SUSE-SU-2026:0962-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Mon Mar 23 16:35:33 UTC 2026



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:0962-1  
Release Date: 2026-03-23T09:09:03Z  
Rating: important  
References:

  * bsc#1241345
  * bsc#1245728
  * bsc#1247180
  * bsc#1249587
  * bsc#1249998
  * bsc#1251135
  * bsc#1251186
  * bsc#1251966
  * bsc#1251971
  * bsc#1252008
  * bsc#1252266
  * bsc#1252911
  * bsc#1252924
  * bsc#1253049
  * bsc#1253129
  * bsc#1253644
  * bsc#1253691
  * bsc#1254214
  * bsc#1254306
  * bsc#1254992
  * bsc#1255084
  * bsc#1255129
  * bsc#1255265
  * bsc#1255379
  * bsc#1255530
  * bsc#1255698
  * bsc#1255811
  * bsc#1256564
  * bsc#1256640
  * bsc#1256679
  * bsc#1256683
  * bsc#1256708
  * bsc#1256716
  * bsc#1256755
  * bsc#1256784
  * bsc#1256802
  * bsc#1256863
  * bsc#1257159
  * bsc#1257179
  * bsc#1257209
  * bsc#1257228
  * bsc#1257231
  * bsc#1257246
  * bsc#1257279
  * bsc#1257332
  * bsc#1257466
  * bsc#1257472
  * bsc#1257473
  * bsc#1257552
  * bsc#1257553
  * bsc#1257554
  * bsc#1257556
  * bsc#1257557
  * bsc#1257559
  * bsc#1257560
  * bsc#1257562
  * bsc#1257570
  * bsc#1257573
  * bsc#1257576
  * bsc#1257579
  * bsc#1257580
  * bsc#1257586
  * bsc#1257635
  * bsc#1257679
  * bsc#1257687
  * bsc#1257704
  * bsc#1257706
  * bsc#1257707
  * bsc#1257709
  * bsc#1257714
  * bsc#1257715
  * bsc#1257716
  * bsc#1257718
  * bsc#1257722
  * bsc#1257723
  * bsc#1257729
  * bsc#1257732
  * bsc#1257734
  * bsc#1257735
  * bsc#1257739
  * bsc#1257740
  * bsc#1257741
  * bsc#1257742
  * bsc#1257743
  * bsc#1257745
  * bsc#1257749
  * bsc#1257750
  * bsc#1257755
  * bsc#1257757
  * bsc#1257758
  * bsc#1257759
  * bsc#1257761
  * bsc#1257762
  * bsc#1257763
  * bsc#1257765
  * bsc#1257768
  * bsc#1257770
  * bsc#1257772
  * bsc#1257775
  * bsc#1257776
  * bsc#1257788
  * bsc#1257789
  * bsc#1257790
  * bsc#1257805
  * bsc#1257808
  * bsc#1257809
  * bsc#1257811
  * bsc#1257813
  * bsc#1257814
  * bsc#1257816
  * bsc#1257830
  * bsc#1257891
  * bsc#1257952
  * bsc#1258037
  * bsc#1258153
  * bsc#1258176
  * bsc#1258181
  * bsc#1258184
  * bsc#1258222
  * bsc#1258226
  * bsc#1258234
  * bsc#1258237
  * bsc#1258245
  * bsc#1258249
  * bsc#1258252
  * bsc#1258256
  * bsc#1258259
  * bsc#1258272
  * bsc#1258273
  * bsc#1258277
  * bsc#1258278
  * bsc#1258279
  * bsc#1258286
  * bsc#1258293
  * bsc#1258297
  * bsc#1258298
  * bsc#1258299
  * bsc#1258304
  * bsc#1258309
  * bsc#1258313
  * bsc#1258317
  * bsc#1258321
  * bsc#1258326
  * bsc#1258338
  * bsc#1258340
  * bsc#1258349
  * bsc#1258354
  * bsc#1258358
  * bsc#1258374
  * bsc#1258376
  * bsc#1258377
  * bsc#1258379
  * bsc#1258389
  * bsc#1258394
  * bsc#1258395
  * bsc#1258397
  * bsc#1258411
  * bsc#1258415
  * bsc#1258419
  * bsc#1258422
  * bsc#1258424
  * bsc#1258429
  * bsc#1258442
  * bsc#1258464
  * bsc#1258465
  * bsc#1258468
  * bsc#1258469
  * bsc#1258484
  * bsc#1258517
  * bsc#1258518
  * bsc#1258519
  * bsc#1258520
  * bsc#1258524
  * bsc#1258544
  * bsc#1258660
  * bsc#1258824
  * bsc#1258832
  * bsc#1258849
  * bsc#1258860
  * bsc#1258928
  * bsc#1259070
  * bsc#1259130
  * bsc#1259558
  * bsc#1259580

  
Cross-References:

  * CVE-2023-53817
  * CVE-2025-39748
  * CVE-2025-39817
  * CVE-2025-39964
  * CVE-2025-40099
  * CVE-2025-40103
  * CVE-2025-40201
  * CVE-2025-40253
  * CVE-2025-68283
  * CVE-2025-68295
  * CVE-2025-68374
  * CVE-2025-68735
  * CVE-2025-68736
  * CVE-2025-68778
  * CVE-2025-68785
  * CVE-2025-68810
  * CVE-2025-71071
  * CVE-2025-71104
  * CVE-2025-71113
  * CVE-2025-71125
  * CVE-2025-71126
  * CVE-2025-71148
  * CVE-2025-71182
  * CVE-2025-71184
  * CVE-2025-71185
  * CVE-2025-71188
  * CVE-2025-71189
  * CVE-2025-71190
  * CVE-2025-71191
  * CVE-2025-71192
  * CVE-2025-71194
  * CVE-2025-71195
  * CVE-2025-71196
  * CVE-2025-71197
  * CVE-2025-71198
  * CVE-2025-71199
  * CVE-2025-71200
  * CVE-2025-71222
  * CVE-2025-71224
  * CVE-2025-71225
  * CVE-2025-71229
  * CVE-2025-71231
  * CVE-2025-71232
  * CVE-2025-71234
  * CVE-2025-71235
  * CVE-2025-71236
  * CVE-2026-22979
  * CVE-2026-22982
  * CVE-2026-22989
  * CVE-2026-22998
  * CVE-2026-23003
  * CVE-2026-23004
  * CVE-2026-23010
  * CVE-2026-23017
  * CVE-2026-23021
  * CVE-2026-23023
  * CVE-2026-23026
  * CVE-2026-23033
  * CVE-2026-23035
  * CVE-2026-23037
  * CVE-2026-23038
  * CVE-2026-23049
  * CVE-2026-23053
  * CVE-2026-23054
  * CVE-2026-23056
  * CVE-2026-23057
  * CVE-2026-23058
  * CVE-2026-23060
  * CVE-2026-23061
  * CVE-2026-23062
  * CVE-2026-23063
  * CVE-2026-23064
  * CVE-2026-23065
  * CVE-2026-23068
  * CVE-2026-23069
  * CVE-2026-23070
  * CVE-2026-23071
  * CVE-2026-23073
  * CVE-2026-23074
  * CVE-2026-23076
  * CVE-2026-23078
  * CVE-2026-23080
  * CVE-2026-23082
  * CVE-2026-23083
  * CVE-2026-23084
  * CVE-2026-23085
  * CVE-2026-23086
  * CVE-2026-23088
  * CVE-2026-23089
  * CVE-2026-23090
  * CVE-2026-23091
  * CVE-2026-23094
  * CVE-2026-23095
  * CVE-2026-23096
  * CVE-2026-23099
  * CVE-2026-23101
  * CVE-2026-23102
  * CVE-2026-23104
  * CVE-2026-23105
  * CVE-2026-23107
  * CVE-2026-23108
  * CVE-2026-23110
  * CVE-2026-23111
  * CVE-2026-23112
  * CVE-2026-23113
  * CVE-2026-23116
  * CVE-2026-23119
  * CVE-2026-23121
  * CVE-2026-23125
  * CVE-2026-23128
  * CVE-2026-23129
  * CVE-2026-23131
  * CVE-2026-23133
  * CVE-2026-23135
  * CVE-2026-23139
  * CVE-2026-23141
  * CVE-2026-23145
  * CVE-2026-23146
  * CVE-2026-23150
  * CVE-2026-23151
  * CVE-2026-23152
  * CVE-2026-23154
  * CVE-2026-23155
  * CVE-2026-23156
  * CVE-2026-23157
  * CVE-2026-23163
  * CVE-2026-23166
  * CVE-2026-23167
  * CVE-2026-23169
  * CVE-2026-23170
  * CVE-2026-23171
  * CVE-2026-23172
  * CVE-2026-23173
  * CVE-2026-23176
  * CVE-2026-23178
  * CVE-2026-23179
  * CVE-2026-23182
  * CVE-2026-23190
  * CVE-2026-23191
  * CVE-2026-23198
  * CVE-2026-23202
  * CVE-2026-23204
  * CVE-2026-23207
  * CVE-2026-23208
  * CVE-2026-23209
  * CVE-2026-23210
  * CVE-2026-23213
  * CVE-2026-23214
  * CVE-2026-23221
  * CVE-2026-23222
  * CVE-2026-23229
  * CVE-2026-23268
  * CVE-2026-23269

  
CVSS scores:

