2025-23136.html
  * https://www.suse.com/security/cve/CVE-2025-23138.html
  * https://www.suse.com/security/cve/CVE-2025-23140.html
  * https://www.suse.com/security/cve/CVE-2025-23141.html
  * https://www.suse.com/security/cve/CVE-2025-23142.html
  * https://www.suse.com/security/cve/CVE-2025-23144.html
  * https://www.suse.com/security/cve/CVE-2025-23145.html
  * https://www.suse.com/security/cve/CVE-2025-23146.html
  * https://www.suse.com/security/cve/CVE-2025-23147.html
  * https://www.suse.com/security/cve/CVE-2025-23148.html
  * https://www.suse.com/security/cve/CVE-2025-23149.html
  * https://www.suse.com/security/cve/CVE-2025-23150.html
  * https://www.suse.com/security/cve/CVE-2025-23151.html
  * https://www.suse.com/security/cve/CVE-2025-23156.html
  * https://www.suse.com/security/cve/CVE-2025-23157.html
  * https://www.suse.com/security/cve/CVE-2025-23158.html
  * https://www.suse.com/security/cve/CVE-2025-23159.html
  * https://www.suse.com/security/cve/CVE-2025-23160.html
  * https://www.suse.com/security/cve/CVE-2025-23161.html
  * https://www.suse.com/security/cve/CVE-2025-37740.html
  * https://www.suse.com/security/cve/CVE-2025-37741.html
  * https://www.suse.com/security/cve/CVE-2025-37742.html
  * https://www.suse.com/security/cve/CVE-2025-37747.html
  * https://www.suse.com/security/cve/CVE-2025-37748.html
  * https://www.suse.com/security/cve/CVE-2025-37749.html
  * https://www.suse.com/security/cve/CVE-2025-37750.html
  * https://www.suse.com/security/cve/CVE-2025-37754.html
  * https://www.suse.com/security/cve/CVE-2025-37755.html
  * https://www.suse.com/security/cve/CVE-2025-37758.html
  * https://www.suse.com/security/cve/CVE-2025-37765.html
  * https://www.suse.com/security/cve/CVE-2025-37766.html
  * https://www.suse.com/security/cve/CVE-2025-37767.html
  * https://www.suse.com/security/cve/CVE-2025-37768.html
  * https://www.suse.com/security/cve/CVE-2025-37769.html
  * https://www.suse.com/security/cve/CVE-2025-37770.html
  * https://www.suse.com/security/cve/CVE-2025-37771.html
  * https://www.suse.com/security/cve/CVE-2025-37772.html
  * https://www.suse.com/security/cve/CVE-2025-37773.html
  * https://www.suse.com/security/cve/CVE-2025-37780.html
  * https://www.suse.com/security/cve/CVE-2025-37781.html
  * https://www.suse.com/security/cve/CVE-2025-37782.html
  * https://www.suse.com/security/cve/CVE-2025-37785.html
  * https://www.suse.com/security/cve/CVE-2025-37787.html
  * https://www.suse.com/security/cve/CVE-2025-37788.html
  * https://www.suse.com/security/cve/CVE-2025-37789.html
  * https://www.suse.com/security/cve/CVE-2025-37790.html
  * https://www.suse.com/security/cve/CVE-2025-37792.html
  * https://www.suse.com/security/cve/CVE-2025-37793.html
  * https://www.suse.com/security/cve/CVE-2025-37794.html
  * https://www.suse.com/security/cve/CVE-2025-37796.html
  * https://www.suse.com/security/cve/CVE-2025-37797.html
  * https://www.suse.com/security/cve/CVE-2025-37798.html
  * https://www.suse.com/security/cve/CVE-2025-37799.html
  * https://www.suse.com/security/cve/CVE-2025-37803.html
  * https://www.suse.com/security/cve/CVE-2025-37804.html
  * https://www.suse.com/security/cve/CVE-2025-37805.html
  * https://www.suse.com/security/cve/CVE-2025-37809.html
  * https://www.suse.com/security/cve/CVE-2025-37810.html
  * https://www.suse.com/security/cve/CVE-2025-37812.html
  * https://www.suse.com/security/cve/CVE-2025-37815.html
  * https://www.suse.com/security/cve/CVE-2025-37819.html
  * https://www.suse.com/security/cve/CVE-2025-37820.html
  * https://www.suse.com/security/cve/CVE-2025-37823.html
  * https://www.suse.com/security/cve/CVE-2025-37824.html
  * https://www.suse.com/security/cve/CVE-2025-37829.html
  * https://www.suse.com/security/cve/CVE-2025-37830.html
  * https://www.suse.com/security/cve/CVE-2025-37831.html
  * https://www.suse.com/security/cve/CVE-2025-37833.html
  * https://www.suse.com/security/cve/CVE-2025-37836.html
