SUSE-SU-2025:20996-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Wed Nov 12 20:39:31 UTC 2025
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:20996-1
Release Date: 2025-11-06T15:34:33Z
Rating: important
References:
* bsc#1215199
* bsc#1218644
* bsc#1230062
* bsc#1234634
* bsc#1234693
* bsc#1234863
* bsc#1235953
* bsc#1236897
* bsc#1237108
* bsc#1237131
* bsc#1237542
* bsc#1237776
* bsc#1238972
* bsc#1239206
* bsc#1240324
* bsc#1240696
* bsc#1240966
* bsc#1240998
* bsc#1241166
* bsc#1241353
* bsc#1241403
* bsc#1241435
* bsc#1242034
* bsc#1242086
* bsc#1242414
* bsc#1242782
* bsc#1242864
* bsc#1242965
* bsc#1242995
* bsc#1243000
* bsc#1243055
* bsc#1243068
* bsc#1243100
* bsc#1243112
* bsc#1243774
* bsc#1244309
* bsc#1244723
* bsc#1244734
* bsc#1244749
* bsc#1244792
* bsc#1244812
* bsc#1244930
* bsc#1244939
* bsc#1245000
* bsc#1245151
* bsc#1245193
* bsc#1245206
* bsc#1245216
* bsc#1245260
* bsc#1245410
* bsc#1245457
* bsc#1245504
* bsc#1245506
* bsc#1245508
* bsc#1245510
* bsc#1245596
* bsc#1245621
* bsc#1245630
* bsc#1245654
* bsc#1245657
* bsc#1245658
* bsc#1245659
* bsc#1245663
* bsc#1245664
* bsc#1245665
* bsc#1245666
* bsc#1245668
* bsc#1245669
* bsc#1245670
* bsc#1245671
* bsc#1245675
* bsc#1245676
* bsc#1245678
* bsc#1245683
* bsc#1245684
* bsc#1245686
* bsc#1245688
* bsc#1245690
* bsc#1245691
* bsc#1245695
* bsc#1245700
* bsc#1245703
* bsc#1245705
* bsc#1245710
* bsc#1245711
* bsc#1245713
* bsc#1245714
* bsc#1245715
* bsc#1245717
* bsc#1245719
* bsc#1245721
* bsc#1245723
* bsc#1245726
* bsc#1245728
* bsc#1245729
* bsc#1245730
* bsc#1245731
* bsc#1245735
* bsc#1245737
* bsc#1245744
* bsc#1245745
* bsc#1245746
* bsc#1245747
* bsc#1245748
* bsc#1245749
* bsc#1245751
* bsc#1245757
* bsc#1245763
* bsc#1245765
* bsc#1245767
* bsc#1245769
* bsc#1245777
* bsc#1245780
* bsc#1245781
* bsc#1245784
* bsc#1245785
* bsc#1245787
* bsc#1245812
* bsc#1245814
* bsc#1245815
* bsc#1245937
* bsc#1245945
* bsc#1245952
* bsc#1245955
* bsc#1245956
* bsc#1245963
* bsc#1245966
* bsc#1245970
* bsc#1245973
* bsc#1245976
* bsc#1245977
* bsc#1245986
* bsc#1246000
* bsc#1246002
* bsc#1246005
* bsc#1246008
* bsc#1246012
* bsc#1246022
* bsc#1246023
* bsc#1246031
* bsc#1246034
* bsc#1246037
* bsc#1246041
* bsc#1246042
* bsc#1246047
* bsc#1246049
* bsc#1246050
* bsc#1246053
* bsc#1246054
* bsc#1246055
* bsc#1246057
* bsc#1246098
* bsc#1246109
* bsc#1246125
* bsc#1246166
* bsc#1246171
* bsc#1246176
* bsc#1246181
* bsc#1246183
* bsc#1246185
* bsc#1246186
* bsc#1246188
* bsc#1246190
* bsc#1246192
* bsc#1246193
* bsc#1246195
* bsc#1246220
* bsc#1246234
* bsc#1246236
* bsc#1246240
* bsc#1246243
* bsc#1246244
* bsc#1246245
* bsc#1246246
* bsc#1246248
* bsc#1246250
* bsc#1246252
* bsc#1246253
* bsc#1246255
* bsc#1246258
* bsc#1246259
* bsc#1246260
* bsc#1246262
* bsc#1246266
* bsc#1246268
* bsc#1246283
* bsc#1246285
* bsc#1246286
* bsc#1246287
* bsc#1246290
* bsc#1246292
* bsc#1246293
* bsc#1246295
* bsc#1246297
* bsc#1246333
* bsc#1246334
* bsc#1246337
* bsc#1246342
* bsc#1246349
* bsc#1246351
* bsc#1246353
* bsc#1246354
* bsc#1246358
* bsc#1246364
* bsc#1246366
* bsc#1246370
* bsc#1246375
* bsc#1246376
* bsc#1246385
* bsc#1246386
* bsc#1246387
* bsc#1246438
* bsc#1246443
* bsc#1246444
* bsc#1246447
* bsc#1246450
* bsc#1246453
* bsc#1246473
* bsc#1246490
* bsc#1246509
* bsc#1246547
* bsc#1246631
* bsc#1246651
* bsc#1246688
* bsc#1246777
* bsc#1246781
* bsc#1246782
* bsc#1246868
* bsc#1246896
* bsc#1246911
* bsc#1246979
* bsc#1247018
* bsc#1247020
* bsc#1247022
* bsc#1247023
* bsc#1247024
* bsc#1247027
* bsc#1247028
* bsc#1247031
* bsc#1247033
* bsc#1247035
* bsc#1247061
* bsc#1247062
* bsc#1247064
* bsc#1247076
* bsc#1247078
* bsc#1247079
* bsc#1247088
* bsc#1247089
* bsc#1247091
* bsc#1247097
* bsc#1247098
* bsc#1247099
* bsc#1247101
* bsc#1247102
* bsc#1247103
* bsc#1247104
* bsc#1247112
* bsc#1247113
* bsc#1247116
* bsc#1247118
* bsc#1247119
* bsc#1247123
* bsc#1247125
* bsc#1247126
* bsc#1247128
* bsc#1247130
* bsc#1247131
* bsc#1247132
* bsc#1247136
* bsc#1247137
* bsc#1247138
* bsc#1247141
* bsc#1247143
* bsc#1247145
* bsc#1247146
* bsc#1247147
* bsc#1247149
* bsc#1247150
* bsc#1247151
* bsc#1247152
* bsc#1247153
* bsc#1247154
* bsc#1247155
* bsc#1247156
* bsc#1247157
* bsc#1247160
* bsc#1247162
* bsc#1247163
* bsc#1247164
* bsc#1247167
* bsc#1247169
* bsc#1247170
* bsc#1247171
* bsc#1247174
* bsc#1247176
* bsc#1247177
* bsc#1247178
* bsc#1247181
* bsc#1247209
* bsc#1247210
* bsc#1247220
* bsc#1247223
* bsc#1247227
* bsc#1247229
* bsc#1247231
* bsc#1247233
* bsc#1247234
* bsc#1247235
* bsc#1247236
* bsc#1247238
* bsc#1247239
* bsc#1247241
* bsc#1247243
* bsc#1247250
* bsc#1247251
* bsc#1247252
* bsc#1247253
* bsc#1247255
* bsc#1247262
* bsc#1247265
* bsc#1247270
* bsc#1247271
* bsc#1247273
* bsc#1247274
* bsc#1247276
* bsc#1247277
* bsc#1247278
* bsc#1247279
* bsc#1247280
* bsc#1247282
* bsc#1247283
* bsc#1247284
* bsc#1247285
* bsc#1247288
* bsc#1247289
* bsc#1247290
* bsc#1247293
* bsc#1247308
* bsc#1247311
* bsc#1247313
* bsc#1247314
* bsc#1247317
* bsc#1247325
* bsc#1247347
* bsc#1247348
* bsc#1247349
* bsc#1247366
* bsc#1247372
* bsc#1247376
* bsc#1247426
* bsc#1247437
* bsc#1247442
* bsc#1247483
* bsc#1247500
* bsc#1247712
* bsc#1247837
* bsc#1247838
* bsc#1247935
* bsc#1247936
* bsc#1247949
* bsc#1247950
* bsc#1247963
* bsc#1247976
* bsc#1248088
* bsc#1248111
* bsc#1248121
* bsc#1248183
* bsc#1248186
* bsc#1248190
* bsc#1248192
* bsc#1248194
* bsc#1248198
* bsc#1248199
* bsc#1248200
* bsc#1248202
* bsc#1248205
* bsc#1248211
* bsc#1248223
* bsc#1248224
* bsc#1248225
* bsc#1248230
* bsc#1248235
* bsc#1248255
* bsc#1248296
* bsc#1248297
* bsc#1248299
* bsc#1248302
* bsc#1248304
* bsc#1248306
* bsc#1248312
* bsc#1248333
* bsc#1248334
* bsc#1248337
* bsc#1248338
* bsc#1248340
* bsc#1248341
* bsc#1248343
* bsc#1248345
* bsc#1248349
* bsc#1248350
* bsc#1248354
* bsc#1248355
* bsc#1248357
* bsc#1248359
* bsc#1248361
* bsc#1248363
* bsc#1248365
* bsc#1248367
* bsc#1248368
* bsc#1248374
* bsc#1248377
* bsc#1248378
* bsc#1248380
* bsc#1248386
* bsc#1248390
* bsc#1248392
* bsc#1248395
* bsc#1248396
* bsc#1248399
* bsc#1248401
* bsc#1248511
* bsc#1248512
* bsc#1248573
* bsc#1248575
* bsc#1248577
* bsc#1248609
* bsc#1248610
* bsc#1248616
* bsc#1248617
* bsc#1248619
* bsc#1248621
* bsc#1248622
* bsc#1248624
* bsc#1248627
* bsc#1248628
* bsc#1248634
* bsc#1248635
* bsc#1248639
* bsc#1248643
* bsc#1248647
* bsc#1248648
* bsc#1248652
* bsc#1248655
* bsc#1248662
* bsc#1248664
* bsc#1248666
* bsc#1248669
* bsc#1248674
* bsc#1248681
* bsc#1248727
* bsc#1248728
* bsc#1248748
* bsc#1248754
* bsc#1248775
* bsc#1249022
* bsc#1249038
* bsc#1249060
* bsc#1249061
* bsc#1249062
* bsc#1249064
* bsc#1249065
* bsc#1249066
* bsc#1249126
* bsc#1249143
* bsc#1249156
* bsc#1249159
* bsc#1249160
* bsc#1249163
* bsc#1249164
* bsc#1249166
* bsc#1249167
* bsc#1249169
* bsc#1249170
* bsc#1249172
* bsc#1249176
* bsc#1249177
* bsc#1249182
* bsc#1249186
* bsc#1249190
* bsc#1249193
* bsc#1249195
* bsc#1249199
* bsc#1249201
* bsc#1249202
* bsc#1249203
* bsc#1249204
* bsc#1249206
* bsc#1249215
* bsc#1249220
* bsc#1249221
* bsc#1249254
* bsc#1249258
* bsc#1249262
* bsc#1249263
* bsc#1249265
* bsc#1249266
* bsc#1249269
* bsc#1249271
* bsc#1249272
* bsc#1249273
* bsc#1249274
* bsc#1249278
* bsc#1249279
* bsc#1249281
* bsc#1249282
* bsc#1249284
* bsc#1249285
* bsc#1249286
* bsc#1249288
* bsc#1249290
* bsc#1249292
* bsc#1249295
* bsc#1249296
* bsc#1249297
* bsc#1249299
* bsc#1249300
* bsc#1249301
* bsc#1249303
* bsc#1249304
* bsc#1249305
* bsc#1249306
* bsc#1249308
* bsc#1249309
* bsc#1249312
* bsc#1249313
* bsc#1249314
* bsc#1249315
* bsc#1249316
* bsc#1249318
* bsc#1249319
* bsc#1249320
* bsc#1249321
* bsc#1249322
* bsc#1249323
* bsc#1249324
* bsc#1249333
* bsc#1249334
* bsc#1249338
* bsc#1249346
* bsc#1249374
* bsc#1249413
* bsc#1249477
* bsc#1249478
* bsc#1249479
* bsc#1249486
* bsc#1249490
* bsc#1249494
* bsc#1249500
* bsc#1249504
* bsc#1249506
* bsc#1249508
* bsc#1249509
* bsc#1249510
* bsc#1249513
* bsc#1249515
* bsc#1249516
* bsc#1249522
* bsc#1249523
* bsc#1249524
* bsc#1249526
* bsc#1249533
* bsc#1249538
* bsc#1249540
* bsc#1249542
* bsc#1249545
* bsc#1249547
* bsc#1249548
* bsc#1249550
* bsc#1249552
* bsc#1249554
* bsc#1249562
* bsc#1249566
* bsc#1249587
* bsc#1249598
* bsc#1249604
* bsc#1249608
* bsc#1249615
* bsc#1249618
* bsc#1249774
* bsc#1249833
* bsc#1249887
* bsc#1249888
* bsc#1249901
* bsc#1249904
* bsc#1249906
* bsc#1249915
* bsc#1249974
* bsc#1249975
* bsc#1250002
* bsc#1250007
* bsc#1250021
* bsc#1250025
* bsc#1250028
* bsc#1250032
* bsc#1250087
* bsc#1250088
* bsc#1250119
* bsc#1250123
* bsc#1250124
* bsc#1250177
* bsc#1250179
* bsc#1250203
* bsc#1250204
* bsc#1250205
* bsc#1250237
* bsc#1250242
* bsc#1250247
* bsc#1250249
* bsc#1250251
* bsc#1250258
* bsc#1250262
* bsc#1250266
* bsc#1250267
* bsc#1250268
* bsc#1250275
* bsc#1250276
* bsc#1250281
* bsc#1250291
* bsc#1250292
* bsc#1250294
* bsc#1250296
* bsc#1250297
* bsc#1250298
* bsc#1250334
* bsc#1250344
* bsc#1250365
* bsc#1250371
* bsc#1250377
* bsc#1250386
* bsc#1250389
* bsc#1250398
* bsc#1250402
* bsc#1250406
* bsc#1250407
* bsc#1250408
* bsc#1250450
* bsc#1250491
* bsc#1250519
* bsc#1250522
* bsc#1250650
* bsc#1250655
* bsc#1250671
* bsc#1250702
* bsc#1250711
* bsc#1250712
* bsc#1250713
* bsc#1250716
* bsc#1250719
* bsc#1250722
* bsc#1250729
* bsc#1250736
* bsc#1250737
* bsc#1250739
* bsc#1250741
* bsc#1250742
* bsc#1250758
* bsc#1250952
* bsc#1251100
* bsc#1251114
* bsc#1251134
* bsc#1251135
* bsc#1251143
* bsc#1251146
* bsc#1251186
* bsc#1251216
* bsc#1251230
* bsc#1251810
* bsc#1252084
* jsc#PED-10909
* jsc#PED-12405
* jsc#PED-12745
* jsc#PED-12882
* jsc#PED-13113
* jsc#PED-13256
* jsc#PED-13302
* jsc#PED-13331
* jsc#PED-13343
* jsc#PED-13345
* jsc#PED-13631
* jsc#PED-13704
* jsc#PED-13728
* jsc#PED-13762
* jsc#PED-13815
* jsc#PED-348
* jsc#PED-7249
Cross-References:
* CVE-2024-53164
* CVE-2024-57891
* CVE-2024-57951
* CVE-2024-57952
* CVE-2024-58090
* CVE-2025-22034
* CVE-2025-22077
* CVE-2025-23141
* CVE-2025-37798
* CVE-2025-37821
* CVE-2025-37849
* CVE-2025-37856
* CVE-2025-37861
* CVE-2025-37864
* CVE-2025-38006
* CVE-2025-38008
* CVE-2025-38019
* CVE-2025-38034
* CVE-2025-38038
* CVE-2025-38052
* CVE-2025-38058
* CVE-2025-38062
* CVE-2025-38075
* CVE-2025-38087
* CVE-2025-38088
* CVE-2025-38089
* CVE-2025-38090
* CVE-2025-38091
* CVE-2025-38095
* CVE-2025-38096
* CVE-2025-38098
* CVE-2025-38099
* CVE-2025-38101
* CVE-2025-38102
* CVE-2025-38103
* CVE-2025-38106
* CVE-2025-38107
* CVE-2025-38108
* CVE-2025-38109
* CVE-2025-38110
* CVE-2025-38111
* CVE-2025-38112
* CVE-2025-38113
* CVE-2025-38114
* CVE-2025-38117
* CVE-2025-38118
* CVE-2025-38119
* CVE-2025-38120
* CVE-2025-38122
* CVE-2025-38123
* CVE-2025-38124
* CVE-2025-38125
* CVE-2025-38127
* CVE-2025-38128
* CVE-2025-38129
* CVE-2025-38134
* CVE-2025-38135
* CVE-2025-38136
* CVE-2025-38137
* CVE-2025-38138
* CVE-2025-38140
* CVE-2025-38141
* CVE-2025-38142
* CVE-2025-38143
* CVE-2025-38145
* CVE-2025-38146
* CVE-2025-38148
* CVE-2025-38149
* CVE-2025-38151
* CVE-2025-38153
* CVE-2025-38154
* CVE-2025-38155
* CVE-2025-38156
* CVE-2025-38157
* CVE-2025-38159
* CVE-2025-38160
* CVE-2025-38161
* CVE-2025-38165
* CVE-2025-38168
* CVE-2025-38169
* CVE-2025-38170
* CVE-2025-38172
* CVE-2025-38173
* CVE-2025-38174
* CVE-2025-38177
* CVE-2025-38180
* CVE-2025-38181
* CVE-2025-38182
* CVE-2025-38184
* CVE-2025-38185
* CVE-2025-38186
* CVE-2025-38188
* CVE-2025-38189
* CVE-2025-38190
* CVE-2025-38193
* CVE-2025-38197
* CVE-2025-38198
* CVE-2025-38201
* CVE-2025-38205
* CVE-2025-38208
* CVE-2025-38209
* CVE-2025-38211
* CVE-2025-38213
* CVE-2025-38214
* CVE-2025-38215
* CVE-2025-38216
* CVE-2025-38217
* CVE-2025-38220
* CVE-2025-38222
* CVE-2025-38224
* CVE-2025-38225
* CVE-2025-38226
* CVE-2025-38227
* CVE-2025-38228
* CVE-2025-38229
* CVE-2025-38231
* CVE-2025-38232
* CVE-2025-38233
* CVE-2025-38234
* CVE-2025-38242
* CVE-2025-38244
* CVE-2025-38245
* CVE-2025-38246
* CVE-2025-38249
* CVE-2025-38251
* CVE-2025-38253
* CVE-2025-38255
* CVE-2025-38256
* CVE-2025-38257
* CVE-2025-38258
* CVE-2025-38259
* CVE-2025-38263
* CVE-2025-38265
* CVE-2025-38267
* CVE-2025-38268
* CVE-2025-38270
* CVE-2025-38272
* CVE-2025-38273
* CVE-2025-38274
* CVE-2025-38275
* CVE-2025-38277
* CVE-2025-38278
* CVE-2025-38286
* CVE-2025-38287
* CVE-2025-38288
* CVE-2025-38289
* CVE-2025-38290
* CVE-2025-38291
* CVE-2025-38292
* CVE-2025-38293
* CVE-2025-38299
* CVE-2025-38300
* CVE-2025-38301
* CVE-2025-38302
* CVE-2025-38303
* CVE-2025-38304
* CVE-2025-38305
* CVE-2025-38306
* CVE-2025-38307
* CVE-2025-38311
* CVE-2025-38312
* CVE-2025-38313
* CVE-2025-38315
* CVE-2025-38317
* CVE-2025-38318
* CVE-2025-38319
* CVE-2025-38322
* CVE-2025-38323
* CVE-2025-38326
* CVE-2025-38332
* CVE-2025-38335
* CVE-2025-38336
* CVE-2025-38337
* CVE-2025-38338
* CVE-2025-38339
* CVE-2025-38341
* CVE-2025-38342
* CVE-2025-38343
* CVE-2025-38344
* CVE-2025-38345
* CVE-2025-38348
* CVE-2025-38349
* CVE-2025-38350
* CVE-2025-38351
* CVE-2025-38352
* CVE-2025-38353
* CVE-2025-38354
* CVE-2025-38355
* CVE-2025-38356
* CVE-2025-38359
* CVE-2025-38360
* CVE-2025-38361
* CVE-2025-38362
* CVE-2025-38363
* CVE-2025-38364
* CVE-2025-38365
* CVE-2025-38368
* CVE-2025-38369
* CVE-2025-38371
* CVE-2025-38372
* CVE-2025-38373
* CVE-2025-38374
* CVE-2025-38375
* CVE-2025-38376
* CVE-2025-38377
* CVE-2025-38380
* CVE-2025-38381
* CVE-2025-38382
* CVE-2025-38383
* CVE-2025-38384
* CVE-2025-38385
* CVE-2025-38386
* CVE-2025-38387
* CVE-2025-38389
* CVE-2025-38390
* CVE-2025-38391
* CVE-2025-38392
* CVE-2025-38393
* CVE-2025-38395
* CVE-2025-38396
* CVE-2025-38397
* CVE-2025-38399
* CVE-2025-38400
* CVE-2025-38401
* CVE-2025-38402
* CVE-2025-38403
* CVE-2025-38404
* CVE-2025-38405
* CVE-2025-38406
* CVE-2025-38408
* CVE-2025-38409
* CVE-2025-38410
* CVE-2025-38412
* CVE-2025-38413
* CVE-2025-38414
* CVE-2025-38415
* CVE-2025-38416
* CVE-2025-38417
* CVE-2025-38418
* CVE-2025-38419
* CVE-2025-38420
* CVE-2025-38421
* CVE-2025-38424
* CVE-2025-38425
* CVE-2025-38426
* CVE-2025-38427
* CVE-2025-38428
* CVE-2025-38429
* CVE-2025-38430
* CVE-2025-38436
* CVE-2025-38438
* CVE-2025-38439
* CVE-2025-38440
* CVE-2025-38441
* CVE-2025-38443
* CVE-2025-38444
* CVE-2025-38445
* CVE-2025-38446
* CVE-2025-38448
* CVE-2025-38449
* CVE-2025-38450
* CVE-2025-38451
* CVE-2025-38453
* CVE-2025-38454
* CVE-2025-38455
* CVE-2025-38456
* CVE-2025-38457
* CVE-2025-38458
* CVE-2025-38459
* CVE-2025-38460
* CVE-2025-38461
* CVE-2025-38462
* CVE-2025-38463
* CVE-2025-38464
* CVE-2025-38465
* CVE-2025-38466
* CVE-2025-38467
* CVE-2025-38468
* CVE-2025-38470
* CVE-2025-38472
* CVE-2025-38473
* CVE-2025-38474
* CVE-2025-38475
* CVE-2025-38476
* CVE-2025-38477
* CVE-2025-38478
* CVE-2025-38480
* CVE-2025-38481
* CVE-2025-38482
* CVE-2025-38483
* CVE-2025-38484
* CVE-2025-38485
* CVE-2025-38487
* CVE-2025-38488
* CVE-2025-38489
* CVE-2025-38490
* CVE-2025-38491
* CVE-2025-38493
* CVE-2025-38494
* CVE-2025-38495
* CVE-2025-38496
* CVE-2025-38497
* CVE-2025-38499
* CVE-2025-38500
* CVE-2025-38503
* CVE-2025-38506
* CVE-2025-38508
* CVE-2025-38514
* CVE-2025-38524
* CVE-2025-38526
* CVE-2025-38527
* CVE-2025-38528
* CVE-2025-38531
* CVE-2025-38533
* CVE-2025-38539
* CVE-2025-38544
* CVE-2025-38545
* CVE-2025-38546
* CVE-2025-38549
* CVE-2025-38552
* CVE-2025-38553
* CVE-2025-38554
* CVE-2025-38555
* CVE-2025-38556
* CVE-2025-38557
* CVE-2025-38559
* CVE-2025-38560
* CVE-2025-38563
* CVE-2025-38564
* CVE-2025-38565
* CVE-2025-38566
* CVE-2025-38568
* CVE-2025-38571
* CVE-2025-38572
* CVE-2025-38573
* CVE-2025-38574
* CVE-2025-38576
* CVE-2025-38581
* CVE-2025-38582
* CVE-2025-38583
* CVE-2025-38584
* CVE-2025-38585
* CVE-2025-38586
* CVE-2025-38587
* CVE-2025-38588
* CVE-2025-38591
* CVE-2025-38593
* CVE-2025-38595
* CVE-2025-38597
* CVE-2025-38601
* CVE-2025-38602
* CVE-2025-38604
* CVE-2025-38605
* CVE-2025-38608
* CVE-2025-38609
* CVE-2025-38610
* CVE-2025-38612
* CVE-2025-38614
* CVE-2025-38616
* CVE-2025-38617
* CVE-2025-38618
* CVE-2025-38619
* CVE-2025-38621
* CVE-2025-38622
* CVE-2025-38623
* CVE-2025-38624
* CVE-2025-38628
* CVE-2025-38630
* CVE-2025-38631
* CVE-2025-38632
* CVE-2025-38634
* CVE-2025-38635
* CVE-2025-38639
* CVE-2025-38640
* CVE-2025-38643
* CVE-2025-38644
* CVE-2025-38646
* CVE-2025-38648
* CVE-2025-38656
* CVE-2025-38658
* CVE-2025-38659
* CVE-2025-38660
* CVE-2025-38662
* CVE-2025-38664
* CVE-2025-38665
* CVE-2025-38668
* CVE-2025-38670
* CVE-2025-38671
* CVE-2025-38676
* CVE-2025-38678
* CVE-2025-38679
* CVE-2025-38680
* CVE-2025-38681
* CVE-2025-38683
* CVE-2025-38684
* CVE-2025-38685
* CVE-2025-38686
* CVE-2025-38687
* CVE-2025-38691
* CVE-2025-38692
* CVE-2025-38693
* CVE-2025-38694
* CVE-2025-38695
* CVE-2025-38700
* CVE-2025-38701
* CVE-2025-38702
* CVE-2025-38703
* CVE-2025-38705
* CVE-2025-38706
* CVE-2025-38709
* CVE-2025-38710
* CVE-2025-38717
* CVE-2025-38721
* CVE-2025-38722
* CVE-2025-38724
* CVE-2025-38725
* CVE-2025-38727
* CVE-2025-38729
* CVE-2025-38730
* CVE-2025-38732
* CVE-2025-38733
* CVE-2025-38734
* CVE-2025-38735
* CVE-2025-38736
* CVE-2025-39673
* CVE-2025-39675
* CVE-2025-39677
* CVE-2025-39678
* CVE-2025-39679
* CVE-2025-39681
* CVE-2025-39682
* CVE-2025-39683
* CVE-2025-39684
* CVE-2025-39685
* CVE-2025-39686
* CVE-2025-39687
* CVE-2025-39691
* CVE-2025-39693
* CVE-2025-39694
* CVE-2025-39695
* CVE-2025-39697
* CVE-2025-39698
* CVE-2025-39700
* CVE-2025-39701
* CVE-2025-39703
* CVE-2025-39705
* CVE-2025-39706
* CVE-2025-39707
* CVE-2025-39709
* CVE-2025-39710
* CVE-2025-39711
* CVE-2025-39712
* CVE-2025-39713
* CVE-2025-39714
* CVE-2025-39718
* CVE-2025-39719
* CVE-2025-39721
* CVE-2025-39722
* CVE-2025-39723
* CVE-2025-39724
* CVE-2025-39726
* CVE-2025-39727
* CVE-2025-39730
* CVE-2025-39732
* CVE-2025-39738
* CVE-2025-39739
* CVE-2025-39742
* CVE-2025-39744
* CVE-2025-39746
* CVE-2025-39747
* CVE-2025-39748
* CVE-2025-39749
* CVE-2025-39750
* CVE-2025-39751
* CVE-2025-39754
* CVE-2025-39757
* CVE-2025-39758
* CVE-2025-39759
* CVE-2025-39760
* CVE-2025-39761
* CVE-2025-39763
* CVE-2025-39764
* CVE-2025-39765
* CVE-2025-39766
* CVE-2025-39770
* CVE-2025-39772
* CVE-2025-39773
* CVE-2025-39775
* CVE-2025-39782
* CVE-2025-39783
* CVE-2025-39787
* CVE-2025-39788
* CVE-2025-39790
* CVE-2025-39791
* CVE-2025-39792
* CVE-2025-39797
* CVE-2025-39798
* CVE-2025-39800
* CVE-2025-39801
* CVE-2025-39806
* CVE-2025-39807
* CVE-2025-39808
* CVE-2025-39810
* CVE-2025-39811
* CVE-2025-39813
* CVE-2025-39816
* CVE-2025-39823
* CVE-2025-39824
* CVE-2025-39825
* CVE-2025-39826
* CVE-2025-39827
* CVE-2025-39828
* CVE-2025-39830
* CVE-2025-39832
* CVE-2025-39833
* CVE-2025-39834
* CVE-2025-39835
* CVE-2025-39836
* CVE-2025-39838
* CVE-2025-39839
* CVE-2025-39841
* CVE-2025-39842
* CVE-2025-39844
* CVE-2025-39845
* CVE-2025-39847
* CVE-2025-39848
* CVE-2025-39849
* CVE-2025-39850
* CVE-2025-39851
* CVE-2025-39852
* CVE-2025-39853
* CVE-2025-39854
* CVE-2025-39857
* CVE-2025-39860
* CVE-2025-39861
* CVE-2025-39863
* CVE-2025-39864
* CVE-2025-39865
* CVE-2025-39869
* CVE-2025-39870
* CVE-2025-39871
* CVE-2025-39873
* CVE-2025-39875
* CVE-2025-39877
* CVE-2025-39882
* CVE-2025-39884
* CVE-2025-39885
* CVE-2025-39889
* CVE-2025-39890
* CVE-2025-39891
* CVE-2025-39896
* CVE-2025-39898
* CVE-2025-39899
* CVE-2025-39900
* CVE-2025-39902
* CVE-2025-39907
* CVE-2025-39909
* CVE-2025-39916
* CVE-2025-39918
* CVE-2025-39922
* CVE-2025-39923
* CVE-2025-39925
* CVE-2025-39926
* CVE-2025-39931
* CVE-2025-39934
* CVE-2025-39937
* CVE-2025-39938
* CVE-2025-39945
* CVE-2025-39946
* CVE-2025-39952
* CVE-2025-39957
* CVE-2025-40300
* CVE-2026-38264
CVSS scores:
* CVE-2024-53164 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57891 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57952 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58090 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22034 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22034 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22077 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23141 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-37856 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37856 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37861 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37861 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38006 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38006 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38008 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38008 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38019 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38019 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38034 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38034 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38038 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38038 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38058 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38058 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38062 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38062 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38075 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38087 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38088 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38088 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38089 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38090 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38090 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38091 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38095 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38096 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38098 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38098 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38099 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38099 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38101 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38101 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38102 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38102 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38103 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38103 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38106 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38106 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38107 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38107 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38108 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38108 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38109 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38109 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38110 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38110 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38111 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38112 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38113 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38114 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38114 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38117 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38117 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38118 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38118 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38119 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38120 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38120 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-38122 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38123 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38124 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38125 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38125 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38127 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38128 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38128 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38129 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38134 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38135 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38136 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38137 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38137 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38138 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38140 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38140 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38141 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38142 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38142 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38143 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38145 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38146 ( SUSE ): 7.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38146 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38148 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38149 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38149 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38151 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38153 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38154 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38154 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38155 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38156 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38157 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38157 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38159 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38159 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38160 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38161 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38161 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38165 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38168 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38168 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38169 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38169 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38170 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38170 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38172 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38172 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38173 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38173 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38174 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38174 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38177 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38180 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38181 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38181 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38184 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38185 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38186 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38188 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38189 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38190 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38193 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38193 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38197 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38197 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38198 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38201 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38205 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38208 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38209 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38209 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38211 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38211 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38213 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38213 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38214 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38215 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38216 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38217 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38217 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38220 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38220 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38222 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38222 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2025-38224 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38225 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38226 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38226 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38227 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38227 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38228 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38228 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38229 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38229 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2025-38231 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38231 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38232 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38232 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38233 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38242 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38242 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38244 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38244 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38245 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38249 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38249 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38251 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38253 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38253 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38255 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38256 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38256 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38257 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38258 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38259 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38263 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38265 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38267 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38267 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38268 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38268 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38270 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38270 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38272 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38273 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38273 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38274 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38274 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38275 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38277 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38278 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38286 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38286 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38287 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38288 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38289 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38289 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38290 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38290 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38291 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38291 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38292 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38292 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38293 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38293 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38299 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38300 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38300 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38301 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38302 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38302 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38303 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38303 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38304 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38306 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38306 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38307 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38311 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38311 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38312 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38313 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38315 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38315 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38317 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38317 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-38318 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38318 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38319 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38322 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38322 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-38323 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38326 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38332 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38335 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38336 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38337 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38338 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38338 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38339 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38339 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-38341 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38342 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-38344 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38345 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38345 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38348 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38349 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38349 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-38350 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38350 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-38351 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38352 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38352 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38352 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38353 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38354 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38355 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38355 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38356 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38356 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38359 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38360 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38361 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38362 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38363 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38364 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38365 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38365 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38368 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38369 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38371 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38372 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38372 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38373 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38373 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38374 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38375 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38375 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38376 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38377 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38377 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38380 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38380 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38381 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38382 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38382 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38383 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38384 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38384 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38385 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38385 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38386 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38387 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38387 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38389 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38390 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38391 ( SUSE ): 5.2
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38391 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38392 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38393 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38393 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38395 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38395 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38396 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38396 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38397 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38399 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38400 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38400 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38401 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38401 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38402 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38403 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38403 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38404 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38404 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38405 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38406 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38408 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38408 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38409 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38409 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38410 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38412 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38413 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38413 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38414 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38415 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38415 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38416 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38416 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38417 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38417 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38418 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38419 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38420 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38421 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38421 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38424 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38425 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38425 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38426 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38427 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38428 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38428 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38429 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38429 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38430 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38436 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38436 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38438 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38439 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38439 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38440 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38440 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38441 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38441 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38443 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38443 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38444 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38445 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38446 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38446 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2025-38448 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38448 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38449 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38449 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38450 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38451 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38453 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38454 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38455 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38455 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38456 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38457 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38458 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38459 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38460 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38460 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38461 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38461 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38462 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38462 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38463 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38463 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38464 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38464 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38465 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38466 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2025-38467 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38467 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38468 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38470 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38472 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38472 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38473 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38473 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38474 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38475 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38475 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38477 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38478 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38478 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38480 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38480 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38481 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38481 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38482 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38482 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38483 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38483 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38484 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-38485 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38485 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38487 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38488 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38489 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38489 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38490 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38491 ( SUSE ): 2.3
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38491 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38493 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38493 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L
* CVE-2025-38494 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38495 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38495 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38496 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38496 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38497 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38497 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38499 ( SUSE ): 6.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H
* CVE-2025-38499 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
* CVE-2025-38500 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38503 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38506 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38508 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38514 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38524 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38526 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38527 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38528 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38528 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38531 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38531 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38533 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38533 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38539 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38544 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38545 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38545 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38546 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38546 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38549 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38549 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38552 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38552 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38553 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38554 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38554 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38555 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38555 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38556 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38556 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38557 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38559 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38560 ( SUSE ): 5.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
* CVE-2025-38560 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-38564 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38564 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38565 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38566 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38568 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38571 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38571 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38573 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38573 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38574 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38576 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38576 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38581 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38582 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38583 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38584 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38584 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38585 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38585 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38586 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38587 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38588 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38591 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38591 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2025-38593 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38595 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38595 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38597 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38601 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38602 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38604 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38604 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38605 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38608 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38609 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38610 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38612 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38614 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38617 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38618 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38619 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38619 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38621 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38622 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38623 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38624 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38628 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38628 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38630 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38631 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38632 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38634 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38635 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38639 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38640 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38643 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38644 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38644 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38646 ( SUSE ): 6.0
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38646 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38648 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38648 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38656 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38658 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38658 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38659 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38662 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38662 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38668 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38676 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38679 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38680 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38681 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38685 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38691 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38692 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38692 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38694 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38695 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38700 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38700 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38701 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38702 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38702 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38703 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38703 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38705 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38706 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38706 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38709 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38709 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38710 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38710 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38732 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38732 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39675 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39679 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-39683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-39693 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39698 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39698 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-39700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39705 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39707 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39707 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39738 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-39739 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-39739 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-39742 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39744 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39746 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-39747 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39748 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39750 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39751 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-39754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39759 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N
* CVE-2025-39759 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39760 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-39761 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39763 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39782 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39787 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-39787 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-39788 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-39790 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39790 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39791 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39791 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-39792 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39792 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39797 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39798 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-39798 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-39800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39801 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-39801 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-39806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39825 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39825 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-39826 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39826 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39827 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39827 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39828 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-39828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-39830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39838 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39838 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-39839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39848 ( SUSE ): 6.9
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39848 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39889 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39890 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39891 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-39891 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-39896 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39896 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39898 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39900 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39902 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39918 ( SUSE ): 5.3
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-39918 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-39922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39922 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-39923 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39923 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-39925 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39926 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39926 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
* CVE-2025-39931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39945 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39952 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39952 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-39957 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40300 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Affected Products:
* SUSE Linux Micro 6.2
An update that solves 573 vulnerabilities, contains 17 features and has 96 fixes
can now be installed.