  * CVE-2023-53817 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53817 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39748 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39748 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39748 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39817 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39817 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-39964 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39964 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-39964 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40099 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40099 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-40103 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40103 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40201 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40201 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40253 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68283 ( SUSE ):  5.9
    CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68283 ( SUSE ):  6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-68295 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68374 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68374 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68735 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68735 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-68736 ( SUSE ):  7.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-68736 ( SUSE ):  5.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
  * CVE-2025-68778 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68778 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68785 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68785 ( SUSE ):  5.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-68810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71071 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-71104 ( SUSE ):  8.2
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
  * CVE-2025-71104 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2025-71113 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71113 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-71125 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71125 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71126 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71126 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71148 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71148 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71148 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2025-71182 ( SUSE ):  5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71184 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71185 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71185 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71188 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71188 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71189 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71189 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71190 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71190 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71191 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71191 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71192 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71192 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-71194 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71194 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71195 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71195 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71196 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71196 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71197 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-71198 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71198 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71199 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71199 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71200 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71200 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71200 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71222 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71222 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71222 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71224 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71224 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71225 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71225 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-71225 ( NVD ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-71229 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71229 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71229 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71231 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71231 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71231 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-71232 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71232 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71232 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71234 ( SUSE ):  7.7
    CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71234 ( SUSE ):  7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71234 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71235 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71235 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71235 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71236 ( SUSE ):  5.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71236 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71236 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22979 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-22979 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22982 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22982 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22989 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22989 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22989 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22998 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22998 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22998 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23003 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23003 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2026-23004 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23004 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23010 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-23017 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23017 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23021 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23021 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23023 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23023 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23026 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23026 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23033 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23033 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23035 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23035 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23037 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23037 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23038 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23038 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23049 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23049 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23053 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23053 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23054 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23054 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23056 ( SUSE ):  6.1
    CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23056 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2026-23057 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23057 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2026-23058 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23058 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23060 ( SUSE ):  7.1
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23060 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23060 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23061 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23061 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23062 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23062 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-23062 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23063 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23063 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23064 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23064 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23065 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23065 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23065 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23068 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23068 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23069 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23069 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23069 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23070 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23070 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23070 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23071 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23071 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23071 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23073 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23073 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23074 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23074 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23074 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23076 ( SUSE ):  5.2
    CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23076 ( SUSE ):  5.4 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2026-23076 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23078 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23078 ( SUSE ):  6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23078 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23080 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23080 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23080 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23082 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23082 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23083 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23083 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23083 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23084 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23084 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23085 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23085 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23085 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23086 ( SUSE ):  6.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H
  * CVE-2026-23086 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2026-23086 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23088 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23088 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23088 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23089 ( SUSE ):  5.2
    CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23089 ( SUSE ):  5.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23089 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23090 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23090 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23090 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23091 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23091 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23091 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23094 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23094 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23094 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23095 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23095 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23096 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23096 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23096 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23099 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23099 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23099 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23101 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23101 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23101 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23102 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23102 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23102 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23104 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23104 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-23104 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23105 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23105 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23105 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23107 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23107 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23107 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23108 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23108 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23108 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23110 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23110 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23110 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23111 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23111 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23111 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23112 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23112 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-23112 ( NVD ):  9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23113 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23113 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23113 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23116 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23116 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23116 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23119 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23119 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23119 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23121 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23121 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23121 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23125 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23125 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23125 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23128 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23128 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23128 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23129 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23129 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23129 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23131 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23131 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23133 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23133 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-23133 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23135 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23135 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-23135 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23139 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23139 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23139 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23141 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23141 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23141 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23145 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23145 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23145 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23146 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23146 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23146 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23150 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23150 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23150 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23151 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23151 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23151 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23152 ( SUSE ):  5.9
    CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23152 ( SUSE ):  6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23152 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23154 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23154 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23154 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23155 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23155 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23155 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23156 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23156 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
  * CVE-2026-23156 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23157 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23157 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23157 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23163 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23163 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23166 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23166 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23167 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23167 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23167 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23169 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23169 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2026-23169 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23170 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23170 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23170 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23171 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-23171 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23172 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2026-23172 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2026-23172 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23173 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23173 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23173 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23176 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23176 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23178 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-23179 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23179 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23182 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23182 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23190 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23190 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23190 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23191 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23191 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23191 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23198 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23198 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23198 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23202 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23202 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23202 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23204 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2026-23204 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23204 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23207 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23207 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23207 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23208 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2026-23208 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23209 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23209 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23209 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23210 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23210 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23210 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23213 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23213 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23213 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23214 ( SUSE ):  5.1
    CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23214 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23214 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23221 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-23221 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23222 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23222 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
  * CVE-2026-23222 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23229 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23229 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23229 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23268 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23268 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23269 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23269 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise Live Patching 15-SP7
  * SUSE Linux Enterprise Real Time 15 SP7
  * SUSE Linux Enterprise Server 15 SP7
  * SUSE Linux Enterprise Server for SAP Applications 15 SP7
  * SUSE Real Time Module 15-SP7

  
  
An update that solves 153 vulnerabilities and has 31 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP7 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
    (bsc#1254992).
  * CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET
    (bsc#1249587).
  * CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
    (bsc#1249998).
  * CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in
    af_alg_sendmsg (bsc#1251966).
  * CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input
    (bsc#1252911).
  * CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink
    (bsc#1252924).
  * CVE-2025-40201: kernel/sys.c: fix the racy usage of
    task_lock(tsk->group_leader) in sys_prlimit64() paths
  * CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).
  * CVE-2025-68283: libceph: replace BUG_ON with bounds check for map->max_osd
    (bsc#1255379).
  * CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon()
    (bsc#1255129).
  * CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).
  * CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation
    (bsc#1255811).
  * CVE-2025-68736: landlock: Fix handling of disconnected directories
    (bsc#1255698).
  * CVE-2025-68778: btrfs: don't log conflicting inode if it's a dir moved in
    the current transaction (bsc#1256683).
  * CVE-2025-68785: net: openvswitch: fix middle attribute validation in
    push_nsh() action (bsc#1256640).
  * CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing
    memslot (bsc#1256679).
  * CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral
    (bsc#1256802).
  * CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with
    periodic HV timer (bsc#1256708).
  * CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via
    sock_kmalloc (bsc#1256716).
  * CVE-2025-71125: tracing: Do not register unsupported perf events
    (bsc#1256784).
  * CVE-2025-71126: mptcp: reset fallback status gracefully at disconnect() time
    (bsc#1256755).
  * CVE-2025-71148: net/handshake: restore destructor on submit failure
    (bsc#1257159).
  * CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode
    eviction (bsc#1257635).
  * CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored
    transaction type (bsc#1257687).
  * CVE-2025-71225: md: suspend array while updating raid_disks via sysfs
    (bsc#1258411).
  * CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets
    (bsc#1257228).
  * CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a
    lag (bsc#1257179).
  * CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in
    nvmet_tcp_build_pdu_iovec (bsc#1257209).
  * CVE-2026-23003: geneve: Fix incorrect inner network header offset when
    innerprotoinherit is set (bsc#1257246).
  * CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
    rt_del_uncached_list() (bsc#1257231).
  * CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).
  * CVE-2026-23017: idpf: fix error handling in the init_task on load
    (bsc#1257552).
  * CVE-2026-23023: idpf: fix memory leak in idpf_vport_rel() (bsc#1257556).
  * CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of
    priv (bsc#1257559).
  * CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio()
    (bsc#1257718).
  * CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).
  * CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to
    match ESP/ESN spec (bsc#1257735).
  * CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).
  * CVE-2026-23069: vsock/virtio: fix potential underflow in
    virtio_transport_get_credit() (bsc#1257755).
  * CVE-2026-23070: Octeontx2-af: Add proper checks for fwdata (bsc#1257709).
  * CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc
    (bsc#1257749).
  * CVE-2026-23083: fou: Don't allow 0 for FOU_ATTR_IPPROTO (bsc#1257745).
  * CVE-2026-23084: be2net: Fix NULL pointer dereference in
    be_cmd_get_mac_from_list (bsc#1257830).
  * CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses
    (bsc#1257758).
  * CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size
    (bsc#1257757).
  * CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage
    (bsc#1257814).
  * CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()
    (bsc#1257790).
  * CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).
  * CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices
    (bsc#1257816).
  * CVE-2026-23102: arm64/fpsimd: signal: Mandate SVE payload for streaming-mode
    state (bsc#1257772).
  * CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).
  * CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class
    is active in qfq_rm_from_ag (bsc#1257775).
  * CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring
    ZA (bsc#1257762).
  * CVE-2026-23110: scsi: core: Wake up the error handler when final completions
    race against each other (bsc#1257761).
  * CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in
    nft_map_catchall_activate() (bsc#1258181).
  * CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec
    (bsc#1258184).
  * CVE-2026-23113: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop
    (bsc#1258278).
  * CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask
    for 8mq vpu (bsc#1258277).
  * CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect()
    (bsc#1258273).
  * CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after
    SCTP_CMD_PEER_INIT (bsc#1258293).
  * CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has
    been performed (bsc#1258304).
  * CVE-2026-23141: btrfs: send: check for inline extents in
    range_is_hole_in_parent() (bsc#1258377).
  * CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO
    (bsc#1258286).
  * CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues
    (bsc#1258272).
  * CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()
    (bsc#1258389).
  * CVE-2026-23171: net: bonding: update the slave array for broadcast mode
    (bsc#1258349).
  * CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers
    (bsc#1258520).
  * CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()
    (bsc#1258394).
  * CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).
  * CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd
    (bsc#1258321).
  * CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful()
    (bsc#1258340).
  * CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames
    (bsc#1258468).
  * CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink()
    (bsc#1258518).
  * CVE-2026-23210: ice: Fix PTP NULL pointer dereference during VSI rebuild
    (bsc#1258517).
  * CVE-2026-23213: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset
    (bsc#1258465).
  * CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only
    (bsc#1258464).
  * CVE-2026-23268: apparmor: fix unprivileged local user can do privileged
    policy management
  * CVE-2026-23269: apparmor: validate DFA start states are in bounds in
    unpack_pdb

The following non-security bugs were fixed:

  * ACPI: CPPC: Fix remaining for_each_possible_cpu() to use online CPUs (git-
    fixes).
  * ACPI: OSL: fix __iomem type on return from acpi_os_map_generic_address()
    (git-fixes).
  * ACPI: PM: Add unused power resource quirk for THUNDEROBOT ZERO (git-fixes).
  * ACPI: processor: Fix NULL-pointer dereference in
    acpi_processor_errata_piix4() (stable-fixes).
  * ACPICA: Abort AML bytecode execution when executing AML_FATAL_OP (stable-
    fixes).
  * ACPICA: Fix NULL pointer dereference in acpi_ev_address_space_dispatch()
    (git-fixes).
  * ALSA: hda/conexant: Add headset mic fix for MECHREVO Wujie 15X Pro (stable-
    fixes).
  * ALSA: hda/realtek - fixed speaker no sound (stable-fixes).
  * ALSA: hda/realtek: Add quirk for Inspur S14-G1 (stable-fixes).
  * ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU (stable-fixes).
  * ALSA: hda/realtek: Really fix headset mic for TongFang X6AR55xU (git-fixes).
  * ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk (stable-fixes).
  * ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine
    (stable-fixes).
  * ALSA: usb-audio: Add iface reset and delay quirk for AB13X USB Audio
    (stable-fixes).
  * ALSA: usb-audio: Add sanity check for OOB writes at silencing (stable-
    fixes).
  * ALSA: usb-audio: Avoid implicit feedback mode on DIYINHK USB Audio 2.0
    (stable-fixes).
  * ALSA: usb-audio: Cap the packet size pre-calculations (git-fixes).
  * ALSA: usb-audio: Check max frame size for implicit feedback mode, too
    (stable-fixes).
  * ALSA: usb-audio: Remove VALIDATE_RATES quirk for Focusrite devices (git-
    fixes).
  * ALSA: usb-audio: Update the number of packets properly at receiving (stable-
    fixes).
  * ALSA: usb-audio: Use correct version for UAC3 header validation (git-fixes).
  * ALSA: usb-audio: Use inclusive terms (git-fixes).
  * ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).
  * ALSA: vmaster: Relax __free() variable declarations (git-fixes).
  * APEI/GHES: ensure that won't go past CPER allocated record (stable-fixes).
  * ASoC: Intel: sof_es8336: Add DMI quirk for Huawei BOD-WXX9 (stable-fixes).
  * ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-
    fixes).
  * ASoC: SOF: ipc4-control: Keep the payload size up to date (git-fixes).
  * ASoC: SOF: ipc4-control: Use the correct size for scontrol->ipc_control_data
    (git-fixes).
  * ASoC: SOF: ipc4-topology: Correct the allocation size for bytes controls
    (git-fixes).
  * ASoC: amd: drop unused Kconfig symbols (git-fixes).
  * ASoC: amd: fix memory leak in acp3x pdm dma ops (git-fixes).
  * ASoC: amd: yc: Add ASUS ExpertBook PM1503CDA to quirks list (stable-fixes).
  * ASoC: amd: yc: Add DMI quirk for ASUS Vivobook Pro 15X M6501RR (stable-
    fixes).
  * ASoC: amd: yc: Add DMI quirk for Acer TravelMate P216-41-TCO (stable-fixes).
  * ASoC: amd: yc: Add quirk for HP 200 G2a 16 (stable-fixes).
  * ASoC: amd: yc: Fix microphone on ASUS M6500RE (stable-fixes).
  * ASoC: codecs: max98390: Check return value of devm_gpiod_get_optional() in
    max98390_i2c_probe() (stable-fixes).
  * ASoC: cs35l45: Corrects ASP_TX5 DAPM widget channel (stable-fixes).
  * ASoC: cs42l43: Correct handling of 3-pole jack load detection (stable-
    fixes).
  * ASoC: davinci-evm: Fix reference leak in davinci_evm_probe (stable-fixes).
  * ASoC: nau8821: Avoid unnecessary blocking in IRQ handler (stable-fixes).
  * ASoC: nau8821: Cancel delayed work on component remove (git-fixes).
  * ASoC: nau8821: Cancel pending work before suspend (git-fixes).
  * ASoC: nau8821: Consistently clear interrupts before unmasking (git-fixes).
  * ASoC: nau8821: Fixup nau8821_enable_jack_detect() (git-fixes).
  * ASoC: pxa: drop unused Kconfig symbol (git-fixes).
  * ASoC: rockchip: i2s-tdm: Use param rate if not provided by set_sysclk (git-
    fixes).
  * ASoC: sunxi: sun50i-dmic: Add missing check for devm_regmap_init_mmio
    (stable-fixes).
  * ASoC: tlv320adcx140: Propagate error codes during probe (stable-fixes).
  * ASoC: wm8962: Add WM8962_ADC_MONOMIX to "3D Coefficients" mask (stable-
    fixes).
  * ASoC: wm8962: Do not report a microphone if it's shorted to ground on plug
    (stable-fixes).
  * Add bugnumber to existing mana and mana_ib changes (bsc#1251135
    bsc#1251971).
  * Add bugnumber to existing mana change (bsc#1251971).
  * Add bugnumber to existing mana changes (bsc#1245728 bsc#1251971 bsc#1252266
    bsc#1257466)
  * Add bugnumber to existing mana changes (bsc#1259558 bsc#1259580).
  * Bluetooth: L2CAP: Fix invalid response to L2CAP_ECRED_RECONF_REQ (git-
    fixes).
  * Bluetooth: L2CAP: Fix missing key size check for L2CAP_LE_CONN_REQ (git-
    fixes).
  * Bluetooth: L2CAP: Fix not checking output MTU is acceptable on
    L2CAP_ECRED_CONN_REQ (git-fixes).
  * Bluetooth: L2CAP: Fix response to L2CAP_ECRED_CONN_REQ (git-fixes).
  * Bluetooth: L2CAP: Fix result of L2CAP_ECRED_CONN_RSP when MTU is too short
    (git-fixes).
  * Bluetooth: btintel_pcie: Use IRQF_ONESHOT and default primary handler (git-
    fixes).
  * Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB (stable-fixes).
  * Bluetooth: btusb: Add device ID for Realtek RTL8761BU (stable-fixes).
  * Bluetooth: btusb: Add new VID/PID for RTL8852CE (stable-fixes).
  * Bluetooth: hci_conn: Set link_policy on incoming ACL connections (stable-
    fixes).
  * Bluetooth: hci_conn: use mod_delayed_work for active mode timeout (stable-
    fixes).
  * Bluetooth: hci_qca: Cleanup on all setup failures (git-fixes).
  * Documentation: PCI: endpoint: Fix ntb/vntb copy & paste errors (git-fixes).
  * Documentation: mailbox: mbox_chan_ops.flush() is optional (git-fixes).
  * Drivers: hv: Allocate interrupt and monitor pages aligned to system page
    boundary (git-fixes).
  * Drivers: hv: Always do Hyper-V panic notification in hv_kmsg_dump() (git-
    fixes).
  * Drivers: hv: Fix bad pointer dereference in hv_get_partition_id (git-fixes).
  * Drivers: hv: Fix the check for HYPERVISOR_CALLBACK_VECTOR (git-fixes).
  * Drivers: hv: Fix warnings for missing export.h header inclusion (git-fixes).
  * Drivers: hv: Resolve ambiguity in hypervisor version log (git-fixes).
  * Drivers: hv: Use kmalloc_array() instead of kmalloc() (git-fixes).
  * Drivers: hv: Use kzalloc for panic page allocation (git-fixes).
  * Drivers: hv: fix missing kernel-doc description for 'size' in
    request_arr_init() (git-fixes).
  * Drivers: hv: remove stale comment (git-fixes).
  * Drivers: hv: use kmalloc_array() instead of kmalloc() (git-fixes).
  * Drivers: hv: util: Cosmetic changes for hv_utils_transport.c (git-fixes).
  * Drivers: hv: vmbus: Add comments about races with "channels" sysfs dir (git-
    fixes).
  * Drivers: hv: vmbus: Clean up sscanf format specifier in target_cpu_store()
    (git-fixes).
  * Drivers: hv: vmbus: Fix sysfs output format for ring buffer index (git-
    fixes).
  * Drivers: hv: vmbus: Fix typos in vmbus_drv.c (git-fixes).
  * Drivers: hv: vmbus: Get the IRQ number from DeviceTree (git-fixes).
  * Drivers: hv: vmbus: Introduce hv_get_vmbus_root_device() (git-fixes).
  * HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101) (stable-
    fixes).
  * HID: apple: Add "SONiX KN85 Keyboard" to the list of non-apple keyboards
    (stable-fixes).
  * HID: elecom: Add support for ELECOM HUGE Plus M-HT1MRBK (stable-fixes).
  * HID: hid-pl: handle probe errors (git-fixes).
  * HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() (stable-
    fixes).
  * HID: intel-ish-hid: Reset enum_devices_done before enumeration (stable-
    fixes).
  * HID: intel-ish-hid: Update ishtp bus match to support device ID table
    (stable-fixes).
  * HID: intel-ish-hid: fix NULL-ptr-deref in ishtp_bus_remove_all_clients (git-
    fixes).
  * HID: logitech-hidpp: Check maxfield in hidpp_get_report_length() (stable-
    fixes).
  * HID: magicmouse: Do not crash on missing msc->input (stable-fixes).
  * HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL (stable-fixes).
  * HID: multitouch: add eGalaxTouch EXC3188 support (stable-fixes).
  * HID: playstation: Add missing check for input_ff_create_memless (git-fixes).
  * HID: playstation: Center initial joystick axes to prevent spurious events
    (stable-fixes).
  * HID: prodikeys: Check presence of pm->input_ep82 (stable-fixes).
  * HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list (stable-
    fixes).
  * Input: stmfts - correct wording for the warning message (git-fixes).
  * Input: stmfts - make comments correct (git-fixes).
  * KABi: fix "dm-snapshot: fix 'scheduling while atomic' on real-time kernels"
    (git-fixes).
  * KVM: nSVM: Clear exit_code_hi in VMCB when synthesizing nested VM-Exits
    (git-fixes).
  * KVM: nSVM: Set exit_code_hi to -1 when synthesizing SVM_EXIT_ERR (failed
    VMRUN) (git-fixes).
  * KVM: x86: Do not clear async #PF queue when CR0.PG is disabled (e.g. on
    #SMI) (git-fixes).
  * KVM: x86: Explicitly set new periodic hrtimer expiration in apic_timer_fn()
    (git-fixes).
  * KVM: x86: WARN if hrtimer callback for periodic APIC timer fires with
    period=0 (git-fixes).
  * Move upstreamed mm and SCSI patches into sorted section
  * NTB: ntb_transport: Fix too small buffer for debugfs_name (git-fixes).
  * PCI/ACPI: Restrict program_hpx_type2() to AER bits (git-fixes).
  * PCI/IOV: Fix race between SR-IOV enable/disable and hotplug (git-fixes).
  * PCI/MSI: Unmap MSI-X region on error (git-fixes).
  * PCI/MSI: Unmap MSI-X region on error (stable-fixes).
  * PCI/P2PDMA: Release per-CPU pgmap ref when vm_insert_page() fails (git-
    fixes).
  * PCI/PM: Avoid redundant delays on D3hot->D3cold (git-fixes).
  * PCI/portdrv: Fix potential resource leak (git-fixes).
  * PCI: Add ACS quirk for Pericom PI7C9X2G404 switches [12d8:b404] (git-fixes).
  * PCI: Add ACS quirk for Qualcomm Hamoa & Glymur (git-fixes).
  * PCI: Add ACS quirk for Qualcomm Hamoa & Glymur (stable-fixes).
  * PCI: Add PCIE_MSG_CODE_ASSERT_INTx message macros (stable-fixes).
  * PCI: Add defines for bridge window indexing (stable-fixes).
  * PCI: Correct PCI_CAP_EXP_ENDPOINT_SIZEOF_V2 value (git-fixes).
  * PCI: Do not attempt to set ExtTag for VFs (git-fixes).
  * PCI: Enable ACS after configuring IOMMU for OF platforms (git-fixes).
  * PCI: Enable ACS after configuring IOMMU for OF platforms (stable-fixes).
  * PCI: Fix pci_slot_lock () device locking (git-fixes).