  * https://www.suse.com/security/cve/CVE-2025-37839.html
  * https://www.suse.com/security/cve/CVE-2025-37840.html
  * https://www.suse.com/security/cve/CVE-2025-37841.html
  * https://www.suse.com/security/cve/CVE-2025-37842.html
  * https://www.suse.com/security/cve/CVE-2025-37849.html
  * https://www.suse.com/security/cve/CVE-2025-37850.html
  * https://www.suse.com/security/cve/CVE-2025-37851.html
  * https://www.suse.com/security/cve/CVE-2025-37852.html
  * https://www.suse.com/security/cve/CVE-2025-37853.html
  * https://www.suse.com/security/cve/CVE-2025-37854.html
  * https://www.suse.com/security/cve/CVE-2025-37858.html
  * https://www.suse.com/security/cve/CVE-2025-37860.html
  * https://www.suse.com/security/cve/CVE-2025-37867.html
  * https://www.suse.com/security/cve/CVE-2025-37870.html
  * https://www.suse.com/security/cve/CVE-2025-37871.html
  * https://www.suse.com/security/cve/CVE-2025-37873.html
  * https://www.suse.com/security/cve/CVE-2025-37875.html
  * https://www.suse.com/security/cve/CVE-2025-37879.html
  * https://www.suse.com/security/cve/CVE-2025-37881.html
  * https://www.suse.com/security/cve/CVE-2025-37886.html
  * https://www.suse.com/security/cve/CVE-2025-37887.html
  * https://www.suse.com/security/cve/CVE-2025-37889.html
  * https://www.suse.com/security/cve/CVE-2025-37890.html
  * https://www.suse.com/security/cve/CVE-2025-37891.html
  * https://www.suse.com/security/cve/CVE-2025-37892.html
  * https://www.suse.com/security/cve/CVE-2025-37897.html
  * https://www.suse.com/security/cve/CVE-2025-37900.html
  * https://www.suse.com/security/cve/CVE-2025-37901.html
  * https://www.suse.com/security/cve/CVE-2025-37903.html
  * https://www.suse.com/security/cve/CVE-2025-37905.html
  * https://www.suse.com/security/cve/CVE-2025-37911.html
  * https://www.suse.com/security/cve/CVE-2025-37912.html
  * https://www.suse.com/security/cve/CVE-2025-37913.html
  * https://www.suse.com/security/cve/CVE-2025-37914.html
  * https://www.suse.com/security/cve/CVE-2025-37915.html
  * https://www.suse.com/security/cve/CVE-2025-37918.html
  * https://www.suse.com/security/cve/CVE-2025-37925.html
  * https://www.suse.com/security/cve/CVE-2025-37928.html
  * https://www.suse.com/security/cve/CVE-2025-37929.html
  * https://www.suse.com/security/cve/CVE-2025-37930.html
  * https://www.suse.com/security/cve/CVE-2025-37931.html
  * https://www.suse.com/security/cve/CVE-2025-37932.html
  * https://www.suse.com/security/cve/CVE-2025-37937.html
  * https://www.suse.com/security/cve/CVE-2025-37943.html
  * https://www.suse.com/security/cve/CVE-2025-37944.html
  * https://www.suse.com/security/cve/CVE-2025-37948.html
  * https://www.suse.com/security/cve/CVE-2025-37949.html
  * https://www.suse.com/security/cve/CVE-2025-37951.html
  * https://www.suse.com/security/cve/CVE-2025-37953.html
  * https://www.suse.com/security/cve/CVE-2025-37954.html
  * https://www.suse.com/security/cve/CVE-2025-37957.html
  * https://www.suse.com/security/cve/CVE-2025-37958.html
  * https://www.suse.com/security/cve/CVE-2025-37959.html
  * https://www.suse.com/security/cve/CVE-2025-37960.html
  * https://www.suse.com/security/cve/CVE-2025-37963.html
  * https://www.suse.com/security/cve/CVE-2025-37969.html
  * https://www.suse.com/security/cve/CVE-2025-37970.html
  * https://www.suse.com/security/cve/CVE-2025-37972.html
  * https://www.suse.com/security/cve/CVE-2025-37974.html
  * https://www.suse.com/security/cve/CVE-2025-37978.html
  * https://www.suse.com/security/cve/CVE-2025-37979.html
  * https://www.suse.com/security/cve/CVE-2025-37980.html
  * https://www.suse.com/security/cve/CVE-2025-37982.html
  * https://www.suse.com/security/cve/CVE-2025-37983.html
  * https://www.suse.com/security/cve/CVE-2025-37985.html
  * https://www.suse.com/security/cve/CVE-2025-37986.html
  * https://www.suse.com/security/cve/CVE-2025-37989.html
  * https://www.suse.com/security/cve/CVE-2025-37990.html