## Description:
The SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel was
updated to receive various security bugfixes.
The following security bugs were fixed:
* CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
* CVE-2024-57891: sched_ext: Fix invalid irq restore in scx_ops_bypass()
(bsc#1235953).
* CVE-2024-57951: hrtimers: Handle CPU state correctly on hotplug
(bsc#1237108).
* CVE-2024-57952: Revert "libfs: fix infinite directory reads for offset dir"
(bsc#1237131).
* CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are
disabled (bsc#1240324).
* CVE-2025-22034: mm/rmap: avoid -EBUSY from make_device_exclusive()
(bsc#1241435).
* CVE-2025-22077: Revert "smb: client: fix TCP timers deadlock after rmmod"
(bsc#1241403).
* CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest
memory accesses (bsc#1242782).
* CVE-2025-37821: sched/eevdf: Fix se->slice being set to U64_MAX and
resulting (bsc#1242864).
* CVE-2025-37849: KVM: arm64: Tear down vGIC on failed vCPU creation
(bsc#1243000).
* CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races
(bsc#1243068).
* CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (bsc#1243055).
* CVE-2025-37864: net: dsa: clean up FDB, MDB, VLAN entries on unbind
(bsc#1242965).
* CVE-2025-38006: net: mctp: Do not access ifa_index when missing
(bsc#1244930).
* CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory
handling (bsc#1244939).
* CVE-2025-38019: mlxsw: spectrum_router: Fix use-after-free when deleting GRE
net devices (bsc#1245000).
* CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in
btrfs__prelim_ref (bsc#1244792).
* CVE-2025-38038: cpufreq: amd-pstate: Remove unnecessary driver_lock in
set_boost (bsc#1244812).
* CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be
under mount_lock (bsc#1245151).
* CVE-2025-38062: kABI: restore layout of struct msi_desc (bsc#1245216).
* CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection
(bsc#1244734).
* CVE-2025-38101: ring-buffer: Fix buffer locking in
ring_buffer_subbuf_order_set() (bsc#1245659).
* CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in
usbhid_parse() (bsc#1245663).
* CVE-2025-38106: io_uring/sqpoll: do not put task_struct on tctx setup
failure (bsc#1245664).
* CVE-2025-38117: hci_dev centralize extra lock (bsc#1245695).
* CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler
(bsc#1245700).
* CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before
configuring EST (bsc#1245710).
* CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse
(bsc#1245767).
* CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()
(bsc#1245780).
* CVE-2025-38168: perf: arm-ni: Unregister PMUs on probe failure
(bsc#1245763).
* CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
* CVE-2025-38182: ublk: santizize the arguments from userspace when adding a
device (bsc#1245937).
* CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of
ethernet bearer (bsc#1245956).
* CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send()
(bsc#1246012).
* CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails
(bsc#1245973).
* CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to
INT_MAX (bsc#1245977).
* CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy
pitch to 1 (bsc#1246005).
* CVE-2025-38208: smb: client: add NULL check in automount_fullpath
(bsc#1245815).
* CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased
devices (bsc#1245963).
* CVE-2025-38220: ext4: only dirty folios when data journaling regular files
(bsc#1245966).
* CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data
(bsc#1245976).
* CVE-2025-38242: mm: userfaultfd: fix race of userfaultfd_move and swap cache
(bsc#1246176).
* CVE-2025-38244: smb: client: fix potential deadlock when reconnecting
channels (bsc#1246183).
* CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in
atm_dev_deregister() (bsc#1246193).
* CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181).
* CVE-2025-38256: io_uring/rsrc: fix folio unpinning (bsc#1246188).
* CVE-2025-38258: mm/damon/sysfs-schemes: free old
damon_sysfs_scheme_filter->memcg_path on write (bsc#1246185).
* CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248).
* CVE-2025-38267: ring-buffer: Do not trigger WARN_ON() due to a
commit_overrun (bsc#1246245).
* CVE-2025-38270: net: drv: netdevsim: do not napi_complete() from netpoll
(bsc#1246252).
* CVE-2025-38272: net: dsa: b53: do not enable EEE on bcm63xx (bsc#1246268).
* CVE-2025-38301: nvmem: zynqmp_nvmem: unbreak driver after cleanup
(bsc#1246351).
* CVE-2025-38306: fs/fhandle.c: fix a race in call of has_locked_children()
(bsc#1246366).
* CVE-2025-38311: iavf: get rid of the crit lock (bsc#1246376).
* CVE-2025-38318: perf: arm-ni: Fix missing platform_set_drvdata()
(bsc#1246444).
* CVE-2025-38322: perf/x86/intel: Fix crash in icl_update_topdown_event()
(bsc#1246447).
* CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
* CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in
jbd2_journal_dirty_metadata() (bsc#1246253).
* CVE-2025-38341: eth: fbnic: avoid double free when failing to DMA-map FW msg
(bsc#1246260).
* CVE-2025-38349: eventpoll: do not decrement ep refcount while still holding
the ep mutex (bsc#1246777).
* CVE-2025-38350: net/sched: Always pass notifications when child class
becomes empty (bsc#1246781).
* CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB
flush (bsc#1246782).
* CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers()
and posix_cpu_timer_del() (bsc#1246911).
* CVE-2025-38359: s390/mm: Fix in_atomic() handling in
do_secure_storage_access() (bsc#1247076).
* CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO
guarantees (bsc#1247078).
* CVE-2025-38365: btrfs: fix a race between renames and directory logging
(bsc#1247023).
* CVE-2025-38374: optee: ffa: fix sleep in atomic context (bsc#1247024).
* CVE-2025-38382: btrfs: fix iteration of extrefs during log replay
(bsc#1247031).
* CVE-2025-38383: mm/vmalloc: fix data race in show_numa_info() (bsc#1247250).
* CVE-2025-38392: idpf: convert control queue mutex to a spinlock
(bsc#1247169).
* CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem
LSM bypass (bsc#1247156).
* CVE-2025-38399: scsi: target: Fix NULL pointer dereference in
core_scsi3_decode_spec_i_port() (bsc#1247097).
* CVE-2025-38402: idpf: return 0 size for RSS key if not supported
(bsc#1247262).
* CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly
(bsc#1247126).
* CVE-2025-38418: remoteproc: core: Release rproc->clean_table after
rproc_attach() fails (bsc#1247137).
* CVE-2025-38419: remoteproc: core: Cleanup acquired resources when
rproc_handle_resources() fails in rproc_attach() (bsc#1247136).
* CVE-2025-38426: drm/amdgpu: Add basic validation for RAS header
(bsc#1247252).
* CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
(bsc#1247155).
* CVE-2025-38440: net/mlx5e: Fix race between DIM disable and net_dim()
(bsc#1247290).
* CVE-2025-38441: netfilter: flowtable: account for Ethernet header in
nf_flow_pppoe_proto() (bsc#1247167).
* CVE-2025-38444: raid10: cleanup memleak at raid10_make_request
(bsc#1247162).
* CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape
(bsc#1247229).
* CVE-2025-38451: md/md-bitmap: fix GPF in bitmap_get_stats() (bsc#1247102).
* CVE-2025-38453: kABI: io_uring: msg_ring ensure io_kiocb freeing is deferred
(bsc#1247234).
* CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in
ipmi_create_user() (bsc#1247099).
* CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not
exist (bsc#1247098).
* CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
(bsc#1247116).
* CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push()
(bsc#1247119).
* CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd()
(bsc#1247143).
* CVE-2025-38463: tcp: Correct signedness in skb remaining space calculation
(bsc#1247113).
* CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112).
* CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling
filtering during runtime (bsc#1247288).
* CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of
uninitialised entry (bsc#1247313).
* CVE-2025-38475: smc: Fix various oops due to inet_sock type confusion
(bsc#1247308).
* CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using
async crypto (bsc#1247239).
* CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page()
(bsc#1247243).
* CVE-2025-38491: mptcp: make fallback action and fallback decision atomic
(bsc#1247280).
* CVE-2025-38493: tracing/osnoise: Fix crash in timerlat_dump_stack()
(bsc#1247283).
* CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write
(bsc#1247347).
* CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN
in the right userns (bsc#1247976).
* CVE-2025-38500: xfrm: interface: fix use-after-free after changing
collect_md xfrm interface (bsc#1248088).
* CVE-2025-38508: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation
(bsc#1248190).
* CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog
struct (bsc#1248202).
* CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194).
* CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192).
* CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break
(bsc#1248199).
* CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200).
* CVE-2025-38539: tracing: Add down_write(trace_event_sem) when adding trace
event (bsc#1248211).
* CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225).
* CVE-2025-38545: net: ethernet: ti: am65-cpsw-nuss: Fix skb size by
accounting for skb_shared_info (bsc#1248224).
* CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
* CVE-2025-38549: efivarfs: Fix memory leak of efivarfs_fs_info in fs_context
error paths (bsc#1248235).
* CVE-2025-38554: mm: fix a UAF when vma->mm is freed after vma->vm_refcnt got
dropped (bsc#1248299).
* CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits
(bsc#1248296).
* CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation
(bsc#1248312).
* CVE-2025-38566: sunrpc: fix handling of server side tls alerts
(bsc#1248374).
* CVE-2025-38571: sunrpc: fix client side handling of tls alerts
(bsc#1248401).
* CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment()
(bsc#1248399).
* CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit()
(bsc#1248365).
* CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343).
* CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size()
(bsc#1248368).
* CVE-2025-38593: kABI workaround for bluetooth discovery_state change
(bsc#1248357).
* CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane
for a video-port (bsc#1248378).
* CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
in ktls (bsc#1248338).
* CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392).
* CVE-2025-38616: tls: handle data disappearing from under the TLS ULP
(bsc#1248512).
* CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY
(bsc#1248511).
* CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619).
* CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery
(bsc#1248610).
* CVE-2025-38628: vdpa/mlx5: Fix release of uninitialized resources on error
path (bsc#1248616).
* CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null-
terminated (bsc#1248674).
* CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622).
* CVE-2025-38643: wifi: cfg80211: Add missing lock in
cfg80211_check_and_end_cac() (bsc#1248681).
* CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not
associated (bsc#1248748).
* CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
* CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated
string (bsc#1248634).
* CVE-2025-38664: ice: Fix a null pointer dereference in
ice_copy_and_init_pkg() (bsc#1248628).
* CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline
(bsc#1248775).
* CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates
(bsc#1249126).
* CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused
classes (bsc#1249156).
* CVE-2025-38686: userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a
migration entry (bsc#1249160).
* CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn->dd_data only if
memory is allocated (bsc#1249182).
* CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr
(bsc#1249258).
* CVE-2025-38709: loop: Avoid updating block size under exclusive owner
(bsc#1249199).
* CVE-2025-38710: gfs2: Validate i_depth for exhash directories (bsc#1249201).
* CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172).
* CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out()
(bsc#1249324).
* CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path
(bsc#1249320).
* CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal
(bsc#1249300).
* CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init
helper (bsc#1249303).
* CVE-2025-39682: tls: fix handling of zero-length records on the rx_list
(bsc#1249284).
* CVE-2025-39683: tracing: Limit access to parser->buffer when trace_get_user
failed (bsc#1249286).
* CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper
(bsc#1249374).
* CVE-2025-39698: io_uring/futex: ensure io_futex_wait() cleans up properly on
failure (bsc#1249322).
* CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag
(bsc#1249315).
* CVE-2025-39723: kABI: netfs: handle new netfs_io_stream flag (bsc#1249314).
* CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work
(bsc#1249494).
* CVE-2025-39749: rcu: Protect ->defer_qs_iw_pending from data race
(bsc#1249533).
* CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration
(bsc#1249524).
* CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past
buffer_limit (bsc#1249510).
* CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with
only IPV6_CSUM (bsc#1249508).
* CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired()
(bsc#1249504).
* CVE-2025-39775: mm/mremap: fix WARN with uffd that has remap events disabled
(bsc#1249500).
* CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint()
(bsc#1249526).
* CVE-2025-39791: dm: dm-crypt: Do not partially accept write BIOs with zoned
targets (bsc#1249550).
* CVE-2025-39792: dm: Always split write BIOs to zoned device limits
(bsc#1249618).
* CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608).
* CVE-2025-39813: ftrace: Also allocate and copy hash for reading of filter
files (bsc#1250032).
* CVE-2025-39816: io_uring/kbuf: always use READ_ONCE() to read ring provided
buffer lengths (bsc#1249906).
* CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from
guest (bsc#1250002).
* CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2)
(bsc#1250179).
* CVE-2025-39828: kABI workaround for struct atmdev_ops extension
(bsc#1250205).
* CVE-2025-39830: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error
path (bsc#1249974).
* CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion
(bsc#1250365).
* CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown
(bsc#1250267).
* CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292).
* CVE-2025-39850: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop
objects (bsc#1250276).
* CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop
object (bsc#1250296).
* CVE-2025-39852: net/tcp: Fix socket memory leak in TCP-AO failure handling
for IPv6 (bsc#1250258).
* CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty
(bsc#1250275).
* CVE-2025-39854: ice: fix NULL access of tx->in_use in ice_ll_ts_intr
(bsc#1250297).
* CVE-2025-39857: net/smc: fix one NULL pointer dereference in
smc_ib_is_sg_need_sync() (bsc#1250251).
* CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put
(bsc#1250294).
* CVE-2025-39875: igb: Fix NULL pointer dereference in ethtool loopback test
(bsc#1250398).
* CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call
(bsc#1250407).
* CVE-2025-39898: e1000e: fix heap overflow in e1000_set_eeprom (bsc#1250742).
* CVE-2025-39900: net_sched: gen_estimator: fix est_timer() vs
CONFIG_PREEMPT_RT=y (bsc#1250758).
* CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in
object_err() (bsc#1250702).
* CVE-2025-39922: ixgbe: fix incorrect map used in eee linkmode (bsc#1250722).
* CVE-2025-39926: genetlink: fix genl_bind() invoking bind() after -EPERM
(bsc#1250737).
* CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task
(bsc#1251230).
* CVE-2025-39946: tls: make sure to abort the stream if headers are bogus
(bsc#1251114).
* CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT
(bsc#1247483).
* CVE-2026-38264: nvme-tcp: sanitize request list handling (bsc#1246387).
The following non-security bugs were fixed:
* ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes).
* ACPI/processor_idle: Add FFH state handling (jsc#PED-13815).
* ACPI/processor_idle: Export acpi_processor_ffh_play_dead() (jsc#PED-13815).
* ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path (stable-fixes).
* ACPI: APEI: send SIGBUS to current task if synchronous memory error not
recovered (stable-fixes).
* ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes).
* ACPI: LPSS: Remove AudioDSP related ID (git-fixes).
* ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message (git-
fixes).
* ACPI: RISC-V: Fix FFH_CPPC_CSR error handling (git-fixes).
* ACPI: Return -ENODEV from acpi_parse_spcr() when SPCR support is disabled
(stable-fixes).
* ACPI: Suppress misleading SPCR console message when SPCR table is absent
(stable-fixes).
* ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT (git-fixes).
* ACPI: battery: Add synchronization between interface updates (git-fixes).
* ACPI: debug: fix signedness issues in read/write helpers (git-fixes).
* ACPI: pfr_update: Fix the driver update version check (git-fixes).
* ACPI: processor: Rescan "dead" SMT siblings during initialization
(jsc#PED-13815).
* ACPI: processor: fix acpi_object initialization (stable-fixes).
* ACPI: processor: idle: Fix memory leak when register cpuidle device failed
(git-fixes).
* ACPI: processor: perflib: Fix initial _PPC limit application (git-fixes).
* ACPI: processor: perflib: Move problematic pr->performance check (git-
fixes).
* ACPI: property: Fix buffer properties extraction for subnodes (git-fixes).
* ACPICA: Fix largest possible resource descriptor index (git-fixes).
* ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not
supported (stable-fixes).
* ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes).
* ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out()
(git-fixes).
* ALSA: hda/cs35l56: Workaround bad dev-index on Lenovo Yoga Book 9i GenX
(stable-fixes).
* ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable-
fixes).
* ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx (stable-
fixes).
* ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx (stable-
fixes).
* ALSA: hda/realtek - Fix mute LED for HP Victus 16-d1xxx (MB 8A26) (stable-
fixes).
* ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx (stable-fixes).
* ALSA: hda/realtek - Fix mute LED for HP Victus 16-r1xxx (stable-fixes).
* ALSA: hda/realtek - Fix mute LED for HP Victus 16-s0xxx (stable-fixes).
* ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes).
* ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks
(stable-fixes).
* ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS (stable-fixes).
* ALSA: hda/realtek: Add support for ASUS NUC using CS35L41 HDA (stable-
fixes).
* ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook
830 G6 (stable-fixes).
* ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again
(git-fixes).
* ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes).
* ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes).
* ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes).
* ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop (git-fixes).
* ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx (stable-fixes).
* ALSA: hda/realtek: add LG gram 16Z90R-A to alc269 fixup table (stable-
fixes).
* ALSA: hda: Disable jack polling at shutdown (stable-fixes).
* ALSA: hda: Handle the jack polling always via a work (stable-fixes).
* ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git-
fixes).
* ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable-
fixes).
* ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() (git-
fixes).
* ALSA: lx_core: use int type to store negative error codes (git-fixes).
* ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT
(git-fixes).
* ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable-
fixes).
* ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes).
* ALSA: timer: fix ida_free call while not allocated (git-fixes).
* ALSA: usb-audio: Add DSD support for Comtrue USB Audio device (stable-
fixes).
* ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 (stable-fixes).
* ALSA: usb-audio: Add mute TLV for playback volumes on more devices (stable-
fixes).
* ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable-
fixes).
* ALSA: usb-audio: Allow Focusrite devices to use low samplerates (git-fixes).
* ALSA: usb-audio: Avoid multiple assignments in mixer_quirks (stable-fixes).
* ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable-
fixes).
* ALSA: usb-audio: Convert comma to semicolon (git-fixes).
* ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks (stable-
fixes).
* ALSA: usb-audio: Fix block comments in mixer_quirks (stable-fixes).
* ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes).
* ALSA: usb-audio: Fix code alignment in mixer_quirks (stable-fixes).
* ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes).
* ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks (stable-fixes).
* ALSA: usb-audio: Simplify NULL comparison in mixer_quirks (stable-fixes).
* ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git-
fixes).
* ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes).
* ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes).
* ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (git-fixes).
* ALSA: usb-audio: move mixer_quirks' min_mute into common quirk (stable-
fixes).
* ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes).
* ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping (git-fixes).
* ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (git-fixes).
* ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (git-fixes).
* ASoC: Intel: catpt: Expose correct bit depth to userspace (git-fixes).
* ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes).
* ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback (git-fixes).
* ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel (git-
fixes).
* ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead of
buffer time (git-fixes).
* ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message
(git-fixes).
* ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations in resume
context (git-fixes).
* ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down
(git-fixes).
* ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer size
(git-fixes).
* ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size (git-
fixes).
* ASoC: SOF: topology: Parse the dapm_widget_tokens in case of DSPless mode
(stable-fixes).
* ASoC: amd: acp: Adjust pdm gain value (stable-fixes).
* ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes).
* ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes).
* ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes).
* ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes).
* ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes).
* ASoC: codecs: wcd9375: Fix double free of regulator supplies (git-fixes).
* ASoC: codecs: wcd937x: Drop unused buck_supply (git-fixes).
* ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable-
fixes).
* ASoC: fsl_sai: replace regmap_write with regmap_update_bits (git-fixes).
* ASoC: fsl_xcvr: get channel status data when PHY is not exists (git-fixes).
* ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable-
fixes).
* ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes).
* ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv
(git-fixes).
* ASoC: mediatek: use reserved memory or enable buffer pre-allocation (git-
fixes).
* ASoC: ops: dynamically allocate struct snd_ctl_elem_value (git-fixes).
* ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface
(git-fixes).
* ASoC: qcom: audioreach: fix potential null pointer dereference (git-fixes).
* ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph
failed (git-fixes).
* ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git-
fixes).
* ASoC: qcom: use drvdata instead of component to keep id (stable-fixes).
* ASoC: rt5682s: Adjust SAR ADC button mode to fix noise issue (stable-fixes).
* ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() (git-
fixes).
* ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was
successed (stable-fixes).
* ASoC: tas2781: Fix the wrong step for TLV on tas2781 (git-fixes).
* ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data() (git-fixes).
* ASoC: wm8940: Correct PLL rate rounding (git-fixes).
* ASoC: wm8940: Correct typo in control name (git-fixes).
* ASoC: wm8974: Correct PLL rate rounding (git-fixes).
* Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes).
* Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes).
* Bluetooth: ISO: do not leak skb in ISO_CONT RX (git-fixes).
* Bluetooth: ISO: free rx_skb if not consumed (git-fixes).
* Bluetooth: MGMT: Fix not exposing debug UUID on
MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes).
* Bluetooth: MGMT: Fix possible UAFs (git-fixes).
* Bluetooth: btmtk: Fix wait_on_bit_timeout interruption during shutdown (git-
fixes).
* Bluetooth: btusb: Add USB ID 2001:332a for D-Link AX9U rev. A1 (stable-
fixes).
* Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano
(stable-fixes).
* Bluetooth: btusb: Add new VID/PID 0489/e14e for MT7925 (stable-fixes).
* Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git-
fixes).
* Bluetooth: hci_core: Fix using {cis,bis}_capable for current settings (git-
fixes).
* Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git-
fixes).
* Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (git-fixes).
* Bluetooth: hci_event: Mark connection as closed during suspend disconnect
(git-fixes).
* Bluetooth: hci_event: Mask data status from LE ext adv reports (git-fixes).
* Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git-
fixes).
* Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes).
* Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable-
fixes).
* Bluetooth: hci_sync: Avoid adding default advertising on startup (stable-
fixes).
* Bluetooth: hci_sync: Fix hci_resume_advertising_sync (git-fixes).
* Bluetooth: hci_sync: Fix scan state after PA Sync has been established (git-
fixes).
* Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements
(git-fixes).
* Bluetooth: hci_sync: Prevent unintended PA sync when SID is 0xFF (git-
fixes).
* Bluetooth: hci_sync: fix set_local_name race condition (git-fixes).
* Bluetooth: vhci: Prevent use-after-free by removing debugfs files early
(git-fixes).
* CONFIG & no reference -> OK temporarily, must be resolved eventually
* Disable CET before shutdown by tboot (bsc#1247950).
* Docs/ABI: Fix sysfs-kernel-address_bits path (git-fixes).
* Documentation/x86: Document new attack vector controls (git-fixes).
* Documentation: ACPI: Fix parent device references (git-fixes).
* Documentation: KVM: Fix unexpected unindent warning (git-fixes).
* Documentation: KVM: Fix unexpected unindent warnings (git-fixes).
* Documentation: usb: gadget: Wrap remaining usage snippets in literal code
block (git-fixes).
* Drop ath12k patch that was reverted in the upstream (git-fixes)
* EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693).
* Enable CONFIG_CMA_SYSFS This is a generally useful feature for anyone using
CMA or investigating CMA issues, with a small and simple code base and no
runtime overhead.
* Enable MT7925 WiFi drivers for openSUSE Leap 16.0 (bsc#1247325)
* Enable SMC_LO (a.k.a SMC-D) (jsc#PED-13256).
* Fix bogus i915 patch backport (bsc#1238972) It's been already cherry-picked
in 6.12 kernel itself.
* Fix dma_unmap_sg() nents value (git-fixes)
* HID: amd_sfh: Add sync across amd sfh work functions (git-fixes).
* HID: apple: avoid setting up battery timer for devices without battery (git-
fixes).
* HID: apple: validate feature-report field count to prevent NULL pointer
dereference (git-fixes).
* HID: asus: add support for missing PX series fn keys (stable-fixes).
* HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes).
* HID: core: do not bypass hid_hw_raw_request (stable-fixes).
* HID: core: ensure the allocated report buffer can contain the reserved
report ID (stable-fixes).
* HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version()
(stable-fixes).
* HID: hidraw: tighten ioctl command parsing (git-fixes).
* HID: input: rename hidinput_set_battery_charge_status() (stable-fixes).
* HID: input: report battery status changes immediately (git-fixes).
* HID: intel-ish-ipc: Remove redundant ready check after timeout function
(git-fixes).
* HID: logitech: Add ids for G PRO 2 LIGHTSPEED (stable-fixes).
* HID: magicmouse: avoid setting up battery timer when not needed (git-fixes).
* HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git-
fixes).
* HID: quirks: add support for Legion Go dual dinput modes (stable-fixes).
* HID: wacom: Add a new Art Pen 2 (stable-fixes).
* IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes)
* IB/sa: Fix sa_local_svc_timeout_ms read race (git-fixes)
* Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table
(stable-fixes).
* Input: iqs7222 - avoid enabling unused interrupts (stable-fixes).
* Input: psxpad-spi - add a check for the return value of spi_setup() (git-
fixes).
* Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak
(git-fixes).
* KEYS: X.509: Fix Basic Constraints CA flag parsing (git-fixes).
* KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes).
* KVM: Allow CPU to reschedule while setting per-page memory attributes (git-
fixes).
* KVM: Bail from the dirty ring reset flow if a signal is pending (git-fixes).
* KVM: Bound the number of dirty ring entries in a single reset at INT_MAX
(git-fixes).
* KVM: Conditionally reschedule when resetting the dirty ring (git-fixes).
* KVM: PPC: Fix misleading interrupts comment in kvmppc_prepare_to_enter()
(bsc#1215199).
* KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest
(git-fixes).
* KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes).
* KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight
(git-fixes).
* KVM: TDX: Add new TDVMCALL status code for unsupported subfuncs
(jsc#PED-13302).
* KVM: TDX: Do not report base TDVMCALLs (git-fixes).
* KVM: TDX: Exit to userspace for GetTdVmCallInfo (jsc#PED-13302).
* KVM: TDX: Exit to userspace for SetupEventNotifyInterrupt (jsc#PED-13302).
* KVM: TDX: Handle TDG.VP.VMCALL<GetQuote> (jsc#PED-13302).
* KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities
(jsc#PED-13302).
* KVM: TDX: Use kvm_arch_vcpu.host_debugctl to restore the host's DEBUGCTL
(git-fixes).
* KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest
(git-fixes).
* KVM: VMX: Ensure unused kvm_tdx_capabilities fields are zeroed out
(jsc#PED-13302).
* KVM: arm64: Adjust range correctly during host stage-2 faults (git-fixes).
* KVM: arm64: Do not free hyp pages with pKVM on GICv2 (git-fixes).
* KVM: arm64: Fix error path in init_hyp_mode() (git-fixes).
* KVM: arm64: Mark freed S2 MMUs as invalid (git-fixes).
* KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes).
* KVM: s390: Fix access to unavailable adapter indicator pages during postcopy
(git-fixes bsc#1250124).
* KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes
bsc#1250123).
* KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE
(git-fixes).
* KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table
(git-fixes).
* KVM: x86: Avoid calling kvm_is_mmio_pfn() when kvm_x86_ops.get_mt_mask is
NULL (git-fixes).
* KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap
(git-fixes).
* KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting MP_STATE
(git-fixes).
* KVM: x86: Reject KVM_SET_TSC_KHZ vCPU ioctl for TSC protected guest (git-
fixes).
* KVM: x86: avoid underflow when scaling TSC frequency (git-fixes).
* Limit patch filenames to 100 characters (bsc#1249604).
* Move upstreamed SPI patch into sorted section
* NFS: Fix a race when updating an existing write (git-fixes).
* NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (git-fixes).
* NFS: Fix the setting of capabilities when automounting a new filesystem
(git-fixes).
* NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (git-
fixes).
* NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY (git-fixes).
* NFS: nfs_invalidate_folio() must observe the offset and size arguments (git-
fixes).
* NFSD: Define a proc_layoutcommit for the FlexFiles layout type (git-fixes).
* NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul() (git-fixes).
* NFSD: detect mismatch of file handle and delegation stateid in OPEN op (git-
fixes).
* NFSv4.1: fix backchannel max_resp_sz verification check (git-fixes).
* NFSv4.2: another fix for listxattr (git-fixes).
* NFSv4/flexfiles: Fix layout merge mirror check (git-fixes).
* NFSv4: Clear NFS_CAP_OPEN_XOR and NFS_CAP_DELEGTIME if not supported (git-
fixes).
* NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes).
* NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git-
fixes).
* NFSv4: Do not clear capabilities that won't be reset (git-fixes).
* Octeontx2-af: Skip overlap check for SPI field (git-fixes).
* PCI/ACPI: Fix pci_acpi_preserve_config() memory leak (git-fixes).
* PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git-
fixes).
* PCI/AER: Fix missing uevent on recovery when a reset is requested (git-
fixes).
* PCI/ERR: Fix uevent on failure to recover (git-fixes).
* PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (git-
fixes).
* PCI/MSI: Export pci_msix_prepare_desc() for dynamic MSI-X allocations
(bsc#1245457).
* PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes).
* PCI/pwrctrl: Fix device leak at registration (git-fixes).
* PCI/sysfs: Ensure devices are powered for config reads (git-fixes).
* PCI: Extend isolated function probing to LoongArch (git-fixes).
* PCI: Rename PCIE_RESET_CONFIG_DEVICE_WAIT_MS to PCIE_RESET_CONFIG_WAIT_MS
(git-fixes).
* PCI: Support Immediate Readiness on devices without PM capabilities (git-
fixes).
* PCI: dw-rockchip: Replace PERST# sleep time with proper macro (git-fixes).
* PCI: dw-rockchip: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git-
fixes).
* PCI: dwc: Ensure that dw_pcie_wait_for_link() waits 100 ms after link up
(stable-fixes).
* PCI: endpoint: Fix configfs group list head handling (git-fixes).
* PCI: endpoint: Fix configfs group removal on driver teardown (git-fixes).
* PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute
(git-fixes).
* PCI: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar()
fails (git-fixes).
* PCI: hv: Allow dynamic MSI-X vector allocation (bsc#1245457).
* PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features
(git-fixes).
* PCI: imx6: Add IMX8MQ_EP third 64-bit BAR in epc_features (git-fixes).
* PCI: imx6: Add i.MX8Q PCIe Endpoint (EP) support (git-fixes).
* PCI: imx6: Delay link start until configfs 'start' written (git-fixes).
* PCI: imx6: Remove apps_reset toggling from
imx_pcie_{assert/deassert}_core_reset (git-fixes).
* PCI: j721e: Fix incorrect error message in probe() (git-fixes).
* PCI: j721e: Fix programming sequence of "strap" settings (git-fixes).
* PCI: keystone: Use devm_request_irq() to free "ks-pcie-error-irq" on exit
(git-fixes).
* PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199).
* PCI: pnv_php: Work around switches with broken presence detection
(bsc#1215199).
* PCI: qcom: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git-fixes).
* PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion (git-fixes).
* PCI: rcar-gen4: Assure reset occurs before DBI access (git-fixes).
* PCI: rcar-gen4: Fix PHY initialization (git-fixes).
* PCI: rcar-gen4: Fix inverted break condition in PHY initialization (git-
fixes).
* PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-
fixes).
* PCI: rcar-host: Drop PMSR spinlock (git-fixes).
* PCI: rockchip-host: Fix "Unexpected Completion" log message (git-fixes).
* PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git-
fixes).
* PCI: rockchip: Use standard PCIe definitions (git-fixes).
* PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq() (git-fixes).
* PCI: tegra194: Fix duplicate PLL disable in pex_ep_event_pex_rst_assert()
(git-fixes).
* PCI: tegra194: Handle errors in BPMP response (git-fixes).
* PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).
* PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock (git-
fixes).
* PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation
(git-fixes).
* PCI: xilinx-nwl: Fix ECAM programming (git-fixes).
* PM / devfreq: Check governor before using governor->name (git-fixes).
* PM / devfreq: Fix a index typo in trans_stat (git-fixes).
* PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store()
(stable-fixes).
* PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()
(git-fixes).
* PM / devfreq: rockchip-dfi: double count on RK3588 (git-fixes).
* PM: EM: use kfree_rcu() to simplify the code (stable-fixes).
* PM: cpufreq: powernv/tracing: Move powernv_throttle trace event (git-fixes).
* PM: hibernate: Add pm_hibernation_mode_is_suspend() (bsc#1243112).
* PM: hibernate: Add stub for pm_hibernate_is_recovering() (bsc#1243112).
* PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage
(bsc#1243112).
* PM: hibernate: add new api pm_hibernate_is_recovering() (bsc#1243112).
* PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable-
fixes).
* PM: runtime: Take active children into account in pm_runtime_get_if_in_use()
(git-fixes).
* PM: sleep: console: Fix the black screen issue (stable-fixes).
* PM: sleep: core: Clear power.must_resume in noirq suspend error path (git-
fixes).
* RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034).
* RAS/AMD/FMPM: Get masked address (bsc#1242034).
* RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes)
* RDMA/bnxt_re: Fix size of uverbs_copy_to() in BNXT_RE_METHOD_GET_TOGGLE_MEM
(git-fixes)
* RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes)
* RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes)
* RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes)
* RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes)
* RDMA/core: Rate limit GID cache warning messages (git-fixes)
* RDMA/core: Resolve MAC of next-hop device without ARP support (git-fixes)
* RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes)
* RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters
(git-fixes)
* RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes)
* RDMA/hns: Drop GFP_NOWARN (git-fixes)
* RDMA/hns: Fix -Wframe-larger-than issue (git-fixes)
* RDMA/hns: Fix HW configurations not cleared in error flow (git-fixes)
* RDMA/hns: Fix accessing uninitialized resources (git-fixes)
* RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes)
* RDMA/hns: Fix double destruction of rsv_qp (git-fixes)
* RDMA/hns: Fix querying wrong SCC context for DIP algorithm (git-fixes)
* RDMA/hns: Get message length of ack_req from FW (git-fixes)
* RDMA/mana_ib: Add device statistics support (bsc#1246651).
* RDMA/mana_ib: Drain send wrs of GSI QP (bsc#1251135).
* RDMA/mana_ib: Extend modify QP (bsc#1251135).
* RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes).
* RDMA/mana_ib: add additional port counters (git-fixes).
* RDMA/mana_ib: add support of multiple ports (git-fixes).
* RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count (git-fixes)
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes)
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes)
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes)
* RDMA/mlx5: Fix UMR modifying of mkey page size (git-fixes)
* RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes)
* RDMA/mlx5: Fix vport loopback forcing for MPV device (git-fixes)
* RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes)
* RDMA/rxe: Fix race in do_task() when draining (git-fixes)
* RDMA/rxe: Flush delayed SKBs while releasing RXE resources (git-fixes)
* RDMA/siw: Always report immediate post SQ errors (git-fixes)
* RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages (git-fixes)
* RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes)
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes)
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git-
fixes)
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes)
* RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes)
* README.BRANCH: mfranc at suse.cz leaving SUSE
* RISC-V: Add defines for the SBI nested acceleration extension (jsc#PED-348).