  * PCI: Fix pci_slot_lock () device locking (stable-fixes).
  * PCI: Fix pci_slot_trylock() error handling (git-fixes).
  * PCI: Initialize RCB from pci_configure_device() (git-fixes).
  * PCI: Log bridge info when first enumerating bridge (stable-fixes).
  * PCI: Log bridge windows conditionally (stable-fixes).
  * PCI: Mark 3ware-9650SA Root Port Extended Tags as broken (git-fixes).
  * PCI: Mark ASM1164 SATA controller to avoid bus reset (git-fixes).
  * PCI: Mark ASM1164 SATA controller to avoid bus reset (stable-fixes).
  * PCI: Mark Nvidia GB10 to avoid bus reset (git-fixes).
  * PCI: Mark Nvidia GB10 to avoid bus reset (stable-fixes).
  * PCI: Move pci_read_bridge_windows() below individual window accessors
    (stable-fixes).
  * PCI: Supply bridge device, not secondary bus, to read window details
    (stable-fixes).
  * PCI: dw-rockchip: Disable BAR 0 and BAR 1 for Root Port (git-fixes).
  * PCI: dw-rockchip: Disable BAR 0 and BAR 1 for Root Port (stable-fixes).
  * PCI: endpoint: Fix swapped parameters in
    pci_{primary/secondary}_epc_epf_unlink() functions (git-fixes).
  * PCI: hv: Correct a comment (git-fixes).
  * PCI: hv: Fix warnings for missing export.h header inclusion (git-fixes).
  * PCI: hv: Remove unnecessary flex array in struct pci_packet (git-fixes).
  * PCI: hv: Remove unused field pci_bus in struct hv_pcibus_device (git-fixes).
  * PCI: hv: remove unnecessary module_init/exit functions (git-fixes).
  * PCI: mediatek: Fix IRQ domain leak when MSI allocation fails (git-fixes).
  * PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).
  * PM: sleep: wakeirq: harden dev_pm_clear_wake_irq() against races (git-
    fixes).
  * PM: wakeup: Handle empty list in wakeup_sources_walk_start() (git-fixes).
  * RDMA/mana_ib: Add device-memory support (git-fixes).
  * RDMA/mana_ib: Take CQ type from the device type (git-fixes).
  * RDMA/rtrs-clt: For conn rejection use actual err number (git-fixes)
  * Revive thinkpad-lmi driver and mark as supported (jsc#PED-15553).
  * USB: serial: option: add Telit FN920C04 RNDIS compositions (stable-fixes).
  * Update "drm/mgag200: fix mgag200_bmc_stop_scanout()" bug number (bsc#1258153
    bsc#1258226)
  * Update "drm/mgag200: fix mgag200_bmc_stop_scanout()" bug number
    (bsc#1258153)
  * apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).
  * apparmor: fix differential encoding verification (bsc#1258849).
  * apparmor: fix memory leak in verify_header (bsc#1258849).
  * apparmor: fix missing bounds check on DEFAULT table in verify_dfa()
    (bsc#1258849).
  * apparmor: fix race between freeing data and fs accessing it (bsc#1258849).
  * apparmor: fix race on rawdata dereference (bsc#1258849).
  * apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).
  * apparmor: fix unprivileged local user can do privileged policy management
    (bsc#1258849).
  * apparmor: fix: limit the number of levels of policy namespaces
    (bsc#1258849).
  * apparmor: replace recursive profile removal with iterative approach
    (bsc#1258849).
  * apparmor: validate DFA start states are in bounds in unpack_pdb
    (bsc#1258849).
  * arm64: Add support for TSV110 Spectre-BHB mitigation (git-fixes)
  * arm64: Disable branch profiling for all arm64 code (git-fixes)
  * arm64: Set __nocfi on swsusp_arch_resume() (git-fixes)
  * ata: libata: avoid long timeouts on hot-unplugged SATA DAS (stable-fixes).
  * ata: pata_ftide010: Fix some DMA timings (git-fixes).
  * atm: fore200e: fix use-after-free in tasklets during device removal (git-
    fixes).
  * auxdisplay: arm-charlcd: fix release_mem_region() size (git-fixes).
  * backlight: qcom-wled: Change PM8950 WLED configurations (git-fixes).
  * backlight: qcom-wled: Support ovp values for PMI8994 (git-fixes).
  * batman-adv: Avoid double-rtnl_lock ELP metric worker (git-fixes).
  * block,bfq: fix aux stat accumulation destination (git-fixes).
  * bonding: only set speed/duplex to unknown, if getting speed failed
    (bsc#1253691).
  * bpf: selftests: Move xfrm tunnel test to test_progs (bsc#1258860).
  * bpf: selftests: test_tunnel: Setup fresh topology for each subtest
    (bsc#1258860).
  * bpf: selftests: test_tunnel: Use vmlinux.h declarations (bsc#1258860).
  * bpf: verifier improvement in 32bit shift sign extension pattern (git-fixes).
  * bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc (bsc#1258860).
  * bpf: xfrm: Add selftest for bpf_xdp_get_xfrm_state() (bsc#1258860).
  * btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).
  * bus: fsl-mc: Replace snprintf and sprintf with sysfs_emit in sysfs show
    functions (stable-fixes).
  * bus: fsl-mc: fix an error handling in fsl_mc_device_add() (git-fixes).
  * bus: fsl-mc: fix use-after-free in driver_override_show() (git-fixes).
  * can: bcm: fix locking for bcm_op runtime updates (git-fixes).
  * can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a
    message (git-fixes).
  * can: hi311x: hi3110_open(): add check for hi3110_power_enable() return value
    (git-fixes).
  * can: mcp251x: fix deadlock in error path of mcp251x_open (git-fixes).
  * can: ucan: Fix infinite loop from zero-length messages (git-fixes).
  * can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
    (git-fixes).
  * cgroup: Fix incorrect WARN_ON_ONCE() in css_release_work_fn() (bsc#1256564
    bsc#1259130).
  * cgroup: Show # of subsystem CSSes in cgroup.stat (bsc#1256564 bsc#1259130).
  * char: tpm: cr50: Remove IRQF_ONESHOT (git-fixes).
  * char: tpm: cr50: Remove IRQF_ONESHOT (stable-fixes).
  * cifs: add xid to query server interface call (git-fixes).
  * clk: clk-apple-nco: Add "apple,t8103-nco" compatible (git-fixes).
  * clk: mediatek: Fix error handling in runtime PM setup (git-fixes).
  * clk: meson: g12a: Limit the HDMI PLL OD to /4 (git-fixes).
  * clk: meson: gxbb: Limit the HDMI PLL OD to /4 on GXL/GXM SoCs (git-fixes).
  * clk: mvebu: cp110 add CLK_IGNORE_UNUSED to pcie_x10, pcie_x11 & (git-fixes)
  * clk: qcom: dispcc-sdm845: Enable parents for pixel clocks (git-fixes).
  * clk: qcom: gcc-msm8917: Remove ALWAYS_ON flag from cpp_gdsc (git-fixes).
  * clk: qcom: gcc-msm8953: Remove ALWAYS_ON flag from cpp_gdsc (git-fixes).
  * clk: qcom: gfx3d: add parent to parent request map (git-fixes).
  * clk: qcom: rcg2: compute 2d using duty fraction directly (git-fixes).
  * clk: renesas: rzg2l: Fix intin variable size (git-fixes).
  * clk: renesas: rzg2l: Select correct div round macro (git-fixes).
  * clk: tegra: tegra124-emc: Fix potential memory leak in
    tegra124_clk_register_emc() (git-fixes).
  * clk: tegra: tegra124-emc: fix device leak on set_rate() (git-fixes).
  * clocksource: Print durations for sync check unconditionally (bsc#1241345).
  * clocksource: Reduce watchdog readout delay limit to prevent false positives
    (bsc#1241345).
  * clocksource: hyper-v: Fix warnings for missing export.h header inclusion
    (git-fixes).
  * cpu: export lockdep_assert_cpus_held() (git-fixes).
  * cpufreq/amd-pstate: Add missing NULL ptr check in amd_pstate_update
    (bsc#1247180).
  * cpufreq/amd-pstate: Add the missing cpufreq_cpu_put() (bsc#1247180).
  * cpufreq/amd-pstate: Fix the clamping of perf values (bsc#1247180).
  * cpufreq/amd-pstate: Modularize perf<->freq conversion (bsc#1247180).
  * cpufreq/amd-pstate: Refactor max frequency calculation (bsc#1247180).
  * cpufreq/amd-pstate: fix setting policy current frequency value
    (bsc#1247180).
  * cpufreq/amd-pstate: store all values in cpudata struct in khz (bsc#1247180).
  * cpufreq: amd-pstate: Unify computation of
    {max,min,nominal,lowest_nonlinear}_freq (bsc#1247180).
  * crypto: cavium - fix dma_free_coherent() size (git-fixes).
  * crypto: ccp - Add an S4 restore flow (git-fixes).
  * crypto: hisilicon/sec2 - support skcipher/aead fallback for hardware queue
    unavailable (git-fixes).
  * crypto: hisilicon/trng - support tfms sharing the device (git-fixes).
  * crypto: hisilicon/zip - adjust the way to obtain the req in the callback
    function (git-fixes).
  * crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode
    (git-fixes).
  * crypto: octeontx - Fix length check to avoid truncation in ucode_load_store
    (git-fixes).
  * crypto: octeontx - fix dma_free_coherent() size (git-fixes).
  * crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly (git-
    fixes).
  * crypto: qat - fix parameter order used in ICP_QAT_FW_COMN_FLAGS_BUILD (git-
    fixes).
  * crypto: qat - fix warning on adf_pfvf_pf_proto.c (git-fixes).
  * crypto: virtio - Add spinlock protection with virtqueue notification (git-
    fixes).
  * crypto: virtio - Remove duplicated virtqueue_kick in
    virtio_crypto_skcipher_crypt_req (git-fixes).
  * device property: Allow secondary lookup in fwnode_get_next_child_node()
    (git-fixes).
  * dm mpath: make pg_init_delay_msecs settable (git-fixes).
  * dm-bufio: align write boundary on physical block size (git-fixes).
  * dm-ebs: Mark full buffer dirty even on partial write (git-fixes).
  * dm-snapshot: fix 'scheduling while atomic' on real-time kernels (git-fixes).
  * dm: clear cloned request bio pointer when last clone bio completes (git-
    fixes).
  * dm: remove fake timeout to avoid leak request (git-fixes).
  * dma: dma-axi-dmac: fix SW cyclic transfers (git-fixes).
  * dmaengine: mediatek: uart-apdma: Fix above 4G addressing TX/RX (git-fixes).
  * dmaengine: sun6i: Choose appropriate burst length under maxburst (stable-
    fixes).
  * docs: fix WARNING document not included in any toctree (stable-fixes).
  * drivers/hv: add CPU offlining support (git-fixes).
  * drivers/hv: introduce vmbus_channel_set_cpu() (git-fixes).
  * drivers: iio: mpu3050: use dev_err_probe for regulator request (git-fixes).
  * drm/amd/display: Add USB-C DP Alt Mode lane limitation in DCN32 (stable-
    fixes).
  * drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src (stable-
    fixes).
  * drm/amd/display: Avoid updating surface with the same surface under MPO
    (stable-fixes).
  * drm/amd/display: Disable FEC when powering down encoders (stable-fixes).
  * drm/amd/display: Fix GFX12 family constant checks (stable-fixes).
  * drm/amd/display: Fix dsc eDP issue (stable-fixes).
  * drm/amd/display: Fix out-of-bounds stream encoder index v3 (git-fixes).
  * drm/amd/display: Fix system resume lag issue (stable-fixes).
  * drm/amd/display: Fix writeback on DCN 3.2+ (stable-fixes).
  * drm/amd/display: Increase DCN35 SR enter/exit latency (stable-fixes).