  * https://www.suse.com/security/cve/CVE-2025-38104.html
  * https://www.suse.com/security/cve/CVE-2025-38152.html
  * https://www.suse.com/security/cve/CVE-2025-38240.html
  * https://www.suse.com/security/cve/CVE-2025-38637.html
  * https://www.suse.com/security/cve/CVE-2025-39728.html
  * https://www.suse.com/security/cve/CVE-2025-39735.html
  * https://www.suse.com/security/cve/CVE-2025-40014.html
  * https://www.suse.com/security/cve/CVE-2025-40325.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1215199
  * https://bugzilla.suse.com/show_bug.cgi?id=1220112
  * https://bugzilla.suse.com/show_bug.cgi?id=1223096
  * https://bugzilla.suse.com/show_bug.cgi?id=1223809
  * https://bugzilla.suse.com/show_bug.cgi?id=1224013
  * https://bugzilla.suse.com/show_bug.cgi?id=1224597
  * https://bugzilla.suse.com/show_bug.cgi?id=1224757
  * https://bugzilla.suse.com/show_bug.cgi?id=1226498
  * https://bugzilla.suse.com/show_bug.cgi?id=1228659
  * https://bugzilla.suse.com/show_bug.cgi?id=1229491
  * https://bugzilla.suse.com/show_bug.cgi?id=1230581
  * https://bugzilla.suse.com/show_bug.cgi?id=1230764
  * https://bugzilla.suse.com/show_bug.cgi?id=1231016
  * https://bugzilla.suse.com/show_bug.cgi?id=1231103
  * https://bugzilla.suse.com/show_bug.cgi?id=1231910
  * https://bugzilla.suse.com/show_bug.cgi?id=1232493
  * https://bugzilla.suse.com/show_bug.cgi?id=1232649
  * https://bugzilla.suse.com/show_bug.cgi?id=1232882
  * https://bugzilla.suse.com/show_bug.cgi?id=1233075
  * https://bugzilla.suse.com/show_bug.cgi?id=1233098
  * https://bugzilla.suse.com/show_bug.cgi?id=1233192
  * https://bugzilla.suse.com/show_bug.cgi?id=1234074
  * https://bugzilla.suse.com/show_bug.cgi?id=1234154
  * https://bugzilla.suse.com/show_bug.cgi?id=1234157
  * https://bugzilla.suse.com/show_bug.cgi?id=1234698
  * https://bugzilla.suse.com/show_bug.cgi?id=1235149
  * https://bugzilla.suse.com/show_bug.cgi?id=1235501
  * https://bugzilla.suse.com/show_bug.cgi?id=1235526
  * https://bugzilla.suse.com/show_bug.cgi?id=1235550
  * https://bugzilla.suse.com/show_bug.cgi?id=1235870
  * https://bugzilla.suse.com/show_bug.cgi?id=1235968
  * https://bugzilla.suse.com/show_bug.cgi?id=1236086
  * https://bugzilla.suse.com/show_bug.cgi?id=1236142
  * https://bugzilla.suse.com/show_bug.cgi?id=1236208
  * https://bugzilla.suse.com/show_bug.cgi?id=1236704
  * https://bugzilla.suse.com/show_bug.cgi?id=1237111
  * https://bugzilla.suse.com/show_bug.cgi?id=1237312
  * https://bugzilla.suse.com/show_bug.cgi?id=1237874
  * https://bugzilla.suse.com/show_bug.cgi?id=1237882
  * https://bugzilla.suse.com/show_bug.cgi?id=1238052
  * https://bugzilla.suse.com/show_bug.cgi?id=1238212
  * https://bugzilla.suse.com/show_bug.cgi?id=1238471
  * https://bugzilla.suse.com/show_bug.cgi?id=1238473
  * https://bugzilla.suse.com/show_bug.cgi?id=1238527
  * https://bugzilla.suse.com/show_bug.cgi?id=1238565
  * https://bugzilla.suse.com/show_bug.cgi?id=1238714
  * https://bugzilla.suse.com/show_bug.cgi?id=1238737
  * https://bugzilla.suse.com/show_bug.cgi?id=1238742
  * https://bugzilla.suse.com/show_bug.cgi?id=1238745
  * https://bugzilla.suse.com/show_bug.cgi?id=1238746
  * https://bugzilla.suse.com/show_bug.cgi?id=1238774
  * https://bugzilla.suse.com/show_bug.cgi?id=1238862
  * https://bugzilla.suse.com/show_bug.cgi?id=1238961
  * https://bugzilla.suse.com/show_bug.cgi?id=1238970
  * https://bugzilla.suse.com/show_bug.cgi?id=1238983
  * https://bugzilla.suse.com/show_bug.cgi?id=1238990
  * https://bugzilla.suse.com/show_bug.cgi?id=1238992
  * https://bugzilla.suse.com/show_bug.cgi?id=1239066
  * https://bugzilla.suse.com/show_bug.cgi?id=1239079
  * https://bugzilla.suse.com/show_bug.cgi?id=1239108
  * https://bugzilla.suse.com/show_bug.cgi?id=1239470
  * https://bugzilla.suse.com/show_bug.cgi?id=1239475
  * https://bugzilla.suse.com/show_bug.cgi?id=1239476
  * https://bugzilla.suse.com/show_bug.cgi?id=1239487
  * https://bugzilla.suse.com/show_bug.cgi?id=1239510