* Reapply "wifi: mac80211: Update skb's control block key in
ieee80211_tx_dequeue()" (git-fixes).
* Reapply "x86/smp: Eliminate mwait_play_dead_cpuid_hint()" (jsc#PED-13815).
* Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes).
* Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes).
* Revert "drm/nouveau: check ioctl command codes better" (git-fixes).
* Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes).
* Revert "leds: trigger: netdev: Configure LED blink interval for HW offload"
(git-fixes).
* Revert "mac80211: Dynamically set CoDel parameters per station" (stable-
fixes).
* Revert "usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems
Running" (git-fixes).
* Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()"
(stable-fixes).
* Revert "wifi: mt76: mt7925: Update mt7925_mcu_uni_[tx,rx]_ba for MLO" (git-
fixes).
* SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes).
* Squashfs: add additional inode sanity checking (git-fixes).
* Squashfs: fix uninit-value in squashfs_get_parent (git-fixes).
* Squashfs: reject negative file sizes in squashfs_read_inode() (git-fixes).
* USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes).
* USB: gadget: f_hid: Fix memory leak in hidg_bind error path (git-fixes).
* USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI (stable-fixes).
* USB: serial: option: add Foxconn T99W640 (stable-fixes).
* USB: serial: option: add Foxconn T99W709 (stable-fixes).
* USB: serial: option: add SIMCom 8230C compositions (stable-fixes).
* USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition (stable-
fixes).
* USB: serial: option: add Telit Cinterion FN990A w/audio compositions
(stable-fixes).
* USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions
(stable-fixes).
* USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera
(stable-fixes).
* USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles
(stable-fixes).
* Update config files. (bsc#1249186) Enable where we define KABI refs + rely
on Kconfig deps.
* Update config files: revive pwc driver for Leap (bsc#1249060)
* accel/habanalabs/gaudi2: Use kvfree() for memory allocated with kvcalloc()
(git-fixes).
* accel/ivpu: Correct DCT interrupt handling (git-fixes).
* accel/ivpu: Fix reset_engine debugfs file logic (stable-fixes).
* accel/ivpu: Fix warning in ivpu_gem_bo_free() (git-fixes).
* accel/ivpu: Prevent recovery work from being queued during device removal
(git-fixes).
* amdgpu/amdgpu_discovery: increase timeout limit for IFWI init (stable-
fixes).
* aoe: defer rexmit timer downdev work to workqueue (git-fixes).
* arch/powerpc: Remove .interp section in vmlinux (bsc#1215199).
* arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes)
* arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes)
* arm64/mm: Check pmd_table() in pmd_trans_huge() (git-fixes)
* arm64/mm: Close theoretical race where stale TLB entry remains valid (git-
fixes)
* arm64/mm: Drop wrong writes into TCR2_EL1 (git-fixes)
* arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes)
* arm64/sysreg: Add register fields for HDFGRTR2_EL2 (git-fixes)
* arm64/sysreg: Add register fields for HDFGWTR2_EL2 (git-fixes)
* arm64/sysreg: Add register fields for HFGITR2_EL2 (git-fixes)
* arm64/sysreg: Add register fields for HFGRTR2_EL2 (git-fixes)
* arm64/sysreg: Add register fields for HFGWTR2_EL2 (git-fixes)
* arm64/sysreg: Update register fields for ID_AA64MMFR0_EL1 (git-fixes)
* arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes)
* arm64: Handle KCOV __init vs inline mismatches (git-fixes)
* arm64: Mark kernel as tainted on SAE and SError panic (git-fixes)
* arm64: Restrict pagetable teardown to avoid false warning (git-fixes)
* arm64: config: Make tpm_tis_spi module build-in (bsc#1246896)
* arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes)
* arm64: dts: add big-endian property back into watchdog node (git-fixes)
* arm64: dts: apple: Add ethernet0 alias for J375 template (git-fixes)
* arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map (git-fixes)
* arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes)
* arm64: dts: exynos: gs101: Add 'local-timer-stop' to cpuidle nodes (git-
fixes)
* arm64: dts: exynos: gs101: ufs: add dma-coherent property (git-fixes)
* arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes)
* arm64: dts: freescale: imx93-tqma9352: Limit BUCK2 to 600mV (git-fixes)
* arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes)
* arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes)
* arm64: dts: imx8mm-beacon: Set SAI5 MCLK direction to output for HDMI (git-
fixes)
* arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git-
fixes)
* arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git-
fixes)
* arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git-
fixes)
* arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git-
fixes)
* arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git-
fixes)
* arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes)
* arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes)
* arm64: dts: imx8mn-beacon: Set SAI5 MCLK direction to output for HDMI (git-
fixes)
* arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git-
fixes)
* arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes)
* arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes)
* arm64: dts: imx8mp-venice-gw702x: Increase HS400 USDHC clock speed (git-
fixes)
* arm64: dts: imx8mp-venice-gw71xx: fix TPM SPI frequency (git-fixes)
* arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency (git-fixes)
* arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency (git-fixes)
* arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency (git-fixes)
* arm64: dts: imx8mp: Correct thermal sensor index (git-fixes)
* arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git-
fixes)
* arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes)
* arm64: dts: imx93-kontron: Fix GPIO for panel regulator (git-fixes)
* arm64: dts: imx93-kontron: Fix USB port assignment (git-fixes)
* arm64: dts: imx95: Correct the DMA interrupter number of pcie0_ep (git-
fixes)
* arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid (git-fixes)
* arm64: dts: marvell: cn9132-clearfog: disable eMMC high-speed modes (git-
fixes)
* arm64: dts: marvell: cn9132-clearfog: fix multi-lane pci x2 and x4 (git-
fixes)
* arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B (git-
fixes).
* arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5 (git-
fixes)
* arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes)
* arm64: dts: rockchip: Add vcc-supply to SPI flash on rk3566-rock3c (git-
fixes)
* arm64: dts: rockchip: Fix Bluetooth interrupts flag on Neardi LBA3368 (git-
fixes)
* arm64: dts: rockchip: Fix the headphone detection on the orangepi 5 (git-
fixes)
* arm64: dts: rockchip: Move SHMEM memory to reserved memory on rk3588 (git-
fixes)
* arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes)
* arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git-
fixes)
* arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399
Puma (git-fixes)
* arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes)
* arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git-
fixes)
* arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes)
* arm64: dts: st: fix timer used for ticks (git-fixes)
* arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git-
fixes)
* arm64: map [_text, _stext) virtual address range (git-fixes)
* arm64: mte: Do not flag the zero page as PG_mte_tagged (git-fixes)
* arm64: poe: Handle spurious Overlay faults (git-fixes)
* arm64: rust: clean Rust 1.85.0 warning using softfloat target (git-fixes)
* arm64: stacktrace: Check kretprobe_find_ret_addr() return value (git-fixes)
* arm64: tegra: Add uartd serial alias for Jetson TX1 module (git-fixes)
* arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes)
* arm64: tegra: Resize aperture for the IGX PCIe C5 slot (git-fixes)
* arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes)
* arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes)
* ata: ahci: Disable DIPM if host lacks support (stable-fixes).
* ata: ahci: Disallow LPM policy control if not supported (stable-fixes).
* ata: libata-sata: Add link_power_management_supported sysfs attribute (git-
fixes).
* ata: libata-sata: Disallow changing LPM state if not supported (stable-
fixes).
* ata: libata-scsi: Fix CDL control (git-fixes).
* audit,module: restore audit logging in load failure case (git-fixes).
* ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes).
* batman-adv: fix OOB read/write in network-coding decode (git-fixes).
* benet: fix BUG when creating VFs (git-fixes).
* block: Introduce bio_needs_zone_write_plugging() (git-fixes).
* block: Make REQ_OP_ZONE_FINISH a write operation (git-fixes, bsc#1249552).
* block: ensure discard_granularity is zero when discard is not supported
(git-fixes).
* block: fix kobject leak in blk_unregister_queue (git-fixes).
* block: mtip32xx: Fix usage of dma_map_sg() (git-fixes).
* block: sanitize chunk_sectors for atomic write limits (git-fixes).
* bnxt_en: Add a helper function to configure MRU and RSS (git-fixes).
* bnxt_en: Adjust TX rings if reservation is less than requested (git-fixes).
* bnxt_en: Fix DCB ETS validation (git-fixes).
* bnxt_en: Fix memory corruption when FW resources change during ifdown (git-
fixes).
* bnxt_en: Fix stats context reservation logic (git-fixes).
* bnxt_en: Flush FW trace before copying to the coredump (git-fixes).
* bnxt_en: Update MRU and RSS table of RSS contexts on queue reset (git-
fixes).
* bnxt_en: eliminate the compile warning in bnxt_request_irq due to
CONFIG_RFS_ACCEL (git-fixes).
* bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free() (git-
fixes)
* bpf, arm64: Fix fp initialization for exception boundary (git-fixes)
* bpf, docs: Fix broken link to renamed bpf_iter_task_vmas.c (git-fixes).
* bpf, sockmap: Fix psock incorrectly pointing to sk (git-fixes).
* bpf: Adjust free target to avoid global starvation of LRU map (git-fixes).
* bpf: Allow XDP dev-bound programs to perform XDP_REDIRECT into maps (git-
fixes).
* bpf: Avoid RCU context warning when unpinning htab with internal structs
(git-fixes).
* bpf: Check link_create.flags parameter for multi_kprobe (git-fixes).
* bpf: Check link_create.flags parameter for multi_uprobe (git-fixes).
* bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} (git-fixes).
* bpf: Fix uninitialized values in BPF_{CORE,PROBE}_READ (git-fixes).
* bpf: Forget ranges when refining tnum after JSET (git-fixes).
* bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes).
* bpf: Only fails the busy counter check in bpf_cgrp_storage_get if it creates
storage (git-fixes).
* bpf: Reject %p% format string in bprintf-like helpers (git-fixes).
* bpf: Reject attaching fexit/fmod_ret to __noreturn functions (git-fixes).
* bpf: Reject narrower access to pointer ctx fields (git-fixes).
* bpf: Return prog btf_id without capable check (git-fixes).
* bpf: Use preempt_count() directly in bpf_send_signal_common() (git-fixes).
* bpf: Use proper type to calculate bpf_raw_tp_null_args.mask index (git-
fixes).
* bpf: fix possible endless loop in BPF map iteration (git-fixes).
* btrfs: abort transaction during log replay if walk_log_tree() failed (git-
fixes).
* btrfs: abort transaction on unexpected eb generation at btrfs_copy_root()
(git-fixes).
* btrfs: add assertions and comment about path expectations to
btrfs_cross_ref_exist() (git-fixes).
* btrfs: add debug build only WARN (bsc#1249038).
* btrfs: add function comment for check_committed_ref() (git-fixes).
* btrfs: always abort transaction on failure to add block group to free space
tree (git-fixes).
* btrfs: avoid load/store tearing races when checking if an inode was logged
(git-fixes).
* btrfs: avoid redundant call to get inline ref type at check_committed_ref()
(git-fixes).
* btrfs: avoid starting new transaction when cleaning qgroup during subvolume
drop (git-fixes).
* btrfs: clear dirty status from extent buffer on error at insert_new_root()
(git-fixes).
* btrfs: codify pattern for adding block_group to bg_list (git-fixes).
* btrfs: convert ASSERT(0) with handled errors to DEBUG_WARN() (bsc#1249038).
* btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling
(git-fixes).
* btrfs: correctly escape subvol in btrfs_show_options() (git-fixes).
* btrfs: do not allow relocation of partially dropped subvolumes
(bsc#1249540).
* btrfs: do not ignore inode missing when replaying log tree (git-fixes).
* btrfs: do not output error message if a qgroup has been already cleaned up
(git-fixes).
* btrfs: do not return VM_FAULT_SIGBUS on failure to set delalloc for mmap
write (bsc#1247949).
* btrfs: do not silently ignore unexpected extent type when replaying log
(git-fixes).
* btrfs: do not skip remaining extrefs if dir not found during log replay
(git-fixes).
* btrfs: enhance ASSERT() to take optional format string (bsc#1249038).
* btrfs: error on missing block group when unaccounting log tree extent
buffers (git-fixes).
* btrfs: exit after state split error at set_extent_bit() (git-fixes).
* btrfs: explicitly ref count block_group on new_bgs list (bsc#1243068)
* btrfs: fix -ENOSPC mmap write failure on NOCOW files/extents (bsc#1247949).
* btrfs: fix assertion when building free space tree (git-fixes).
* btrfs: fix corruption reading compressed range when block size is smaller
than page size (git-fixes).
* btrfs: fix data overwriting bug during buffered write when block size <
page size (git-fixes).
* btrfs: fix data race when accessing the inode's disk_i_size at
btrfs_drop_extents() (git-fixes).
* btrfs: fix incorrect log message for nobarrier mount option (git-fixes).
* btrfs: fix inode lookup error handling during log replay (git-fixes).
* btrfs: fix invalid extref key setup when replaying dentry (git-fixes).
* btrfs: fix invalid inode pointer after failure to create reloc inode (git-
fixes).
* btrfs: fix invalid inode pointer dereferences during log replay (git-fixes).
* btrfs: fix iteration bug in __qgroup_excl_accounting() (git-fixes).
* btrfs: fix log tree replay failure due to file with 0 links and extents
(git-fixes).
* btrfs: fix missing error handling when searching for inode refs during log
replay (git-fixes).
* btrfs: fix non-empty delayed iputs list on unmount due to async workers
(git-fixes).
* btrfs: fix printing of mount info messages for NODATACOW/NODATASUM (git-
fixes).
* btrfs: fix race between logging inode and checking if it was logged before
(git-fixes).
* btrfs: fix race between setting last_dir_index_offset and inode logging
(git-fixes).
* btrfs: fix squota compressed stats leak (git-fixes).
* btrfs: fix ssd_spread overallocation (git-fixes).
* btrfs: fix subvolume deletion lockup caused by inodes xarray race (git-
fixes).
* btrfs: fix the inode leak in btrfs_iget() (git-fixes).
* btrfs: fix two misuses of folio_shift() (git-fixes).
* btrfs: fix wrong length parameter for btrfs_cleanup_ordered_extents() (git-
fixes).
* btrfs: handle unaligned EOF truncation correctly for subpage cases
(bsc#1249038).
* btrfs: initialize inode::file_extent_tree after i_mode has been set (git-
fixes).
* btrfs: make btrfs_discard_workfn() block_group ref explicit (bsc#1243068)
* btrfs: make btrfs_iget() return a btrfs inode instead (git-fixes).
* btrfs: make btrfs_iget_path() return a btrfs inode instead (git-fixes).
* btrfs: move transaction aborts to the error site in
add_block_group_free_space() (git-fixes).
* btrfs: pass a btrfs_inode to fixup_inode_link_count() (git-fixes).
* btrfs: pass struct btrfs_inode to btrfs_defrag_file() (git-fixes).
* btrfs: pass struct btrfs_inode to btrfs_double_mmap_lock() (git-fixes).
* btrfs: pass struct btrfs_inode to btrfs_double_mmap_unlock() (git-fixes).
* btrfs: pass struct btrfs_inode to btrfs_extent_same_range() (git-fixes).
* btrfs: pass struct btrfs_inode to btrfs_fill_inode() (git-fixes).
* btrfs: pass struct btrfs_inode to btrfs_iget_locked() (git-fixes).
* btrfs: pass struct btrfs_inode to btrfs_inode_inherit_props() (git-fixes).
* btrfs: pass struct btrfs_inode to btrfs_inode_type() (git-fixes).
* btrfs: pass struct btrfs_inode to btrfs_load_inode_props() (git-fixes).
* btrfs: pass struct btrfs_inode to btrfs_read_locked_inode() (git-fixes).
* btrfs: pass struct btrfs_inode to can_nocow_extent() (git-fixes).
* btrfs: pass struct btrfs_inode to clone_copy_inline_extent() (git-fixes).
* btrfs: pass struct btrfs_inode to extent_range_clear_dirty_for_io() (git-
fixes).
* btrfs: pass struct btrfs_inode to fill_stack_inode_item() (git-fixes).
* btrfs: pass struct btrfs_inode to new_simple_dir() (git-fixes).
* btrfs: pass true to btrfs_delalloc_release_space() at btrfs_page_mkwrite()
(bsc#1247949).
* btrfs: propagate last_unlink_trans earlier when doing a rmdir (git-fixes).
* btrfs: props: switch prop_handler::apply to struct btrfs_inode (git-fixes).
* btrfs: props: switch prop_handler::extract to struct btrfs_inode (git-
fixes).
* btrfs: push cleanup into btrfs_read_locked_inode() (git-fixes).
* btrfs: qgroup: fix qgroup create ioctl returning success after quotas
disabled (git-fixes).
* btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git-
fixes).
* btrfs: qgroup: remove no longer used fs_info->qgroup_ulist (git-fixes).
* btrfs: qgroup: set quota enabled bit if quota disable fails flushing
reservations (git-fixes).
* btrfs: record new subvolume in parent dir earlier to avoid dir logging races
(git-fixes).
* btrfs: remove conditional path allocation in btrfs_read_locked_inode() (git-
fixes).
* btrfs: remove no longer needed strict argument from can_nocow_extent() (git-
fixes).
* btrfs: remove redundant path release when replaying a log tree (git-fixes).
* btrfs: remove the snapshot check from check_committed_ref() (git-fixes).
* btrfs: restore mount option info messages during mount (git-fixes).
* btrfs: return a btrfs_inode from btrfs_iget_logging() (git-fixes).
* btrfs: return a btrfs_inode from read_one_inode() (git-fixes).
* btrfs: return any hit error from extent_writepage_io() (git-fixes).
* btrfs: send: remove unnecessary inode lookup at send_encoded_inline_extent()
(git-fixes).
* btrfs: simplify arguments for btrfs_cross_ref_exist() (git-fixes).
* btrfs: simplify early error checking in btrfs_page_mkwrite() (bsc#1247949).
* btrfs: simplify error detection flow during log replay (git-fixes).
* btrfs: simplify return logic at check_committed_ref() (git-fixes).
* btrfs: subpage: fix the bitmap dump of the locked flags (git-fixes).
* btrfs: tests: fix chunk map leak after failure to add it to the tree (git-
fixes).
* btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes).
* btrfs: unfold transaction aborts when replaying log trees (git-fixes).
* btrfs: unify ordering of btrfs_key initializations (git-fixes).
* btrfs: update superblock's device bytes_used when dropping chunk (git-
fixes).
* btrfs: use a single variable to track return value at btrfs_page_mkwrite()
(bsc#1247949).
* btrfs: use btrfs_record_snapshot_destroy() during rmdir (git-fixes).
* btrfs: use filemap_get_folio() helper (git-fixes).
* btrfs: use struct btrfs_inode inside btrfs_get_name() (git-fixes).
* btrfs: use struct btrfs_inode inside btrfs_get_parent() (git-fixes).
* btrfs: use struct btrfs_inode inside btrfs_remap_file_range() (git-fixes).
* btrfs: use struct btrfs_inode inside btrfs_remap_file_range_prep() (git-
fixes).
* btrfs: use struct btrfs_inode inside create_pending_snapshot() (git-fixes).
* btrfs: use verbose ASSERT() in volumes.c (bsc#1249038).
* build_bug.h: Add KABI assert (bsc#1249186).
* bus: firewall: Fix missing static inline annotations for stubs (git-fixes).
* bus: fsl-mc: Check return value of platform_get_resource() (git-fixes).
* bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint()
(git-fixes).
* bus: mhi: ep: Fix chained transfer handling in read path (git-fixes).
* bus: mhi: host: Detect events pointing to unexpected TREs (git-fixes).
* bus: mhi: host: Do not use uninitialized 'dev' pointer in
mhi_init_irq_setup() (git-fixes).
* bus: mhi: host: pci_generic: Fix the modem name of Foxconn T99W640 (git-
fixes).
* can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow (git-
fixes).
* can: hi311x: fix null pointer dereference when resuming from sleep before
interface was enabled (stable-fixes).
* can: hi311x: populate ndo_change_mtu() to prevent buffer overflow (git-
fixes).
* can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes).
* can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get()
fails (git-fixes).
* can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when
j1939_local_ecu_get() failed (git-fixes).
* can: kvaser_pciefd: Store device channel index (git-fixes).
* can: kvaser_usb: Assign netdev.dev_port based on device channel index (git-
fixes).
* can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (git-
fixes).
* can: netlink: can_changelink(): fix NULL pointer deref of struct
can_priv::do_set_mode (git-fixes).
* can: peak_usb: fix USB FD devices potential malfunction (git-fixes).
* can: peak_usb: fix shift-out-of-bounds issue (git-fixes).
* can: rcar_can: rcar_can_resume(): fix s2ram with PSCI (stable-fixes).
* can: rcar_canfd: Fix controller mode setting (stable-fixes).
* can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow (git-
fixes).
* can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB
(git-fixes).
* cdc-acm: fix race between initial clearing halt and open (git-fixes).
* cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes).
* cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes).
* cgroup/cpuset: Fix a partition error with CPU hotplug (bsc#1241166).
* cgroup/cpuset: Use static_branch_enable_cpuslocked() on
cpusets_insane_config_key (bsc#1241166).
* cgroup: Add compatibility option for content of /proc/cgroups
(jsc#PED-12405).
* cgroup: Print message when /proc/cgroups is read on v2-only system
(jsc#PED-12405).
* cgroup: llist: avoid memory tears for llist_node (bsc#1247963).
* cgroup: make css_rstat_updated nmi safe (bsc#1247963).
* cgroup: remove per-cpu per-subsystem locks (bsc#1247963).
* cgroup: support to enable nmi-safe css_rstat_updated (bsc#1247963).
* char: misc: Fix improper and inaccurate error code returned by misc_init()
(stable-fixes).
* clk: at91: peripheral: fix return value (git-fixes).
* clk: at91: sam9x7: update pll clk ranges (git-fixes).
* clk: clk-axi-clkgen: fix fpfd_max frequency for zynq (git-fixes).
* clk: davinci: Add NULL check in davinci_lpsc_clk_register() (git-fixes).
* clk: imx95-blk-ctl: Fix synchronous abort (git-fixes).
* clk: mediatek: clk-mux: Do not pass flags to clk_mux_determine_rate_flags()
(git-fixes).
* clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m (git-
fixes).
* clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register()
(git-fixes).
* clk: qcom: gcc-ipq8074: fix broken freq table for nss_port6_tx_clk_src (git-
fixes).
* clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk (git-
fixes).
* clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init() (git-
fixes).
* clk: renesas: rzv2h: Fix missing CLK_SET_RATE_PARENT flag for ddiv clocks
(git-fixes).
* clk: samsung: exynos850: fix a comment (git-fixes).
* clk: samsung: gs101: fix CLK_DOUT_CMU_G3D_BUSD (git-fixes).
* clk: samsung: gs101: fix alternate mout_hsi0_usb20_ref parent clock (git-
fixes).
* clk: sunxi-ng: v3s: Fix de clock definition (git-fixes).
* clk: tegra: do not overallocate memory for bpmp clocks (git-fixes).
* clk: thead: th1520-ap: Correctly refer the parent of osc_12m (git-fixes).
* clk: xilinx: vcu: unregister pll_post only if registered correctly (git-
fixes).
* comedi: Fix use of uninitialized memory in do_insn_ioctl() and
do_insnlist_ioctl() (git-fixes).
* comedi: Make insn_rw_emulate_bits() do insn->n samples (git-fixes).
* comedi: fix race between polling and detaching (git-fixes).
* comedi: pcl726: Prevent invalid irq number (git-fixes).
* compiler-clang.h: define **SANITIZE_*** macros only when undefined (stable-
fixes).
* compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes).
* config.sh: SLFO 1.2 branched in IBS
* config: arm64: default: enable mtu3 dual-role support for MediaTek platforms
(bsc#1245206)
* coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes).
* cpu: Define attack vectors (git-fixes).
* cpufreq/amd-pstate: Fix a regression leading to EPP 0 after resume (git-
fixes).
* cpufreq/amd-pstate: Fix setting of CPPC.min_perf in active mode for
performance governor (git-fixes).
* cpufreq/sched: Explicitly synchronize limits_changed flag (git-fixes)
* cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS (git-fixes)
* cpufreq: Add SM8650 to cpufreq-dt-platdev blocklist (stable-fixes).
* cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay (stable-
fixes).
* cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes).
* cpufreq: Exit governor when failed to start old governor (stable-fixes).
* cpufreq: Init policy->rwsem before it may be possibly used (git-fixes).
* cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes).
* cpufreq: Initialize cpufreq-based invariance before subsys (git-fixes).
* cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency
(stable-fixes git-fixes).
* cpufreq: Reference count policy in cpufreq_update_limits() (git-fixes).
* cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table()
(stable-fixes).
* cpufreq: armada-8k: make both cpu masks static (git-fixes).
* cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes).
* cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git-
fixes).
* cpufreq: intel_pstate: Add Granite Rapids support in no-HWP mode (stable-
fixes).
* cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git-
fixes).
* cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
(git-fixes).
* cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes).
* cpufreq: mediatek: fix device leak on probe failure (git-fixes).
* cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus() (git-
fixes).
* cpufreq: scmi: Skip SCMI devices that are not used by the CPUs (stable-
fixes).
* cpufreq: scpi: compare kHz instead of Hz (git-fixes).
* cpufreq: sun50i: prevent out-of-bounds access (git-fixes).
* cpufreq: tegra186: Set target frequency for all cpus in policy (git-fixes).
* cpufreq: tegra186: Share policy per cluster (stable-fixes).
* cpupower: Fix a bug where the -t option of the set subcommand was not
working (stable-fixes).
* crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes).
* crypto: arm/aes-neonbs - work around gcc-15 warning (git-fixes).
* crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes).
* crypto: atmel - Fix dma_unmap_sg() direction (git-fixes).
* crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP (git-fixes).
* crypto: ccp - Add missing bootloader info reg for pspv6 (stable-fixes).
* crypto: ccp - Fix crash when rebind ccp device for ccp.ko (git-fixes).
* crypto: ccp - Fix locking on alloc failure handling (git-fixes).
* crypto: essiv - Check ssize for decryption and in-place encryption (git-
fixes).
* crypto: hisilicon - re-enable address prefetch after device resuming (git-
fixes).
* crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes).
* crypto: hisilicon/qm - check whether the input function and PF are on the
same device (git-fixes).
* crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs (git-fixes).
* crypto: hisilicon/zip - remove unnecessary validation for high-performance
mode configurations (git-fixes).
* crypto: img-hash - Fix dma_unmap_sg() nents value (git-fixes).
* crypto: inside-secure - Fix `dma_unmap_sg()` nents value (git-fixes).
* crypto: jitter - fix intermediary handling (stable-fixes).
* crypto: keembay - Add missing check after sg_nents_for_len() (git-fixes).
* crypto: keembay - Fix dma_unmap_sg() nents value (git-fixes).
* crypto: marvell/cesa - Fix engine load inaccuracy (git-fixes).
* crypto: octeontx2 - Call strscpy() with correct size argument (git-fixes).
* crypto: octeontx2 - Fix address alignment issue on ucode loading (stable-
fixes).
* crypto: octeontx2 - Fix address alignment on CN10K A0/A1 and OcteonTX2
(stable-fixes).
* crypto: octeontx2 - Fix address alignment on CN10KB and CN10KA-B0 (stable-
fixes).
* crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes).
* crypto: qat - allow enabling VFs in the absence of IOMMU (git-fixes).
* crypto: qat - disable ZUC-256 capability for QAT GEN5 (git-fixes).
* crypto: qat - fix DMA direction for compression on GEN2 devices (git-fixes).
* crypto: qat - fix seq_file position update in adf_ring_next() (git-fixes).
* crypto: qat - fix state restore for banks with exceptions (git-fixes).
* crypto: qat - flush misc workqueue during device shutdown (git-fixes).
* crypto: qat - lower priority for skcipher and aead algorithms (stable-
fixes).
* crypto: qat - use unmanaged allocation for dc_data (git-fixes).
* crypto: rng - Ensure set_ent is always present (git-fixes).
* crypto: rockchip - Fix dma_unmap_sg() nents value (git-fixes).
* crypto: sun8i-ce - fix nents passed to dma_unmap_sg() (git-fixes).
* devlink: Add support for u64 parameters (jsc#PED-13331).
* devlink: avoid param type value translations (jsc#PED-13331).
* devlink: define enum for attr types of dynamic attributes (jsc#PED-13331).
* devlink: introduce devlink_nl_put_u64() (jsc#PED-13331).
* devlink: let driver opt out of automatic phys_port_name generation (git-
fixes).
* dm-mpath: do not print the "loaded" message if registering fails (git-
fixes).
* dm-stripe: limit chunk_sectors to the stripe size (git-fixes).
* dm-table: fix checking for rq stackable devices (git-fixes).
* dm: Check for forbidden splitting of zone write operations (git-fixes).
* dm: split write BIOs on zone boundaries when zone append is not emulated
(git-fixes).
* dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes).
* dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation (git-fixes).
* dmaengine: dw-edma: Drop unused dchan2dev() and chan2dev() (git-fixes).
* dmaengine: dw: dmamux: Fix device reference leak in
rzn1_dmamux_route_allocate (git-fixes).
* dmaengine: fsl-dpaa2-qdma: Drop unused mc_enc() (git-fixes).
* dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes).
* dmaengine: idxd: Fix refcount underflow on module unload (git-fixes).
* dmaengine: idxd: Remove improper idxd_free (git-fixes).
* dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() (git-
fixes).
* dmaengine: mmp: Fix again Wvoid-pointer-to-enum-cast warning (git-fixes).
* dmaengine: mv_xor: Fix missing check after DMA map and missing unmap (git-
fixes).
* dmaengine: nbpfaxi: Add missing check after DMA map (git-fixes).
* dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git-
fixes).
* dmaengine: qcom: gpi: Drop unused gpi_write_reg_field() (git-fixes).
* dmaengine: stm32-dma: configure next sg only if there are more than 2 sgs
(stable-fixes).
* dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git-
fixes).
* docs: admin-guide: update to current minimum pipe size default (git-fixes).
* dpll: Add basic Microchip ZL3073x support (jsc#PED-13331).
* dpll: Make ZL3073X invisible (jsc#PED-13331).
* dpll: zl3073x: Add support to get/set frequency on pins (jsc#PED-13331).
* dpll: zl3073x: Add support to get/set priority on input pins
(jsc#PED-13331).
* dpll: zl3073x: Fetch invariants during probe (jsc#PED-13331).
* dpll: zl3073x: Fix build failure (jsc#PED-13331).
* dpll: zl3073x: Implement input pin selection in manual mode (jsc#PED-13331).
* dpll: zl3073x: Implement input pin state setting in automatic mode
(jsc#PED-13331).
* dpll: zl3073x: Read DPLL types and pin properties from system firmware
(jsc#PED-13331).
* dpll: zl3073x: Register DPLL devices and pins (jsc#PED-13331).
* dpll: zl3073x: ZL3073X_I2C and ZL3073X_SPI should depend on NET
(jsc#PED-13331).
* driver core/PM: Set power.no_callbacks along with power.no_pm (stable-
fixes).
* drivers/base/node: fix double free in register_one_node() (git-fixes).
* drivers/base/node: handle error properly in register_one_node() (git-fixes).
* drivers: base: handle module_kobject creation (git-fixes).
* drm/amd : Update MES API header file for v11 & v12 (stable-fixes).
* drm/amd/amdgpu: Declare isp firmware binary file (stable-fixes).
* drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes).
* drm/amd/amdgpu: Implement MES suspend/resume gang functionality for v12
(bsc#1243112).
* drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on vf mode (stable-
fixes).
* drm/amd/display: Add NULL check for stream before dereference in
'dm_vupdate_high_irq' (bsc#1243112).
* drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs (git-fixes).
* drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()
(git-fixes).
* drm/amd/display: Add primary plane to commits for correct VRR handling
(stable-fixes).
* drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes).
* drm/amd/display: Allow DCN301 to clear update flags (git-fixes).
* drm/amd/display: Allow RX6xxx & RX7700 to invoke amdgpu_irq_get/put (git-
fixes).
* drm/amd/display: Avoid a NULL pointer dereference (stable-fixes).
* drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported
(stable-fixes).
* drm/amd/display: Avoid trying AUX transactions on disconnected ports
(stable-fixes).
* drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out DPP PG
(stable-fixes).
* drm/amd/display: Default IPS to RCG_IN_ACTIVE_IPS2_IN_OFF (git-fixes).
* drm/amd/display: Disable CRTC degamma LUT for DCN401 (stable-fixes).
* drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121).
* drm/amd/display: Disable dsc_power_gate for dcn314 by default (stable-
fixes).
* drm/amd/display: Disable scaling on DCE6 for now (git-fixes).
* drm/amd/display: Do not check for NULL divisor in fixpt code (git-fixes).
* drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes).
* drm/amd/display: Do not overwrite dce60_clk_mgr (git-fixes).
* drm/amd/display: Do not print errors for nonexistent connectors (git-fixes).
* drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes).
* drm/amd/display: Enable Dynamic DTBCLK Switch (bsc#1243112).
* drm/amd/display: Fill display clock and vblank time in
dce110_fill_display_configs (stable-fixes).
* drm/amd/display: Find first CRTC and its line time in
dce110_fill_display_configs (stable-fixes).
* drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes).
* drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes).
* drm/amd/display: Fix Xorg desktop unresponsive on Replay panel (stable-
fixes).
* drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git-
fixes).
* drm/amd/display: Fix mismatch type comparison (stable-fixes).
* drm/amd/display: Fix vupdate_offload_work doc (bsc#1243112).
* drm/amd/display: Free memory allocation (stable-fixes).
* drm/amd/display: Init DCN35 clocks from pre-os HW values (git-fixes).
* drm/amd/display: Initialize mode_select to 0 (stable-fixes).
* drm/amd/display: Only finalize atomic_obj if it was initialized (stable-
fixes).
* drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6 (git-fixes).
* drm/amd/display: Properly disable scaling on DCE6 (git-fixes).
* drm/amd/display: Remove redundant semicolons (git-fixes).
* drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes).
* drm/amd/display: Update DMCUB loading sequence for DCN3.5 (stable-fixes).
* drm/amd/display: add workaround flag to link to force FFE preset (stable-
fixes).
* drm/amd/display: fix a Null pointer dereference vulnerability (stable-
fixes).
* drm/amd/display: fix dmub access race condition (bsc#1243112).
* drm/amd/display: fix initial backlight brightness calculation (git-fixes).
* drm/amd/display: limit clear_update_flags to dcn32 and above (stable-fixes).
* drm/amd/display: more liberal vmin/vmax update for freesync (bsc#1243112).
* drm/amd/display: remove output_tf_change flag (git-fixes).
* drm/amd/display: use udelay rather than fsleep (git-fixes).
* drm/amd/include : MES v11 and v12 API header update (stable-fixes).
* drm/amd/include : Update MES v12 API for fence update (stable-fixes).
* drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value (git-
fixes).
* drm/amd/pm: Adjust si_upload_smc_data register programming (v3) (git-fixes).
* drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2) (git-fixes).
* drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3)
(git-fixes).
* drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes).
* drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes).
* drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3) (git-fixes).
* drm/amd/pm: fix null pointer access (stable-fixes).
* drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual
(stable-fixes).
* drm/amd: Avoid evicting resources at S5 (bsc#1243112).
* drm/amd: Check whether secure display TA loaded successfully (bsc#1243112).
* drm/amd: Fix hybrid sleep (bsc#1243112).
* drm/amd: Only restore cached manual clock settings in restore if OD enabled
(bsc#1243112).
* drm/amd: Restore cached manual clock settings during resume (bsc#1243112).
* drm/amd: Restore cached power limit during resume (stable-fixes).
* drm/amdgpu/discovery: fix fw based ip discovery (git-fixes).
* drm/amdgpu/discovery: optionally use fw based ip discovery (stable-fixes).
* drm/amdgpu/gfx10: fix KGQ reset sequence (git-fixes).
* drm/amdgpu/gfx10: fix kiq locking in KCQ reset (git-fixes).
* drm/amdgpu/gfx9.4.3: fix kiq locking in KCQ reset (git-fixes).