  * drm/amd/display: Reject cursor plane on DCE when scaled differently than
    primary (git-fixes).
  * drm/amd/display: Remove conditional for shaper 3DLUT power-on (stable-
    fixes).
  * drm/amd/display: Use same max plane scaling limits for all 64 bpp formats
    (git-fixes).
  * drm/amd/display: avoid dig reg access timeout on usb4 link training fail
    (stable-fixes).
  * drm/amd/display: bypass post csc for additional color spaces in dal (stable-
    fixes).
  * drm/amd/display: extend delta clamping logic to CM3 LUT helper (stable-
    fixes).
  * drm/amd/display: fix wrong color value mapping on MCM shaper LUT (git-
    fixes).
  * drm/amd/display: only power down dig on phy endpoints (stable-fixes).
  * drm/amd/display: remove assert around dpp_base replacement (stable-fixes).
  * drm/amd/pm: Disable MMIO access during SMU Mode 1 reset (stable-fixes).
  * drm/amd: Disable MES LR compute W/A (git-fixes).
  * drm/amd: Drop "amdgpu kernel modesetting enabled" message (git-fixes).
  * drm/amd: Fix hang on amdgpu unload by using pci_dev_is_disconnected() (git-
    fixes).
  * drm/amdgpu/gfx10: fix wptr reset in KGQ init (stable-fixes).
  * drm/amdgpu/gfx11: fix wptr reset in KGQ init (stable-fixes).
  * drm/amdgpu/gfx12: fix wptr reset in KGQ init (stable-fixes).
  * drm/amdgpu/soc21: fix xclk for APUs (stable-fixes).
  * drm/amdgpu: Add HAINAN clock adjustment (stable-fixes).
  * drm/amdgpu: Adjust usleep_range in fence wait (stable-fixes).
  * drm/amdgpu: Fix locking bugs in error paths (git-fixes).
  * drm/amdgpu: Fix memory leak in amdgpu_acpi_enumerate_xcc() (git-fixes).
  * drm/amdgpu: Fix memory leak in amdgpu_ras_init() (git-fixes).
  * drm/amdgpu: Replace kzalloc + copy_from_user with memdup_user (stable-
    fixes).
  * drm/amdgpu: Skip loading SDMA_RS64 in VF (stable-fixes).
  * drm/amdgpu: Unlock a mutex before destroying it (git-fixes).
  * drm/amdgpu: Use kvfree instead of kfree in amdgpu_gmc_get_nps_memranges()
    (git-fixes).
  * drm/amdgpu: add support for HDP IP version 6.1.1 (stable-fixes).
  * drm/amdgpu: avoid a warning in timedout job handler (stable-fixes).
  * drm/amdgpu: ensure no_hw_access is visible before MMIO (git-fixes).
  * drm/amdgpu: fix NULL pointer issue buffer funcs (stable-fixes).
  * drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify (git-fixes).
  * drm/amdgpu: keep vga memory on MacBooks with switchable graphics (stable-
    fixes).
  * drm/amdgpu: remove invalid usage of sched.ready (stable-fixes).
  * drm/amdgpu: stop unmapping MQD for kernel queues v3 (stable-fixes).
  * drm/amdkfd: Fix GART PTE for non-4K pagesize in svm_migrate_gart_map()
    (stable-fixes).
  * drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set() (stable-fixes).
  * drm/amdkfd: Fix signal_eviction_fence() bool return value (git-fixes).
  * drm/amdkfd: Fix watch_id bounds checking in debug address watch v2 (git-
    fixes).
  * drm/amdkfd: Handle GPU reset and drain retry fault race (stable-fixes).
  * drm/amdkfd: Relax size checking during queue buffer get (stable-fixes).
  * drm/amdkfd: fix debug watchpoints for logical devices (stable-fixes).
  * drm/atmel-hlcdc: do not reject the commit if the src rect has fractional
    parts (stable-fixes).
  * drm/atmel-hlcdc: fix memory leak from the atomic_destroy_state callback
    (stable-fixes).
  * drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit after release
    (stable-fixes).
  * drm/bridge: anx7625: Fix invalid EDID size (git-fixes).
  * drm/bridge: samsung-dsim: Fix memory leak in error path (git-fixes).
  * drm/bridge: ti-sn65dsi86: Enable HPD polling if IRQ is not used (git-fixes).
  * drm/buddy: Prevent BUG_ON by validating rounded allocation (git-fixes).
  * drm/display/dp_mst: Add protection against 0 vcpi (stable-fixes).
  * drm/i915/acpi: free _DSM package when no connectors (git-fixes).
  * drm/i915/display: Add quirk to skip retraining of dp link (bsc#1253129).
  * drm/i915/wakeref: clean up INTEL_WAKEREF_PUT_* flag macros (stable-fixes).
  * drm/logicvc: Fix device node reference leak in logicvc_drm_config_parse()
    (git-fixes).
  * drm/mgag200: fix mgag200_bmc_stop_scanout() (git-fixes).
  * drm/msm/a2xx: fix pixel shader start on A225 (git-fixes).
  * drm/msm/disp: set num_planes to 1 for interleaved YUV formats (git-fixes).
  * drm/msm/dpu: Set vsync source irrespective of mdp top support (git-fixes).
  * drm/msm/dpu: drop intr_start from DPU 3.x catalog files (git-fixes).
  * drm/msm/dpu: fix CMD panels on DPU 1.x - 3.x (git-fixes).
  * drm/msm/dpu: fix WD timer handling on DPU 8.x (git-fixes).
  * drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove()
    (stable-fixes).
  * drm/panel: sw43408: Remove manual invocation of unprepare at remove (git-
    fixes).
  * drm/panthor: Evict groups before VM termination (git-fixes).
  * drm/panthor: Fix immediate ticking on a disabled tick (git-fixes).
  * drm/panthor: Fix the full_tick check (git-fixes).
  * drm/panthor: Fix the group priority rotation logic (git-fixes).
  * drm/panthor: Fix the logic that decides when to stop ticking (git-fixes).
  * drm/panthor: Make sure we resume the tick when new jobs are submitted (git-
    fixes).
  * drm/panthor: Recover from panthor_gpu_flush_caches() failures (git-fixes).
  * drm/radeon: Add HAINAN clock adjustment (stable-fixes).
  * drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-
    fixes).
  * drm/sched: Fix kernel-doc warning for drm_sched_job_done() (git-fixes).
  * drm/solomon: Fix page start when updating rectangle in page addressing mode
    (git-fixes).
  * drm/tegra: dsi: fix device leak on probe (git-fixes).
  * drm/tegra: hdmi: sor: Fix error: variable ‘j’ set but not used (stable-
    fixes).
  * drm/tests: shmem: Swap names of export tests (git-fixes).
  * drm/v3d: Set DMA segment size to avoid debug warnings (stable-fixes).
  * drm/vmwgfx: Fix invalid kref_put callback in vmw_bo_dirty_release (git-
    fixes).
  * drm/vmwgfx: Return the correct value in vmw_translate_ptr functions (git-
    fixes).
  * drm/xe/mmio: Avoid double-adjust in 64-bit reads (git-fixes).
  * drm/xe/pm: Also avoid missing outer rpm warning on system suspend (stable-
    fixes).
  * drm/xe/pm: Disable D3Cold for BMG only on specific platforms (git-fixes).
  * drm/xe/ptl: Apply Wa_13011645652 (stable-fixes).
  * drm/xe/query: Fix topology query pointer advance (git-fixes).
  * drm/xe/sync: Cleanup partially initialized sync on parse failure (git-
    fixes).
  * drm/xe/xe2_hpg: Add set of workarounds (stable-fixes).
  * drm/xe/xe2_hpg: Fix handling of Wa_14019988906 & Wa_14019877138 (git-fixes).
  * drm/xe: Add xe_tile backpointer to xe_mmio (stable-fixes).
  * drm/xe: Adjust mmio code to pass VF substructure to SRIOV code (stable-
    fixes).
  * drm/xe: Clarify size of MMIO region (stable-fixes).
  * drm/xe: Create dedicated xe_mmio structure (stable-fixes).
  * drm/xe: Defer gt->mmio initialization until after multi-tile setup (git-
    fixes).
  * drm/xe: Move GSI offset adjustment fields into 'struct xe_mmio' (stable-
    fixes).
  * drm/xe: Move forcewake to 'gt.pm' substructure (stable-fixes).
  * drm/xe: Only toggle scheduling in TDR if GuC is running (stable-fixes).
  * drm/xe: Populate GT's mmio iomap from tile during init (stable-fixes).
  * drm/xe: Switch MMIO interface to take xe_mmio instead of xe_gt (stable-
    fixes).
  * drm/xe: Switch mmio_ext to use 'struct xe_mmio' (stable-fixes).
  * drm/xe: Unregister drm device on probe error (git-fixes).
  * drm: Account property blob allocations to memcg (stable-fixes).
  * efi: Fix reservation of unaccepted memory table (git-fixes).
  * efivarfs: fix error propagation in efivar_entry_get() (git-fixes).
  * ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).
  * fbcon: check return value of con2fb_acquire_newinfo() (git-fixes).
  * fbdev: au1200fb: Fix a memory leak in au1200fb_drv_probe() (git-fixes).
  * fbdev: ffb: fix corrupted video output on Sun FFB1 (stable-fixes).
  * fbdev: of: display_timing: fix refcount leak in of_get_display_timings()
    (git-fixes).
  * fbdev: rivafb: fix divide error in nv3_arb() (git-fixes).
  * fbdev: smscufx: properly copy ioctl memory to kernelspace (stable-fixes).
  * fbdev: vt8500lcdfb: fix missing dma_free_coherent() (git-fixes).
  * fix it87_wdt early reboot by reporting running timer (stable-fixes).
  * fpga: dfl: use subsys_initcall to allow built-in drivers to be added (git-
    fixes).
  * fpga: of-fpga-region: Fail if any bridge is missing (stable-fixes).
  * genirq: Set IRQF_COND_ONESHOT in devm_request_irq() (git-fixes).
  * gpio: aspeed-sgpio: Change the macro to support deferred probe (stable-
    fixes).
  * gpio: pca953x: mask interrupts in irq shutdown (stable-fixes).
  * gpio: sprd: Change sprd_gpio lock to raw_spin_lock (stable-fixes).
  * gpu/panel-edp: add AUO panel entry for B140HAN06.4 (stable-fixes).
  * hwmon: (f71882fg) Add F81968 support (stable-fixes).
  * hwmon: (it87) Check the it87_lock() return value (git-fixes).
  * hwmon: (max16065) Use READ/WRITE_ONCE to avoid compiler optimization induced
    race (git-fixes).
  * hwmon: (nct6775) Add ASUS Pro WS WRX90E-SAGE SE (stable-fixes).
  * hwmon: (occ) Mark occ_init_attribute() as __printf (git-fixes).
  * hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read (git-fixes).
  * hyperv: Convert hypercall statuses to linux error codes (git-fixes).
  * hyperv: Move arch/x86/hyperv/hv_proc.c to drivers/hv (git-fixes).
  * hyperv: Move hv_current_partition_id to arch-generic code (git-fixes).
  * i3c: Move device name assignment after i3c_bus_init (git-fixes).
  * i3c: dw: Initialize spinlock to avoid upsetting lockdep (git-fixes).
  * i3c: master: Update hot-join flag only on success (git-fixes).
  * i3c: master: svc: Initialize 'dev' to NULL in svc_i3c_master_ibi_isr()
    (stable-fixes).
  * iio: Use IRQF_NO_THREAD (stable-fixes).
  * iio: gyro: itg3200: Fix unchecked return value in read_raw (git-fixes).
  * iio: magnetometer: Remove IRQF_ONESHOT (stable-fixes).
  * iio: sca3000: Fix a resource leak in sca3000_probe() (git-fixes).
  * iomap: account for unaligned end offsets when truncating read range (git-
    fixes).
  * ipmi: ipmb: initialise event handler read bytes (git-fixes).
  * kabi: cgroup.stat fixup (bsc#1256564 bsc#1259130).
  * ktls, sockmap: Fix missing uncharge operation (bsc#1252008).