  * https://bugzilla.suse.com/show_bug.cgi?id=1239684
  * https://bugzilla.suse.com/show_bug.cgi?id=1239691
  * https://bugzilla.suse.com/show_bug.cgi?id=1239906
  * https://bugzilla.suse.com/show_bug.cgi?id=1239925
  * https://bugzilla.suse.com/show_bug.cgi?id=1239997
  * https://bugzilla.suse.com/show_bug.cgi?id=1240167
  * https://bugzilla.suse.com/show_bug.cgi?id=1240168
  * https://bugzilla.suse.com/show_bug.cgi?id=1240171
  * https://bugzilla.suse.com/show_bug.cgi?id=1240176
  * https://bugzilla.suse.com/show_bug.cgi?id=1240181
  * https://bugzilla.suse.com/show_bug.cgi?id=1240184
  * https://bugzilla.suse.com/show_bug.cgi?id=1240185
  * https://bugzilla.suse.com/show_bug.cgi?id=1240375
  * https://bugzilla.suse.com/show_bug.cgi?id=1240557
  * https://bugzilla.suse.com/show_bug.cgi?id=1240575
  * https://bugzilla.suse.com/show_bug.cgi?id=1240576
  * https://bugzilla.suse.com/show_bug.cgi?id=1240581
  * https://bugzilla.suse.com/show_bug.cgi?id=1240582
  * https://bugzilla.suse.com/show_bug.cgi?id=1240583
  * https://bugzilla.suse.com/show_bug.cgi?id=1240584
  * https://bugzilla.suse.com/show_bug.cgi?id=1240585
  * https://bugzilla.suse.com/show_bug.cgi?id=1240587
  * https://bugzilla.suse.com/show_bug.cgi?id=1240590
  * https://bugzilla.suse.com/show_bug.cgi?id=1240591
  * https://bugzilla.suse.com/show_bug.cgi?id=1240592
  * https://bugzilla.suse.com/show_bug.cgi?id=1240593
  * https://bugzilla.suse.com/show_bug.cgi?id=1240594
  * https://bugzilla.suse.com/show_bug.cgi?id=1240595
  * https://bugzilla.suse.com/show_bug.cgi?id=1240596
  * https://bugzilla.suse.com/show_bug.cgi?id=1240600
  * https://bugzilla.suse.com/show_bug.cgi?id=1240612
  * https://bugzilla.suse.com/show_bug.cgi?id=1240616
  * https://bugzilla.suse.com/show_bug.cgi?id=1240639
  * https://bugzilla.suse.com/show_bug.cgi?id=1240643
  * https://bugzilla.suse.com/show_bug.cgi?id=1240647
  * https://bugzilla.suse.com/show_bug.cgi?id=1240655
  * https://bugzilla.suse.com/show_bug.cgi?id=1240691
  * https://bugzilla.suse.com/show_bug.cgi?id=1240700
  * https://bugzilla.suse.com/show_bug.cgi?id=1240701
  * https://bugzilla.suse.com/show_bug.cgi?id=1240703
  * https://bugzilla.suse.com/show_bug.cgi?id=1240708
  * https://bugzilla.suse.com/show_bug.cgi?id=1240709
  * https://bugzilla.suse.com/show_bug.cgi?id=1240712
  * https://bugzilla.suse.com/show_bug.cgi?id=1240713
  * https://bugzilla.suse.com/show_bug.cgi?id=1240714
  * https://bugzilla.suse.com/show_bug.cgi?id=1240715
  * https://bugzilla.suse.com/show_bug.cgi?id=1240716
  * https://bugzilla.suse.com/show_bug.cgi?id=1240717
  * https://bugzilla.suse.com/show_bug.cgi?id=1240718
  * https://bugzilla.suse.com/show_bug.cgi?id=1240719
  * https://bugzilla.suse.com/show_bug.cgi?id=1240720
  * https://bugzilla.suse.com/show_bug.cgi?id=1240722
  * https://bugzilla.suse.com/show_bug.cgi?id=1240727
  * https://bugzilla.suse.com/show_bug.cgi?id=1240739
  * https://bugzilla.suse.com/show_bug.cgi?id=1240740
  * https://bugzilla.suse.com/show_bug.cgi?id=1240742
  * https://bugzilla.suse.com/show_bug.cgi?id=1240779
  * https://bugzilla.suse.com/show_bug.cgi?id=1240783
  * https://bugzilla.suse.com/show_bug.cgi?id=1240784
  * https://bugzilla.suse.com/show_bug.cgi?id=1240785
  * https://bugzilla.suse.com/show_bug.cgi?id=1240795
  * https://bugzilla.suse.com/show_bug.cgi?id=1240796
  * https://bugzilla.suse.com/show_bug.cgi?id=1240797
  * https://bugzilla.suse.com/show_bug.cgi?id=1240799
  * https://bugzilla.suse.com/show_bug.cgi?id=1240801
  * https://bugzilla.suse.com/show_bug.cgi?id=1240802
  * https://bugzilla.suse.com/show_bug.cgi?id=1240806
  * https://bugzilla.suse.com/show_bug.cgi?id=1240808
  * https://bugzilla.suse.com/show_bug.cgi?id=1240809
  * https://bugzilla.suse.com/show_bug.cgi?id=1240811
  * https://bugzilla.suse.com/show_bug.cgi?id=1240812
  * https://bugzilla.suse.com/show_bug.cgi?id=1240813
  * https://bugzilla.suse.com/show_bug.cgi?id=1240815