* drm/amdgpu/gfx9: fix kiq locking in KCQ reset (git-fixes).
* drm/amdgpu/mes11: implement detect and reset callback (bsc#1243112).
* drm/amdgpu/mes12: implement detect and reset callback (bsc#1243112).
* drm/amdgpu/mes: add front end for detect and reset hung queue (bsc#1243112).
* drm/amdgpu/mes: add missing locking in helper functions (stable-fixes).
* drm/amdgpu/mes: enable compute pipes across all MEC (git-fixes).
* drm/amdgpu/mes: optimize compute loop handling (stable-fixes).
* drm/amdgpu/swm14: Update power limit logic (stable-fixes).
* drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable-
fixes).
* drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time
(stable-fixes).
* drm/amdgpu/vcn: fix ref counting for ring based profile handling (git-
fixes).
* drm/amdgpu/vpe: cancel delayed work in hw_fini (bsc#1243112).
* drm/amdgpu: Add additional DCE6 SCL registers (git-fixes).
* drm/amdgpu: Avoid extra evict-restore process (stable-fixes).
* drm/amdgpu: Avoid rma causes GPU duplicate reset (bsc#1243112).
* drm/amdgpu: Enable MES lr_compute_wa by default (stable-fixes).
* drm/amdgpu: Fix allocating extra dwords for rings (v2) (git-fixes).
* drm/amdgpu: Fix for GPU reset being blocked by KIQ I/O (bsc#1243112).
* drm/amdgpu: Increase reset counter only on success (stable-fixes).
* drm/amdgpu: Initialize data to NULL in imu_v12_0_program_rlc_ram() (git-
fixes).
* drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes).
* drm/amdgpu: Remove nbiov7.9 replay count reporting (git-fixes).
* drm/amdgpu: Report individual reset error (bsc#1243112).
* drm/amdgpu: Reset the clear flag in buddy during resume (git-fixes).
* drm/amdgpu: Update external revid for GC v9.5.0 (stable-fixes).
* drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause (stable-
fixes).
* drm/amdgpu: add kicker fws loading for gfx11/smu13/psp13 (stable-fixes).
* drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities
(stable-fixes).
* drm/amdgpu: do not resume device in thaw for normal hibernation
(bsc#1243112).
* drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes).
* drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes).
* drm/amdgpu: fix incorrect vm flags to map bo (git-fixes).
* drm/amdgpu: fix link error for !PM_SLEEP (bsc#1243112).
* drm/amdgpu: fix task hang from failed job submission during process kill
(git-fixes).
* drm/amdgpu: fix vram reservation issue (git-fixes).
* drm/amdgpu: remove the redeclaration of variable i (git-fixes).
* drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes).
* drm/amdgpu: update mmhub 4.1.0 client id mappings (stable-fixes).
* drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes).
* drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl() (git-fixes).
* drm/amdkfd: Fix mmap write lock not release (bsc#1243112).
* drm/ast: Use msleep instead of mdelay for edid read (git-fixes).
* drm/bridge: fix OF node leak (git-fixes).
* drm/bridge: it6505: select REGMAP_I2C (git-fixes).
* drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe()
(git-fixes).
* drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes).
* drm/cirrus-qemu: Fix pitch programming (git-fixes).
* drm/connector: hdmi: Evaluate limited range after computing format (git-
fixes).
* drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121).
* drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS
(stable-fixes).
* drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to
TRAINING_PATTERN_SET (bsc#1248121).
* drm/edid: Add support for quirks visible to DRM core and drivers
(bsc#1248121).
* drm/edid: Define the quirks in an enum list (bsc#1248121).
* drm/format-helper: Add conversion from XRGB8888 to BGR888 (stable-fixes).
* drm/gem: Internally test import_attach for imported objects (git-fixes).
* drm/gem: Test for imported GEM buffers with helper (stable-fixes).
* drm/gma500: Fix null dereference in hdmi teardown (git-fixes).
* drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes).
* drm/hisilicon/hibmc: fix the i2c device resource leak when vdac init failed
(git-fixes).
* drm/hisilicon/hibmc: refactored struct hibmc_drm_private (stable-fixes).
* drm/i915/backlight: Return immediately when scale() finds invalid parameters
(stable-fixes).
* drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return type
(stable-fixes).
* drm/i915/ddi: gracefully handle errors from intel_ddi_init_hdmi_connector()
(stable-fixes).
* drm/i915/ddi: only call shutdown hooks for valid encoders (stable-fixes).
* drm/i915/display: Fix dma_fence_wait_timeout() return value handling (git-
fixes).
* drm/i915/display: add intel_encoder_is_hdmi() (stable-fixes).
* drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x (git-fixes).
* drm/i915/dp_mst: Work around Thunderbolt sink disconnect after
SINK_COUNT_ESI read (stable-fixes).
* drm/i915/hdmi: add error handling in g4x_hdmi_init() (stable-fixes).
* drm/i915/hdmi: propagate errors from intel_hdmi_init_connector() (stable-
fixes).
* drm/i915/icl+/tc: Cache the max lane count value (stable-fixes).
* drm/i915/icl+/tc: Convert AUX powered WARN to a debug message (stable-
fixes).
* drm/i915/power: fix size for for_each_set_bit() in abox iteration (git-
fixes).
* drm/imagination: Clear runtime PM errors while resetting the GPU (stable-
fixes).
* drm/mediatek: Add error handling for old state CRTC in atomic_disable (git-
fixes).
* drm/mediatek: Fix device/node reference count leaks in
mtk_drm_get_all_drm_priv (git-fixes).
* drm/mediatek: fix potential OF node use-after-free (git-fixes).
* drm/msm/dp: account for widebus and yuv420 during mode validation (git-
fixes).
* drm/msm/dpu: Fill in min_prefill_lines for SC8180X (git-fixes).
* drm/msm/dpu: fix incorrect type for ret (git-fixes).
* drm/msm/kms: move snapshot init earlier in KMS init (git-fixes).
* drm/msm: Add error handling for krealloc in metadata setup (stable-fixes).
* drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes).
* drm/msm: update the high bitfield of certain DSI registers (git-fixes).
* drm/msm: use trylock for debugfs (stable-fixes).
* drm/nouveau/disp: Always accept linear modifier (git-fixes).
* drm/nouveau/gsp: fix potential leak of memory used during acpi init (git-
fixes).
* drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes).
* drm/nouveau: fix bad ret code in nouveau_bo_move_prep (git-fixes).
* drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes).
* drm/nouveau: fix typos in comments (git-fixes).
* drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes).
* drm/nouveau: remove unused memory target test (git-fixes).
* drm/panel: novatek-nt35560: Fix invalid return value (git-fixes).
* drm/panfrost: Fix panfrost device variable name in devfreq (git-fixes).
* drm/panthor: Add missing explicit padding in drm_panthor_gpu_info (git-
fixes).
* drm/panthor: Defer scheduler entitiy destruction to queue release (git-
fixes).
* drm/panthor: Fix memory leak in panthor_ioctl_group_create() (git-fixes).
* drm/panthor: validate group queue count (git-fixes).
* drm/radeon/r600_cs: clean up of dead code in r600_cs (git-fixes).
* drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes).
* drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed (git-fixes).
* drm/sched: Remove optimization that causes hang when killing dependent jobs
(git-fixes).
* drm/simpledrm: Do not upcast in release helpers (git-fixes).
* drm/tests: Fix endian warning (git-fixes).
* drm/ttm: Respect the shrinker core free target (stable-fixes).
* drm/ttm: Should to return the evict error (stable-fixes).
* drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel (git-fixes).
* drm/vmwgfx: Fix Use-after-free in validation (git-fixes).
* drm/vmwgfx: Fix a null-ptr access in the cursor snooper (git-fixes).
* drm/vmwgfx: Fix copy-paste typo in validation (git-fixes).
* drm/xe/bmg: Add new PCI IDs (stable-fixes).
* drm/xe/bmg: Add one additional PCI ID (stable-fixes).
* drm/xe/bmg: Update Wa_22019338487 (git-fixes).
* drm/xe/gsc: do not flush the GSC worker from the reset path (git-fixes).
* drm/xe/hw_engine_group: Fix double write lock release in error path (git-
fixes).
* drm/xe/mocs: Initialize MOCS index early (stable-fixes).
* drm/xe/pf: Move VFs reprovisioning to worker (stable-fixes).
* drm/xe/pf: Prepare to stop SR-IOV support prior GT reset (git-fixes).
* drm/xe/pf: Sanitize VF scratch registers on FLR (stable-fixes).
* drm/xe/tile: Release kobject for the failure path (git-fixes).
* drm/xe/uapi: Correct sync type definition in comments (git-fixes).
* drm/xe/uapi: loosen used tracking restriction (git-fixes).
* drm/xe/vf: Disable CSC support on VF (git-fixes).
* drm/xe/vm: Clear the scratch_pt pointer on error (git-fixes).
* drm/xe/xe_query: Use separate iterator while filling GT list (stable-fixes).
* drm/xe/xe_sync: avoid race during ufence signaling (git-fixes).
* drm/xe: Allow dropping kunit dependency as built-in (git-fixes).
* drm/xe: Attempt to bring bos back to VRAM after eviction (git-fixes).
* drm/xe: Carve out wopcm portion from the stolen memory (git-fixes).
* drm/xe: Do not trigger rebind on initial dma-buf validation (git-fixes).
* drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change (git-fixes).
* drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue() (git-
fixes).
* drm/xe: Fix build without debugfs (git-fixes).
* drm/xe: Make dma-fences compliant with the safe access rules (stable-fixes).
* drm/xe: Move page fault init after topology init (git-fixes).
* drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git-
fixes).
* drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git-
fixes).
* drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range (stable-fixes).
* dt-bindings: dpll: Add DPLL device and pin (jsc#PED-13331).
* dt-bindings: dpll: Add support for Microchip Azurite chip family
(jsc#PED-13331).
* e1000e: disregard NVM checksum on tgp when valid checksum bit is not set
(git-fixes).
* e1000e: ignore uninitialized checksum word on tgp (git-fixes).
* efi: stmm: Fix incorrect buffer allocation method (git-fixes).
* erofs: avoid reading more for fragment maps (git-fixes).
* erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git-
fixes).
* execmem: enforce allocation size aligment to PAGE_SIZE (git-fixes).
* exfat: add cluster chain loop check for dir (git-fixes).
* exfat: fdatasync flag should be same like generic_write_sync() (git-fixes).
* ext4: fix checks for orphan inodes (bsc#1250119).
* ext4: remove writable userspace mappings before truncating page cache
(bsc#1247223).
* fbcon: Fix OOB access in font allocation (git-fixes).
* fbcon: Fix outdated registered_fb reference in comment (git-fixes).
* fbcon: fix integer overflow in fbcon_do_set_font (git-fixes).
* fbdev: Fix logic error in "offb" name match (git-fixes).
* fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes).
* fbdev: fix potential buffer overflow in do_register_framebuffer() (stable-
fixes).
* fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref (git-fixes).
* fbdev: simplefb: Fix use after free in simplefb_detach_genpds() (git-fixes).
* fgraph: Fix set_graph_notrace with setting TRACE_GRAPH_NOTRACE_BIT (git-
fixes).
* firewire: core: fix overlooked update of subsystem ABI version (git-fixes).
* firewire: ohci: correct code comments about bus_reset tasklet (git-fixes).
* firmware: arm_ffa: Change initcall level of ffa_init() to rootfs_initcall
(stable-fixes).
* firmware: arm_scmi: Convert to SYSTEM_SLEEP_PM_OPS (git-fixes).
* firmware: arm_scmi: Fix up turbo frequencies selection (git-fixes).
* firmware: arm_scmi: Mark VirtIO ready before registering scmi_virtio_driver
(git-fixes).
* firmware: arm_scmi: power_control: Ensure SCMI_SYSPOWER_IDLE is set early
during resume (stable-fixes).
* firmware: firmware: meson-sm: fix compile-test default (git-fixes).
* firmware: meson_sm: fix device leak at probe (git-fixes).
* firmware: tegra: Fix IVC dependency problems (stable-fixes).
* flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read
(git-fixes).
* fs/nfs/io: make nfs_start_io_*() killable (git-fixes).
* fs/proc/task_mmu: check p->vec_buf for NULL (git-fixes).
* fs/proc: Use inode_get_dev() for device numbers in procmap_query References:
bsc#1246450
* ftrace: Fix function profiler's filtering functionality (git-fixes).
* ftrace: fix incorrect hash size in register_ftrace_direct() (git-fixes).
* gfs2: Call gfs2_queue_verify_delete from gfs2_evict_inode (bsc#1247220).
* gfs2: Clean up delete work processing (bsc#1247220).
* gfs2: Faster gfs2_upgrade_iopen_glock wakeups (bsc#1247220).
* gfs2: Initialize gl_no_formal_ino earlier (bsc#1247220).
* gfs2: Minor delete_work_func cleanup (bsc#1247220).
* gfs2: Only defer deletes when we have an iopen glock (bsc#1247220).
* gfs2: Prevent inode creation race (2) (bsc#1247220).
* gfs2: Prevent inode creation race (bsc#1247220).
* gfs2: Randomize GLF_VERIFY_DELETE work delay (bsc#1247220).
* gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE (bsc#1247220).
* gfs2: Rename dinode_demise to evict_behavior (bsc#1247220).
* gfs2: Replace GIF_DEFER_DELETE with GLF_DEFER_DELETE (bsc#1247220).
* gfs2: Return enum evict_behavior from gfs2_upgrade_iopen_glock
(bsc#1247220).
* gfs2: Simplify DLM_LKF_QUECVT use (bsc#1247220).
* gfs2: Update to the evict / remote delete documentation (bsc#1247220).
* gfs2: Use mod_delayed_work in gfs2_queue_try_to_evict (bsc#1247220).
* gfs2: gfs2_evict_inode clarification (bsc#1247220).
* gfs2: minor evict fix (bsc#1247220).
* gfs2: skip if we cannot defer delete (bsc#1247220).
* gpio: mlxbf2: use platform_get_irq_optional() (git-fixes).
* gpio: mlxbf3: use platform_get_irq_optional() (git-fixes).
* gpio: tps65912: check the return value of regmap_update_bits() (stable-
fixes).
* gpio: virtio: Fix config space reading (git-fixes).
* gpio: wcd934x: check the return value of regmap_update_bits() (stable-
fixes).
* gpio: wcd934x: mark the GPIO controller as sleeping (git-fixes).
* gpiolib: Extend software-node support to support secondary software-nodes
(git-fixes).
* gve: Fix stuck TX queue for DQ queue format (git-fixes).
* gve: prevent ethtool ops after shutdown (git-fixes).
* habanalabs: fix UAF in export_dmabuf() (git-fixes).
* hid: fix I2C read buffer overflow in raw_event() for mcp2221 (stable-fixes).
* hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111).
* hv_netvsc: Link queues to NAPIs (git-fixes).
* hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal
state (stable-fixes).
* hwmon: (gsc-hwmon) fix fan pwm setpoint show functions (git-fixes).
* hwmon: (mlxreg-fan) Separate methods of fan setting coming from different
subsystems (git-fixes).
* hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes).
* hwrng: ks-sa - fix division by zero in ks_sa_rng_init (git-fixes).
* hwrng: mtk - handle devm_pm_runtime_enable errors (git-fixes).
* hwrng: nomadik - add ARM_AMBA dependency (git-fixes).
* i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes).
* i2c: designware: Add disabling clocks when probe fails (git-fixes).
* i2c: designware: Add quirk for Intel Xe (stable-fixes).
* i2c: designware: Fix clock issue when PM is disabled (git-fixes).
* i2c: designware: Use temporary variable for struct device (stable-fixes).
* i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes).
* i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD (git-fixes).
* i2c: muxes: mule: Fix an error handling path in mule_i2c_mux_probe() (git-
fixes).
* i2c: omap: Add support for setting mux (stable-fixes).
* i2c: omap: Fix an error handling path in omap_i2c_probe() (git-fixes).
* i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe() (git-fixes).
* i2c: omap: fix deprecated of_property_read_bool() use (git-fixes).
* i2c: qup: jump out of the loop in case of timeout (git-fixes).
* i2c: riic: Allow setting frequencies lower than 50KHz (git-fixes).
* i2c: tegra: Fix reset error handling with ACPI (git-fixes).
* i2c: tegra: Use internal reset when reset property is not available
(bsc#1249143)
* i2c: virtio: Avoid hang by using interruptible completion wait (git-fixes).
* i3c: Fix default I2C adapter timeout value (git-fixes).
* i3c: add missing include to internal header (stable-fixes).
* i3c: do not fail if GETHDRCAP is unsupported (stable-fixes).
* i3c: fix module_i3c_i2c_driver() with I3C=n (git-fixes).
* i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes).
* i3c: master: svc: Recycle unused IBI slot (git-fixes).
* i3c: master: svc: Use manual response for IBI events (git-fixes).
* i40e: When removing VF MAC filters, only check PF-set MAC (git-fixes).
* i40e: report VF tx_dropped with tx_errors instead of tx_discards (git-
fixes).
* ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof (git-
fixes).
* ice, irdma: fix an off by one in error handling code (bsc#1247712).
* ice, irdma: move interrupts code to irdma (bsc#1247712).
* ice/ptp: fix crosstimestamp reporting (git-fixes).
* ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712).
* ice: Replace ice specific DSCP mapping num with a kernel define
(jsc#PED-13728 jsc#PED-13762).
* ice: check correct pointer in fwlog debugfs (git-fixes).
* ice: count combined queues using Rx/Tx count (bsc#1247712).
* ice: devlink PF MSI-X max and min parameter (bsc#1247712).
* ice: do not leave device non-functional if Tx scheduler config fails (git-
fixes).
* ice: enable_rdma devlink param (bsc#1247712).
* ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset
(jsc#PED-13728).
* ice: fix incorrect counter for buffer allocation failures (git-fixes).
* ice: get rid of num_lan_msix field (bsc#1247712).
* ice: init flow director before RDMA (bsc#1247712).
* ice: remove splitting MSI-X between features (bsc#1247712).
* ice: simplify VF MSI-X managing (bsc#1247712).
* ice: treat dyn_allowed only as suggestion (bsc#1247712).
* ice: use fixed adapter index for E825C embedded devices (git-fixes).
* idpf: add PTP clock configuration (jsc#PED-13728 jsc#PED-13762).
* idpf: add Tx timestamp capabilities negotiation (jsc#PED-13728
jsc#PED-13762).
* idpf: add Tx timestamp flows (jsc#PED-13728 jsc#PED-13762).
* idpf: add cross timestamping (jsc#PED-13728).
* idpf: add flow steering support (jsc#PED-13728).
* idpf: add initial PTP support (jsc#PED-13728 jsc#PED-13762).
* idpf: add mailbox access to read PTP clock time (jsc#PED-13728
jsc#PED-13762).
* idpf: add support for Rx timestamping (jsc#PED-13728 jsc#PED-13762).
* idpf: add support for Tx refillqs in flow scheduling mode (jsc#PED-13728).
* idpf: assign extracted ptype to struct libeth_rqe_info field (jsc#PED-13728
jsc#PED-13762).
* idpf: change the method for mailbox workqueue allocation (jsc#PED-13728
jsc#PED-13762).
* idpf: fix UAF in RDMA core aux dev deinitialization (jsc#PED-13728).
* idpf: implement IDC vport aux driver MTU change handler (jsc#PED-13728
jsc#PED-13762).
* idpf: implement RDMA vport auxiliary dev create, init, and destroy
(jsc#PED-13728 jsc#PED-13762).
* idpf: implement core RDMA auxiliary dev create, init, and destroy
(jsc#PED-13728 jsc#PED-13762).
* idpf: implement get LAN MMIO memory regions (jsc#PED-13728 jsc#PED-13762).
* idpf: implement remaining IDC RDMA core callbacks and handlers
(jsc#PED-13728 jsc#PED-13762).
* idpf: improve when to set RE bit logic (jsc#PED-13728).
* idpf: move virtchnl structures to the header file (jsc#PED-13728
jsc#PED-13762).
* idpf: negotiate PTP capabilities and get PTP clock (jsc#PED-13728
jsc#PED-13762).
* idpf: preserve coalescing settings across resets (jsc#PED-13728).
* idpf: remove obsolete stashing code (jsc#PED-13728).
* idpf: remove unreachable code from setting mailbox (jsc#PED-13728
jsc#PED-13762).
* idpf: replace flow scheduling buffer ring with buffer pool (jsc#PED-13728).
* idpf: set mac type when adding and removing MAC filters (jsc#PED-13728).
* idpf: simplify and fix splitq Tx packet rollback error path (jsc#PED-13728).
* idpf: stop Tx if there are insufficient buffer resources (jsc#PED-13728).
* idpf: use reserved RDMA vectors from control plane (jsc#PED-13728
jsc#PED-13762).
* igb: xsk: solve negative overflow of nb_pkts in zerocopy mode (git-fixes).
* igc: disable L1.2 PCI-E link substate to avoid performance issue (git-
fixes).
* igc: fix disabling L1.2 PCI-E link substate on I226 on init (git-fixes).
* iidc/ice/irdma: Break iidc.h into two headers (jsc#PED-13728 jsc#PED-13762).
* iidc/ice/irdma: Rename IDC header file (jsc#PED-13728 jsc#PED-13762).
* iidc/ice/irdma: Rename to iidc_* convention (jsc#PED-13728 jsc#PED-13762).
* iidc/ice/irdma: Update IDC to support multiple consumers (jsc#PED-13728
jsc#PED-13762).
* iio/adc/pac1934: fix channel disable configuration (git-fixes).
* iio: accel: adxl355: Make timestamp 64-bit aligned using aligned_s64 (git-
fixes).
* iio: accel: fxls8962af: Fix temperature calculation (git-fixes).
* iio: adc: ad7173: fix setting ODR in probe (git-fixes).
* iio: adc: ad7266: Fix potential timestamp alignment issue (git-fixes).
* iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable-
fixes).
* iio: adc: ad7768-1: Fix insufficient alignment of timestamp (git-fixes).
* iio: adc: ad_sigma_delta: change to buffer predisable (git-fixes).
* iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes).
* iio: adc: dln2: Use aligned_s64 for timestamp (git-fixes).
* iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] (stable-fixes).
* iio: adc: max1363: Reorder mode_list[] entries (stable-fixes).
* iio: chemical: pms7003: use aligned_s64 for timestamp (git-fixes).
* iio: chemical: sps30: use aligned_s64 for timestamp (git-fixes).
* iio: common: st_sensors: Fix use of uninitialize device structs (stable-
fixes).
* iio: consumers: Fix handling of negative channel scale in
iio_convert_raw_to_processed() (git-fixes).
* iio: consumers: Fix offset handling in iio_convert_raw_to_processed() (git-
fixes).
* iio: dac: ad5360: use int type to store negative error codes (git-fixes).
* iio: dac: ad5421: use int type to store negative error codes (git-fixes).
* iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE (git-fixes).
* iio: frequency: adf4350: Fix prescaler usage (git-fixes).
* iio: hid-sensor-prox: Fix incorrect OFFSET calculation (git-fixes).
* iio: hid-sensor-prox: Restore lost scale assignments (git-fixes).
* iio: imu: bno055: fix OOB access of hw_xlate array (git-fixes).
* iio: imu: inv_icm42600: Convert to uXX and sXX integer types (stable-fixes).
* iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in resume
(git-fixes).
* iio: imu: inv_icm42600: change invalid data error to -EBUSY (git-fixes).
* iio: imu: inv_icm42600: fix spi burst write not supported (git-fixes).
* iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to
aligned_s64 (stable-fixes).
* iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes).
* iio: light: Use aligned_s64 instead of open coding alignment (stable-fixes).
* iio: light: as73211: Ensure buffer holes are zeroed (git-fixes).
* iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes).
* iio: pressure: mprls0025pa: use aligned_s64 for timestamp (git-fixes).
* iio: proximity: isl29501: fix buffered read on big-endian systems (git-
fixes).
* iio: temperature: maxim_thermocouple: use DMA-safe buffer for spi_read()
(git-fixes).
* iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes).
* iio: xilinx-ams: Unmask interrupts after updating alarms (git-fixes).
* integrity/platform_certs: Allow loading of keys in the static key management
mode (jsc#PED-13345 jsc#PED-13343).
* intel_idle: Provide the default enter_dead() handler (jsc#PED-13815).
* intel_idle: Rescan "dead" SMT siblings during initialization
(jsc#PED-13815).
* intel_idle: Use subsys_initcall_sync() for initialization (jsc#PED-13815).
* interconnect: qcom: sc8180x: specify num_nodes (git-fixes).
* interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg (git-
fixes).
* io_uring/rw: do not mask in f_iocb_flags (jsc#PED-12882 bsc#1237542). Drop
blacklisting.
* io_uring: expose read/write attribute capability (jsc#PED-12882
bsc#1237542).
* io_uring: fix potential page leak in io_sqe_buffer_register() (git-fixes).
* iommu/amd: Enable PASID and ATS capabilities in the correct order (git-
fixes).
* iommu/amd: Fix alias device DTE setting (git-fixes).
* iommu/amd: Fix geometry.aperture_end for V2 tables (git-fixes).
* iommu/arm-smmu-qcom: Add SM6115 MDSS compatible (git-fixes).
* iommu/arm-smmu-v3: Fix smmu_domain->nr_ats_masters decrement (git-fixes).
* iommu/tegra241-cmdqv: Read SMMU IDR1.CMDQS instead of hardcoding (git-
fixes).
* iommu/vt-d: Disallow dirty tracking if incoherent page walk (git-fixes).
* iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() (git-
fixes).
* iommu/vt-d: Fix missing PASID in dev TLB flush with cache_tag_flush_all
(git-fixes).
* iommu/vt-d: Fix possible circular locking dependency (git-fixes).
* iommu/vt-d: Fix system hang on reboot -f (git-fixes).
* iommu/vt-d: PRS isn't usable if PDS isn't supported (git-fixes).
* iommu: Handle race with default domain setup (git-fixes).
* iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes).
* ipmi: Fix strcpy source and destination the same (stable-fixes).
* ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable-
fixes).
* ipv6: annotate data-races around rt->fib6_nsiblings (git-fixes).
* ipv6: fix possible infinite loop in fib6_info_uses_dev() (git-fixes).
* ipv6: prevent infinite loop in rt6_nlmsg_size() (git-fixes).
* ipv6: reject malicious packets in ipv6_gso_segment() (git-fixes).
* ipvs: Fix clamp() of ip_vs_conn_tab on small memory systems (git-fixes).
* irdma: free iwdev->rf after removing MSI-X (bsc#1247712).
* isolcpus: add missing hunk back (bsc#1236897 bsc#1249206).
* iwlwifi: Add missing check for alloc_ordered_workqueue (git-fixes).
* ixgbe: fix ixgbe_orom_civd_info struct layout (bsc#1245410).
* ixgbe: prevent from unwanted interface name changes (git-fixes).
* ixgbe: xsk: resolve the negative overflow of budget in ixgbe_xmit_zc (git-
fixes).
* kABI fix after Add TDX support for vSphere (jsc#PED-13302).
* kABI fix after KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes).
* kABI fix after KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO
into the guest (git-fixes).
* kABI fix after KVM: x86: Convert vcpu_run()'s immediate exit param into a
generic bitmap (git-fixes).
* kABI fix after vhost: Reintroduce kthread API and add mode selection (git-
fixes).
* kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access
probe" (bsc#1248121).
* kABI workaround for amd_sfh (git-fixes).
* kABI workaround for drm_gem.h (git-fixes).
* kABI workaround for struct mtk_base_afe changes (git-fixes).
* kABI: Fix the module::name type in audit_context (git-fixes).
* kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git-
fixes).
* kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes).
* kABI: fix for struct devlink_port_attrs: move new member to the end (git-
fixes).
* kABI: netfilter: supress warnings for nft_set_ops (git-fixes).
* kABI: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (git-
fixes).
* kabi/severities: ignore kABI compatibility in iio inv_icm42600 drivers They
are used only locally
* kabi/severities: ignore two unused/dropped symbols from MEI
* kabi: Hide adding of u64 to devlink_param_type (jsc#PED-12745).
* kabi: Restore layout of parallel_data (bsc1248343).
* kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963).
* kasan: use vmalloc_dump_obj() for vmalloc error reports (git-fixes).
* kbuild/modpost: Continue processing all unresolved symbols when KLP_SYM_RELA
is found (bsc#1218644, bsc#1250655).
* kbuild: rust: add rustc-min-version support function (git-fixes)
* kernel-binary: Another installation ordering fix (bsc#1241353).
* kernel-subpackage-build: Decompress ghost file when compressed version
exists (bsc#1249346)
* kernel: globalize lookup_or_create_module_kobject() (stable-fixes).
* kernel: param: rename locate_module_kobject (stable-fixes).
* leds: flash: leds-qcom-flash: Fix registry access after re-bind (git-fixes).
* leds: flash: leds-qcom-flash: Update torch current clamp setting (git-
fixes).
* leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes).
* leds: leds-lp55xx: Use correct address for memory programming (git-fixes).
* lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly()
(bsc#1236897).
* libbpf: Add identical pointer detection to btf_dedup_is_equiv() (git-fixes).
* libeth: move idpf_rx_csum_decoded and idpf_rx_extracted (jsc#PED-13728
jsc#PED-13762).
* livepatch: Add stack_order sysfs attribute (poo#187320).
* loop: use kiocb helpers to fix lockdep warning (git-fixes).
* lpfc: do not use file->f_path.dentry for comparisons (bsc#1250519).
* mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes).
* mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes).
* mailbox: Not protect module_put with spin_lock_irqsave (stable-fixes).
* mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data() (git-
fixes).
* mailbox: pcc: Always clear the platform ack interrupt first (stable-fixes).
* mailbox: pcc: Fix the possible race in updation of chan_in_use flag (stable-
fixes).
* mailbox: pcc: Use acpi_os_ioremap() instead of ioremap() (stable-fixes).
* mailbox: zynqmp-ipi: Fix SGI cleanup on unbind (git-fixes).
* mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop (git-
fixes).
* mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes (git-
fixes).
* mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call
(git-fixes).
* maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs (git-fixes).
* maple_tree: fix status setup on restore to active (git-fixes).
* maple_tree: fix testing for 32 bit builds (git-fixes).
* mctp: no longer rely on net->dev_index_head (git-fixes).
* md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes).
* md: allow removing faulty rdev during resync (git-fixes).
* md: dm-zoned-target: Initialize return variable r to avoid uninitialized use
(git-fixes).
* md: make rdev_addable usable for rcu mode (git-fixes).
* media: b2c2: Fix use-after-free causing by irq_check_work in
flexcop_pci_remove (git-fixes).
* media: cec: extron-da-hd-4k-plus: drop external-module make commands (git-
fixes).
* media: cx18: Add missing check after DMA map (git-fixes).
* media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()
(stable-fixes).
* media: dvb-frontends: w7090p: fix null-ptr-deref in
w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes).
* media: gspca: Add bounds checking to firmware parser (git-fixes).
* media: hi556: Fix reset GPIO timings (stable-fixes).
* media: hi556: correct the test pattern configuration (git-fixes).
* media: i2c: mt9v111: fix incorrect type for ret (git-fixes).
* media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in
probe (git-fixes).
* media: imx: fix a potential memory leak in
imx_media_csc_scaler_device_init() (git-fixes).
* media: ipu-bridge: Add _HID for OV5670 (stable-fixes).
* media: ipu6: isys: Use correct pads for xlate_streams() (git-fixes).
* media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls
(git-fixes).
* media: lirc: Fix error handling in lirc_register() (git-fixes).
* media: mc: Fix MUST_CONNECT handling for pads with no links (git-fixes).
* media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval (git-
fixes).
* media: ov2659: Fix memory leaks in ov2659_probe() (git-fixes).
* media: pci: ivtv: Add missing check after DMA map (git-fixes).
* media: pci: mg4b: fix uninitialized iio scan data (git-fixes).
* media: pisp_be: Fix pm_runtime underrun in probe (git-fixes).
* media: qcom: camss: cleanup media device allocated resource on error path
(git-fixes).
* media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() (git-
fixes).
* media: rc: fix races with imon_disconnect() (git-fixes).
* media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes).
* media: s5p-mfc: remove an unused/uninitialized variable (git-fixes).
* media: st-delta: avoid excessive stack usage (git-fixes).
* media: tc358743: Check I2C succeeded during probe (stable-fixes).
* media: tc358743: Increase FIFO trigger level to 374 (stable-fixes).
* media: tc358743: Return an appropriate colorspace from tc358743_set_fmt
(stable-fixes).
* media: ti: j721e-csi2rx: Fix source subdev link creation (git-fixes).
* media: ti: j721e-csi2rx: Use devm_of_platform_populate (git-fixes).
* media: ti: j721e-csi2rx: fix list_del corruption (git-fixes).
* media: tuner: xc5000: Fix use-after-free in xc5000_release (git-fixes).
* media: usb: hdpvr: disable zero-length read messages (stable-fixes).
* media: usbtv: Lock resolution while streaming (git-fixes).
* media: uvcvideo: Add quirk for HP Webcam HD 2300 (stable-fixes).
* media: uvcvideo: Do not mark valid metadata as invalid (git-fixes).
* media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (git-
fixes).
* media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes).
* media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID (git-
fixes).
* media: uvcvideo: Rollback non processed entities on error (git-fixes).
* media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control
(stable-fixes).
* media: v4l2-ctrls: Do not reset handler's error in v4l2_ctrl_handler_free()
(git-fixes).
* media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check (git-fixes).
* media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()
(git-fixes).
* media: v4l2: Add support for NV12M tiled variants to v4l2_format_info()
(git-fixes).
* media: venus: Add a check for packet size after reading from shared memory
(git-fixes).
* media: venus: Fix MSM8998 frequency table (git-fixes).
* media: venus: Fix OOB read due to missing payload bound check (git-fixes).
* media: venus: firmware: Use correct reset sequence for IRIS2 (git-fixes).
* media: venus: hfi: explicitly release IRQ during teardown (git-fixes).
* media: venus: protect against spurious interrupts during probe (git-fixes).
* media: venus: vdec: Clamp param smaller than 1fps and bigger than 240 (git-
fixes).
* media: venus: venc: Clamp param smaller than 1fps and bigger than 240 (git-
fixes).
* media: verisilicon: Fix AV1 decoder clock frequency (git-fixes).
* media: vivid: fix wrong pixel_array control size (git-fixes).
* media: zoran: Remove zoran_fh structure (git-fixes).
* mei: bus: Check for still connected devices in mei_cl_bus_dev_release()
(stable-fixes).
* mei: vsc: Destroy mutex after freeing the IRQ (git-fixes).
* mei: vsc: Do not re-init VSC from mei_vsc_hw_reset() on stop (git-fixes).
* mei: vsc: Drop unused vsc_tp_request_irq() and vsc_tp_free_irq() (stable-
fixes).
* mei: vsc: Event notifier fixes (git-fixes).
* mei: vsc: Fix "BUG: Invalid wait context" lockdep error (git-fixes).
* mei: vsc: Run event callback from a workqueue (git-fixes).
* mei: vsc: Unset the event callback on remove and probe errors (git-fixes).
* memory: mtk-smi: Add ostd setting for mt8186 (git-fixes).
* memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe (git-
fixes).
* memstick: Fix deadlock by moving removing flag earlier (git-fixes).
* mfd: axp20x: Set explicit ID for AXP313 regulator (stable-fixes).
* mfd: cros_ec: Separate charge-control probing from USB-PD (git-fixes).
* mfd: exynos-lpass: Fix another error handling path in exynos_lpass_probe()
(git-fixes).
* mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes).
* mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data()
(git-fixes).
* microchip: lan865x: Fix LAN8651 autoloading (git-fixes).
* microchip: lan865x: Fix module autoloading (git-fixes).
* microchip: lan865x: fix missing Timer Increment config for Rev.B0/B1 (git-
fixes).
* microchip: lan865x: fix missing netif_start_queue() call on device open
(git-fixes).
* misc: fastrpc: Fix fastrpc_map_lookup operation (git-fixes).
* misc: fastrpc: Save actual DMA size in fastrpc_map structure (git-fixes).