  * landlock: Optimize file path walks and prepare for audit support
    (bsc#1255698).
  * leds: qcom-lpg: Check the return value of regmap_bulk_write() (git-fixes).
  * media: adv7180: fix frame interval in progressive mode (stable-fixes).
  * media: amphion: Clear last_buffer_dequeued flag for DEC_CMD_START (stable-
    fixes).
  * media: amphion: Drop min_queued_buffers assignment (git-fixes).
  * media: ccs: Accommodate C-PHY into the calculation (git-fixes).
  * media: ccs: Avoid possible division by zero (git-fixes).
  * media: ccs: Fix setting initial sub-device state (git-fixes).
  * media: chips-media: wave5: Fix memory leak on codec_info allocation failure
    (git-fixes).
  * media: cx23885: Add missing unmap in snd_cx23885_hw_params() (git-fixes).
  * media: cx25821: Add missing unmap in snd_cx25821_hw_params() (git-fixes).
  * media: cx25821: Fix a resource leak in cx25821_dev_setup() (stable-fixes).
  * media: cx88: Add missing unmap in snd_cx88_hw_params() (git-fixes).
  * media: dvb-core: dmxdevfilter must always flush bufs (stable-fixes).
  * media: dvb-core: fix wrong reinitialization of ringbuffer on reopen (git-
    fixes).
  * media: dvb-net: fix OOB access in ULE extension header tables (git-fixes).
  * media: i2c/tw9903: Fix potential memory leak in tw9903_probe() (git-fixes).
  * media: i2c/tw9906: Fix potential memory leak in tw9906_probe() (git-fixes).
  * media: i2c: ov5647: Correct minimum VBLANK value (git-fixes).
  * media: i2c: ov5647: Correct pixel array offset (git-fixes).
  * media: i2c: ov5647: Fix PIXEL_RATE value for VGA mode (git-fixes).
  * media: i2c: ov5647: Initialize subdev before controls (git-fixes).
  * media: i2c: ov5647: Sensor should report RAW color space (git-fixes).
  * media: i2c: ov5647: use our own mutex for the ctrl lock (git-fixes).
  * media: ipu6: Fix RPM reference leak in probe error paths (git-fixes).
  * media: ipu6: Fix typo and wrong constant in ipu6-mmu.c (git-fixes).
  * media: mtk-mdp: Fix a reference leak bug in mtk_mdp_remove() (git-fixes).
  * media: mtk-mdp: Fix error handling in probe function (git-fixes).
  * media: omap3isp: isp_video_mbus_to_pix/pix_to_mbus fixes (stable-fixes).
  * media: omap3isp: isppreview: always clamp in preview_try_format() (stable-
    fixes).
  * media: omap3isp: set initial format (stable-fixes).
  * media: pvrusb2: fix URB leak in pvr2_send_request_ex (stable-fixes).
  * media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update()
    (git-fixes).
  * media: radio-keene: fix memory leak in error path (git-fixes).
  * media: rkisp1: Fix filter mode register configuration (stable-fixes).
  * media: solo6x10: Check for out of bounds chip_id (stable-fixes).
  * media: tegra-video: Fix memory leak in __tegra_channel_try_format() (git-
    fixes).
  * media: uvcvideo: Fix allocation for small frame sizes (git-fixes).
  * media: v4l2-async: Fix error handling on steps after finding a match
    (stable-fixes).
  * media: venus: vdec: fix error state assignment for zero bytesused (git-
    fixes).
  * media: verisilicon: AV1: Fix enable cdef computation (git-fixes).
  * media: verisilicon: AV1: Fix tile info buffer size (git-fixes).
  * media: verisilicon: AV1: Fix tx mode bit setting (git-fixes).
  * media: verisilicon: AV1: Set IDR flag for intra_only frame type (git-fixes).
  * mfd: arizona: Fix regulator resource leak on wm5102_clear_write_sequencer()
    failure (git-fixes).
  * mfd: core: Add locking around 'mfd_of_node_list' (git-fixes).
  * mfd: tps6105x: Fix kernel-doc warnings relating to the core struct and
    tps6105x_mode (git-fixes).
  * mfd: wm8350-core: Use IRQF_ONESHOT (git-fixes).
  * misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read()
    (stable-fixes).
  * misc: eeprom: Fix EWEN/EWDS/ERAL commands for 93xx56 and 93xx66 (stable-
    fixes).
  * mmc: mmci: Fix device_node reference leak in of_get_dml_pipe_index() (git-
    fixes).
  * mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms (git-fixes).
  * mtd: parsers: Fix memory leak in mtd_parser_tplink_safeloader_parse() (git-
    fixes).
  * mtd: parsers: ofpart: fix OF node refcount leak in parse_fixed_partitions()
    (git-fixes).
  * mtd: rawnand: cadence: Fix return type of CDMA send-and-wait helper (git-
    fixes).
  * mtd: rawnand: pl353: Fix software ECC support (git-fixes).
  * mtd: spinand: Fix kernel doc (git-fixes).
  * myri10ge: avoid uninitialized variable use (stable-fixes).
  * net: mana: Fix double destroy_workqueue on service rescan PCI path (git-
    fixes).
  * net: mana: Implement ndo_tx_timeout and serialize queue resets per port
    (bsc#1257472).
  * net: mana: Ring doorbell at 4 CQ wraparounds (git-fixes).
  * net: mana: Support HW link state events (bsc#1253049).
  * net: nfc: nci: Fix parameter validation for packet data (git-fixes).
  * net: nfc: nci: Fix zero-length proprietary notifications (git-fixes).
  * net: usb: catc: enable basic endpoint checking (git-fixes).
  * net: usb: kalmia: validate USB endpoints (git-fixes).
  * net: usb: kaweth: remove TX queue manipulation in kaweth_set_rx_mode (git-
    fixes).
  * net: usb: kaweth: validate USB endpoints (git-fixes).
  * net: usb: lan78xx: fix TX byte statistics for small packets (git-fixes).
  * net: usb: lan78xx: fix silent drop of packets with checksum errors (git-
    fixes).
  * net: usb: lan78xx: scan all MDIO addresses on LAN7801 (git-fixes).
  * net: usb: pegasus: enable basic endpoint checking (git-fixes).
  * net: usb: r8152: fix transmit queue timeout (stable-fixes).
  * net: usb: sr9700: remove code to drive nonexistent multicast filter (stable-
    fixes).
  * net: usb: sr9700: support devices with virtual driver CD (stable-fixes).
  * net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdlc_memclean() (git-
    fixes).
  * net: wan: farsync: Fix use-after-free bugs caused by unfinished tasklets
    (git-fixes).
  * nfc: hci: shdlc: Stop timers and work before freeing context (git-fixes).
  * nfc: nci: clear NCI_DATA_EXCHANGE before calling completion callback (git-
    fixes).
  * nfc: nci: free skb on nci_transceive early error paths (git-fixes).
  * nfc: nxp-nci: remove interrupt trigger type (stable-fixes).
  * nfc: pn533: properly drop the usb interface reference on disconnect (git-
    fixes).
  * nfc: rawsock: cancel tx_work before socket teardown (git-fixes).
  * nfsd: check that server is running in unlock_filesystem (bsc#1257279).
  * nfsd: use correct loop termination in nfsd4_revoke_states() (git-fixes).
  * nouveau/dpcd: return EBUSY for aux xfer if the device is asleep (git-fixes).
  * ntb: ntb_hw_switchtec: Fix array-index-out-of-bounds access (stable-fixes).
  * ntb: ntb_hw_switchtec: Fix shift-out-of-bounds for 0 mw lut (stable-fixes).
  * nvme-fc: do not hold rport lock when putting ctrl (git-fixes).
  * nvme-fc: release admin tagset if init fails (git-fixes).
  * nvme-pci: disable secondary temp for Wodposit WPBSNM8 (git-fixes).
  * phy: fsl-imx8mq-usb: disable bind/unbind platform driver feature (stable-
    fixes).
  * phy: mvebu-cp110-utmi: fix dr_mode property read from dts (stable-fixes).
  * pinctrl: equilibrium: Fix device node reference leak in pinbank_init() (git-
    fixes).
  * pinctrl: meson: mark the GPIO controller as sleeping (git-fixes).
  * pinctrl: qcom: sm8250-lpass-lpi: Fix i2s2_data_groups definition (git-
    fixes).
  * pinctrl: single: fix refcount leak in pcs_add_gpio_func() (git-fixes).
  * platform/chrome: cros_ec_lightbar: Fix response size initialization (git-
    fixes).
  * platform/chrome: cros_typec_switch: Do not touch struct fwnode_handle::dev
    (git-fixes).
  * platform/x86/amd/pmc: Add quirk for MECHREVO Wujie 15X Pro (stable-fixes).
  * platform/x86: ISST: Add missing write block check (git-fixes).
  * platform/x86: classmate-laptop: Add missing NULL pointer checks (stable-
    fixes).
  * platform/x86: dell-wmi-sysman: Do not hex dump plaintext password data (git-
    fixes).
  * platform/x86: hp-bioscfg: Skip empty attribute names (git-fixes).
  * platform/x86: int0002: Remove IRQF_ONESHOT from request_irq() (git-fixes).
  * platform/x86: intel_telemetry: Fix PSS event register mask (git-fixes).
  * platform/x86: intel_telemetry: Fix swapped arrays in PSS output (git-fixes).
  * platform/x86: panasonic-laptop: Fix sysfs group leak in error path (stable-
    fixes).
  * platform/x86: toshiba_haps: Fix memory leaks in add/remove routines (git-
    fixes).
  * pmdomain: imx: gpcv2: Fix the imx8mm gpu hang due to wrong adb400 reset
    (git-fixes).
  * power: reset: nvmem-reboot-mode: respect cell size for nvmem_cell_write
    (git-fixes).
  * power: supply: ab8500: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: act8945a: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: bq256xx: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: bq25980: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: bq27xxx: fix wrong errno when bus ops are unsupported (git-
    fixes).
  * power: supply: cpcap-battery: Fix use-after-free in power_supply_changed()
    (git-fixes).
  * power: supply: goldfish: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: qcom_battmgr: Recognize "LiP" as lithium-polymer (git-fixes).
  * power: supply: rt9455: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: sbs-battery: Fix use-after-free in power_supply_changed()
    (git-fixes).
  * power: supply: wm97xx: Fix NULL pointer dereference in
    power_supply_changed() (git-fixes).
  * powercap: intel_rapl_tpmi: Remove FW_BUG from invalid version check (git-
    fixes).
  * qmi_wwan: allow max_mtu above hard_mtu to control rx_urb_size (git-fixes).
  * rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net() (git-
    fixes).
  * regmap: maple: free entry on mas_store_gfp() failure (stable-fixes).
  * regulator: core: fix locking in regulator_resolve_supply() error path (git-
    fixes).
  * regulator: core: move supply check earlier in set_machine_constraints()
    (git-fixes).
  * remoteproc: sysmon: Correct subsys_name_len type in QMI request (git-fixes).
  * rpmsg: core: fix race in driver_override_show() and use core helper (git-
    fixes).
  * rtc: interface: Alarm race handling should not discard preceding error (git-
    fixes).
  * rtc: zynqmp: correct frequency value (stable-fixes).
  * s390/cio: Update purge function to unregister the unused subchannels
    (bsc#1254214).