  * https://bugzilla.suse.com/show_bug.cgi?id=1240816
  * https://bugzilla.suse.com/show_bug.cgi?id=1240819
  * https://bugzilla.suse.com/show_bug.cgi?id=1240821
  * https://bugzilla.suse.com/show_bug.cgi?id=1240825
  * https://bugzilla.suse.com/show_bug.cgi?id=1240829
  * https://bugzilla.suse.com/show_bug.cgi?id=1240835
  * https://bugzilla.suse.com/show_bug.cgi?id=1240866
  * https://bugzilla.suse.com/show_bug.cgi?id=1240873
  * https://bugzilla.suse.com/show_bug.cgi?id=1240934
  * https://bugzilla.suse.com/show_bug.cgi?id=1240936
  * https://bugzilla.suse.com/show_bug.cgi?id=1240937
  * https://bugzilla.suse.com/show_bug.cgi?id=1240938
  * https://bugzilla.suse.com/show_bug.cgi?id=1240940
  * https://bugzilla.suse.com/show_bug.cgi?id=1240942
  * https://bugzilla.suse.com/show_bug.cgi?id=1240943
  * https://bugzilla.suse.com/show_bug.cgi?id=1240944
  * https://bugzilla.suse.com/show_bug.cgi?id=1240966
  * https://bugzilla.suse.com/show_bug.cgi?id=1240978
  * https://bugzilla.suse.com/show_bug.cgi?id=1240979
  * https://bugzilla.suse.com/show_bug.cgi?id=1241010
  * https://bugzilla.suse.com/show_bug.cgi?id=1241038
  * https://bugzilla.suse.com/show_bug.cgi?id=1241051
  * https://bugzilla.suse.com/show_bug.cgi?id=1241123
  * https://bugzilla.suse.com/show_bug.cgi?id=1241148
  * https://bugzilla.suse.com/show_bug.cgi?id=1241151
  * https://bugzilla.suse.com/show_bug.cgi?id=1241167
  * https://bugzilla.suse.com/show_bug.cgi?id=1241175
  * https://bugzilla.suse.com/show_bug.cgi?id=1241204
  * https://bugzilla.suse.com/show_bug.cgi?id=1241250
  * https://bugzilla.suse.com/show_bug.cgi?id=1241265
  * https://bugzilla.suse.com/show_bug.cgi?id=1241266
  * https://bugzilla.suse.com/show_bug.cgi?id=1241280
  * https://bugzilla.suse.com/show_bug.cgi?id=1241282
  * https://bugzilla.suse.com/show_bug.cgi?id=1241305
  * https://bugzilla.suse.com/show_bug.cgi?id=1241332
  * https://bugzilla.suse.com/show_bug.cgi?id=1241333
  * https://bugzilla.suse.com/show_bug.cgi?id=1241340
  * https://bugzilla.suse.com/show_bug.cgi?id=1241341
  * https://bugzilla.suse.com/show_bug.cgi?id=1241343
  * https://bugzilla.suse.com/show_bug.cgi?id=1241344
  * https://bugzilla.suse.com/show_bug.cgi?id=1241347
  * https://bugzilla.suse.com/show_bug.cgi?id=1241351
  * https://bugzilla.suse.com/show_bug.cgi?id=1241357
  * https://bugzilla.suse.com/show_bug.cgi?id=1241361
  * https://bugzilla.suse.com/show_bug.cgi?id=1241369
  * https://bugzilla.suse.com/show_bug.cgi?id=1241371
  * https://bugzilla.suse.com/show_bug.cgi?id=1241373
  * https://bugzilla.suse.com/show_bug.cgi?id=1241376
  * https://bugzilla.suse.com/show_bug.cgi?id=1241378
  * https://bugzilla.suse.com/show_bug.cgi?id=1241394
  * https://bugzilla.suse.com/show_bug.cgi?id=1241402
  * https://bugzilla.suse.com/show_bug.cgi?id=1241412
  * https://bugzilla.suse.com/show_bug.cgi?id=1241413
  * https://bugzilla.suse.com/show_bug.cgi?id=1241416
  * https://bugzilla.suse.com/show_bug.cgi?id=1241424
  * https://bugzilla.suse.com/show_bug.cgi?id=1241426
  * https://bugzilla.suse.com/show_bug.cgi?id=1241433
  * https://bugzilla.suse.com/show_bug.cgi?id=1241436
  * https://bugzilla.suse.com/show_bug.cgi?id=1241441
  * https://bugzilla.suse.com/show_bug.cgi?id=1241442
  * https://bugzilla.suse.com/show_bug.cgi?id=1241443
  * https://bugzilla.suse.com/show_bug.cgi?id=1241448
  * https://bugzilla.suse.com/show_bug.cgi?id=1241451
  * https://bugzilla.suse.com/show_bug.cgi?id=1241452
  * https://bugzilla.suse.com/show_bug.cgi?id=1241456
  * https://bugzilla.suse.com/show_bug.cgi?id=1241457
  * https://bugzilla.suse.com/show_bug.cgi?id=1241458
  * https://bugzilla.suse.com/show_bug.cgi?id=1241459
  * https://bugzilla.suse.com/show_bug.cgi?id=1241492
  * https://bugzilla.suse.com/show_bug.cgi?id=1241519
  * https://bugzilla.suse.com/show_bug.cgi?id=1241525
  * https://bugzilla.suse.com/show_bug.cgi?id=1241526
  * https://bugzilla.suse.com/show_bug.cgi?id=1241528