* misc: fastrpc: Skip reference for DMA handles (git-fixes).
* misc: fastrpc: fix possible map leak in fastrpc_put_args (git-fixes).
* misc: genwqe: Fix incorrect cmd field being reported in error (git-fixes).
* misc: pci_endpoint_test: Fix 'irq_type' to convey the correct type (git-
fixes).
* misc: pci_endpoint_test: Give disabled BARs a distinct error code (stable-
fixes).
* misc: rtsx: usb: Ensure mmc child device is active when card is present
(git-fixes).
* mm/damon/core: avoid destroyed target reference from DAMOS quota (git-
fixes).
* mm/damon/core: prevent unnecessary overflow in damos_set_effective_quota()
(git-fixes).
* mm/damon/core: set quota->charged_from to jiffies at first charge window
(git-fixes).
* mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()
(git-fixes).
* mm/damon/ops-common: ignore migration request to invalid nodes (git-fixes).
* mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()
(git-fixes).
* mm/damon/sysfs: fix use-after-free in state_show() (git-fixes).
* mm/memory-failure: fix redundant updates for already poisoned pages
(bsc#1250087).
* mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes)
* mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE (git-fixes).
* mm: close theoretical race where stale TLB entries could linger (git-fixes).
* mm: fault in complete folios instead of individual pages for tmpfs (git-
fixes).
* mm: fix the inaccurate memory statistics issue for users (bsc#1244723).
* mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes).
* mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma (git-
fixes).
* mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting (bsc#1245630).
* mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting - kabi (bsc#1245630).
* mm: move page table sync declarations to linux/pgtable.h (git-fixes).
* mm: swap: fix potential buffer overflow in setup_clusters() (git-fixes).
* mmc: core: Fix variable shadowing in mmc_route_rpmb_frames() (git-fixes).
* mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes).
* mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes).
* mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes).
* mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable-
fixes).
* mmc: sdhci-of-arasan: Ensure CD logic stabilization before power-up (stable-
fixes).
* mmc: sdhci-of-arasan: Support for emmc hardware reset (stable-fixes).
* mmc: sdhci-pci-gli: Add a new function to simplify the code (git-fixes).
* mmc: sdhci-pci-gli: GL9763e: Mask the replay timer timeout of AER (git-
fixes).
* mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency
(git-fixes).
* mmc: sdhci_am654: Disable HS400 for AM62P SR1.0 and SR1.1 (git-fixes).
* module: Fix memory deallocation on error path in move_module() (git-fixes).
* module: Prevent silent truncation of module name in delete_module(2) (git-
fixes).
* module: Remove unnecessary +1 from last_unloaded_module::name size (git-
fixes).
* module: Restore the moduleparam prefix length check (git-fixes).
* most: core: Drop device reference after usage in get_channel() (git-fixes).
* mptcp: fix spurious wake-up on under memory pressure (git-fixes).
* mtd: fix possible integer overflow in erase_xfer() (git-fixes).
* mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes).
* mtd: rawnand: atmel: Fix dma_mapping_error() address (git-fixes).
* mtd: rawnand: atmel: Fix error handling path in
atmel_nand_controller_add_nands (git-fixes).
* mtd: rawnand: atmel: set pmecc data setup time (git-fixes).
* mtd: rawnand: fsmc: Add missing check after DMA map (git-fixes).
* mtd: rawnand: omap2: fix device leak on probe failure (git-fixes).
* mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec()
(git-fixes).
* mtd: rawnand: renesas: Add missing check after DMA map (git-fixes).
* mtd: rawnand: rockchip: Add missing check after DMA map (git-fixes).
* mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git-
fixes).
* mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes).
* mtd: spi-nor: Fix spi_nor_try_unlock_all() (git-fixes).
* mtd: spi-nor: spansion: Fixup params->set_4byte_addr_mode for SEMPER (git-
fixes).
* mtd: spinand: propagate spinand_wait() errors from spinand_write_page()
(git-fixes).
* mwl8k: Add missing check after DMA map (git-fixes).
* neighbour: Fix null-ptr-deref in neigh_flush_dev() (git-fixes).
* net/mlx5: Base ECVF devlink port attrs from 0 (git-fixes).
* net/mlx5: CT: Use the correct counter offset (git-fixes).
* net/mlx5: Check device memory pointer before usage (git-fixes).
* net/mlx5: Correctly set gso_segs when LRO is used (git-fixes).
* net/mlx5: Correctly set gso_size when LRO is used (git-fixes).
* net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch (git-fixes).
* net/mlx5: Fix lockdep assertion on sync reset unload event (git-fixes).
* net/mlx5: Fix memory leak in cmd_exec() (git-fixes).
* net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow
(git-fixes).
* net/mlx5: HWS, Fix pattern destruction in mlx5hws_pat_get_pattern error path
(git-fixes).
* net/mlx5: HWS, fix bad parameter in CQ creation (git-fixes).
* net/mlx5: Nack sync reset when SFs are present (git-fixes).
* net/mlx5: Prevent flow steering mode changes in switchdev mode (git-fixes).
* net/mlx5: Reload auxiliary drivers on fw_activate (git-fixes).
* net/mlx5e: Add new prio for promiscuous mode (git-fixes).
* net/mlx5e: Clear Read-Only port buffer size in PBMC before update (git-
fixes).
* net/mlx5e: Preserve shared buffer capacity during headroom updates (git-
fixes).
* net/mlx5e: Remove skb secpath if xfrm state is not found (git-fixes).
* net/mlx5e: Set local Xoff after FW update (git-fixes).
* net/mlx5e: Update and set Xon/Xoff upon MTU set (git-fixes).
* net/mlx5e: Update and set Xon/Xoff upon port speed set (git-fixes).
* net/packet: fix a race in packet_set_ring() and packet_notifier() (git-
fixes).
* net/sched: Restrict conditions for adding duplicating netems to qdisc tree
(git-fixes).
* net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (git-
fixes).
* net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
qfq_delete_class (git-fixes).
* net/sched: taprio: enforce minimum value for picos_per_byte (git-fixes).
* net/smc: check sndbuf_space again after NOSPACE flag is set in smc_poll
(git-fixes).
* net: 802: LLC+SNAP OID:PID lookup on start of skb data (git-fixes).
* net: dsa: restore dsa_software_vlan_untag() ability to operate on VLAN-
untagged traffic (git-fixes).
* net: dsa: tag_ocelot_8021q: fix broken reception (git-fixes).
* net: hsr: fix fill_frame_info() regression vs VLAN packets (git-fixes).
* net: hsr: fix hsr_init_sk() vs network/transport headers (git-fixes).
* net: hv_netvsc: fix loss of early receive events from host during channel
open (git-fixes).
* net: ieee8021q: fix insufficient table-size assertion (stable-fixes).
* net: llc: reset skb->transport_header (git-fixes).
* net: mana: Add handler for hardware servicing events (bsc#1245730).
* net: mana: Add speed support in mana_get_link_ksettings (bsc#1245726).
* net: mana: Add support for net_shaper_ops (bsc#1245726).
* net: mana: Allocate MSI-X vectors dynamically (bsc#1245457).
* net: mana: Allow irq_setup() to skip cpus for affinity (bsc#1245457).
* net: mana: Expose additional hardware counters for drop and TC via ethtool
(bsc#1245729).
* net: mana: Fix build errors when CONFIG_NET_SHAPER is disabled (gix-fixes).
* net: mana: Fix potential deadlocks in mana napi ops (bsc#1245726).
* net: mana: Handle Reset Request from MANA NIC (bsc#1245728).
* net: mana: Handle unsupported HWC commands (bsc#1245726).
* net: mana: Set tx_packets to post gso processing packet count (bsc#1245731).
* net: mana: Use page pool fragments for RX buffers instead of full pages to
improve memory efficiency (bsc#1248754).
* net: mana: explain irq_setup() algorithm (bsc#1245457).
* net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes).
* net: mctp: handle skb cleanup on sock_queue failures (git-fixes).
* net: mdio: mdio-bcm-unimac: Correct rate fallback logic (git-fixes).
* net: nfc: nci: Add parameter validation for packet data (git-fixes).
* net: page_pool: allow enabling recycling late, fix false positive warning
(git-fixes).
* net: phy: bcm54811: PHY initialization (stable-fixes).
* net: phy: fix phy_uses_state_machine() (git-fixes).
* net: phy: micrel: Add ksz9131_resume() (stable-fixes).
* net: phy: micrel: fix KSZ8081/KSZ8091 cable test (git-fixes).
* net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes).
* net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer
(git-fixes).
* net: rose: convert 'use' field to refcount_t (git-fixes).
* net: rose: fix a typo in rose_clear_routes() (git-fixes).
* net: rose: include node references in rose_neigh refcount (git-fixes).
* net: rose: split remove and free operations in rose_remove_neigh() (stable-
fixes).
* net: thunderbolt: Enable end-to-end flow control also in transmit (stable-
fixes).
* net: thunderbolt: Fix the parameter passing of
tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes).
* net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (git-
fixes).
* net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock (git-
fixes).
* net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization
(git-fixes).
* net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes).
* net: usb: cdc-ncm: check for filtering capability (git-fixes).
* net: usb: qmi_wwan: add Telit Cinterion FN990A w/audio composition (stable-
fixes).
* net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git-
fixes).
* net: usb: qmi_wwan: fix Telit Cinterion FE990A name (stable-fixes).
* net: usb: qmi_wwan: fix Telit Cinterion FN990A name (stable-fixes).
* net: usbnet: Avoid potential RCU stall on LINK_CHANGE event (git-fixes).
* net: usbnet: Fix the wrong netif_carrier_on() call (git-fixes).
* netfilter: ctnetlink: fix refcount leak on table dump (git-fixes).
* netfilter: ctnetlink: remove refcounting in expectation dumpers (git-fixes).
* netfilter: nf_conncount: garbage collection is not skipped when jiffies wrap
around (git-fixes).
* netfilter: nf_nat: also check reverse tuple to obtain clashing entry (git-
fixes).
* netfilter: nf_reject: do not leak dst refcount for loopback packets (git-
fixes).
* netfilter: nf_tables: Drop dead code from fill_*_info routines (git-fixes).
* netfilter: nf_tables: adjust lockdep assertions handling (git-fixes).
* netfilter: nf_tables: fix set size with rbtree backend (git-fixes).
* netfilter: nf_tables: imbalance in flowtable binding (git-fixes).
* netfilter: nft_ct: Use __refcount_inc() for per-CPU nft_ct_pcpu_template
(git-fixes).
* netfilter: nft_flow_offload: update tcp state flags under lock (git-fixes).
* netfilter: nft_objref: validate objref and objrefmap expressions
(bsc#1250237).
* netfilter: nft_set_hash: skip duplicated elements pending gc run (git-
fixes).
* netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext (git-
fixes).
* netfilter: nft_set_pipapo: prefer kvmalloc for scratch maps (git-fixes).
* netfilter: nft_tunnel: fix geneve_opt dump (git-fixes).
* netfilter: xtables: support arpt_mark and ipv6 optstrip for iptables-nft
only builds (git-fixes).
* netlink: fix policy dump for int with validation callback (jsc#PED-13331).
* netlink: specs: devlink: replace underscores with dashes in names
(jsc#PED-13331).
* netpoll: prevent hanging NAPI when netcons gets enabled (git-fixes).
* nfs/localio: add direct IO enablement with sync and async IO support (git-
fixes).
* nfs/localio: remove extra indirect nfs_to call to check {read,write}_iter
(git-fixes).
* nfsd: Fix NFSD_MAY_BYPASS_GSS and NFSD_MAY_BYPASS_GSS_ON_ROOT (git-fixes).
* nfsd: fix access checking for NLM under XPRTSEC policies (git-fixes).
* nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
(git-fixes).
* nouveau: fix disabling the nonstall irq due to storm code (git-fixes).
* nvme-auth: update bi_directional flag (git-fixes).
* nvme-fc: use lock accessing port_state and rport state (bsc#1245193
bsc#1247500).
* nvme-pci: try function level reset on init failure (git-fixes).
* nvme-tcp: log TLS handshake failures at error level (git-fixes).
* nvme-tcp: send only permitted commands for secure concat (git-fixes).
* nvme: fix PI insert on write (git-fixes).
* nvme: fix endianness of command word prints in nvme_log_err_passthru() (git-
fixes).
* nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list()
(git-fixes).
* nvme: fix misaccounting of nvme-mpath inflight I/O (git-fixes).
* nvmet-fc: avoid scheduling association deletion twice (bsc#1245193
bsc#1247500).
* nvmet-fc: move lsop put work to nvmet_fc_ls_req_op (bsc#1245193
bsc#1247500).
* nvmet-fcloop: call done callback even when remote port is gone (bsc#1245193
bsc#1247500).
* nvmet-tcp: fix callback lock for TLS handshake (git-fixes).
* nvmet: exit debugfs after discovery subsystem exits (git-fixes).
* nvmet: initialize discovery subsys after debugfs is initialized (git-fixes).
* nvmet: pci-epf: Do not complete commands twice if nvmet_req_init() fails
(git-fixes).
* objtool, ASoC: codecs: wcd934x: Remove potential undefined behavior in
wcd934x_slim_irq_handler() (stable-fixes).
* objtool, lkdtm: Obfuscate the do_nothing() pointer (stable-fixes).
* objtool, regulator: rk808: Remove potential undefined behavior in
rk806_set_mode_dcdc() (stable-fixes).
* of: dynamic: Fix memleak when of_pci_add_properties() failed (git-fixes).
* of: dynamic: Fix use after free in of_changeset_add_prop_helper() (git-
fixes).
* of: resolver: Fix device node refcount leakage in of_resolve_phandles()
(git-fixes).
* of: resolver: Simplify of_resolve_phandles() using __free() (stable-fixes).
* of: unittest: Fix device reference count leak in of_unittest_pci_node_verify
(git-fixes).
* of: unittest: Unlock on error in unittest_data_add() (git-fixes).
* pNFS/flexfiles: do not attempt pnfs on fatal DS errors (git-fixes).
* pNFS: Fix disk addr range check in block/scsi layout (git-fixes).
* pNFS: Fix stripe mapping in block/scsi layout (git-fixes).
* pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes).
* pNFS: Handle RPC size limit for layoutcommits (git-fixes).
* percpu: fix race on alloc failed warning limit (git-fixes).
* perf bpf-event: Fix use-after-free in synthesis (git-fixes).
* perf bpf-utils: Constify bpil_array_desc (git-fixes).
* perf bpf-utils: Harden get_bpf_prog_info_linear (git-fixes).
* perf dso: Add missed dso__put to dso__load_kcore (git-fixes).
* perf hwmon_pmu: Avoid shortening hwmon PMU name (git-fixes).
* perf parse-events: Set default GH modifier properly (git-fixes).
* perf record: Cache build-ID of hit DSOs only (git-fixes).
* perf sched: Fix memory leaks for evsel->priv in timehist (git-fixes).
* perf sched: Fix memory leaks in 'perf sched latency' (git-fixes).
* perf sched: Fix memory leaks in 'perf sched map' (git-fixes).
* perf sched: Fix thread leaks in 'perf sched timehist' (git-fixes).
* perf sched: Free thread->priv using priv_destructor (git-fixes).
* perf sched: Make sure it frees the usage string (git-fixes).
* perf sched: Use RC_CHK_EQUAL() to compare pointers (git-fixes).
* perf symbol-minimal: Fix ehdr reading in filename__read_build_id (git-
fixes).
* perf test: Fix a build error in x86 topdown test (git-fixes).
* perf tests bp_account: Fix leaked file descriptor (git-fixes).
* perf tools: Remove libtraceevent in .gitignore (git-fixes).
* perf topdown: Use attribute to see an event is a topdown metic or slots
(git-fixes).
* perf trace: Remove --map-dump documentation (git-fixes).
* phy: fsl-imx8mq-usb: fix phy_tx_vboost_level_from_property() (git-fixes).
* phy: mscc: Fix parsing of unicast frames (git-fixes).
* phy: mscc: Fix timestamping for vsc8584 (git-fixes).
* phy: qcom: phy-qcom-m31: Update IPQ5332 M31 USB phy initialization sequence
(git-fixes).
* phy: qualcomm: phy-qcom-eusb2-repeater: Do not zero-out registers (git-
fixes).
* phy: qualcomm: phy-qcom-eusb2-repeater: fix override properties (git-fixes).
* phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable-
fixes).
* phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568 (git-fixes).
* phy: rockchip: samsung-hdptx: Do no set rk_hdptx_phy->rate in case of errors
(git-fixes).
* phy: rockchip: samsung-hdptx: Fix clock ratio setup (git-fixes).
* phy: tegra: xusb: fix device and OF node leak at probe (git-fixes).
* phy: ti-pipe3: fix device leak at unbind (git-fixes).
* phy: ti: omap-usb2: fix device leak at unbind (git-fixes).
* pidfs: Fix memory leak in pidfd_info() (jsc#PED-13113).
* pidfs: raise SB_I_NODEV and SB_I_NOEXEC (bsc#1249562).
* pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes).
* pinctrl: berlin: fix memory leak in berlin_pinctrl_build_state() (git-
fixes).
* pinctrl: equilibrium: Remove redundant semicolons (git-fixes).
* pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes).
* pinctrl: renesas: Use int type to store negative error codes (git-fixes).
* pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read()
(git-fixes).
* pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes).
* pinctrl: stm32: Manage irq affinity settings (stable-fixes).
* pinctrl: sunxi: Fix memory leak on krealloc failure (git-fixes).
* pinmux: fix race causing mux_owner NULL with active mux_usecount (git-
fixes).
* platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() (git-
fixes).
* platform/chrome: cros_ec_sensorhub: Retries when a sensor is not ready
(stable-fixes).
* platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable-
fixes).
* platform/mellanox: mlxbf-pmc: Remove newline char from event name input
(git-fixes).
* platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input (git-
fixes).
* platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes).
* platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL (git-fixes).
* platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042 list
(stable-fixes).
* platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042 quirks
list (stable-fixes).
* platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks
list (stable-fixes).
* platform/x86/amd/pmf: Support new ACPI ID AMDI0108 (stable-fixes).
* platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable-
fixes).
* platform/x86/intel-uncore-freq: Check write blocked for ELC (git-fixes).
* platform/x86/intel: power-domains: Use topology_logical_package_id() for
package ID (git-fixes).
* platform/x86: Fix initialization order for firmware_attributes_class (git-
fixes).
* platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA
(stable-fixes).
* platform/x86: asus-wmi: Fix ROG button mapping, tablet mode on ASUS ROG Z13
(stable-fixes).
* platform/x86: asus-wmi: Re-add extra keys to ignore_key_wlan quirk (git-
fixes).
* platform/x86: asus-wmi: Remove extra keys from ignore_key_wlan quirk (git-
fixes).
* platform/x86: ideapad-laptop: Fix FnLock not remembered among boots (git-
fixes).
* platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots
(git-fixes).
* platform/x86: lg-laptop: Fix WMAB call in fan_mode_store() (git-fixes).
* pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop()
(stable-fixes).
* pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable-
fixes).
* power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery
(git-fixes).
* power: supply: bq27xxx: restrict no-battery detection to bq27000 (git-
fixes).
* power: supply: cpcap-charger: Fix null check for power_supply_get_by_name
(git-fixes).
* power: supply: cw2015: Fix a alignment coding style issue (git-fixes).
* power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set (git-
fixes).
* power: supply: max77976_charger: fix constant current reporting (git-fixes).
* power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes).
* powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() (git-
fixes).
* powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199).
* powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199).
* powerpc/ftrace: ensure ftrace record ops are always set for NOPs (git-
fixes).
* powerpc/ftrace: ensure ftrace record ops are always set for NOPs
(jsc#PED-10909 git-fixes).
* powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199).
* powerpc/kvm: Fix ifdef to remove build warning (bsc#1215199).
* powerpc/powernv/pci: Fix underflow and leak issue (bsc#1215199).
* powerpc/pseries/msi: Fix potential underflow and leak issue (bsc#1215199).
* powerpc/pseries: Correct secvar format representation for static key
management (jsc#PED-13345 jsc#PED-13343).
* powerpc/secvar: Expose secvars relevant to the key management mode
(jsc#PED-13345 jsc#PED-13343).
* powerpc64/modules: correctly iterate over stubs in setup_ftrace_ool_stubs
(jsc#PED-10909 git-fixes).
* powerpc: do not build ppc_save_regs.o always (bsc#1215199).
* powerpc: floppy: Add missing checks after DMA map (bsc#1215199).
* pptp: fix pptp_xmit() error path (git-fixes).
* printk: nbcon: Allow reacquire during panic (bsc#1246688).
* psample: adjust size if rate_as_probability is set (git-fixes).
* ptp: fix breakage after ptp_vclock_in_use() rework (git-fixes).
* pwm: berlin: Fix wrong register in suspend/resume (git-fixes).
* pwm: imx-tpm: Reset counter if CMOD is 0 (git-fixes).
* pwm: mediatek: Fix duty and period setting (git-fixes).
* pwm: mediatek: Handle hardware enable and clock enable separately (stable-
fixes).
* pwm: rockchip: Round period/duty down on apply, up on get (git-fixes).
* pwm: tiehrpwm: Do not drop runtime PM reference in .free() (git-fixes).
* pwm: tiehrpwm: Fix corner case in clock divisor calculation (git-fixes).
* pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation (git-
fixes).
* pwm: tiehrpwm: Make code comment in .free() more useful (git-fixes).
* r8169: add support for RTL8125D (stable-fixes).
* r8169: disable RTL8126 ZRX-DC timeout (stable-fixes).
* r8169: do not scan PHY addresses > 0 (stable-fixes).
* rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes)
* regmap: Remove superfluous check for !config in __regmap_init() (git-fixes).
* regulator: core: fix NULL dereference on unbind due to stale coupling data
(stable-fixes).
* regulator: scmi: Use int type to store negative error codes (git-fixes).
* regulator: sy7636a: fix lifecycle of power good gpio (git-fixes).
* reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes).
* reset: eyeq: fix OF node leak (git-fixes).
* resource: Add resource set range and size helpers (jsc#PED-13728
jsc#PED-13762).
* resource: fix false warning in __request_region() (git-fixes).
* ring-buffer: Do not allow events in NMI with generic atomic64 cmpxchg()
(git-fixes).
* ring-buffer: Make reading page consistent with the code logic (git-fixes).
* rpm/config.sh: SLFO 1.2 is now synced to OBS as well
* rtc: ds1307: fix incorrect maximum clock rate handling (git-fixes).
* rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes).
* rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable-
fixes).
* rtc: hym8563: fix incorrect maximum clock rate handling (git-fixes).
* rtc: nct3018y: fix incorrect maximum clock rate handling (git-fixes).
* rtc: optee: fix memory leak on driver removal (git-fixes).
* rtc: pcf85063: fix incorrect maximum clock rate handling (git-fixes).
* rtc: pcf8563: fix incorrect maximum clock rate handling (git-fixes).
* rtc: rv3028: fix incorrect maximum clock rate handling (git-fixes).
* rtc: x1205: Fix Xicor X1205 vendor prefix (git-fixes).
* s390/ap: Unmask SLCF bit in card and queue ap functions sysfs (git-fixes
bsc#1247837).
* s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again (git-fixes
bsc#1246868).
* s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes
bsc#1249477).
* s390/early: Copy last breaking event address to pt_regs (git-fixes
bsc#1249061).
* s390/hypfs: Avoid unnecessary ioctl registration in debugfs (bsc#1248727
git-fixes).
* s390/hypfs: Enable limited access during lockdown (bsc#1248727 git-fixes).
* s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1247372).
* s390/mm: Allocate page table with PAGE_SIZE granularity (git-fixes
bsc#1247838).
* s390/mm: Do not map lowcore with identity mapping (git-fixes bsc#1249066).
* s390/mm: Remove possible false-positive warning in pte_free_defer() (git-
fixes bsc#1247366).
* s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249478).
* s390/pci: Allow automatic recovery with minimal driver support (bsc#1248728
git-fixes).
* s390/sclp: Fix SCCB present check (git-fixes bsc#1249065).
* s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249062).
* s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249064).
* samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora
(git-fixes).
* samples: mei: Fix building on musl libc (git-fixes).
* sched/deadline: Always stop dl-server before changing parameters
(bsc#1247936).
* sched/deadline: Do not count nr_running for dl_server proxy tasks (git-
fixes, bsc#1247936).
* sched/deadline: Fix RT task potential starvation when expiry time passed
(git-fixes, bsc#1247936).
* sched/deadline: Fix dl_server_stopped() (bsc#1247936).
* sched/deadline: Initialize dl_servers after SMP (git-fixes)
* sched_ext, sched/core: Do not call scx_group_set_weight() (git-fixes)
* scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes).
* scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes).
* scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes).
* scsi: fc: Avoid -Wflex-array-member-not-at-end warnings (bsc#1250519).
* scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes).
* scsi: isci: Fix dma_unmap_sg() nents value (git-fixes).
* scsi: lpfc: Abort outstanding ELS WQEs regardless of if rmmod is in progress
(bsc#1250519).
* scsi: lpfc: Check return status of lpfc_reset_flush_io_context during
TGT_RESET (bsc#1250519).
* scsi: lpfc: Clean up allocated queues when queue setup mbox commands fail
(bsc#1250519).
* scsi: lpfc: Clean up extraneous phba dentries (bsc#1250519).
* scsi: lpfc: Convert debugfs directory counts from atomic to unsigned int
(bsc#1250519).
* scsi: lpfc: Copyright updates for 14.4.0.11 patches (bsc#1250519).
* scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted (bsc#1250519).
* scsi: lpfc: Define size of debugfs entry for xri rebalancing (bsc#1250519).
* scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point
topology (bsc#1250519).
* scsi: lpfc: Fix buffer free/clear order in deferred receive path
(bsc#1250519).
* scsi: lpfc: Fix wrong function reference in a comment (bsc#1250519).
* scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in
lpfc_cleanup (bsc#1250519).
* scsi: lpfc: Remove redundant assignment to avoid memory leak (bsc#1250519).
* scsi: lpfc: Remove unused member variables in struct lpfc_hba and lpfc_vport
(bsc#1250519).
* scsi: lpfc: Update lpfc version to 14.4.0.11 (bsc#1250519).
* scsi: lpfc: Use int type to store negative error codes (bsc#1250519).
* scsi: lpfc: Use switch case statements in DIF debugfs handlers
(bsc#1250519).
* scsi: lpfc: use min() to improve code (bsc#1250519).
* scsi: mpi3mr: Event processing debug improvement (bsc#1251186).
* scsi: mpi3mr: Fix I/O failures during controller reset (bsc#1251186).
* scsi: mpi3mr: Fix controller init failure on fault during queue creation
(bsc#1251186).
* scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link speed
(bsc#1251186).
* scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes).
* scsi: mpi3mr: Fix premature TM timeouts on virtual drives (bsc#1251186).
* scsi: mpi3mr: Fix race between config read submit and interrupt completion
(git-fixes).
* scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git-
fixes).
* scsi: mpi3mr: Update MPI headers to revision 37 (bsc#1251186).
* scsi: mpi3mr: Update driver version to 8.15.0.5.50 (bsc#1251186).
* scsi: mpt3sas: Fix a fw_event memory leak (git-fixes).
* scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes).
* scsi: qla2xxx: Avoid stack frame size warning in qla_dfs (git-fixes).
* scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES()
(git-fixes).
* scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp()
(git-fixes).
* scsi: qla2xxx: Remove firmware URL (git-fixes).
* scsi: qla2xxx: Use secs_to_jiffies() instead of msecs_to_jiffies() (git-
fixes).
* scsi: qla2xxx: edif: Fix incorrect sign of error code (git-fixes).
* scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes).
* scsi: smartpqi: Enhance WWID logging logic (bsc#1246631).
* scsi: smartpqi: Take drives offline when controller is offline
(bsc#1246631).
* scsi: smartpqi: Update driver version to 2.1.34-035 (bsc#1246631).
* scsi: ufs: Fix toggling of clk_gating.state when clock gating is not allowed
(git-fixes).
* scsi: ufs: Introduce quirk to extend PA_HIBERN8TIME for UFS devices (git-
fixes).
* scsi: ufs: bsg: Delete bsg_dev when setting up bsg fails (git-fixes).
* scsi: ufs: core: Add missing post notify for power mode change (git-fixes).
* scsi: ufs: core: Add ufshcd_send_bsg_uic_cmd() for UFS BSG (git-fixes).
* scsi: ufs: core: Always initialize the UIC done completion (git-fixes).
* scsi: ufs: core: Do not perform UFS clkscaling during host async scan (git-
fixes).
* scsi: ufs: core: Fix clk scaling to be conditional in reset and restore
(git-fixes).
* scsi: ufs: core: Fix error return with query response (git-fixes).
* scsi: ufs: core: Fix spelling of a sysfs attribute name (git-fixes).
* scsi: ufs: core: Fix ufshcd_is_ufs_dev_busy() and ufshcd_eh_timed_out()
(git-fixes).
* scsi: ufs: core: Honor runtime/system PM levels if set by host controller
drivers (git-fixes).
* scsi: ufs: core: Improve ufshcd_mcq_sq_cleanup() (git-fixes).
* scsi: ufs: core: Introduce ufshcd_has_pending_tasks() (git-fixes).
* scsi: ufs: core: Prepare to introduce a new clock_gating lock (git-fixes).
* scsi: ufs: core: Remove redundant query_complete trace (git-fixes).
* scsi: ufs: core: Set default runtime/system PM levels before
ufshcd_hba_init() (git-fixes).
* scsi: ufs: core: Update compl_time_stamp_local_clock after completing a cqe
(git-fixes).
* scsi: ufs: core: Use link recovery when h8 exit fails during runtime resume
(git-fixes).
* scsi: ufs: exynos: Add check inside exynos_ufs_config_smu() (git-fixes).
* scsi: ufs: exynos: Add gs101_ufs_drv_init() hook and enable WriteBooster
(git-fixes).
* scsi: ufs: exynos: Enable PRDT pre-fetching with UFSHCD_CAP_CRYPTO (git-
fixes).
* scsi: ufs: exynos: Ensure consistent phy reference counts (git-fixes).
* scsi: ufs: exynos: Ensure pre_link() executes before exynos_ufs_phy_init()
(git-fixes).
* scsi: ufs: exynos: Fix hibern8 notify callbacks (git-fixes).
* scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (git-fixes).
* scsi: ufs: exynos: Move UFS shareability value to drvdata (git-fixes).
* scsi: ufs: exynos: Move phy calls to .exit() callback (git-fixes).
* scsi: ufs: exynos: Remove empty drv_init method (git-fixes).
* scsi: ufs: exynos: Remove superfluous function parameter (git-fixes).
* scsi: ufs: exynos: gs101: Put UFS device in reset on .suspend() (git-fixes).
* scsi: ufs: mcq: Delete ufshcd_release_scsi_cmd() in ufshcd_mcq_abort() (git-
fixes).
* scsi: ufs: pltfrm: Disable runtime PM during removal of glue drivers (git-
fixes).
* scsi: ufs: pltfrm: Drop PM runtime reference count after ufshcd_remove()
(git-fixes).
* scsi: ufs: qcom: Fix crypto key eviction (git-fixes).
* scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get (git-
fixes).
* scsi: ufs: ufs-pci: Fix default runtime and system PM levels (git-fixes).
* scsi: ufs: ufs-pci: Fix hibernate state transition for Intel MTL-like host
controllers (git-fixes).
* seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too fast
(git-fixes bsc#1250671).
* selftest/livepatch: Only run test-kprobe with CONFIG_KPROBES_ON_FTRACE
(poo#187320).
* selftests/cpufreq: Fix cpufreq basic read and update testcases
(bsc#1250344).
* selftests/livepatch: Ignore NO_SUPPORT line in dmesg (poo#187320).
* selftests/livepatch: Replace hardcoded module name with variable in test-
callbacks.sh (poo#187320).
* selftests/run_kselftest.sh: Fix help string for --per-test-log (poo#187320).
* selftests/run_kselftest.sh: Use readlink if realpath is not available
(poo#187320).
* selftests/tracing: Fix false failure of subsystem event test (git-fixes).
* selftests: ALSA: fix memory leak in utimer test (git-fixes).
* selftests: livepatch: add new ftrace helpers functions (poo#187320).
* selftests: livepatch: add test cases of stack_order sysfs interface
(poo#187320).
* selftests: livepatch: handle PRINTK_CALLER in check_result() (poo#187320).
* selftests: livepatch: rename KLP_SYSFS_DIR to SYSFS_KLP_DIR (poo#187320).
* selftests: livepatch: save and restore kprobe state (poo#187320).
* selftests: livepatch: test if ftrace can trace a livepatched function
(poo#187320).
* selftests: livepatch: test livepatching a kprobed function (poo#187320).
* selftests: ncdevmem: Move ncdevmem under drivers/net/hw (poo#187443).
* selinux: change security_compute_sid to return the ssid or tsid on match
(git-fixes).
* selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len (stable-
fixes).
* serial: 8250: Touch watchdogs in write_atomic() (bsc#1246688).
* serial: 8250: fix panic due to PSLVERR (git-fixes).
* serial: max310x: Add error checking in probe() (git-fixes).
* serial: sc16is7xx: fix bug in flow control levels init (git-fixes).
* skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650).
* slab: Decouple slab_debug and no_hash_pointers (bsc#1249022).
* smb: client: fix crypto buffers in non-linear memory (bsc#1250491,
boo#1239206).
* smb: client: fix netns refcount leak after net_passive changes (git-fixes).
* soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS (git-fixes).
* soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes).
* soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure (git-
fixes).
* soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure (git-
fixes).
* soc: qcom: QMI encoding/decoding for big endian (git-fixes).
* soc: qcom: fix endianness for QMI header (git-fixes).
* soc: qcom: mdt_loader: Actually use the e_phoff (stable-fixes).
* soc: qcom: mdt_loader: Deal with zero e_shentsize (git-fixes).
* soc: qcom: mdt_loader: Ensure we do not read past the ELF header (git-
fixes).
* soc: qcom: mdt_loader: Fix error return values in mdt_header_valid() (git-
fixes).
* soc: qcom: pmic_glink: fix OF node leak (git-fixes).
* soc: qcom: rpmh-rsc: Add RSC version 4 support (stable-fixes).
* soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS (git-fixes).
* soundwire: Move handle_nested_irq outside of sdw_dev_lock (stable-fixes).
* soundwire: amd: cancel pending slave status handling workqueue during remove
sequence (stable-fixes).
* soundwire: amd: fix for handling slave alerts after link is down (git-
fixes).
* soundwire: amd: serialize amd manager resume sequence during pm_prepare
(stable-fixes).
* soundwire: stream: restore params when prepare ports fail (git-fixes).
* spi: bcm2835: Remove redundant semicolons (git-fixes).
* spi: cadence-quadspi: Fix cqspi_setup_flash() (git-fixes).
* spi: cadence-quadspi: Flush posted register writes before DAC access (git-
fixes).
* spi: cadence-quadspi: Flush posted register writes before INDAC access (git-
fixes).
* spi: cadence-quadspi: fix cleanup of rx_chan on failure paths (stable-
fixes).
* spi: cs42l43: Property entry should be a null-terminated array
(bsc#1246979).
* spi: fix return code when spi device has too many chipselects (git-fixes).
* spi: mtk-snfi: Remove redundant semicolons (git-fixes).
* spi: spi-fsl-lpspi: Clamp too high speed_hz (git-fixes).
* spi: spi-fsl-lpspi: Clear status register after disabling the module (git-
fixes).
* spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes).
* spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git-
fixes).
* spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes).
* spi: stm32: Check for cfg availability in stm32_spi_probe (git-fixes).
* sprintf.h requires stdarg.h (git-fixes).
* sprintf.h: mask additional include (git-fixes).
* squashfs: fix memory leak in squashfs_fill_super (git-fixes).
* staging: axis-fifo: fix TX handling on copy_from_user() failure (git-fixes).
* staging: axis-fifo: fix maximum TX packet length check (git-fixes).
* staging: axis-fifo: flush RX FIFO on read errors (git-fixes).