  * s390/ipl: Clear SBP flag when bootprog is set (bsc#1258176).
  * s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253644).
  * s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP (bsc#1254306).
  * scsi: mpi3mr: Event processing debug improvement (bsc#1251186, bsc#1258832).
  * scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT (git-fixes).
  * scsi: storvsc: Remove redundant ternary operators (git-fixes).
  * selftests/bpf: Add tc helpers (bsc#1258860).
  * selftests/bpf: Integrate test_tc_tunnel.sh tests into test_progs
    (bsc#1258860).
  * selftests/bpf: Make test_tc_tunnel.bpf.c compatible with big endian
    platforms (bsc#1258860).
  * selftests/bpf: Remove "&>" usage in the selftests (bsc#1258860).
  * selftests/bpf: Remove test_tc_tunnel.sh (bsc#1258860).
  * selftests/bpf: Support when CONFIG_VXLAN=m (bsc#1258860).
  * selftests/bpf: Use connect_to_addr in test_sock_addr (bsc#1258860).
  * selftests/bpf: Use log_err in open_netns/close_netns (bsc#1258860).
  * selftests/bpf: Use make_sockaddr in test_sock_addr (bsc#1258860).
  * selftests/bpf: Use start_server_addr in test_sock_addr (bsc#1258860).
  * selftests/bpf: add verifier sign extension bound computation tests (git-
    fixes).
  * selftests/bpf: test_tunnel: Add generic_attach* helpers (bsc#1258860).
  * selftests/bpf: test_tunnel: Add ping helpers (bsc#1258860).
  * selftests/bpf: test_tunnel: Move erspan tunnel tests to test_progs
    (bsc#1258860).
  * selftests/bpf: test_tunnel: Move geneve tunnel test to test_progs
    (bsc#1258860).
  * selftests/bpf: test_tunnel: Move gre tunnel test to test_progs
    (bsc#1258860).
  * selftests/bpf: test_tunnel: Move ip6erspan tunnel test to test_progs
    (bsc#1258860).
  * selftests/bpf: test_tunnel: Move ip6geneve tunnel test to test_progs
    (bsc#1258860).
  * selftests/bpf: test_tunnel: Move ip6gre tunnel test to test_progs
    (bsc#1258860).
  * selftests/bpf: test_tunnel: Move ip6tnl tunnel tests to test_progs
    (bsc#1258860).
  * selftests/bpf: test_tunnel: Remove test_tunnel.sh (bsc#1258860).
  * serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA
    termination is done (git-fixes).
  * serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA
    termination is done (stable-fixes).
  * serial: 8250_dw: handle clock enable errors in runtime_resume (git-fixes).
  * serial: 8250_dw: handle clock enable errors in runtime_resume (stable-
    fixes).
  * serial: SH_SCI: improve "DMA support" prompt (git-fixes).
  * serial: imx: change SERIAL_IMX_CONSOLE to bool (git-fixes).
  * shrink_slab_memcg: clear_bits of skipped shrinkers (bsc#1256564).
  * soc: mediatek: svs: Fix memory leak in svs_enable_debug_write() (git-fixes).
  * soc: qcom: cmd-db: Use devm_memremap() to fix memory leak in
    cmd_db_dev_probe (git-fixes).
  * soc: qcom: smem: handle ENOMEM error during probe (git-fixes).
  * soc: ti: k3-socinfo: Fix regmap leak on probe failure (git-fixes).
  * soc: ti: pruss: Fix double free in pruss_clk_mux_setup() (git-fixes).
  * soundwire: dmi-quirks: add mapping for Avell B.ON (OEM rebranded of NUC15)
    (stable-fixes).
  * soundwire: intel_ace2x: add SND_HDA_CORE dependency (git-fixes).
  * spi-geni-qcom: initialize mode related registers to 0 (stable-fixes).
  * spi-geni-qcom: use xfer->bits_per_word for can_dma() (stable-fixes).
  * spi: spi-mem: Limit octal DTR constraints to octal DTR situations (git-
    fixes)
  * spi: spi-mem: Limit octal DTR constraints to octal DTR situations (stable-
    fixes).
  * spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end (git-
    fixes)
  * spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end (stable-
    fixes).
  * spi: spidev: fix lock inversion between spi_lock and buf_lock (git-fixes)
  * spi: stm32: fix Overrun issue at < 8bpw (stable-fixes).
  * spi: tegra114: Preserve SPI mode bits in def_command1_reg (git-fixes).
  * spi: tegra210-quad: Move curr_xfer read inside spinlock (bsc#1257952)
  * spi: tegra210-quad: Move curr_xfer read inside spinlock (git-fixes).
  * spi: tegra210-quad: Protect curr_xfer assignment in (bsc#1257952)
  * spi: tegra210-quad: Protect curr_xfer assignment in
    tegra_qspi_setup_transfer_one (git-fixes).
  * spi: tegra210-quad: Protect curr_xfer check in IRQ handler (bsc#1257952)
  * spi: tegra210-quad: Protect curr_xfer check in IRQ handler (git-fixes).
  * spi: tegra210-quad: Protect curr_xfer clearing in (bsc#1257952)
  * spi: tegra210-quad: Protect curr_xfer clearing in
    tegra_qspi_non_combined_seq_xfer (git-fixes).
  * spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer
    (bsc#1257952)
  * spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (git-
    fixes).
  * spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed
    (bsc#1257952)
  * spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed
    transfer (git-fixes).
  * spi: tegra: Fix a memory leak in tegra_slink_probe() (git-fixes).
  * spi: wpcm-fiu: Fix potential NULL pointer dereference in wpcm_fiu_probe()
    (git-fixes).
  * spi: wpcm-fiu: Fix uninitialized res (git-fixes).
  * spi: wpcm-fiu: Simplify with dev_err_probe() (stable-fixes).
  * spi: wpcm-fiu: Use devm_platform_ioremap_resource_byname() (stable-fixes).
  * staging: rtl8723bs: fix memory leak on failure path (stable-fixes).
  * staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure
    (stable-fixes).
  * staging: rtl8723bs: fix null dereference in find_network (git-fixes).
  * thermal: int340x: Fix sysfs group leak on DLVR registration failure (stable-
    fixes).
  * thermal: intel: x86_pkg_temp_thermal: Handle invalid temperature (git-
    fixes).
  * tools/hv: fcopy: Fix irregularities with size of ring buffer (git-fixes).
  * tools/power cpupower: Reset errno before strtoull() (stable-fixes).
  * tools/power/x86/intel-speed-select: Fix file descriptor leak in
    isolate_cpus() (git-fixes).
  * tools: hv: Enable debug logs for hv_kvp_daemon (git-fixes).
  * tpm: st33zp24: Fix missing cleanup on get_burstcount() error (git-fixes).
  * tpm: tpm_i2c_infineon: Fix locality leak on get_burstcount() failure (git-
    fixes).
  * uio_hv_generic: Align ring size to system page (git-fixes).
  * uio_hv_generic: Use correct size for interrupt and monitor pages (git-
    fixes).
  * usb: bdc: fix sleep during atomic (git-fixes).
  * usb: dwc2: fix resume failure if dr_mode is host (git-fixes).
  * usb: gadget: tegra-xudc: Add handling for BLCG_COREPLL_PWRDN (git-fixes).
  * usb: typec: ucsi: psy: Fix voltage and current max for non-Fixed PDOs (git-
    fixes).
  * watchdog: imx7ulp_wdt: handle the nowayout option (stable-fixes).
  * wifi: ath10k: fix lock protection in
    ath10k_wmi_event_peer_sta_ps_state_chg() (stable-fixes).
  * wifi: ath10k: sdio: add missing lock protection in
    ath10k_sdio_fw_crashed_dump() (git-fixes).
  * wifi: ath11k: Fix failure to connect to a 6 GHz AP (stable-fixes).
  * wifi: ath11k: add pm quirk for Thinkpad Z13/Z16 Gen1 (stable-fixes).
  * wifi: ath12k: fix preferred hardware mode calculation (stable-fixes).
  * wifi: ath9k: debug.h: fix kernel-doc bad lines and struct ath_tx_stats (git-
    fixes).
  * wifi: ath9k: fix kernel-doc warnings in common-debug.h (git-fixes).
  * wifi: cfg80211: Fix bitrate calculation overflow for HE rates (stable-
    fixes).
  * wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).
  * wifi: cfg80211: allow only one NAN interface, also in multi radio (stable-
    fixes).
  * wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() (git-fixes).
  * wifi: cfg80211: stop NAN and P2P in cfg80211_leave (git-fixes).
  * wifi: cfg80211: wext: fix IGTK key ID off-by-one (git-fixes).
  * wifi: cw1200: Fix locking in error paths (git-fixes).
  * wifi: iwlegacy: add missing mutex protection in il3945_store_measurement()
    (stable-fixes).
  * wifi: iwlegacy: add missing mutex protection in il4965_store_tx_power()
    (stable-fixes).
  * wifi: iwlwifi: mvm: check the validity of noa_len (stable-fixes).
  * wifi: iwlwifi: mvm: pause TCM on fast resume (git-fixes).
  * wifi: libertas: fix WARNING in usb_tx_block (stable-fixes).
  * wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration (git-
    fixes).
  * wifi: mac80211: collect station statistics earlier when disconnect (stable-
    fixes).
  * wifi: mac80211: correctly check if CSA is active (stable-fixes).
  * wifi: mac80211: do not increment crypto_tx_tailroom_needed_cnt twice
    (stable-fixes).
  * wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame() (git-
    fixes).
  * wifi: mac80211: ocb: skip rx_no_sta when interface is not joined (stable-
    fixes).
  * wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211()
    (git-fixes).
  * wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211()
    (git-fixes).
  * wifi: mt76: mt7996: Fix possible oob access in mt7996_mac_write_txwi_80211()
    (git-fixes).
  * wifi: radiotap: reject radiotap with unknown bits (git-fixes).
  * wifi: rsi: Do not default to -EOPNOTSUPP in rsi_mac80211_config (git-fixes).
  * wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add (git-fixes).
  * wifi: rtw88: 8822b: Avoid WARNING in rtw8822b_config_trx_mode() (stable-
    fixes).
  * wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() (git-fixes).
  * wifi: rtw88: fix DTIM period handling when conf->dtim_period is zero
    (stable-fixes).
  * wifi: rtw88: rtw8821cu: Add ID for Mercusys MU6H (stable-fixes).
  * wifi: rtw89: 8922a: set random mac if efuse contains zeroes (stable-fixes).
  * wifi: rtw89: mac: correct page number for CSI response (stable-fixes).
  * wifi: rtw89: pci: restore LDO setting after device resume (stable-fixes).
  * wifi: rtw89: ser: enable error IMR after recovering from L1 (stable-fixes).
  * wifi: rtw89: wow: add reason codes for disassociation in WoWLAN mode
    (stable-fixes).
  * wifi: wlcore: Fix a locking bug (git-fixes).
  * wifi: wlcore: ensure skb headroom before skb_push (stable-fixes).
  * workqueue: mark power efficient workqueue as unbounded if (bsc#1257891)
  * x86/hyperv: Fix usage of cpu_online_mask to get valid cpu (git-fixes).
  * x86/hyperv: Fix warnings for missing export.h header inclusion (git-fixes).
  * x86/hyperv: Use named operands in inline asm (git-fixes).
  * x86/hyperv: fix an indentation issue in mshyperv.h (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Live Patching 15-SP7  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-962=1