  * https://bugzilla.suse.com/show_bug.cgi?id=1241533
  * https://bugzilla.suse.com/show_bug.cgi?id=1241537
  * https://bugzilla.suse.com/show_bug.cgi?id=1241538
  * https://bugzilla.suse.com/show_bug.cgi?id=1241541
  * https://bugzilla.suse.com/show_bug.cgi?id=1241545
  * https://bugzilla.suse.com/show_bug.cgi?id=1241547
  * https://bugzilla.suse.com/show_bug.cgi?id=1241548
  * https://bugzilla.suse.com/show_bug.cgi?id=1241550
  * https://bugzilla.suse.com/show_bug.cgi?id=1241573
  * https://bugzilla.suse.com/show_bug.cgi?id=1241574
  * https://bugzilla.suse.com/show_bug.cgi?id=1241575
  * https://bugzilla.suse.com/show_bug.cgi?id=1241576
  * https://bugzilla.suse.com/show_bug.cgi?id=1241578
  * https://bugzilla.suse.com/show_bug.cgi?id=1241590
  * https://bugzilla.suse.com/show_bug.cgi?id=1241593
  * https://bugzilla.suse.com/show_bug.cgi?id=1241595
  * https://bugzilla.suse.com/show_bug.cgi?id=1241596
  * https://bugzilla.suse.com/show_bug.cgi?id=1241597
  * https://bugzilla.suse.com/show_bug.cgi?id=1241598
  * https://bugzilla.suse.com/show_bug.cgi?id=1241599
  * https://bugzilla.suse.com/show_bug.cgi?id=1241601
  * https://bugzilla.suse.com/show_bug.cgi?id=1241625
  * https://bugzilla.suse.com/show_bug.cgi?id=1241626
  * https://bugzilla.suse.com/show_bug.cgi?id=1241627
  * https://bugzilla.suse.com/show_bug.cgi?id=1241635
  * https://bugzilla.suse.com/show_bug.cgi?id=1241638
  * https://bugzilla.suse.com/show_bug.cgi?id=1241640
  * https://bugzilla.suse.com/show_bug.cgi?id=1241644
  * https://bugzilla.suse.com/show_bug.cgi?id=1241648
  * https://bugzilla.suse.com/show_bug.cgi?id=1241654
  * https://bugzilla.suse.com/show_bug.cgi?id=1241657
  * https://bugzilla.suse.com/show_bug.cgi?id=1242006
  * https://bugzilla.suse.com/show_bug.cgi?id=1242012
  * https://bugzilla.suse.com/show_bug.cgi?id=1242035
  * https://bugzilla.suse.com/show_bug.cgi?id=1242044
  * https://bugzilla.suse.com/show_bug.cgi?id=1242172
  * https://bugzilla.suse.com/show_bug.cgi?id=1242203
  * https://bugzilla.suse.com/show_bug.cgi?id=1242283
  * https://bugzilla.suse.com/show_bug.cgi?id=1242307
  * https://bugzilla.suse.com/show_bug.cgi?id=1242313
  * https://bugzilla.suse.com/show_bug.cgi?id=1242314
  * https://bugzilla.suse.com/show_bug.cgi?id=1242315
  * https://bugzilla.suse.com/show_bug.cgi?id=1242321
  * https://bugzilla.suse.com/show_bug.cgi?id=1242326
  * https://bugzilla.suse.com/show_bug.cgi?id=1242327
  * https://bugzilla.suse.com/show_bug.cgi?id=1242328
  * https://bugzilla.suse.com/show_bug.cgi?id=1242332
  * https://bugzilla.suse.com/show_bug.cgi?id=1242333
  * https://bugzilla.suse.com/show_bug.cgi?id=1242335
  * https://bugzilla.suse.com/show_bug.cgi?id=1242336
  * https://bugzilla.suse.com/show_bug.cgi?id=1242342
  * https://bugzilla.suse.com/show_bug.cgi?id=1242343
  * https://bugzilla.suse.com/show_bug.cgi?id=1242344
  * https://bugzilla.suse.com/show_bug.cgi?id=1242345
  * https://bugzilla.suse.com/show_bug.cgi?id=1242346
  * https://bugzilla.suse.com/show_bug.cgi?id=1242347
  * https://bugzilla.suse.com/show_bug.cgi?id=1242348
  * https://bugzilla.suse.com/show_bug.cgi?id=1242414
  * https://bugzilla.suse.com/show_bug.cgi?id=1242417
  * https://bugzilla.suse.com/show_bug.cgi?id=1242501
  * https://bugzilla.suse.com/show_bug.cgi?id=1242502
  * https://bugzilla.suse.com/show_bug.cgi?id=1242506
  * https://bugzilla.suse.com/show_bug.cgi?id=1242507
  * https://bugzilla.suse.com/show_bug.cgi?id=1242509
  * https://bugzilla.suse.com/show_bug.cgi?id=1242510
  * https://bugzilla.suse.com/show_bug.cgi?id=1242512
  * https://bugzilla.suse.com/show_bug.cgi?id=1242513
  * https://bugzilla.suse.com/show_bug.cgi?id=1242514
  * https://bugzilla.suse.com/show_bug.cgi?id=1242520
  * https://bugzilla.suse.com/show_bug.cgi?id=1242523
  * https://bugzilla.suse.com/show_bug.cgi?id=1242524
  * https://bugzilla.suse.com/show_bug.cgi?id=1242526
  * https://bugzilla.suse.com/show_bug.cgi?id=1242528