* staging: axis-fifo: remove sysfs interface (git-fixes).
* staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() (git-
fixes).
* staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()
(git-fixes).
* staging: nvec: Fix incorrect null termination of battery manufacturer (git-
fixes).
* staging: vchiq_arm: Make vchiq_shutdown never fail (git-fixes).
* struct cdc_ncm_ctx: move new member to end (git-fixes).
* sunrpc: fix client side handling of tls alerts (git-fixes).
* sunrpc: fix handling of server side tls alerts (git-fixes).
* sunrpc: fix null pointer dereference on zero-length checksum (git-fixes).
* sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes).
* supported.conf: Mark ZL3073X modules supported
* supported.conf: mark hyperv_drm as external
* tcp: call tcp_measure_rcv_mss() for ooo packets (git-fixes).
* tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650).
* thermal/drivers/mediatek/lvts_thermal: Add lvts commands and their sizes to
driver data (stable-fixes).
* thermal/drivers/mediatek/lvts_thermal: Add mt7988 lvts commands (stable-
fixes).
* thermal/drivers/mediatek/lvts_thermal: Change lvts commands array to static
const (stable-fixes).
* thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required
(stable-fixes).
* thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes).
* thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes).
* thunderbolt: Compare HMAC values in constant time (git-fixes).
* thunderbolt: Fix copy+paste error in match_service_id() (git-fixes).
* tools/power turbostat: Clustered Uncore MHz counters should honor show/hide
options (stable-fixes).
* tools/power turbostat: Fix bogus SysWatt for forked program (git-fixes).
* tools/power turbostat: Fix build with musl (stable-fixes).
* tools/power turbostat: Handle cap_get_proc() ENOSYS (stable-fixes).
* tools/power turbostat: Handle non-root legacy-uncore sysfs permissions
(stable-fixes).
* tools/resolve_btfids: Fix build when cross compiling kernel with clang (git-
fixes).
* tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single (git-fixes).
* trace/fgraph: Fix error handling (git-fixes).
* trace/ring-buffer: Do not use TP_printk() formatting for boot mapped buffers
(git-fixes).
* tracepoint: Print the function symbol when tracepoint_debug is set
(jsc#PED-13631).
* tracing/kprobe: Make trace_kprobe's module callback called after jump_label
update (git-fixes).
* tracing/kprobes: Fix to free objects when failed to copy a symbol (git-
fixes).
* tracing: Correct the refcount if the hist/hist_debug file fails to open
(git-fixes).
* tracing: Fix filter string testing (git-fixes).
* tracing: Fix using ret variable in tracing_set_tracer() (git-fixes).
* tracing: Remove unneeded goto out logic (bsc#1249286).
* tracing: Switch trace.c code over to use guard() (git-fixes).
* tracing: Switch trace_events_hist.c code over to use guard() (git-fixes).
* tracing: fprobe events: Fix possible UAF on modules (git-fixes).
* tracing: tprobe-events: Fix leakage of module refcount (git-fixes).
* tty: hvc_console: Call hvc_kick in hvc_write unconditionally (bsc#1230062).
* tty: n_gsm: Do not block input queue by waiting MSC (git-fixes).
* tty: serial: fix print format specifiers (stable-fixes).
* ublk: sanity check add_dev input for underflow (git-fixes).
* ublk: use vmalloc for ublk_device's __queues (git-fixes).
* ucount: fix atomic_long_inc_below() argument type (git-fixes).
* uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes).
* usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init()
(git-fixes).
* usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call (git-
fixes).
* usb: core: Add 0x prefix to quirks debug output (stable-fixes).
* usb: core: config: Prevent OOB read in SS endpoint companion parsing
(stable-fixes).
* usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE
test (git-fixes).
* usb: core: usb_submit_urb: downgrade type check (stable-fixes).
* usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git-
fixes).
* usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable-
fixes).
* usb: dwc3: imx8mp: fix device leak at unbind (git-fixes).
* usb: dwc3: meson-g12a: fix device leaks at unbind (git-fixes).
* usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes).
* usb: dwc3: qcom: Do not leave BCR asserted (git-fixes).
* usb: early: xhci-dbc: Fix early_ioremap leak (git-fixes).
* usb: gadget : fix use-after-free in composite_dev_cleanup() (git-fixes).
* usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes).
* usb: gadget: midi2: Fix MIDI2 IN EP max packet size (git-fixes).
* usb: gadget: midi2: Fix missing UMP group attributes initialization (git-
fixes).
* usb: gadget: udc: renesas_usb3: fix device leak at unbind (git-fixes).
* usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup (git-
fixes).
* usb: host: xhci-plat: fix incorrect type for of_match variable in
xhci_plat_probe() (git-fixes).
* usb: misc: apple-mfi-fastcharge: Make power supply names unique (git-fixes).
* usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls (git-
fixes).
* usb: musb: omap2430: fix device leak at unbind (git-fixes).
* usb: phy: twl6030: Fix incorrect type for ret (git-fixes).
* usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive
(stable-fixes).
* usb: renesas-xhci: Fix External ROM access timeouts (git-fixes).
* usb: storage: realtek_cr: Use correct byte order for bcs->Residue (git-
fixes).
* usb: typec: fusb302: cache PD RX state (git-fixes).
* usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable-
fixes).
* usb: typec: maxim_contaminant: disable low power mode when reading
comparator values (git-fixes).
* usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is
clean (git-fixes).
* usb: typec: tcpm/tcpci_maxim: fix irq wake usage (stable-fixes).
* usb: typec: tcpm: allow switching to mode accessory to mux properly (stable-
fixes).
* usb: typec: tcpm: allow to use sink in accessory mode (stable-fixes).
* usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach (git-
fixes).
* usb: typec: tcpm: properly deliver cable vdms to altmode drivers (git-
fixes).
* usb: typec: tipd: Clear interrupts first (git-fixes).
* usb: typec: ucsi: Update power_supply on power role change (git-fixes).
* usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default
(stable-fixes).
* usb: typec: ucsi: yoga-c630: fix error and remove paths (git-fixes).
* usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes).
* usb: xhci: Avoid showing errors during surprise removal (stable-fixes).
* usb: xhci: Avoid showing warnings for dying controller (stable-fixes).
* usb: xhci: Fix slot_id resource race conflict (git-fixes).
* usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command
(stable-fixes).
* usb: xhci: print xhci->xhc_state when queue_command failed (stable-fixes).
* use uniform permission checks for all mount propagation changes (git-fixes).
* vdpa/mlx5: Fix needs_teardown flag calculation (git-fixes).
* vdpa: Fix IDR memory leak in VDUSE module exit (git-fixes).
* vhost-scsi: Fix log flooding with target does not exist errors (git-fixes).
* vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() (git-
fixes).
* vhost/vsock: Avoid allocating arbitrarily-sized SKBs (git-fixes).
* vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER (git-fixes).
* vhost: Reintroduce kthread API and add mode selection (git-fixes).
* vhost: fail early when __vhost_add_used() fails (git-fixes).
* virtchnl2: add flow steering support (jsc#PED-13728).
* virtchnl2: rename enum virtchnl2_cap_rss (jsc#PED-13728).
* virtchnl: add PTP virtchnl definitions (jsc#PED-13728 jsc#PED-13762).
* virtio_net: Enforce minimum TX ring size for reliability (git-fixes).
* virtio_ring: Fix error reporting in virtqueue_resize (git-fixes).
* vmci: Prevent the dispatching of uninitialized payloads (git-fixes).
* vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page
(git-fixes).
* vsock/virtio: Validate length in packet header before skb_put() (git-fixes).
* vt: defkeymap: Map keycodes above 127 to K_HOLE (git-fixes).
* vt: keyboard: Do not process Unicode characters in K_OFF mode (git-fixes).
* watchdog: dw_wdt: Fix default timeout (stable-fixes).
* watchdog: iTCO_wdt: Report error if timeout configuration fails (stable-
fixes).
* watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the watchdog
(git-fixes).
* watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race
condition (stable-fixes).
* watchdog: ziirave_wdt: check record length in ziirave_firm_verify() (git-
fixes).
* wifi: ath10k: avoid unnecessary wait for service ready message (git-fixes).
* wifi: ath10k: shutdown driver when hardware is unreliable (stable-fixes).
* wifi: ath11k: HAL SRNG: do not deinitialize and re-initialize again (git-
fixes).
* wifi: ath11k: clear initialized flag for deinit-ed srng lists (git-fixes).
* wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() (git-fixes).
* wifi: ath11k: fix dest ring-buffer corruption (git-fixes).
* wifi: ath11k: fix dest ring-buffer corruption when ring is full (git-fixes).
* wifi: ath11k: fix group data packet drops during rekey (git-fixes).
* wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()
(git-fixes).
* wifi: ath11k: fix source ring-buffer corruption (git-fixes).
* wifi: ath11k: fix suspend use-after-free after probe failure (git-fixes).
* wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952).
* wifi: ath12k: Add memset and update default rate value in wmi tx completion
(stable-fixes).
* wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes).
* wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable-
fixes).
* wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0
(stable-fixes).
* wifi: ath12k: Fix station association with MBSSID Non-TX BSS (stable-fixes).
* wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type()
(git-fixes).
* wifi: ath12k: fix dest ring-buffer corruption (git-fixes).
* wifi: ath12k: fix dest ring-buffer corruption when ring is full (git-fixes).
* wifi: ath12k: fix endianness handling while accessing wmi service bit (git-
fixes).
* wifi: ath12k: fix memory leak in ath12k_pci_remove() (stable-fixes).
* wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (git-fixes).
* wifi: ath12k: fix source ring-buffer corruption (git-fixes).
* wifi: ath12k: fix the fetching of combined rssi (git-fixes).
* wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes).
* wifi: ath12k: fix wrong logging ID used for CE (git-fixes).
* wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE
(git-fixes).
* wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work
(git-fixes).
* wifi: brcmsmac: Remove const from tbl_ptr parameter in
wlc_lcnphy_common_read_table() (git-fixes).
* wifi: cfg80211: Fix interface type validation (stable-fixes).
* wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes).
* wifi: cfg80211: reject HTC bit for management frames (stable-fixes).
* wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git-
fixes).
* wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes).
* wifi: iwlegacy: Check rate_idx range after addition (stable-fixes).
* wifi: iwlwifi: Add missing firmware info for bz-b0-* models (bsc#1252084).
* wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (git-fixes).
* wifi: iwlwifi: Fix memory leak in iwl_mvm_init() (git-fixes).
* wifi: iwlwifi: Remove redundant header files (git-fixes).
* wifi: iwlwifi: config: unify fw/pnvm MODULE_FIRMWARE (bsc#1252084).
* wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable-
fixes).
* wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable-
fixes).
* wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn (stable-fixes).
* wifi: iwlwifi: mvm: fix scan request validation (stable-fixes).
* wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes).
* wifi: iwlwifi: return ERR_PTR from opmode start() (stable-fixes).
* wifi: iwlwifi: uefi: check DSM item validity (git-fixes).
* wifi: libertas: cap SSID len in lbs_associate() (git-fixes).
* wifi: mac80211: Check 802.11 encaps offloading in
ieee80211_tx_h_select_key() (git-fixes).
* wifi: mac80211: Do not call fq_flow_idx() for management frames (git-fixes).
* wifi: mac80211: Do not schedule stopped TXQs (git-fixes).
* wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon()
(git-fixes).
* wifi: mac80211: avoid weird state in error path (stable-fixes).
* wifi: mac80211: do not complete management TX on SAE commit (stable-fixes).
* wifi: mac80211: do not unreserve never reserved chanctx (stable-fixes).
* wifi: mac80211: fix Rx packet handling when pubsta information is not
available (git-fixes).
* wifi: mac80211: fix incorrect type for ret (stable-fixes).
* wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes).
* wifi: mac80211: increase scan_ies_len for S1G (stable-fixes).
* wifi: mac80211: reject TDLS operations when station is not associated (git-
fixes).
* wifi: mac80211: update radar_required in channel context after channel
switch (stable-fixes).
* wifi: mt76: fix linked list corruption (git-fixes).
* wifi: mt76: fix potential memory leak in mt76_wmac_probe() (git-fixes).
* wifi: mt76: free pending offchannel tx frames on wcid cleanup (git-fixes).
* wifi: mt76: mt7915: fix mt7981 pre-calibration (git-fixes).
* wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes).
* wifi: mt76: mt7925: adjust rm BSS flow to prevent next connection failure
(git-fixes).
* wifi: mt76: mt7925: fix locking in mt7925_change_vif_links() (git-fixes).
* wifi: mt76: mt7925: fix the wrong bss cleanup for SAP (git-fixes).
* wifi: mt76: mt7925u: use connac3 tx aggr check in tx complete (git-fixes).
* wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE (git-fixes).
* wifi: mt76: mt7996: Fix RX packets configuration for primary WED device
(git-fixes).
* wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git-
fixes).
* wifi: mt76: prevent non-offchannel mgmt tx during scan/roc (git-fixes).
* wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes).
* wifi: mwifiex: send world regulatory domain to driver (git-fixes).
* wifi: nl80211: Set num_sub_specs before looping through sub_specs (git-
fixes).
* wifi: plfxlc: Fix error handling in usb driver probe (git-fixes).
* wifi: rtl818x: Kill URBs before clearing tx status queue (git-fixes).
* wifi: rtl8xxxu: Do not claim USB ID 07b8:8188 (stable-fixes).
* wifi: rtl8xxxu: Fix RX skb size for aggregation disabled (git-fixes).
* wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc()
(stable-fixes).
* wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()`
(stable-fixes).
* wifi: rtlwifi: rtl8192cu: Do not claim USB ID 07b8:8188 (stable-fixes).
* wifi: rtw88: Fix macid assigned to TDLS station (git-fixes).
* wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes).
* wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable-
fixes).
* wifi: rtw89: avoid NULL dereference when RX problematic packet on
unsupported 6 GHz band (git-fixes).
* wifi: rtw89: avoid circular locking dependency in ser_state_run() (git-
fixes).
* wifi: rtw89: scan abort when assign/unassign_vif (stable-fixes).
* wifi: rtw89: wow: Add Basic Rate IE to probe request in scheduled scan mode
(stable-fixes).
* wifi: virt_wifi: Fix page fault on connect (stable-fixes).
* wifi: wilc1000: avoid buffer overflow in WID string configuration (stable-
fixes).
* writeback: Avoid contention on wb->list_lock when switching inodes
(bsc#1237776).
* writeback: Avoid contention on wb->list_lock when switching inodes (kABI
fixup) (bsc#1237776).
* writeback: Avoid excessively long inode switching times (bsc#1237776).
* writeback: Avoid softlockup when switching many inodes (bsc#1237776).
* x86/CPU/AMD: Add CPUID faulting support (jsc#PED-13704).
* x86/Kconfig: Add arch attack vector support (git-fixes).
* x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes).
* x86/boot: Sanitize boot params before parsing command line (git-fixes).
* x86/bugs: Add SRSO_MITIGATION_NOSMT (git-fixes).
* x86/bugs: Add attack vector controls for BHI (git-fixes).
* x86/bugs: Add attack vector controls for GDS (git-fixes).
* x86/bugs: Add attack vector controls for ITS (git-fixes).
* x86/bugs: Add attack vector controls for L1TF (git-fixes).
* x86/bugs: Add attack vector controls for MDS (git-fixes).
* x86/bugs: Add attack vector controls for MMIO (git-fixes).
* x86/bugs: Add attack vector controls for RFDS (git-fixes).
* x86/bugs: Add attack vector controls for SRBDS (git-fixes).
* x86/bugs: Add attack vector controls for SRSO (git-fixes).
* x86/bugs: Add attack vector controls for SSB (git-fixes).
* x86/bugs: Add attack vector controls for TAA (git-fixes).
* x86/bugs: Add attack vector controls for TSA (git-fixes).
* x86/bugs: Add attack vector controls for retbleed (git-fixes).
* x86/bugs: Add attack vector controls for spectre_v1 (git-fixes).
* x86/bugs: Add attack vector controls for spectre_v2 (git-fixes).
* x86/bugs: Add attack vector controls for spectre_v2_user (git-fixes).
* x86/bugs: Allow ITS stuffing in eIBRS+retpoline mode also (git-fixes).
* x86/bugs: Avoid AUTO after the select step in the retbleed mitigation (git-
fixes).
* x86/bugs: Avoid warning when overriding return thunk (git-fixes).
* x86/bugs: Clean up SRSO microcode handling (git-fixes).
* x86/bugs: Define attack vectors relevant for each bug (git-fixes).
* x86/bugs: Fix GDS mitigation selecting when mitigation is off (git-fixes).
* x86/bugs: Introduce cdt_possible() (git-fixes).
* x86/bugs: Print enabled attack vectors (git-fixes).
* x86/bugs: Remove its=stuff dependency on retbleed (git-fixes).
* x86/bugs: Select best SRSO mitigation (git-fixes).
* x86/bugs: Simplify the retbleed=stuff checks (git-fixes).
* x86/bugs: Use IBPB for retbleed if used by SRSO (git-fixes).
* x86/bugs: Use switch/case in its_apply_mitigation() (git-fixes).
* x86/cacheinfo: Properly parse CPUID(0x80000005) L1d/L1i associativity (git-
fixes).
* x86/cacheinfo: Properly parse CPUID(0x80000006) L2/L3 associativity (git-
fixes).
* x86/cpu: Sanitize CPUID(0x80000000) output (git-fixes).
* x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes).
* x86/fpu/xstate: Fix inconsistencies in guest FPU xfeatures (git-fixes).
* x86/fpu: Avoid copying dynamic FP state from init_task in
arch_dup_task_struct() (git-fixes).
* x86/fpu: Delay instruction pointer fixup until after warning (git-fixes).
* x86/fpu: Fix guest FPU state buffer allocation size (git-fixes).
* x86/fpu: Fully optimize out WARN_ON_FPU() (git-fixes).
* x86/fpu: Refactor xfeature bitmask update code for sigframe XSAVE (git-
fixes).
* x86/fred/signal: Prevent immediate repeat of single step trap on return from
SIGTRAP handler (git-fixes).
* x86/headers: Replace **ASSEMBLY** with **ASSEMBLER** in UAPI headers (git-
fixes).
* x86/locking: Use ALT_OUTPUT_SP() for percpu_{,try_}cmpxchg{64,128}_op()
(git-fixes).
* x86/mce/amd: Add default names for MCA banks and blocks (git-fixes).
* x86/mce: Do not remove sysfs if thresholding sysfs init fails (git-fixes).
* x86/mce: Ensure user polling settings are honored when restarting timer
(git-fixes).
* x86/mce: Make sure CMCI banks are cleared during shutdown on Intel (git-
fixes).
* x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes).
* x86/microcode: Consolidate the loader enablement checking (git-fixes).
* x86/microcode: Update the Intel processor flag scan check (git-fixes).
* x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings()
(git-fixes).
* x86/mm/pat: do not collapse pages without PSE set (git-fixes).
* x86/nmi: Add an emergency handler in nmi_desc & use it in
nmi_shootdown_cpus() (git-fixes).
* x86/percpu: Disable named address spaces for UBSAN_BOOL with KASAN for GCC
< 14.2 (git-fixes).
* x86/pkeys: Simplify PKRU update in signal frame (git-fixes).
* x86/platform/olpc: Remove unused variable 'len' in
olpc_dt_compatible_match() (git-fixes).
* x86/pti: Add attack vector controls for PTI (git-fixes).
* x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes).
* x86/smp: Allow calling mwait_play_dead with an arbitrary hint
(jsc#PED-13815).
* x86/smp: Fix mwait_play_dead() and acpi_processor_ffh_play_dead() noreturn
behavior (jsc#PED-13815).
* x86/smp: PM/hibernate: Split arch_resume_nosmt() (jsc#PED-13815).
* x86/smpboot: Fix INIT delay assignment for extended Intel Families (git-
fixes).
* x86/topology: Implement topology_is_core_online() to address SMT regression
(jsc#PED-13815).
* x86/traps: Initialize DR6 by writing its architectural reset value (git-
fixes).
* xen/gntdev: remove struct gntdev_copy_batch from stack (git-fixes).
* xen/netfront: Fix TX response spurious interrupts (git-fixes).
* xen: fix UAF in dmabuf_exp_from_pages() (git-fixes).
* xfrm: replay: Fix the update of replay_esn->oseq_hi for GSO (git-fixes).
* xfs: change xfs_xattr_class from a TRACE_EVENT() to DECLARE_EVENT_CLASS()
(git-fixes).
* xfs: do not propagate ENODATA disk errors into xattr code (git-fixes).
* xfs: fix scrub trace with null pointer in quotacheck (git-fixes).
* xfs: only create event xfs_file_compat_ioctl when CONFIG_COMPAT is configure
(git-fixes).
* xfs: remove unused event xfs_alloc_near_error (git-fixes).
* xfs: remove unused event xfs_alloc_near_nominleft (git-fixes).
* xfs: remove unused event xfs_attr_node_removename (git-fixes).
* xfs: remove unused event xfs_ioctl_clone (git-fixes).
* xfs: remove unused event xfs_pagecache_inval (git-fixes).
* xfs: remove unused event xlog_iclog_want_sync (git-fixes).
* xfs: remove unused trace event xfs_attr_remove_iter_return (git-fixes).
* xfs: remove unused trace event xfs_attr_rmtval_set (git-fixes).
* xfs: remove unused trace event xfs_discard_rtrelax (git-fixes).
* xfs: remove unused trace event xfs_log_cil_return (git-fixes).
* xfs: remove unused trace event xfs_reflink_cow_enospc (git-fixes).
* xfs: remove unused xfs_attr events (git-fixes).
* xfs: remove unused xfs_reflink_compare_extents events (git-fixes).
* xfs: remove usused xfs_end_io_direct events (git-fixes).
* xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes).
* xhci: dbc: decouple endpoint allocation from initialization (git-fixes).
* xhci: fix memory leak regression when freeing xhci vdev devices depth first
(git-fixes).
* xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes).
* zram: permit only one post-processing operation at a time (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Micro 6.2
zypper in -t patch SUSE-SL-Micro-6.2-11=1
## Package List:
* SUSE Linux Micro 6.2 (noarch)
* kernel-macros-6.12.0-160000.6.1
* kernel-devel-6.12.0-160000.6.1
* kernel-source-6.12.0-160000.6.1
* SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.12.0-160000.6.1
* SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-6.12.0-160000.6.1
* kernel-default-extra-debuginfo-6.12.0-160000.6.1
* kernel-default-extra-6.12.0-160000.6.1
* kernel-default-debuginfo-6.12.0-160000.6.1
* kernel-default-debugsource-6.12.0-160000.6.1
* SUSE Linux Micro 6.2 (x86_64)
* kernel-rt-livepatch-6.12.0-160000.6.1
* kernel-rt-devel-debuginfo-6.12.0-160000.6.1
* kernel-default-devel-debuginfo-6.12.0-160000.6.1
* SUSE Linux Micro 6.2 (ppc64le s390x x86_64)
* kernel-default-livepatch-6.12.0-160000.6.1
* SUSE Linux Micro 6.2 (aarch64 nosrc x86_64)
* kernel-rt-6.12.0-160000.6.1
* SUSE Linux Micro 6.2 (aarch64 x86_64)
* kernel-rt-debuginfo-6.12.0-160000.6.1
* kernel-rt-debugsource-6.12.0-160000.6.1
* kernel-rt-devel-6.12.0-160000.6.1
* SUSE Linux Micro 6.2 (aarch64 nosrc)
* kernel-64kb-6.12.0-160000.6.1
* SUSE Linux Micro 6.2 (aarch64)
* kernel-64kb-debuginfo-6.12.0-160000.6.1
* kernel-64kb-debugsource-6.12.0-160000.6.1
* kernel-64kb-devel-6.12.0-160000.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-53164.html
* https://www.suse.com/security/cve/CVE-2024-57891.html
* https://www.suse.com/security/cve/CVE-2024-57951.html
* https://www.suse.com/security/cve/CVE-2024-57952.html
* https://www.suse.com/security/cve/CVE-2024-58090.html
* https://www.suse.com/security/cve/CVE-2025-22034.html
* https://www.suse.com/security/cve/CVE-2025-22077.html
* https://www.suse.com/security/cve/CVE-2025-23141.html
* https://www.suse.com/security/cve/CVE-2025-37798.html
* https://www.suse.com/security/cve/CVE-2025-37821.html
* https://www.suse.com/security/cve/CVE-2025-37849.html
* https://www.suse.com/security/cve/CVE-2025-37856.html
* https://www.suse.com/security/cve/CVE-2025-37861.html
* https://www.suse.com/security/cve/CVE-2025-37864.html
* https://www.suse.com/security/cve/CVE-2025-38006.html
* https://www.suse.com/security/cve/CVE-2025-38008.html
* https://www.suse.com/security/cve/CVE-2025-38019.html
* https://www.suse.com/security/cve/CVE-2025-38034.html
* https://www.suse.com/security/cve/CVE-2025-38038.html
* https://www.suse.com/security/cve/CVE-2025-38052.html
* https://www.suse.com/security/cve/CVE-2025-38058.html
* https://www.suse.com/security/cve/CVE-2025-38062.html
* https://www.suse.com/security/cve/CVE-2025-38075.html
* https://www.suse.com/security/cve/CVE-2025-38087.html
* https://www.suse.com/security/cve/CVE-2025-38088.html
* https://www.suse.com/security/cve/CVE-2025-38089.html
* https://www.suse.com/security/cve/CVE-2025-38090.html
* https://www.suse.com/security/cve/CVE-2025-38091.html
* https://www.suse.com/security/cve/CVE-2025-38095.html
* https://www.suse.com/security/cve/CVE-2025-38096.html
* https://www.suse.com/security/cve/CVE-2025-38098.html
* https://www.suse.com/security/cve/CVE-2025-38099.html
* https://www.suse.com/security/cve/CVE-2025-38101.html
* https://www.suse.com/security/cve/CVE-2025-38102.html
* https://www.suse.com/security/cve/CVE-2025-38103.html
* https://www.suse.com/security/cve/CVE-2025-38106.html
* https://www.suse.com/security/cve/CVE-2025-38107.html
* https://www.suse.com/security/cve/CVE-2025-38108.html
* https://www.suse.com/security/cve/CVE-2025-38109.html
* https://www.suse.com/security/cve/CVE-2025-38110.html
* https://www.suse.com/security/cve/CVE-2025-38111.html
* https://www.suse.com/security/cve/CVE-2025-38112.html
* https://www.suse.com/security/cve/CVE-2025-38113.html
* https://www.suse.com/security/cve/CVE-2025-38114.html
* https://www.suse.com/security/cve/CVE-2025-38117.html
* https://www.suse.com/security/cve/CVE-2025-38118.html
* https://www.suse.com/security/cve/CVE-2025-38119.html
* https://www.suse.com/security/cve/CVE-2025-38120.html
* https://www.suse.com/security/cve/CVE-2025-38122.html
* https://www.suse.com/security/cve/CVE-2025-38123.html
* https://www.suse.com/security/cve/CVE-2025-38124.html
* https://www.suse.com/security/cve/CVE-2025-38125.html
* https://www.suse.com/security/cve/CVE-2025-38127.html
* https://www.suse.com/security/cve/CVE-2025-38128.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://www.suse.com/security/cve/CVE-2025-38134.html
* https://www.suse.com/security/cve/CVE-2025-38135.html
* https://www.suse.com/security/cve/CVE-2025-38136.html
* https://www.suse.com/security/cve/CVE-2025-38137.html
* https://www.suse.com/security/cve/CVE-2025-38138.html
* https://www.suse.com/security/cve/CVE-2025-38140.html
* https://www.suse.com/security/cve/CVE-2025-38141.html
* https://www.suse.com/security/cve/CVE-2025-38142.html
* https://www.suse.com/security/cve/CVE-2025-38143.html
* https://www.suse.com/security/cve/CVE-2025-38145.html
* https://www.suse.com/security/cve/CVE-2025-38146.html
* https://www.suse.com/security/cve/CVE-2025-38148.html
* https://www.suse.com/security/cve/CVE-2025-38149.html
* https://www.suse.com/security/cve/CVE-2025-38151.html
* https://www.suse.com/security/cve/CVE-2025-38153.html
* https://www.suse.com/security/cve/CVE-2025-38154.html
* https://www.suse.com/security/cve/CVE-2025-38155.html
* https://www.suse.com/security/cve/CVE-2025-38156.html
* https://www.suse.com/security/cve/CVE-2025-38157.html
* https://www.suse.com/security/cve/CVE-2025-38159.html
* https://www.suse.com/security/cve/CVE-2025-38160.html
* https://www.suse.com/security/cve/CVE-2025-38161.html
* https://www.suse.com/security/cve/CVE-2025-38165.html
* https://www.suse.com/security/cve/CVE-2025-38168.html
* https://www.suse.com/security/cve/CVE-2025-38169.html
* https://www.suse.com/security/cve/CVE-2025-38170.html
* https://www.suse.com/security/cve/CVE-2025-38172.html
* https://www.suse.com/security/cve/CVE-2025-38173.html
* https://www.suse.com/security/cve/CVE-2025-38174.html
* https://www.suse.com/security/cve/CVE-2025-38177.html
* https://www.suse.com/security/cve/CVE-2025-38180.html
* https://www.suse.com/security/cve/CVE-2025-38181.html
* https://www.suse.com/security/cve/CVE-2025-38182.html
* https://www.suse.com/security/cve/CVE-2025-38184.html
* https://www.suse.com/security/cve/CVE-2025-38185.html
* https://www.suse.com/security/cve/CVE-2025-38186.html
* https://www.suse.com/security/cve/CVE-2025-38188.html
* https://www.suse.com/security/cve/CVE-2025-38189.html
* https://www.suse.com/security/cve/CVE-2025-38190.html
* https://www.suse.com/security/cve/CVE-2025-38193.html
* https://www.suse.com/security/cve/CVE-2025-38197.html
* https://www.suse.com/security/cve/CVE-2025-38198.html
* https://www.suse.com/security/cve/CVE-2025-38201.html
* https://www.suse.com/security/cve/CVE-2025-38205.html
* https://www.suse.com/security/cve/CVE-2025-38208.html
* https://www.suse.com/security/cve/CVE-2025-38209.html
* https://www.suse.com/security/cve/CVE-2025-38211.html
* https://www.suse.com/security/cve/CVE-2025-38213.html
* https://www.suse.com/security/cve/CVE-2025-38214.html
* https://www.suse.com/security/cve/CVE-2025-38215.html
* https://www.suse.com/security/cve/CVE-2025-38216.html
* https://www.suse.com/security/cve/CVE-2025-38217.html
* https://www.suse.com/security/cve/CVE-2025-38220.html
* https://www.suse.com/security/cve/CVE-2025-38222.html
* https://www.suse.com/security/cve/CVE-2025-38224.html
* https://www.suse.com/security/cve/CVE-2025-38225.html
* https://www.suse.com/security/cve/CVE-2025-38226.html
* https://www.suse.com/security/cve/CVE-2025-38227.html
* https://www.suse.com/security/cve/CVE-2025-38228.html
* https://www.suse.com/security/cve/CVE-2025-38229.html
* https://www.suse.com/security/cve/CVE-2025-38231.html
* https://www.suse.com/security/cve/CVE-2025-38232.html
* https://www.suse.com/security/cve/CVE-2025-38233.html
* https://www.suse.com/security/cve/CVE-2025-38234.html
* https://www.suse.com/security/cve/CVE-2025-38242.html
* https://www.suse.com/security/cve/CVE-2025-38244.html
* https://www.suse.com/security/cve/CVE-2025-38245.html
* https://www.suse.com/security/cve/CVE-2025-38246.html
* https://www.suse.com/security/cve/CVE-2025-38249.html
* https://www.suse.com/security/cve/CVE-2025-38251.html
* https://www.suse.com/security/cve/CVE-2025-38253.html
* https://www.suse.com/security/cve/CVE-2025-38255.html
* https://www.suse.com/security/cve/CVE-2025-38256.html
* https://www.suse.com/security/cve/CVE-2025-38257.html
* https://www.suse.com/security/cve/CVE-2025-38258.html
* https://www.suse.com/security/cve/CVE-2025-38259.html
* https://www.suse.com/security/cve/CVE-2025-38263.html
* https://www.suse.com/security/cve/CVE-2025-38265.html
* https://www.suse.com/security/cve/CVE-2025-38267.html
* https://www.suse.com/security/cve/CVE-2025-38268.html
* https://www.suse.com/security/cve/CVE-2025-38270.html
* https://www.suse.com/security/cve/CVE-2025-38272.html
* https://www.suse.com/security/cve/CVE-2025-38273.html
* https://www.suse.com/security/cve/CVE-2025-38274.html
* https://www.suse.com/security/cve/CVE-2025-38275.html
* https://www.suse.com/security/cve/CVE-2025-38277.html
* https://www.suse.com/security/cve/CVE-2025-38278.html
* https://www.suse.com/security/cve/CVE-2025-38286.html
* https://www.suse.com/security/cve/CVE-2025-38287.html
* https://www.suse.com/security/cve/CVE-2025-38288.html
* https://www.suse.com/security/cve/CVE-2025-38289.html
* https://www.suse.com/security/cve/CVE-2025-38290.html
* https://www.suse.com/security/cve/CVE-2025-38291.html
* https://www.suse.com/security/cve/CVE-2025-38292.html
* https://www.suse.com/security/cve/CVE-2025-38293.html
* https://www.suse.com/security/cve/CVE-2025-38299.html
* https://www.suse.com/security/cve/CVE-2025-38300.html
* https://www.suse.com/security/cve/CVE-2025-38301.html
* https://www.suse.com/security/cve/CVE-2025-38302.html
* https://www.suse.com/security/cve/CVE-2025-38303.html
* https://www.suse.com/security/cve/CVE-2025-38304.html
* https://www.suse.com/security/cve/CVE-2025-38305.html
* https://www.suse.com/security/cve/CVE-2025-38306.html
* https://www.suse.com/security/cve/CVE-2025-38307.html
* https://www.suse.com/security/cve/CVE-2025-38311.html
* https://www.suse.com/security/cve/CVE-2025-38312.html
* https://www.suse.com/security/cve/CVE-2025-38313.html
* https://www.suse.com/security/cve/CVE-2025-38315.html
* https://www.suse.com/security/cve/CVE-2025-38317.html
* https://www.suse.com/security/cve/CVE-2025-38318.html
* https://www.suse.com/security/cve/CVE-2025-38319.html
* https://www.suse.com/security/cve/CVE-2025-38322.html
* https://www.suse.com/security/cve/CVE-2025-38323.html
* https://www.suse.com/security/cve/CVE-2025-38326.html
* https://www.suse.com/security/cve/CVE-2025-38332.html
* https://www.suse.com/security/cve/CVE-2025-38335.html
* https://www.suse.com/security/cve/CVE-2025-38336.html
* https://www.suse.com/security/cve/CVE-2025-38337.html
* https://www.suse.com/security/cve/CVE-2025-38338.html
* https://www.suse.com/security/cve/CVE-2025-38339.html
* https://www.suse.com/security/cve/CVE-2025-38341.html
* https://www.suse.com/security/cve/CVE-2025-38342.html
* https://www.suse.com/security/cve/CVE-2025-38343.html
* https://www.suse.com/security/cve/CVE-2025-38344.html
* https://www.suse.com/security/cve/CVE-2025-38345.html
* https://www.suse.com/security/cve/CVE-2025-38348.html
* https://www.suse.com/security/cve/CVE-2025-38349.html
* https://www.suse.com/security/cve/CVE-2025-38350.html
* https://www.suse.com/security/cve/CVE-2025-38351.html
* https://www.suse.com/security/cve/CVE-2025-38352.html
* https://www.suse.com/security/cve/CVE-2025-38353.html
* https://www.suse.com/security/cve/CVE-2025-38354.html
* https://www.suse.com/security/cve/CVE-2025-38355.html
* https://www.suse.com/security/cve/CVE-2025-38356.html
* https://www.suse.com/security/cve/CVE-2025-38359.html
* https://www.suse.com/security/cve/CVE-2025-38360.html
* https://www.suse.com/security/cve/CVE-2025-38361.html
* https://www.suse.com/security/cve/CVE-2025-38362.html
* https://www.suse.com/security/cve/CVE-2025-38363.html
* https://www.suse.com/security/cve/CVE-2025-38364.html
* https://www.suse.com/security/cve/CVE-2025-38365.html
* https://www.suse.com/security/cve/CVE-2025-38368.html
* https://www.suse.com/security/cve/CVE-2025-38369.html
* https://www.suse.com/security/cve/CVE-2025-38371.html
* https://www.suse.com/security/cve/CVE-2025-38372.html
* https://www.suse.com/security/cve/CVE-2025-38373.html
* https://www.suse.com/security/cve/CVE-2025-38374.html
* https://www.suse.com/security/cve/CVE-2025-38375.html
* https://www.suse.com/security/cve/CVE-2025-38376.html
* https://www.suse.com/security/cve/CVE-2025-38377.html
* https://www.suse.com/security/cve/CVE-2025-38380.html
* https://www.suse.com/security/cve/CVE-2025-38381.html
* https://www.suse.com/security/cve/CVE-2025-38382.html
* https://www.suse.com/security/cve/CVE-2025-38383.html
* https://www.suse.com/security/cve/CVE-2025-38384.html
* https://www.suse.com/security/cve/CVE-2025-38385.html
* https://www.suse.com/security/cve/CVE-2025-38386.html
* https://www.suse.com/security/cve/CVE-2025-38387.html
* https://www.suse.com/security/cve/CVE-2025-38389.html
* https://www.suse.com/security/cve/CVE-2025-38390.html
* https://www.suse.com/security/cve/CVE-2025-38391.html
* https://www.suse.com/security/cve/CVE-2025-38392.html
* https://www.suse.com/security/cve/CVE-2025-38393.html
* https://www.suse.com/security/cve/CVE-2025-38395.html
* https://www.suse.com/security/cve/CVE-2025-38396.html
* https://www.suse.com/security/cve/CVE-2025-38397.html
* https://www.suse.com/security/cve/CVE-2025-38399.html
* https://www.suse.com/security/cve/CVE-2025-38400.html
* https://www.suse.com/security/cve/CVE-2025-38401.html
* https://www.suse.com/security/cve/CVE-2025-38402.html
* https://www.suse.com/security/cve/CVE-2025-38403.html
* https://www.suse.com/security/cve/CVE-2025-38404.html
* https://www.suse.com/security/cve/CVE-2025-38405.html
* https://www.suse.com/security/cve/CVE-2025-38406.html
* https://www.suse.com/security/cve/CVE-2025-38408.html
* https://www.suse.com/security/cve/CVE-2025-38409.html
* https://www.suse.com/security/cve/CVE-2025-38410.html
* https://www.suse.com/security/cve/CVE-2025-38412.html
* https://www.suse.com/security/cve/CVE-2025-38413.html
* https://www.suse.com/security/cve/CVE-2025-38414.html
* https://www.suse.com/security/cve/CVE-2025-38415.html
* https://www.suse.com/security/cve/CVE-2025-38416.html
* https://www.suse.com/security/cve/CVE-2025-38417.html
* https://www.suse.com/security/cve/CVE-2025-38418.html
* https://www.suse.com/security/cve/CVE-2025-38419.html
* https://www.suse.com/security/cve/CVE-2025-38420.html
* https://www.suse.com/security/cve/CVE-2025-38421.html
* https://www.suse.com/security/cve/CVE-2025-38424.html
* https://www.suse.com/security/cve/CVE-2025-38425.html
* https://www.suse.com/security/cve/CVE-2025-38426.html
* https://www.suse.com/security/cve/CVE-2025-38427.html
* https://www.suse.com/security/cve/CVE-2025-38428.html
* https://www.suse.com/security/cve/CVE-2025-38429.html
* https://www.suse.com/security/cve/CVE-2025-38430.html
* https://www.suse.com/security/cve/CVE-2025-38436.html
* https://www.suse.com/security/cve/CVE-2025-38438.html
* https://www.suse.com/security/cve/CVE-2025-38439.html
* https://www.suse.com/security/cve/CVE-2025-38440.html
* https://www.suse.com/security/cve/CVE-2025-38441.html
* https://www.suse.com/security/cve/CVE-2025-38443.html
* https://www.suse.com/security/cve/CVE-2025-38444.html
* https://www.suse.com/security/cve/CVE-2025-38445.html
* https://www.suse.com/security/cve/CVE-2025-38446.html
* https://www.suse.com/security/cve/CVE-2025-38448.html
* https://www.suse.com/security/cve/CVE-2025-38449.html
* https://www.suse.com/security/cve/CVE-2025-38450.html
* https://www.suse.com/security/cve/CVE-2025-38451.html
* https://www.suse.com/security/cve/CVE-2025-38453.html
* https://www.suse.com/security/cve/CVE-2025-38454.html
* https://www.suse.com/security/cve/CVE-2025-38455.html
* https://www.suse.com/security/cve/CVE-2025-38456.html
* https://www.suse.com/security/cve/CVE-2025-38457.html
* https://www.suse.com/security/cve/CVE-2025-38458.html
* https://www.suse.com/security/cve/CVE-2025-38459.html
* https://www.suse.com/security/cve/CVE-2025-38460.html
* https://www.suse.com/security/cve/CVE-2025-38461.html
* https://www.suse.com/security/cve/CVE-2025-38462.html
* https://www.suse.com/security/cve/CVE-2025-38463.html
* https://www.suse.com/security/cve/CVE-2025-38464.html
* https://www.suse.com/security/cve/CVE-2025-38465.html
* https://www.suse.com/security/cve/CVE-2025-38466.html
* https://www.suse.com/security/cve/CVE-2025-38467.html
* https://www.suse.com/security/cve/CVE-2025-38468.html
* https://www.suse.com/security/cve/CVE-2025-38470.html
* https://www.suse.com/security/cve/CVE-2025-38472.html
* https://www.suse.com/security/cve/CVE-2025-38473.html
* https://www.suse.com/security/cve/CVE-2025-38474.html
* https://www.suse.com/security/cve/CVE-2025-38475.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38477.html
* https://www.suse.com/security/cve/CVE-2025-38478.html
* https://www.suse.com/security/cve/CVE-2025-38480.html
* https://www.suse.com/security/cve/CVE-2025-38481.html
* https://www.suse.com/security/cve/CVE-2025-38482.html
* https://www.suse.com/security/cve/CVE-2025-38483.html
* https://www.suse.com/security/cve/CVE-2025-38484.html
* https://www.suse.com/security/cve/CVE-2025-38485.html
* https://www.suse.com/security/cve/CVE-2025-38487.html
* https://www.suse.com/security/cve/CVE-2025-38488.html
* https://www.suse.com/security/cve/CVE-2025-38489.html
* https://www.suse.com/security/cve/CVE-2025-38490.html
* https://www.suse.com/security/cve/CVE-2025-38491.html
* https://www.suse.com/security/cve/CVE-2025-38493.html
* https://www.suse.com/security/cve/CVE-2025-38494.html
* https://www.suse.com/security/cve/CVE-2025-38495.html
* https://www.suse.com/security/cve/CVE-2025-38496.html
* https://www.suse.com/security/cve/CVE-2025-38497.html
* https://www.suse.com/security/cve/CVE-2025-38499.html
* https://www.suse.com/security/cve/CVE-2025-38500.html
* https://www.suse.com/security/cve/CVE-2025-38503.html
* https://www.suse.com/security/cve/CVE-2025-38506.html
* https://www.suse.com/security/cve/CVE-2025-38508.html
* https://www.suse.com/security/cve/CVE-2025-38514.html
* https://www.suse.com/security/cve/CVE-2025-38524.html
* https://www.suse.com/security/cve/CVE-2025-38526.html
* https://www.suse.com/security/cve/CVE-2025-38527.html
* https://www.suse.com/security/cve/CVE-2025-38528.html
* https://www.suse.com/security/cve/CVE-2025-38531.html
* https://www.suse.com/security/cve/CVE-2025-38533.html
* https://www.suse.com/security/cve/CVE-2025-38539.html
* https://www.suse.com/security/cve/CVE-2025-38544.html
* https://www.suse.com/security/cve/CVE-2025-38545.html
* https://www.suse.com/security/cve/CVE-2025-38546.html
* https://www.suse.com/security/cve/CVE-2025-38549.html
* https://www.suse.com/security/cve/CVE-2025-38552.html
* https://www.suse.com/security/cve/CVE-2025-38553.html
* https://www.suse.com/security/cve/CVE-2025-38554.html
* https://www.suse.com/security/cve/CVE-2025-38555.html
* https://www.suse.com/security/cve/CVE-2025-38556.html
* https://www.suse.com/security/cve/CVE-2025-38557.html
* https://www.suse.com/security/cve/CVE-2025-38559.html
* https://www.suse.com/security/cve/CVE-2025-38560.html
* https://www.suse.com/security/cve/CVE-2025-38563.html
* https://www.suse.com/security/cve/CVE-2025-38564.html
* https://www.suse.com/security/cve/CVE-2025-38565.html
* https://www.suse.com/security/cve/CVE-2025-38566.html
* https://www.suse.com/security/cve/CVE-2025-38568.html
* https://www.suse.com/security/cve/CVE-2025-38571.html
* https://www.suse.com/security/cve/CVE-2025-38572.html
* https://www.suse.com/security/cve/CVE-2025-38573.html
* https://www.suse.com/security/cve/CVE-2025-38574.html
* https://www.suse.com/security/cve/CVE-2025-38576.html
* https://www.suse.com/security/cve/CVE-2025-38581.html
* https://www.suse.com/security/cve/CVE-2025-38582.html
* https://www.suse.com/security/cve/CVE-2025-38583.html
* https://www.suse.com/security/cve/CVE-2025-38584.html
* https://www.suse.com/security/cve/CVE-2025-38585.html
* https://www.suse.com/security/cve/CVE-2025-38586.html
* https://www.suse.com/security/cve/CVE-2025-38587.html
* https://www.suse.com/security/cve/CVE-2025-38588.html
* https://www.suse.com/security/cve/CVE-2025-38591.html
* https://www.suse.com/security/cve/CVE-2025-38593.html
* https://www.suse.com/security/cve/CVE-2025-38595.html
* https://www.suse.com/security/cve/CVE-2025-38597.html
* https://www.suse.com/security/cve/CVE-2025-38601.html
* https://www.suse.com/security/cve/CVE-2025-38602.html
* https://www.suse.com/security/cve/CVE-2025-38604.html
* https://www.suse.com/security/cve/CVE-2025-38605.html
* https://www.suse.com/security/cve/CVE-2025-38608.html
* https://www.suse.com/security/cve/CVE-2025-38609.html
* https://www.suse.com/security/cve/CVE-2025-38610.html
* https://www.suse.com/security/cve/CVE-2025-38612.html
* https://www.suse.com/security/cve/CVE-2025-38614.html
* https://www.suse.com/security/cve/CVE-2025-38616.html
* https://www.suse.com/security/cve/CVE-2025-38617.html
* https://www.suse.com/security/cve/CVE-2025-38618.html
* https://www.suse.com/security/cve/CVE-2025-38619.html
* https://www.suse.com/security/cve/CVE-2025-38621.html
* https://www.suse.com/security/cve/CVE-2025-38622.html
* https://www.suse.com/security/cve/CVE-2025-38623.html
* https://www.suse.com/security/cve/CVE-2025-38624.html
* https://www.suse.com/security/cve/CVE-2025-38628.html
* https://www.suse.com/security/cve/CVE-2025-38630.html
* https://www.suse.com/security/cve/CVE-2025-38631.html
* https://www.suse.com/security/cve/CVE-2025-38632.html
* https://www.suse.com/security/cve/CVE-2025-38634.html
* https://www.suse.com/security/cve/CVE-2025-38635.html
* https://www.suse.com/security/cve/CVE-2025-38639.html
* https://www.suse.com/security/cve/CVE-2025-38640.html
* https://www.suse.com/security/cve/CVE-2025-38643.html
* https://www.suse.com/security/cve/CVE-2025-38644.html
* https://www.suse.com/security/cve/CVE-2025-38646.html
* https://www.suse.com/security/cve/CVE-2025-38648.html
* https://www.suse.com/security/cve/CVE-2025-38656.html
* https://www.suse.com/security/cve/CVE-2025-38658.html
* https://www.suse.com/security/cve/CVE-2025-38659.html
* https://www.suse.com/security/cve/CVE-2025-38660.html
* https://www.suse.com/security/cve/CVE-2025-38662.html
* https://www.suse.com/security/cve/CVE-2025-38664.html
* https://www.suse.com/security/cve/CVE-2025-38665.html
* https://www.suse.com/security/cve/CVE-2025-38668.html
* https://www.suse.com/security/cve/CVE-2025-38670.html
* https://www.suse.com/security/cve/CVE-2025-38671.html
* https://www.suse.com/security/cve/CVE-2025-38676.html
* https://www.suse.com/security/cve/CVE-2025-38678.html
* https://www.suse.com/security/cve/CVE-2025-38679.html
* https://www.suse.com/security/cve/CVE-2025-38680.html
* https://www.suse.com/security/cve/CVE-2025-38681.html
* https://www.suse.com/security/cve/CVE-2025-38683.html
* https://www.suse.com/security/cve/CVE-2025-38684.html
* https://www.suse.com/security/cve/CVE-2025-38685.html
* https://www.suse.com/security/cve/CVE-2025-38686.html
* https://www.suse.com/security/cve/CVE-2025-38687.html
* https://www.suse.com/security/cve/CVE-2025-38691.html
* https://www.suse.com/security/cve/CVE-2025-38692.html
* https://www.suse.com/security/cve/CVE-2025-38693.html
* https://www.suse.com/security/cve/CVE-2025-38694.html
* https://www.suse.com/security/cve/CVE-2025-38695.html
* https://www.suse.com/security/cve/CVE-2025-38700.html
* https://www.suse.com/security/cve/CVE-2025-38701.html
* https://www.suse.com/security/cve/CVE-2025-38702.html
* https://www.suse.com/security/cve/CVE-2025-38703.html
* https://www.suse.com/security/cve/CVE-2025-38705.html
* https://www.suse.com/security/cve/CVE-2025-38706.html
* https://www.suse.com/security/cve/CVE-2025-38709.html
* https://www.suse.com/security/cve/CVE-2025-38710.html
* https://www.suse.com/security/cve/CVE-2025-38717.html
* https://www.suse.com/security/cve/CVE-2025-38721.html
* https://www.suse.com/security/cve/CVE-2025-38722.html
* https://www.suse.com/security/cve/CVE-2025-38724.html
* https://www.suse.com/security/cve/CVE-2025-38725.html
* https://www.suse.com/security/cve/CVE-2025-38727.html
* https://www.suse.com/security/cve/CVE-2025-38729.html
* https://www.suse.com/security/cve/CVE-2025-38730.html
* https://www.suse.com/security/cve/CVE-2025-38732.html
* https://www.suse.com/security/cve/CVE-2025-38733.html
* https://www.suse.com/security/cve/CVE-2025-38734.html
* https://www.suse.com/security/cve/CVE-2025-38735.html
* https://www.suse.com/security/cve/CVE-2025-38736.html
* https://www.suse.com/security/cve/CVE-2025-39673.html
* https://www.suse.com/security/cve/CVE-2025-39675.html
* https://www.suse.com/security/cve/CVE-2025-39677.html
* https://www.suse.com/security/cve/CVE-2025-39678.html
* https://www.suse.com/security/cve/CVE-2025-39679.html
* https://www.suse.com/security/cve/CVE-2025-39681.html
* https://www.suse.com/security/cve/CVE-2025-39682.html
* https://www.suse.com/security/cve/CVE-2025-39683.html
* https://www.suse.com/security/cve/CVE-2025-39684.html
* https://www.suse.com/security/cve/CVE-2025-39685.html
* https://www.suse.com/security/cve/CVE-2025-39686.html
* https://www.suse.com/security/cve/CVE-2025-39687.html
* https://www.suse.com/security/cve/CVE-2025-39691.html
* https://www.suse.com/security/cve/CVE-2025-39693.html
* https://www.suse.com/security/cve/CVE-2025-39694.html
* https://www.suse.com/security/cve/CVE-2025-39695.html
* https://www.suse.com/security/cve/CVE-2025-39697.html
* https://www.suse.com/security/cve/CVE-2025-39698.html
* https://www.suse.com/security/cve/CVE-2025-39700.html
* https://www.suse.com/security/cve/CVE-2025-39701.html
* https://www.suse.com/security/cve/CVE-2025-39703.html
* https://www.suse.com/security/cve/CVE-2025-39705.html
* https://www.suse.com/security/cve/CVE-2025-39706.html
* https://www.suse.com/security/cve/CVE-2025-39707.html
* https://www.suse.com/security/cve/CVE-2025-39709.html
* https://www.suse.com/security/cve/CVE-2025-39710.html
* https://www.suse.com/security/cve/CVE-2025-39711.html
* https://www.suse.com/security/cve/CVE-2025-39712.html
* https://www.suse.com/security/cve/CVE-2025-39713.html
* https://www.suse.com/security/cve/CVE-2025-39714.html
* https://www.suse.com/security/cve/CVE-2025-39718.html
* https://www.suse.com/security/cve/CVE-2025-39719.html
* https://www.suse.com/security/cve/CVE-2025-39721.html
* https://www.suse.com/security/cve/CVE-2025-39722.html
* https://www.suse.com/security/cve/CVE-2025-39723.html
* https://www.suse.com/security/cve/CVE-2025-39724.html
* https://www.suse.com/security/cve/CVE-2025-39726.html
* https://www.suse.com/security/cve/CVE-2025-39727.html
* https://www.suse.com/security/cve/CVE-2025-39730.html
* https://www.suse.com/security/cve/CVE-2025-39732.html
* https://www.suse.com/security/cve/CVE-2025-39738.html
* https://www.suse.com/security/cve/CVE-2025-39739.html
* https://www.suse.com/security/cve/CVE-2025-39742.html
* https://www.suse.com/security/cve/CVE-2025-39744.html
* https://www.suse.com/security/cve/CVE-2025-39746.html
* https://www.suse.com/security/cve/CVE-2025-39747.html
* https://www.suse.com/security/cve/CVE-2025-39748.html
* https://www.suse.com/security/cve/CVE-2025-39749.html
* https://www.suse.com/security/cve/CVE-2025-39750.html
* https://www.suse.com/security/cve/CVE-2025-39751.html
* https://www.suse.com/security/cve/CVE-2025-39754.html
* https://www.suse.com/security/cve/CVE-2025-39757.html
* https://www.suse.com/security/cve/CVE-2025-39758.html
* https://www.suse.com/security/cve/CVE-2025-39759.html
* https://www.suse.com/security/cve/CVE-2025-39760.html
* https://www.suse.com/security/cve/CVE-2025-39761.html
* https://www.suse.com/security/cve/CVE-2025-39763.html
* https://www.suse.com/security/cve/CVE-2025-39764.html
* https://www.suse.com/security/cve/CVE-2025-39765.html
* https://www.suse.com/security/cve/CVE-2025-39766.html
* https://www.suse.com/security/cve/CVE-2025-39770.html
* https://www.suse.com/security/cve/CVE-2025-39772.html
* https://www.suse.com/security/cve/CVE-2025-39773.html
* https://www.suse.com/security/cve/CVE-2025-39775.html
* https://www.suse.com/security/cve/CVE-2025-39782.html
* https://www.suse.com/security/cve/CVE-2025-39783.html
* https://www.suse.com/security/cve/CVE-2025-39787.html
* https://www.suse.com/security/cve/CVE-2025-39788.html
* https://www.suse.com/security/cve/CVE-2025-39790.html
* https://www.suse.com/security/cve/CVE-2025-39791.html
* https://www.suse.com/security/cve/CVE-2025-39792.html
* https://www.suse.com/security/cve/CVE-2025-39797.html
* https://www.suse.com/security/cve/CVE-2025-39798.html
* https://www.suse.com/security/cve/CVE-2025-39800.html
* https://www.suse.com/security/cve/CVE-2025-39801.html
* https://www.suse.com/security/cve/CVE-2025-39806.html
* https://www.suse.com/security/cve/CVE-2025-39807.html
* https://www.suse.com/security/cve/CVE-2025-39808.html
* https://www.suse.com/security/cve/CVE-2025-39810.html
* https://www.suse.com/security/cve/CVE-2025-39811.html
* https://www.suse.com/security/cve/CVE-2025-39813.html
* https://www.suse.com/security/cve/CVE-2025-39816.html
* https://www.suse.com/security/cve/CVE-2025-39823.html
* https://www.suse.com/security/cve/CVE-2025-39824.html
* https://www.suse.com/security/cve/CVE-2025-39825.html
* https://www.suse.com/security/cve/CVE-2025-39826.html
* https://www.suse.com/security/cve/CVE-2025-39827.html
* https://www.suse.com/security/cve/CVE-2025-39828.html
* https://www.suse.com/security/cve/CVE-2025-39830.html
* https://www.suse.com/security/cve/CVE-2025-39832.html
* https://www.suse.com/security/cve/CVE-2025-39833.html
* https://www.suse.com/security/cve/CVE-2025-39834.html
* https://www.suse.com/security/cve/CVE-2025-39835.html
* https://www.suse.com/security/cve/CVE-2025-39836.html
* https://www.suse.com/security/cve/CVE-2025-39838.html
* https://www.suse.com/security/cve/CVE-2025-39839.html
* https://www.suse.com/security/cve/CVE-2025-39841.html
* https://www.suse.com/security/cve/CVE-2025-39842.html
* https://www.suse.com/security/cve/CVE-2025-39844.html
* https://www.suse.com/security/cve/CVE-2025-39845.html
* https://www.suse.com/security/cve/CVE-2025-39847.html
* https://www.suse.com/security/cve/CVE-2025-39848.html
* https://www.suse.com/security/cve/CVE-2025-39849.html
* https://www.suse.com/security/cve/CVE-2025-39850.html
* https://www.suse.com/security/cve/CVE-2025-39851.html
* https://www.suse.com/security/cve/CVE-2025-39852.html
* https://www.suse.com/security/cve/CVE-2025-39853.html
* https://www.suse.com/security/cve/CVE-2025-39854.html
* https://www.suse.com/security/cve/CVE-2025-39857.html
* https://www.suse.com/security/cve/CVE-2025-39860.html
* https://www.suse.com/security/cve/CVE-2025-39861.html
* https://www.suse.com/security/cve/CVE-2025-39863.html
* https://www.suse.com/security/cve/CVE-2025-39864.html
* https://www.suse.com/security/cve/CVE-2025-39865.html
* https://www.suse.com/security/cve/CVE-2025-39869.html
* https://www.suse.com/security/cve/CVE-2025-39870.html
* https://www.suse.com/security/cve/CVE-2025-39871.html
* https://www.suse.com/security/cve/CVE-2025-39873.html
* https://www.suse.com/security/cve/CVE-2025-39875.html
* https://www.suse.com/security/cve/CVE-2025-39877.html
* https://www.suse.com/security/cve/CVE-2025-39882.html
* https://www.suse.com/security/cve/CVE-2025-39884.html
* https://www.suse.com/security/cve/CVE-2025-39885.html
* https://www.suse.com/security/cve/CVE-2025-39889.html
* https://www.suse.com/security/cve/CVE-2025-39890.html
* https://www.suse.com/security/cve/CVE-2025-39891.html
* https://www.suse.com/security/cve/CVE-2025-39896.html
* https://www.suse.com/security/cve/CVE-2025-39898.html
* https://www.suse.com/security/cve/CVE-2025-39899.html
* https://www.suse.com/security/cve/CVE-2025-39900.html
* https://www.suse.com/security/cve/CVE-2025-39902.html
* https://www.suse.com/security/cve/CVE-2025-39907.html
* https://www.suse.com/security/cve/CVE-2025-39909.html
* https://www.suse.com/security/cve/CVE-2025-39916.html
* https://www.suse.com/security/cve/CVE-2025-39918.html
* https://www.suse.com/security/cve/CVE-2025-39922.html
* https://www.suse.com/security/cve/CVE-2025-39923.html
* https://www.suse.com/security/cve/CVE-2025-39925.html
* https://www.suse.com/security/cve/CVE-2025-39926.html
* https://www.suse.com/security/cve/CVE-2025-39931.html
* https://www.suse.com/security/cve/CVE-2025-39934.html
* https://www.suse.com/security/cve/CVE-2025-39937.html
* https://www.suse.com/security/cve/CVE-2025-39938.html
* https://www.suse.com/security/cve/CVE-2025-39945.html
* https://www.suse.com/security/cve/CVE-2025-39946.html
* https://www.suse.com/security/cve/CVE-2025-39952.html
* https://www.suse.com/security/cve/CVE-2025-39957.html
* https://www.suse.com/security/cve/CVE-2025-40300.html
* https://www.suse.com/security/cve/CVE-2026-38264.html
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1230062
* https://bugzilla.suse.com/show_bug.cgi?id=1234634
* https://bugzilla.suse.com/show_bug.cgi?id=1234693
* https://bugzilla.suse.com/show_bug.cgi?id=1234863
* https://bugzilla.suse.com/show_bug.cgi?id=1235953
* https://bugzilla.suse.com/show_bug.cgi?id=1236897
* https://bugzilla.suse.com/show_bug.cgi?id=1237108
* https://bugzilla.suse.com/show_bug.cgi?id=1237131
* https://bugzilla.suse.com/show_bug.cgi?id=1237542
* https://bugzilla.suse.com/show_bug.cgi?id=1237776
* https://bugzilla.suse.com/show_bug.cgi?id=1238972
* https://bugzilla.suse.com/show_bug.cgi?id=1239206
* https://bugzilla.suse.com/show_bug.cgi?id=1240324
* https://bugzilla.suse.com/show_bug.cgi?id=1240696
* https://bugzilla.suse.com/show_bug.cgi?id=1240966
* https://bugzilla.suse.com/show_bug.cgi?id=1240998
* https://bugzilla.suse.com/show_bug.cgi?id=1241166
* https://bugzilla.suse.com/show_bug.cgi?id=1241353
* https://bugzilla.suse.com/show_bug.cgi?id=1241403
* https://bugzilla.suse.com/show_bug.cgi?id=1241435
* https://bugzilla.suse.com/show_bug.cgi?id=1242034
* https://bugzilla.suse.com/show_bug.cgi?id=1242086
* https://bugzilla.suse.com/show_bug.cgi?id=1242414
* https://bugzilla.suse.com/show_bug.cgi?id=1242782
* https://bugzilla.suse.com/show_bug.cgi?id=1242864
* https://bugzilla.suse.com/show_bug.cgi?id=1242965
* https://bugzilla.suse.com/show_bug.cgi?id=1242995
* https://bugzilla.suse.com/show_bug.cgi?id=1243000
* https://bugzilla.suse.com/show_bug.cgi?id=1243055
* https://bugzilla.suse.com/show_bug.cgi?id=1243068
* https://bugzilla.suse.com/show_bug.cgi?id=1243100
* https://bugzilla.suse.com/show_bug.cgi?id=1243112
* https://bugzilla.suse.com/show_bug.cgi?id=1243774
* https://bugzilla.suse.com/show_bug.cgi?id=1244309
* https://bugzilla.suse.com/show_bug.cgi?id=1244723
* https://bugzilla.suse.com/show_bug.cgi?id=1244734
* https://bugzilla.suse.com/show_bug.cgi?id=1244749
* https://bugzilla.suse.com/show_bug.cgi?id=1244792
* https://bugzilla.suse.com/show_bug.cgi?id=1244812
* https://bugzilla.suse.com/show_bug.cgi?id=1244930
* https://bugzilla.suse.com/show_bug.cgi?id=1244939
* https://bugzilla.suse.com/show_bug.cgi?id=1245000
* https://bugzilla.suse.com/show_bug.cgi?id=1245151
* https://bugzilla.suse.com/show_bug.cgi?id=1245193
* https://bugzilla.suse.com/show_bug.cgi?id=1245206
* https://bugzilla.suse.com/show_bug.cgi?id=1245216
* https://bugzilla.suse.com/show_bug.cgi?id=1245260
* https://bugzilla.suse.com/show_bug.cgi?id=1245410
* https://bugzilla.suse.com/show_bug.cgi?id=1245457
* https://bugzilla.suse.com/show_bug.cgi?id=1245504
* https://bugzilla.suse.com/show_bug.cgi?id=1245506
* https://bugzilla.suse.com/show_bug.cgi?id=1245508
* https://bugzilla.suse.com/show_bug.cgi?id=1245510
* https://bugzilla.suse.com/show_bug.cgi?id=1245596
* https://bugzilla.suse.com/show_bug.cgi?id=1245621
* https://bugzilla.suse.com/show_bug.cgi?id=1245630
* https://bugzilla.suse.com/show_bug.cgi?id=1245654
* https://bugzilla.suse.com/show_bug.cgi?id=1245657
* https://bugzilla.suse.com/show_bug.cgi?id=1245658
* https://bugzilla.suse.com/show_bug.cgi?id=1245659
* https://bugzilla.suse.com/show_bug.cgi?id=1245663
* https://bugzilla.suse.com/show_bug.cgi?id=1245664
* https://bugzilla.suse.com/show_bug.cgi?id=1245665
* https://bugzilla.suse.com/show_bug.cgi?id=1245666
* https://bugzilla.suse.com/show_bug.cgi?id=1245668
* https://bugzilla.suse.com/show_bug.cgi?id=1245669
* https://bugzilla.suse.com/show_bug.cgi?id=1245670
* https://bugzilla.suse.com/show_bug.cgi?id=1245671
* https://bugzilla.suse.com/show_bug.cgi?id=1245675
* https://bugzilla.suse.com/show_bug.cgi?id=1245676
* https://bugzilla.suse.com/show_bug.cgi?id=1245678
* https://bugzilla.suse.com/show_bug.cgi?id=1245683
* https://bugzilla.suse.com/show_bug.cgi?id=1245684
* https://bugzilla.suse.com/show_bug.cgi?id=1245686
* https://bugzilla.suse.com/show_bug.cgi?id=1245688
* https://bugzilla.suse.com/show_bug.cgi?id=1245690
* https://bugzilla.suse.com/show_bug.cgi?id=1245691
* https://bugzilla.suse.com/show_bug.cgi?id=1245695
* https://bugzilla.suse.com/show_bug.cgi?id=1245700
* https://bugzilla.suse.com/show_bug.cgi?id=1245703
* https://bugzilla.suse.com/show_bug.cgi?id=1245705
* https://bugzilla.suse.com/show_bug.cgi?id=1245710
* https://bugzilla.suse.com/show_bug.cgi?id=1245711
* https://bugzilla.suse.com/show_bug.cgi?id=1245713
* https://bugzilla.suse.com/show_bug.cgi?id=1245714
* https://bugzilla.suse.com/show_bug.cgi?id=1245715
* https://bugzilla.suse.com/show_bug.cgi?id=1245717
* https://bugzilla.suse.com/show_bug.cgi?id=1245719
* https://bugzilla.suse.com/show_bug.cgi?id=1245721
* https://bugzilla.suse.com/show_bug.cgi?id=1245723
* https://bugzilla.suse.com/show_bug.cgi?id=1245726
* https://bugzilla.suse.com/show_bug.cgi?id=1245728
* https://bugzilla.suse.com/show_bug.cgi?id=1245729
* https://bugzilla.suse.com/show_bug.cgi?id=1245730
* https://bugzilla.suse.com/show_bug.cgi?id=1245731
* https://bugzilla.suse.com/show_bug.cgi?id=1245735
* https://bugzilla.suse.com/show_bug.cgi?id=1245737
* https://bugzilla.suse.com/show_bug.cgi?id=1245744
* https://bugzilla.suse.com/show_bug.cgi?id=1245745