  * https://bugzilla.suse.com/show_bug.cgi?id=1242529
  * https://bugzilla.suse.com/show_bug.cgi?id=1242530
  * https://bugzilla.suse.com/show_bug.cgi?id=1242531
  * https://bugzilla.suse.com/show_bug.cgi?id=1242532
  * https://bugzilla.suse.com/show_bug.cgi?id=1242534
  * https://bugzilla.suse.com/show_bug.cgi?id=1242535
  * https://bugzilla.suse.com/show_bug.cgi?id=1242536
  * https://bugzilla.suse.com/show_bug.cgi?id=1242537
  * https://bugzilla.suse.com/show_bug.cgi?id=1242538
  * https://bugzilla.suse.com/show_bug.cgi?id=1242539
  * https://bugzilla.suse.com/show_bug.cgi?id=1242540
  * https://bugzilla.suse.com/show_bug.cgi?id=1242546
  * https://bugzilla.suse.com/show_bug.cgi?id=1242556
  * https://bugzilla.suse.com/show_bug.cgi?id=1242559
  * https://bugzilla.suse.com/show_bug.cgi?id=1242563
  * https://bugzilla.suse.com/show_bug.cgi?id=1242564
  * https://bugzilla.suse.com/show_bug.cgi?id=1242565
  * https://bugzilla.suse.com/show_bug.cgi?id=1242566
  * https://bugzilla.suse.com/show_bug.cgi?id=1242567
  * https://bugzilla.suse.com/show_bug.cgi?id=1242568
  * https://bugzilla.suse.com/show_bug.cgi?id=1242569
  * https://bugzilla.suse.com/show_bug.cgi?id=1242574
  * https://bugzilla.suse.com/show_bug.cgi?id=1242575
  * https://bugzilla.suse.com/show_bug.cgi?id=1242578
  * https://bugzilla.suse.com/show_bug.cgi?id=1242584
  * https://bugzilla.suse.com/show_bug.cgi?id=1242585
  * https://bugzilla.suse.com/show_bug.cgi?id=1242587
  * https://bugzilla.suse.com/show_bug.cgi?id=1242591
  * https://bugzilla.suse.com/show_bug.cgi?id=1242596
  * https://bugzilla.suse.com/show_bug.cgi?id=1242709
  * https://bugzilla.suse.com/show_bug.cgi?id=1242710
  * https://bugzilla.suse.com/show_bug.cgi?id=1242727
  * https://bugzilla.suse.com/show_bug.cgi?id=1242758
  * https://bugzilla.suse.com/show_bug.cgi?id=1242760
  * https://bugzilla.suse.com/show_bug.cgi?id=1242761
  * https://bugzilla.suse.com/show_bug.cgi?id=1242762
  * https://bugzilla.suse.com/show_bug.cgi?id=1242763
  * https://bugzilla.suse.com/show_bug.cgi?id=1242764
  * https://bugzilla.suse.com/show_bug.cgi?id=1242766
  * https://bugzilla.suse.com/show_bug.cgi?id=1242770
  * https://bugzilla.suse.com/show_bug.cgi?id=1242778
  * https://bugzilla.suse.com/show_bug.cgi?id=1242781
  * https://bugzilla.suse.com/show_bug.cgi?id=1242782
  * https://bugzilla.suse.com/show_bug.cgi?id=1242785
  * https://bugzilla.suse.com/show_bug.cgi?id=1242786
  * https://bugzilla.suse.com/show_bug.cgi?id=1242792
  * https://bugzilla.suse.com/show_bug.cgi?id=1242831
  * https://bugzilla.suse.com/show_bug.cgi?id=1242852
  * https://bugzilla.suse.com/show_bug.cgi?id=1242854
  * https://bugzilla.suse.com/show_bug.cgi?id=1242856
  * https://bugzilla.suse.com/show_bug.cgi?id=1242859
  * https://bugzilla.suse.com/show_bug.cgi?id=1242860
  * https://bugzilla.suse.com/show_bug.cgi?id=1242861
  * https://bugzilla.suse.com/show_bug.cgi?id=1242866
  * https://bugzilla.suse.com/show_bug.cgi?id=1242867
  * https://bugzilla.suse.com/show_bug.cgi?id=1242868
  * https://bugzilla.suse.com/show_bug.cgi?id=1242871
  * https://bugzilla.suse.com/show_bug.cgi?id=1242873
  * https://bugzilla.suse.com/show_bug.cgi?id=1242875
  * https://bugzilla.suse.com/show_bug.cgi?id=1242906
  * https://bugzilla.suse.com/show_bug.cgi?id=1242908
  * https://bugzilla.suse.com/show_bug.cgi?id=1242924
  * https://bugzilla.suse.com/show_bug.cgi?id=1242930
  * https://bugzilla.suse.com/show_bug.cgi?id=1242944
  * https://bugzilla.suse.com/show_bug.cgi?id=1242945
  * https://bugzilla.suse.com/show_bug.cgi?id=1242948
  * https://bugzilla.suse.com/show_bug.cgi?id=1242949
  * https://bugzilla.suse.com/show_bug.cgi?id=1242951
  * https://bugzilla.suse.com/show_bug.cgi?id=1242953
  * https://bugzilla.suse.com/show_bug.cgi?id=1242955
  * https://bugzilla.suse.com/show_bug.cgi?id=1242957
  * https://bugzilla.suse.com/show_bug.cgi?id=1242959
  * https://bugzilla.suse.com/show_bug.cgi?id=1242961