* https://bugzilla.suse.com/show_bug.cgi?id=1245746
* https://bugzilla.suse.com/show_bug.cgi?id=1245747
* https://bugzilla.suse.com/show_bug.cgi?id=1245748
* https://bugzilla.suse.com/show_bug.cgi?id=1245749
* https://bugzilla.suse.com/show_bug.cgi?id=1245751
* https://bugzilla.suse.com/show_bug.cgi?id=1245757
* https://bugzilla.suse.com/show_bug.cgi?id=1245763
* https://bugzilla.suse.com/show_bug.cgi?id=1245765
* https://bugzilla.suse.com/show_bug.cgi?id=1245767
* https://bugzilla.suse.com/show_bug.cgi?id=1245769
* https://bugzilla.suse.com/show_bug.cgi?id=1245777
* https://bugzilla.suse.com/show_bug.cgi?id=1245780
* https://bugzilla.suse.com/show_bug.cgi?id=1245781
* https://bugzilla.suse.com/show_bug.cgi?id=1245784
* https://bugzilla.suse.com/show_bug.cgi?id=1245785
* https://bugzilla.suse.com/show_bug.cgi?id=1245787
* https://bugzilla.suse.com/show_bug.cgi?id=1245812
* https://bugzilla.suse.com/show_bug.cgi?id=1245814
* https://bugzilla.suse.com/show_bug.cgi?id=1245815
* https://bugzilla.suse.com/show_bug.cgi?id=1245937
* https://bugzilla.suse.com/show_bug.cgi?id=1245945
* https://bugzilla.suse.com/show_bug.cgi?id=1245952
* https://bugzilla.suse.com/show_bug.cgi?id=1245955
* https://bugzilla.suse.com/show_bug.cgi?id=1245956
* https://bugzilla.suse.com/show_bug.cgi?id=1245963
* https://bugzilla.suse.com/show_bug.cgi?id=1245966
* https://bugzilla.suse.com/show_bug.cgi?id=1245970
* https://bugzilla.suse.com/show_bug.cgi?id=1245973
* https://bugzilla.suse.com/show_bug.cgi?id=1245976
* https://bugzilla.suse.com/show_bug.cgi?id=1245977
* https://bugzilla.suse.com/show_bug.cgi?id=1245986
* https://bugzilla.suse.com/show_bug.cgi?id=1246000
* https://bugzilla.suse.com/show_bug.cgi?id=1246002
* https://bugzilla.suse.com/show_bug.cgi?id=1246005
* https://bugzilla.suse.com/show_bug.cgi?id=1246008
* https://bugzilla.suse.com/show_bug.cgi?id=1246012
* https://bugzilla.suse.com/show_bug.cgi?id=1246022
* https://bugzilla.suse.com/show_bug.cgi?id=1246023
* https://bugzilla.suse.com/show_bug.cgi?id=1246031
* https://bugzilla.suse.com/show_bug.cgi?id=1246034
* https://bugzilla.suse.com/show_bug.cgi?id=1246037
* https://bugzilla.suse.com/show_bug.cgi?id=1246041
* https://bugzilla.suse.com/show_bug.cgi?id=1246042
* https://bugzilla.suse.com/show_bug.cgi?id=1246047
* https://bugzilla.suse.com/show_bug.cgi?id=1246049
* https://bugzilla.suse.com/show_bug.cgi?id=1246050
* https://bugzilla.suse.com/show_bug.cgi?id=1246053
* https://bugzilla.suse.com/show_bug.cgi?id=1246054
* https://bugzilla.suse.com/show_bug.cgi?id=1246055
* https://bugzilla.suse.com/show_bug.cgi?id=1246057
* https://bugzilla.suse.com/show_bug.cgi?id=1246098
* https://bugzilla.suse.com/show_bug.cgi?id=1246109
* https://bugzilla.suse.com/show_bug.cgi?id=1246125
* https://bugzilla.suse.com/show_bug.cgi?id=1246166
* https://bugzilla.suse.com/show_bug.cgi?id=1246171
* https://bugzilla.suse.com/show_bug.cgi?id=1246176
* https://bugzilla.suse.com/show_bug.cgi?id=1246181
* https://bugzilla.suse.com/show_bug.cgi?id=1246183
* https://bugzilla.suse.com/show_bug.cgi?id=1246185
* https://bugzilla.suse.com/show_bug.cgi?id=1246186
* https://bugzilla.suse.com/show_bug.cgi?id=1246188
* https://bugzilla.suse.com/show_bug.cgi?id=1246190
* https://bugzilla.suse.com/show_bug.cgi?id=1246192
* https://bugzilla.suse.com/show_bug.cgi?id=1246193
* https://bugzilla.suse.com/show_bug.cgi?id=1246195
* https://bugzilla.suse.com/show_bug.cgi?id=1246220
* https://bugzilla.suse.com/show_bug.cgi?id=1246234
* https://bugzilla.suse.com/show_bug.cgi?id=1246236
* https://bugzilla.suse.com/show_bug.cgi?id=1246240
* https://bugzilla.suse.com/show_bug.cgi?id=1246243
* https://bugzilla.suse.com/show_bug.cgi?id=1246244
* https://bugzilla.suse.com/show_bug.cgi?id=1246245
* https://bugzilla.suse.com/show_bug.cgi?id=1246246
* https://bugzilla.suse.com/show_bug.cgi?id=1246248
* https://bugzilla.suse.com/show_bug.cgi?id=1246250
* https://bugzilla.suse.com/show_bug.cgi?id=1246252
* https://bugzilla.suse.com/show_bug.cgi?id=1246253
* https://bugzilla.suse.com/show_bug.cgi?id=1246255
* https://bugzilla.suse.com/show_bug.cgi?id=1246258
* https://bugzilla.suse.com/show_bug.cgi?id=1246259
* https://bugzilla.suse.com/show_bug.cgi?id=1246260
* https://bugzilla.suse.com/show_bug.cgi?id=1246262
* https://bugzilla.suse.com/show_bug.cgi?id=1246266
* https://bugzilla.suse.com/show_bug.cgi?id=1246268
* https://bugzilla.suse.com/show_bug.cgi?id=1246283
* https://bugzilla.suse.com/show_bug.cgi?id=1246285
* https://bugzilla.suse.com/show_bug.cgi?id=1246286
* https://bugzilla.suse.com/show_bug.cgi?id=1246287
* https://bugzilla.suse.com/show_bug.cgi?id=1246290
* https://bugzilla.suse.com/show_bug.cgi?id=1246292
* https://bugzilla.suse.com/show_bug.cgi?id=1246293
* https://bugzilla.suse.com/show_bug.cgi?id=1246295
* https://bugzilla.suse.com/show_bug.cgi?id=1246297
* https://bugzilla.suse.com/show_bug.cgi?id=1246333
* https://bugzilla.suse.com/show_bug.cgi?id=1246334
* https://bugzilla.suse.com/show_bug.cgi?id=1246337
* https://bugzilla.suse.com/show_bug.cgi?id=1246342
* https://bugzilla.suse.com/show_bug.cgi?id=1246349
* https://bugzilla.suse.com/show_bug.cgi?id=1246351
* https://bugzilla.suse.com/show_bug.cgi?id=1246353
* https://bugzilla.suse.com/show_bug.cgi?id=1246354
* https://bugzilla.suse.com/show_bug.cgi?id=1246358
* https://bugzilla.suse.com/show_bug.cgi?id=1246364
* https://bugzilla.suse.com/show_bug.cgi?id=1246366
* https://bugzilla.suse.com/show_bug.cgi?id=1246370
* https://bugzilla.suse.com/show_bug.cgi?id=1246375
* https://bugzilla.suse.com/show_bug.cgi?id=1246376
* https://bugzilla.suse.com/show_bug.cgi?id=1246385
* https://bugzilla.suse.com/show_bug.cgi?id=1246386
* https://bugzilla.suse.com/show_bug.cgi?id=1246387
* https://bugzilla.suse.com/show_bug.cgi?id=1246438
* https://bugzilla.suse.com/show_bug.cgi?id=1246443
* https://bugzilla.suse.com/show_bug.cgi?id=1246444
* https://bugzilla.suse.com/show_bug.cgi?id=1246447
* https://bugzilla.suse.com/show_bug.cgi?id=1246450
* https://bugzilla.suse.com/show_bug.cgi?id=1246453
* https://bugzilla.suse.com/show_bug.cgi?id=1246473
* https://bugzilla.suse.com/show_bug.cgi?id=1246490
* https://bugzilla.suse.com/show_bug.cgi?id=1246509
* https://bugzilla.suse.com/show_bug.cgi?id=1246547
* https://bugzilla.suse.com/show_bug.cgi?id=1246631
* https://bugzilla.suse.com/show_bug.cgi?id=1246651
* https://bugzilla.suse.com/show_bug.cgi?id=1246688
* https://bugzilla.suse.com/show_bug.cgi?id=1246777
* https://bugzilla.suse.com/show_bug.cgi?id=1246781
* https://bugzilla.suse.com/show_bug.cgi?id=1246782
* https://bugzilla.suse.com/show_bug.cgi?id=1246868
* https://bugzilla.suse.com/show_bug.cgi?id=1246896
* https://bugzilla.suse.com/show_bug.cgi?id=1246911
* https://bugzilla.suse.com/show_bug.cgi?id=1246979
* https://bugzilla.suse.com/show_bug.cgi?id=1247018
* https://bugzilla.suse.com/show_bug.cgi?id=1247020
* https://bugzilla.suse.com/show_bug.cgi?id=1247022
* https://bugzilla.suse.com/show_bug.cgi?id=1247023
* https://bugzilla.suse.com/show_bug.cgi?id=1247024
* https://bugzilla.suse.com/show_bug.cgi?id=1247027
* https://bugzilla.suse.com/show_bug.cgi?id=1247028
* https://bugzilla.suse.com/show_bug.cgi?id=1247031
* https://bugzilla.suse.com/show_bug.cgi?id=1247033
* https://bugzilla.suse.com/show_bug.cgi?id=1247035
* https://bugzilla.suse.com/show_bug.cgi?id=1247061
* https://bugzilla.suse.com/show_bug.cgi?id=1247062
* https://bugzilla.suse.com/show_bug.cgi?id=1247064
* https://bugzilla.suse.com/show_bug.cgi?id=1247076
* https://bugzilla.suse.com/show_bug.cgi?id=1247078
* https://bugzilla.suse.com/show_bug.cgi?id=1247079
* https://bugzilla.suse.com/show_bug.cgi?id=1247088
* https://bugzilla.suse.com/show_bug.cgi?id=1247089
* https://bugzilla.suse.com/show_bug.cgi?id=1247091
* https://bugzilla.suse.com/show_bug.cgi?id=1247097
* https://bugzilla.suse.com/show_bug.cgi?id=1247098
* https://bugzilla.suse.com/show_bug.cgi?id=1247099
* https://bugzilla.suse.com/show_bug.cgi?id=1247101
* https://bugzilla.suse.com/show_bug.cgi?id=1247102
* https://bugzilla.suse.com/show_bug.cgi?id=1247103
* https://bugzilla.suse.com/show_bug.cgi?id=1247104
* https://bugzilla.suse.com/show_bug.cgi?id=1247112
* https://bugzilla.suse.com/show_bug.cgi?id=1247113
* https://bugzilla.suse.com/show_bug.cgi?id=1247116
* https://bugzilla.suse.com/show_bug.cgi?id=1247118
* https://bugzilla.suse.com/show_bug.cgi?id=1247119
* https://bugzilla.suse.com/show_bug.cgi?id=1247123
* https://bugzilla.suse.com/show_bug.cgi?id=1247125
* https://bugzilla.suse.com/show_bug.cgi?id=1247126
* https://bugzilla.suse.com/show_bug.cgi?id=1247128
* https://bugzilla.suse.com/show_bug.cgi?id=1247130
* https://bugzilla.suse.com/show_bug.cgi?id=1247131
* https://bugzilla.suse.com/show_bug.cgi?id=1247132
* https://bugzilla.suse.com/show_bug.cgi?id=1247136
* https://bugzilla.suse.com/show_bug.cgi?id=1247137
* https://bugzilla.suse.com/show_bug.cgi?id=1247138
* https://bugzilla.suse.com/show_bug.cgi?id=1247141
* https://bugzilla.suse.com/show_bug.cgi?id=1247143
* https://bugzilla.suse.com/show_bug.cgi?id=1247145
* https://bugzilla.suse.com/show_bug.cgi?id=1247146
* https://bugzilla.suse.com/show_bug.cgi?id=1247147
* https://bugzilla.suse.com/show_bug.cgi?id=1247149
* https://bugzilla.suse.com/show_bug.cgi?id=1247150
* https://bugzilla.suse.com/show_bug.cgi?id=1247151
* https://bugzilla.suse.com/show_bug.cgi?id=1247152
* https://bugzilla.suse.com/show_bug.cgi?id=1247153
* https://bugzilla.suse.com/show_bug.cgi?id=1247154
* https://bugzilla.suse.com/show_bug.cgi?id=1247155
* https://bugzilla.suse.com/show_bug.cgi?id=1247156
* https://bugzilla.suse.com/show_bug.cgi?id=1247157
* https://bugzilla.suse.com/show_bug.cgi?id=1247160
* https://bugzilla.suse.com/show_bug.cgi?id=1247162
* https://bugzilla.suse.com/show_bug.cgi?id=1247163
* https://bugzilla.suse.com/show_bug.cgi?id=1247164
* https://bugzilla.suse.com/show_bug.cgi?id=1247167
* https://bugzilla.suse.com/show_bug.cgi?id=1247169
* https://bugzilla.suse.com/show_bug.cgi?id=1247170
* https://bugzilla.suse.com/show_bug.cgi?id=1247171
* https://bugzilla.suse.com/show_bug.cgi?id=1247174
* https://bugzilla.suse.com/show_bug.cgi?id=1247176
* https://bugzilla.suse.com/show_bug.cgi?id=1247177
* https://bugzilla.suse.com/show_bug.cgi?id=1247178
* https://bugzilla.suse.com/show_bug.cgi?id=1247181
* https://bugzilla.suse.com/show_bug.cgi?id=1247209
* https://bugzilla.suse.com/show_bug.cgi?id=1247210
* https://bugzilla.suse.com/show_bug.cgi?id=1247220
* https://bugzilla.suse.com/show_bug.cgi?id=1247223
* https://bugzilla.suse.com/show_bug.cgi?id=1247227
* https://bugzilla.suse.com/show_bug.cgi?id=1247229
* https://bugzilla.suse.com/show_bug.cgi?id=1247231
* https://bugzilla.suse.com/show_bug.cgi?id=1247233
* https://bugzilla.suse.com/show_bug.cgi?id=1247234
* https://bugzilla.suse.com/show_bug.cgi?id=1247235
* https://bugzilla.suse.com/show_bug.cgi?id=1247236
* https://bugzilla.suse.com/show_bug.cgi?id=1247238
* https://bugzilla.suse.com/show_bug.cgi?id=1247239
* https://bugzilla.suse.com/show_bug.cgi?id=1247241
* https://bugzilla.suse.com/show_bug.cgi?id=1247243
* https://bugzilla.suse.com/show_bug.cgi?id=1247250
* https://bugzilla.suse.com/show_bug.cgi?id=1247251
* https://bugzilla.suse.com/show_bug.cgi?id=1247252
* https://bugzilla.suse.com/show_bug.cgi?id=1247253
* https://bugzilla.suse.com/show_bug.cgi?id=1247255
* https://bugzilla.suse.com/show_bug.cgi?id=1247262
* https://bugzilla.suse.com/show_bug.cgi?id=1247265
* https://bugzilla.suse.com/show_bug.cgi?id=1247270
* https://bugzilla.suse.com/show_bug.cgi?id=1247271
* https://bugzilla.suse.com/show_bug.cgi?id=1247273
* https://bugzilla.suse.com/show_bug.cgi?id=1247274
* https://bugzilla.suse.com/show_bug.cgi?id=1247276
* https://bugzilla.suse.com/show_bug.cgi?id=1247277
* https://bugzilla.suse.com/show_bug.cgi?id=1247278
* https://bugzilla.suse.com/show_bug.cgi?id=1247279
* https://bugzilla.suse.com/show_bug.cgi?id=1247280
* https://bugzilla.suse.com/show_bug.cgi?id=1247282
* https://bugzilla.suse.com/show_bug.cgi?id=1247283
* https://bugzilla.suse.com/show_bug.cgi?id=1247284
* https://bugzilla.suse.com/show_bug.cgi?id=1247285
* https://bugzilla.suse.com/show_bug.cgi?id=1247288
* https://bugzilla.suse.com/show_bug.cgi?id=1247289
* https://bugzilla.suse.com/show_bug.cgi?id=1247290
* https://bugzilla.suse.com/show_bug.cgi?id=1247293
* https://bugzilla.suse.com/show_bug.cgi?id=1247308
* https://bugzilla.suse.com/show_bug.cgi?id=1247311
* https://bugzilla.suse.com/show_bug.cgi?id=1247313
* https://bugzilla.suse.com/show_bug.cgi?id=1247314
* https://bugzilla.suse.com/show_bug.cgi?id=1247317
* https://bugzilla.suse.com/show_bug.cgi?id=1247325
* https://bugzilla.suse.com/show_bug.cgi?id=1247347
* https://bugzilla.suse.com/show_bug.cgi?id=1247348
* https://bugzilla.suse.com/show_bug.cgi?id=1247349
* https://bugzilla.suse.com/show_bug.cgi?id=1247366
* https://bugzilla.suse.com/show_bug.cgi?id=1247372
* https://bugzilla.suse.com/show_bug.cgi?id=1247376
* https://bugzilla.suse.com/show_bug.cgi?id=1247426
* https://bugzilla.suse.com/show_bug.cgi?id=1247437
* https://bugzilla.suse.com/show_bug.cgi?id=1247442
* https://bugzilla.suse.com/show_bug.cgi?id=1247483
* https://bugzilla.suse.com/show_bug.cgi?id=1247500
* https://bugzilla.suse.com/show_bug.cgi?id=1247712
* https://bugzilla.suse.com/show_bug.cgi?id=1247837
* https://bugzilla.suse.com/show_bug.cgi?id=1247838
* https://bugzilla.suse.com/show_bug.cgi?id=1247935
* https://bugzilla.suse.com/show_bug.cgi?id=1247936
* https://bugzilla.suse.com/show_bug.cgi?id=1247949
* https://bugzilla.suse.com/show_bug.cgi?id=1247950
* https://bugzilla.suse.com/show_bug.cgi?id=1247963
* https://bugzilla.suse.com/show_bug.cgi?id=1247976
* https://bugzilla.suse.com/show_bug.cgi?id=1248088
* https://bugzilla.suse.com/show_bug.cgi?id=1248111
* https://bugzilla.suse.com/show_bug.cgi?id=1248121
* https://bugzilla.suse.com/show_bug.cgi?id=1248183
* https://bugzilla.suse.com/show_bug.cgi?id=1248186
* https://bugzilla.suse.com/show_bug.cgi?id=1248190
* https://bugzilla.suse.com/show_bug.cgi?id=1248192
* https://bugzilla.suse.com/show_bug.cgi?id=1248194
* https://bugzilla.suse.com/show_bug.cgi?id=1248198
* https://bugzilla.suse.com/show_bug.cgi?id=1248199
* https://bugzilla.suse.com/show_bug.cgi?id=1248200
* https://bugzilla.suse.com/show_bug.cgi?id=1248202
* https://bugzilla.suse.com/show_bug.cgi?id=1248205
* https://bugzilla.suse.com/show_bug.cgi?id=1248211
* https://bugzilla.suse.com/show_bug.cgi?id=1248223
* https://bugzilla.suse.com/show_bug.cgi?id=1248224
* https://bugzilla.suse.com/show_bug.cgi?id=1248225
* https://bugzilla.suse.com/show_bug.cgi?id=1248230
* https://bugzilla.suse.com/show_bug.cgi?id=1248235
* https://bugzilla.suse.com/show_bug.cgi?id=1248255
* https://bugzilla.suse.com/show_bug.cgi?id=1248296
* https://bugzilla.suse.com/show_bug.cgi?id=1248297
* https://bugzilla.suse.com/show_bug.cgi?id=1248299
* https://bugzilla.suse.com/show_bug.cgi?id=1248302
* https://bugzilla.suse.com/show_bug.cgi?id=1248304
* https://bugzilla.suse.com/show_bug.cgi?id=1248306
* https://bugzilla.suse.com/show_bug.cgi?id=1248312
* https://bugzilla.suse.com/show_bug.cgi?id=1248333
* https://bugzilla.suse.com/show_bug.cgi?id=1248334
* https://bugzilla.suse.com/show_bug.cgi?id=1248337
* https://bugzilla.suse.com/show_bug.cgi?id=1248338
* https://bugzilla.suse.com/show_bug.cgi?id=1248340
* https://bugzilla.suse.com/show_bug.cgi?id=1248341
* https://bugzilla.suse.com/show_bug.cgi?id=1248343
* https://bugzilla.suse.com/show_bug.cgi?id=1248345
* https://bugzilla.suse.com/show_bug.cgi?id=1248349
* https://bugzilla.suse.com/show_bug.cgi?id=1248350
* https://bugzilla.suse.com/show_bug.cgi?id=1248354
* https://bugzilla.suse.com/show_bug.cgi?id=1248355
* https://bugzilla.suse.com/show_bug.cgi?id=1248357
* https://bugzilla.suse.com/show_bug.cgi?id=1248359
* https://bugzilla.suse.com/show_bug.cgi?id=1248361
* https://bugzilla.suse.com/show_bug.cgi?id=1248363
* https://bugzilla.suse.com/show_bug.cgi?id=1248365
* https://bugzilla.suse.com/show_bug.cgi?id=1248367
* https://bugzilla.suse.com/show_bug.cgi?id=1248368
* https://bugzilla.suse.com/show_bug.cgi?id=1248374
* https://bugzilla.suse.com/show_bug.cgi?id=1248377
* https://bugzilla.suse.com/show_bug.cgi?id=1248378
* https://bugzilla.suse.com/show_bug.cgi?id=1248380
* https://bugzilla.suse.com/show_bug.cgi?id=1248386
* https://bugzilla.suse.com/show_bug.cgi?id=1248390
* https://bugzilla.suse.com/show_bug.cgi?id=1248392
* https://bugzilla.suse.com/show_bug.cgi?id=1248395
* https://bugzilla.suse.com/show_bug.cgi?id=1248396
* https://bugzilla.suse.com/show_bug.cgi?id=1248399
* https://bugzilla.suse.com/show_bug.cgi?id=1248401
* https://bugzilla.suse.com/show_bug.cgi?id=1248511
* https://bugzilla.suse.com/show_bug.cgi?id=1248512
* https://bugzilla.suse.com/show_bug.cgi?id=1248573
* https://bugzilla.suse.com/show_bug.cgi?id=1248575
* https://bugzilla.suse.com/show_bug.cgi?id=1248577
* https://bugzilla.suse.com/show_bug.cgi?id=1248609
* https://bugzilla.suse.com/show_bug.cgi?id=1248610
* https://bugzilla.suse.com/show_bug.cgi?id=1248616
* https://bugzilla.suse.com/show_bug.cgi?id=1248617
* https://bugzilla.suse.com/show_bug.cgi?id=1248619
* https://bugzilla.suse.com/show_bug.cgi?id=1248621
* https://bugzilla.suse.com/show_bug.cgi?id=1248622
* https://bugzilla.suse.com/show_bug.cgi?id=1248624
* https://bugzilla.suse.com/show_bug.cgi?id=1248627
* https://bugzilla.suse.com/show_bug.cgi?id=1248628
* https://bugzilla.suse.com/show_bug.cgi?id=1248634
* https://bugzilla.suse.com/show_bug.cgi?id=1248635
* https://bugzilla.suse.com/show_bug.cgi?id=1248639
* https://bugzilla.suse.com/show_bug.cgi?id=1248643
* https://bugzilla.suse.com/show_bug.cgi?id=1248647
* https://bugzilla.suse.com/show_bug.cgi?id=1248648
* https://bugzilla.suse.com/show_bug.cgi?id=1248652
* https://bugzilla.suse.com/show_bug.cgi?id=1248655
* https://bugzilla.suse.com/show_bug.cgi?id=1248662
* https://bugzilla.suse.com/show_bug.cgi?id=1248664
* https://bugzilla.suse.com/show_bug.cgi?id=1248666
* https://bugzilla.suse.com/show_bug.cgi?id=1248669
* https://bugzilla.suse.com/show_bug.cgi?id=1248674
* https://bugzilla.suse.com/show_bug.cgi?id=1248681
* https://bugzilla.suse.com/show_bug.cgi?id=1248727
* https://bugzilla.suse.com/show_bug.cgi?id=1248728
* https://bugzilla.suse.com/show_bug.cgi?id=1248748
* https://bugzilla.suse.com/show_bug.cgi?id=1248754
* https://bugzilla.suse.com/show_bug.cgi?id=1248775
* https://bugzilla.suse.com/show_bug.cgi?id=1249022
* https://bugzilla.suse.com/show_bug.cgi?id=1249038
* https://bugzilla.suse.com/show_bug.cgi?id=1249060
* https://bugzilla.suse.com/show_bug.cgi?id=1249061
* https://bugzilla.suse.com/show_bug.cgi?id=1249062
* https://bugzilla.suse.com/show_bug.cgi?id=1249064
* https://bugzilla.suse.com/show_bug.cgi?id=1249065
* https://bugzilla.suse.com/show_bug.cgi?id=1249066
* https://bugzilla.suse.com/show_bug.cgi?id=1249126
* https://bugzilla.suse.com/show_bug.cgi?id=1249143
* https://bugzilla.suse.com/show_bug.cgi?id=1249156
* https://bugzilla.suse.com/show_bug.cgi?id=1249159
* https://bugzilla.suse.com/show_bug.cgi?id=1249160
* https://bugzilla.suse.com/show_bug.cgi?id=1249163
* https://bugzilla.suse.com/show_bug.cgi?id=1249164
* https://bugzilla.suse.com/show_bug.cgi?id=1249166
* https://bugzilla.suse.com/show_bug.cgi?id=1249167
* https://bugzilla.suse.com/show_bug.cgi?id=1249169
* https://bugzilla.suse.com/show_bug.cgi?id=1249170
* https://bugzilla.suse.com/show_bug.cgi?id=1249172
* https://bugzilla.suse.com/show_bug.cgi?id=1249176
* https://bugzilla.suse.com/show_bug.cgi?id=1249177
* https://bugzilla.suse.com/show_bug.cgi?id=1249182
* https://bugzilla.suse.com/show_bug.cgi?id=1249186
* https://bugzilla.suse.com/show_bug.cgi?id=1249190
* https://bugzilla.suse.com/show_bug.cgi?id=1249193
* https://bugzilla.suse.com/show_bug.cgi?id=1249195
* https://bugzilla.suse.com/show_bug.cgi?id=1249199
* https://bugzilla.suse.com/show_bug.cgi?id=1249201
* https://bugzilla.suse.com/show_bug.cgi?id=1249202
* https://bugzilla.suse.com/show_bug.cgi?id=1249203
* https://bugzilla.suse.com/show_bug.cgi?id=1249204
* https://bugzilla.suse.com/show_bug.cgi?id=1249206
* https://bugzilla.suse.com/show_bug.cgi?id=1249215
* https://bugzilla.suse.com/show_bug.cgi?id=1249220
* https://bugzilla.suse.com/show_bug.cgi?id=1249221
* https://bugzilla.suse.com/show_bug.cgi?id=1249254
* https://bugzilla.suse.com/show_bug.cgi?id=1249258
* https://bugzilla.suse.com/show_bug.cgi?id=1249262
* https://bugzilla.suse.com/show_bug.cgi?id=1249263
* https://bugzilla.suse.com/show_bug.cgi?id=1249265
* https://bugzilla.suse.com/show_bug.cgi?id=1249266
* https://bugzilla.suse.com/show_bug.cgi?id=1249269
* https://bugzilla.suse.com/show_bug.cgi?id=1249271
* https://bugzilla.suse.com/show_bug.cgi?id=1249272
* https://bugzilla.suse.com/show_bug.cgi?id=1249273
* https://bugzilla.suse.com/show_bug.cgi?id=1249274
* https://bugzilla.suse.com/show_bug.cgi?id=1249278
* https://bugzilla.suse.com/show_bug.cgi?id=1249279
* https://bugzilla.suse.com/show_bug.cgi?id=1249281
* https://bugzilla.suse.com/show_bug.cgi?id=1249282
* https://bugzilla.suse.com/show_bug.cgi?id=1249284
* https://bugzilla.suse.com/show_bug.cgi?id=1249285
* https://bugzilla.suse.com/show_bug.cgi?id=1249286
* https://bugzilla.suse.com/show_bug.cgi?id=1249288
* https://bugzilla.suse.com/show_bug.cgi?id=1249290
* https://bugzilla.suse.com/show_bug.cgi?id=1249292
* https://bugzilla.suse.com/show_bug.cgi?id=1249295
* https://bugzilla.suse.com/show_bug.cgi?id=1249296
* https://bugzilla.suse.com/show_bug.cgi?id=1249297
* https://bugzilla.suse.com/show_bug.cgi?id=1249299
* https://bugzilla.suse.com/show_bug.cgi?id=1249300
* https://bugzilla.suse.com/show_bug.cgi?id=1249301
* https://bugzilla.suse.com/show_bug.cgi?id=1249303
* https://bugzilla.suse.com/show_bug.cgi?id=1249304
* https://bugzilla.suse.com/show_bug.cgi?id=1249305
* https://bugzilla.suse.com/show_bug.cgi?id=1249306
* https://bugzilla.suse.com/show_bug.cgi?id=1249308
* https://bugzilla.suse.com/show_bug.cgi?id=1249309
* https://bugzilla.suse.com/show_bug.cgi?id=1249312
* https://bugzilla.suse.com/show_bug.cgi?id=1249313
* https://bugzilla.suse.com/show_bug.cgi?id=1249314
* https://bugzilla.suse.com/show_bug.cgi?id=1249315
* https://bugzilla.suse.com/show_bug.cgi?id=1249316
* https://bugzilla.suse.com/show_bug.cgi?id=1249318
* https://bugzilla.suse.com/show_bug.cgi?id=1249319
* https://bugzilla.suse.com/show_bug.cgi?id=1249320
* https://bugzilla.suse.com/show_bug.cgi?id=1249321
* https://bugzilla.suse.com/show_bug.cgi?id=1249322
* https://bugzilla.suse.com/show_bug.cgi?id=1249323
* https://bugzilla.suse.com/show_bug.cgi?id=1249324
* https://bugzilla.suse.com/show_bug.cgi?id=1249333
* https://bugzilla.suse.com/show_bug.cgi?id=1249334
* https://bugzilla.suse.com/show_bug.cgi?id=1249338
* https://bugzilla.suse.com/show_bug.cgi?id=1249346
* https://bugzilla.suse.com/show_bug.cgi?id=1249374
* https://bugzilla.suse.com/show_bug.cgi?id=1249413
* https://bugzilla.suse.com/show_bug.cgi?id=1249477
* https://bugzilla.suse.com/show_bug.cgi?id=1249478
* https://bugzilla.suse.com/show_bug.cgi?id=1249479
* https://bugzilla.suse.com/show_bug.cgi?id=1249486
* https://bugzilla.suse.com/show_bug.cgi?id=1249490
* https://bugzilla.suse.com/show_bug.cgi?id=1249494
* https://bugzilla.suse.com/show_bug.cgi?id=1249500
* https://bugzilla.suse.com/show_bug.cgi?id=1249504
* https://bugzilla.suse.com/show_bug.cgi?id=1249506
* https://bugzilla.suse.com/show_bug.cgi?id=1249508
* https://bugzilla.suse.com/show_bug.cgi?id=1249509
* https://bugzilla.suse.com/show_bug.cgi?id=1249510
* https://bugzilla.suse.com/show_bug.cgi?id=1249513
* https://bugzilla.suse.com/show_bug.cgi?id=1249515
* https://bugzilla.suse.com/show_bug.cgi?id=1249516
* https://bugzilla.suse.com/show_bug.cgi?id=1249522
* https://bugzilla.suse.com/show_bug.cgi?id=1249523
* https://bugzilla.suse.com/show_bug.cgi?id=1249524
* https://bugzilla.suse.com/show_bug.cgi?id=1249526
* https://bugzilla.suse.com/show_bug.cgi?id=1249533
* https://bugzilla.suse.com/show_bug.cgi?id=1249538
* https://bugzilla.suse.com/show_bug.cgi?id=1249540
* https://bugzilla.suse.com/show_bug.cgi?id=1249542
* https://bugzilla.suse.com/show_bug.cgi?id=1249545
* https://bugzilla.suse.com/show_bug.cgi?id=1249547
* https://bugzilla.suse.com/show_bug.cgi?id=1249548
* https://bugzilla.suse.com/show_bug.cgi?id=1249550
* https://bugzilla.suse.com/show_bug.cgi?id=1249552
* https://bugzilla.suse.com/show_bug.cgi?id=1249554
* https://bugzilla.suse.com/show_bug.cgi?id=1249562
* https://bugzilla.suse.com/show_bug.cgi?id=1249566
* https://bugzilla.suse.com/show_bug.cgi?id=1249587
* https://bugzilla.suse.com/show_bug.cgi?id=1249598
* https://bugzilla.suse.com/show_bug.cgi?id=1249604
* https://bugzilla.suse.com/show_bug.cgi?id=1249608
* https://bugzilla.suse.com/show_bug.cgi?id=1249615
* https://bugzilla.suse.com/show_bug.cgi?id=1249618
* https://bugzilla.suse.com/show_bug.cgi?id=1249774
* https://bugzilla.suse.com/show_bug.cgi?id=1249833
* https://bugzilla.suse.com/show_bug.cgi?id=1249887
* https://bugzilla.suse.com/show_bug.cgi?id=1249888
* https://bugzilla.suse.com/show_bug.cgi?id=1249901
* https://bugzilla.suse.com/show_bug.cgi?id=1249904
* https://bugzilla.suse.com/show_bug.cgi?id=1249906
* https://bugzilla.suse.com/show_bug.cgi?id=1249915
* https://bugzilla.suse.com/show_bug.cgi?id=1249974
* https://bugzilla.suse.com/show_bug.cgi?id=1249975
* https://bugzilla.suse.com/show_bug.cgi?id=1250002
* https://bugzilla.suse.com/show_bug.cgi?id=1250007
* https://bugzilla.suse.com/show_bug.cgi?id=1250021
* https://bugzilla.suse.com/show_bug.cgi?id=1250025
* https://bugzilla.suse.com/show_bug.cgi?id=1250028
* https://bugzilla.suse.com/show_bug.cgi?id=1250032
* https://bugzilla.suse.com/show_bug.cgi?id=1250087
* https://bugzilla.suse.com/show_bug.cgi?id=1250088
* https://bugzilla.suse.com/show_bug.cgi?id=1250119
* https://bugzilla.suse.com/show_bug.cgi?id=1250123
* https://bugzilla.suse.com/show_bug.cgi?id=1250124
* https://bugzilla.suse.com/show_bug.cgi?id=1250177
* https://bugzilla.suse.com/show_bug.cgi?id=1250179
* https://bugzilla.suse.com/show_bug.cgi?id=1250203
* https://bugzilla.suse.com/show_bug.cgi?id=1250204
* https://bugzilla.suse.com/show_bug.cgi?id=1250205
* https://bugzilla.suse.com/show_bug.cgi?id=1250237
* https://bugzilla.suse.com/show_bug.cgi?id=1250242
* https://bugzilla.suse.com/show_bug.cgi?id=1250247
* https://bugzilla.suse.com/show_bug.cgi?id=1250249
* https://bugzilla.suse.com/show_bug.cgi?id=1250251
* https://bugzilla.suse.com/show_bug.cgi?id=1250258
* https://bugzilla.suse.com/show_bug.cgi?id=1250262
* https://bugzilla.suse.com/show_bug.cgi?id=1250266
* https://bugzilla.suse.com/show_bug.cgi?id=1250267
* https://bugzilla.suse.com/show_bug.cgi?id=1250268
* https://bugzilla.suse.com/show_bug.cgi?id=1250275
* https://bugzilla.suse.com/show_bug.cgi?id=1250276
* https://bugzilla.suse.com/show_bug.cgi?id=1250281
* https://bugzilla.suse.com/show_bug.cgi?id=1250291
* https://bugzilla.suse.com/show_bug.cgi?id=1250292
* https://bugzilla.suse.com/show_bug.cgi?id=1250294
* https://bugzilla.suse.com/show_bug.cgi?id=1250296
* https://bugzilla.suse.com/show_bug.cgi?id=1250297
* https://bugzilla.suse.com/show_bug.cgi?id=1250298
* https://bugzilla.suse.com/show_bug.cgi?id=1250334
* https://bugzilla.suse.com/show_bug.cgi?id=1250344
* https://bugzilla.suse.com/show_bug.cgi?id=1250365
* https://bugzilla.suse.com/show_bug.cgi?id=1250371
* https://bugzilla.suse.com/show_bug.cgi?id=1250377
* https://bugzilla.suse.com/show_bug.cgi?id=1250386
* https://bugzilla.suse.com/show_bug.cgi?id=1250389
* https://bugzilla.suse.com/show_bug.cgi?id=1250398
* https://bugzilla.suse.com/show_bug.cgi?id=1250402
* https://bugzilla.suse.com/show_bug.cgi?id=1250406
* https://bugzilla.suse.com/show_bug.cgi?id=1250407
* https://bugzilla.suse.com/show_bug.cgi?id=1250408
* https://bugzilla.suse.com/show_bug.cgi?id=1250450
* https://bugzilla.suse.com/show_bug.cgi?id=1250491
* https://bugzilla.suse.com/show_bug.cgi?id=1250519
* https://bugzilla.suse.com/show_bug.cgi?id=1250522
* https://bugzilla.suse.com/show_bug.cgi?id=1250650
* https://bugzilla.suse.com/show_bug.cgi?id=1250655
* https://bugzilla.suse.com/show_bug.cgi?id=1250671
* https://bugzilla.suse.com/show_bug.cgi?id=1250702
* https://bugzilla.suse.com/show_bug.cgi?id=1250711
* https://bugzilla.suse.com/show_bug.cgi?id=1250712
* https://bugzilla.suse.com/show_bug.cgi?id=1250713
* https://bugzilla.suse.com/show_bug.cgi?id=1250716
* https://bugzilla.suse.com/show_bug.cgi?id=1250719
* https://bugzilla.suse.com/show_bug.cgi?id=1250722
* https://bugzilla.suse.com/show_bug.cgi?id=1250729
* https://bugzilla.suse.com/show_bug.cgi?id=1250736
* https://bugzilla.suse.com/show_bug.cgi?id=1250737
* https://bugzilla.suse.com/show_bug.cgi?id=1250739
* https://bugzilla.suse.com/show_bug.cgi?id=1250741
* https://bugzilla.suse.com/show_bug.cgi?id=1250742
* https://bugzilla.suse.com/show_bug.cgi?id=1250758
* https://bugzilla.suse.com/show_bug.cgi?id=1250952
* https://bugzilla.suse.com/show_bug.cgi?id=1251100
* https://bugzilla.suse.com/show_bug.cgi?id=1251114
* https://bugzilla.suse.com/show_bug.cgi?id=1251134
* https://bugzilla.suse.com/show_bug.cgi?id=1251135
* https://bugzilla.suse.com/show_bug.cgi?id=1251143
* https://bugzilla.suse.com/show_bug.cgi?id=1251146
* https://bugzilla.suse.com/show_bug.cgi?id=1251186
* https://bugzilla.suse.com/show_bug.cgi?id=1251216
* https://bugzilla.suse.com/show_bug.cgi?id=1251230
* https://bugzilla.suse.com/show_bug.cgi?id=1251810
* https://bugzilla.suse.com/show_bug.cgi?id=1252084
* https://jira.suse.com/browse/PED-10909
* https://jira.suse.com/browse/PED-12405
* https://jira.suse.com/browse/PED-12745
* https://jira.suse.com/browse/PED-12882
* https://jira.suse.com/browse/PED-13113
* https://jira.suse.com/browse/PED-13256
* https://jira.suse.com/browse/PED-13302
* https://jira.suse.com/browse/PED-13331
* https://jira.suse.com/browse/PED-13343
* https://jira.suse.com/browse/PED-13345
* https://jira.suse.com/browse/PED-13631
* https://jira.suse.com/browse/PED-13704
* https://jira.suse.com/browse/PED-13728
* https://jira.suse.com/browse/PED-13762
* https://jira.suse.com/browse/PED-13815
* https://jira.suse.com/browse/PED-348
* https://jira.suse.com/browse/PED-7249
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20251112/edc50604/attachment-0001.htm>
More information about the sle-security-updates
mailing list