  * https://bugzilla.suse.com/show_bug.cgi?id=1242962
  * https://bugzilla.suse.com/show_bug.cgi?id=1242973
  * https://bugzilla.suse.com/show_bug.cgi?id=1242974
  * https://bugzilla.suse.com/show_bug.cgi?id=1242977
  * https://bugzilla.suse.com/show_bug.cgi?id=1242985
  * https://bugzilla.suse.com/show_bug.cgi?id=1242990
  * https://bugzilla.suse.com/show_bug.cgi?id=1242993
  * https://bugzilla.suse.com/show_bug.cgi?id=1243000
  * https://bugzilla.suse.com/show_bug.cgi?id=1243006
  * https://bugzilla.suse.com/show_bug.cgi?id=1243011
  * https://bugzilla.suse.com/show_bug.cgi?id=1243015
  * https://bugzilla.suse.com/show_bug.cgi?id=1243044
  * https://bugzilla.suse.com/show_bug.cgi?id=1243049
  * https://bugzilla.suse.com/show_bug.cgi?id=1243056
  * https://bugzilla.suse.com/show_bug.cgi?id=1243074
  * https://bugzilla.suse.com/show_bug.cgi?id=1243076
  * https://bugzilla.suse.com/show_bug.cgi?id=1243077
  * https://bugzilla.suse.com/show_bug.cgi?id=1243082
  * https://bugzilla.suse.com/show_bug.cgi?id=1243090
  * https://bugzilla.suse.com/show_bug.cgi?id=1243330
  * https://bugzilla.suse.com/show_bug.cgi?id=1243342
  * https://bugzilla.suse.com/show_bug.cgi?id=1243456
  * https://bugzilla.suse.com/show_bug.cgi?id=1243469
  * https://bugzilla.suse.com/show_bug.cgi?id=1243470
  * https://bugzilla.suse.com/show_bug.cgi?id=1243471
  * https://bugzilla.suse.com/show_bug.cgi?id=1243472
  * https://bugzilla.suse.com/show_bug.cgi?id=1243473
  * https://bugzilla.suse.com/show_bug.cgi?id=1243476
  * https://bugzilla.suse.com/show_bug.cgi?id=1243509
  * https://bugzilla.suse.com/show_bug.cgi?id=1243511
  * https://bugzilla.suse.com/show_bug.cgi?id=1243513
  * https://bugzilla.suse.com/show_bug.cgi?id=1243515
  * https://bugzilla.suse.com/show_bug.cgi?id=1243516
  * https://bugzilla.suse.com/show_bug.cgi?id=1243517
  * https://bugzilla.suse.com/show_bug.cgi?id=1243519
  * https://bugzilla.suse.com/show_bug.cgi?id=1243522
  * https://bugzilla.suse.com/show_bug.cgi?id=1243524
  * https://bugzilla.suse.com/show_bug.cgi?id=1243528
  * https://bugzilla.suse.com/show_bug.cgi?id=1243529
  * https://bugzilla.suse.com/show_bug.cgi?id=1243530
  * https://bugzilla.suse.com/show_bug.cgi?id=1243534
  * https://bugzilla.suse.com/show_bug.cgi?id=1243536
  * https://bugzilla.suse.com/show_bug.cgi?id=1243539
  * https://bugzilla.suse.com/show_bug.cgi?id=1243540
  * https://bugzilla.suse.com/show_bug.cgi?id=1243541
  * https://bugzilla.suse.com/show_bug.cgi?id=1243543
  * https://bugzilla.suse.com/show_bug.cgi?id=1243545
  * https://bugzilla.suse.com/show_bug.cgi?id=1243547
  * https://bugzilla.suse.com/show_bug.cgi?id=1243559
  * https://bugzilla.suse.com/show_bug.cgi?id=1243560
  * https://bugzilla.suse.com/show_bug.cgi?id=1243562
  * https://bugzilla.suse.com/show_bug.cgi?id=1243567
  * https://bugzilla.suse.com/show_bug.cgi?id=1243573
  * https://bugzilla.suse.com/show_bug.cgi?id=1243574
  * https://bugzilla.suse.com/show_bug.cgi?id=1243575
  * https://bugzilla.suse.com/show_bug.cgi?id=1243589
  * https://bugzilla.suse.com/show_bug.cgi?id=1243621
  * https://bugzilla.suse.com/show_bug.cgi?id=1243624
  * https://bugzilla.suse.com/show_bug.cgi?id=1243625
  * https://bugzilla.suse.com/show_bug.cgi?id=1243626
  * https://bugzilla.suse.com/show_bug.cgi?id=1243627
  * https://bugzilla.suse.com/show_bug.cgi?id=1243649
  * https://bugzilla.suse.com/show_bug.cgi?id=1243657
  * https://bugzilla.suse.com/show_bug.cgi?id=1243658
  * https://bugzilla.suse.com/show_bug.cgi?id=1243659
  * https://bugzilla.suse.com/show_bug.cgi?id=1243660
  * https://bugzilla.suse.com/show_bug.cgi?id=1243664
  * https://bugzilla.suse.com/show_bug.cgi?id=1243737
  * https://bugzilla.suse.com/show_bug.cgi?id=1243805
  * https://bugzilla.suse.com/show_bug.cgi?id=1243963
  * https://jira.suse.com/browse/PED-12309

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250616/e0210bc4/attachment-0001.htm>


More information about the sle-security-updates mailing list