  * SUSE Real Time Module 15-SP7  
    zypper in -t patch SUSE-SLE-Module-RT-15-SP7-2026-962=1

## Package List:

  * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64)
    * kernel-livepatch-SLE15-SP7-RT_Update_10-debugsource-1-150700.1.3.1
    * kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1
    * kernel-livepatch-6_4_0-150700_7_34-rt-debuginfo-1-150700.1.3.1
  * SUSE Real Time Module 15-SP7 (x86_64)
    * kernel-rt-debuginfo-6.4.0-150700.7.34.1
    * gfs2-kmp-rt-6.4.0-150700.7.34.1
    * kernel-syms-rt-6.4.0-150700.7.34.1
    * ocfs2-kmp-rt-debuginfo-6.4.0-150700.7.34.1
    * kernel-rt-devel-debuginfo-6.4.0-150700.7.34.1
    * kernel-rt-devel-6.4.0-150700.7.34.1
    * ocfs2-kmp-rt-6.4.0-150700.7.34.1
    * gfs2-kmp-rt-debuginfo-6.4.0-150700.7.34.1
    * cluster-md-kmp-rt-6.4.0-150700.7.34.1
    * kernel-rt-debugsource-6.4.0-150700.7.34.1
    * dlm-kmp-rt-debuginfo-6.4.0-150700.7.34.1
    * dlm-kmp-rt-6.4.0-150700.7.34.1
    * cluster-md-kmp-rt-debuginfo-6.4.0-150700.7.34.1
  * SUSE Real Time Module 15-SP7 (noarch)
    * kernel-devel-rt-6.4.0-150700.7.34.1
    * kernel-source-rt-6.4.0-150700.7.34.1
  * SUSE Real Time Module 15-SP7 (nosrc x86_64)
    * kernel-rt-6.4.0-150700.7.34.1

## References:

  * https://www.suse.com/security/cve/CVE-2023-53817.html
  * https://www.suse.com/security/cve/CVE-2025-39748.html
  * https://www.suse.com/security/cve/CVE-2025-39817.html
  * https://www.suse.com/security/cve/CVE-2025-39964.html
  * https://www.suse.com/security/cve/CVE-2025-40099.html
  * https://www.suse.com/security/cve/CVE-2025-40103.html
  * https://www.suse.com/security/cve/CVE-2025-40201.html
  * https://www.suse.com/security/cve/CVE-2025-40253.html
  * https://www.suse.com/security/cve/CVE-2025-68283.html
  * https://www.suse.com/security/cve/CVE-2025-68295.html
  * https://www.suse.com/security/cve/CVE-2025-68374.html
  * https://www.suse.com/security/cve/CVE-2025-68735.html
  * https://www.suse.com/security/cve/CVE-2025-68736.html
  * https://www.suse.com/security/cve/CVE-2025-68778.html
  * https://www.suse.com/security/cve/CVE-2025-68785.html
  * https://www.suse.com/security/cve/CVE-2025-68810.html
  * https://www.suse.com/security/cve/CVE-2025-71071.html
  * https://www.suse.com/security/cve/CVE-2025-71104.html
  * https://www.suse.com/security/cve/CVE-2025-71113.html
  * https://www.suse.com/security/cve/CVE-2025-71125.html
  * https://www.suse.com/security/cve/CVE-2025-71126.html
  * https://www.suse.com/security/cve/CVE-2025-71148.html
  * https://www.suse.com/security/cve/CVE-2025-71182.html
  * https://www.suse.com/security/cve/CVE-2025-71184.html
  * https://www.suse.com/security/cve/CVE-2025-71185.html
  * https://www.suse.com/security/cve/CVE-2025-71188.html
  * https://www.suse.com/security/cve/CVE-2025-71189.html
  * https://www.suse.com/security/cve/CVE-2025-71190.html
  * https://www.suse.com/security/cve/CVE-2025-71191.html
  * https://www.suse.com/security/cve/CVE-2025-71192.html
  * https://www.suse.com/security/cve/CVE-2025-71194.html
  * https://www.suse.com/security/cve/CVE-2025-71195.html
  * https://www.suse.com/security/cve/CVE-2025-71196.html
  * https://www.suse.com/security/cve/CVE-2025-71197.html
  * https://www.suse.com/security/cve/CVE-2025-71198.html
  * https://www.suse.com/security/cve/CVE-2025-71199.html
  * https://www.suse.com/security/cve/CVE-2025-71200.html
  * https://www.suse.com/security/cve/CVE-2025-71222.html
  * https://www.suse.com/security/cve/CVE-2025-71224.html
  * https://www.suse.com/security/cve/CVE-2025-71225.html
  * https://www.suse.com/security/cve/CVE-2025-71229.html
  * https://www.suse.com/security/cve/CVE-2025-71231.html
  * https://www.suse.com/security/cve/CVE-2025-71232.html
  * https://www.suse.com/security/cve/CVE-2025-71234.html
  * https://www.suse.com/security/cve/CVE-2025-71235.html
  * https://www.suse.com/security/cve/CVE-2025-71236.html
  * https://www.suse.com/security/cve/CVE-2026-22979.html
  * https://www.suse.com/security/cve/CVE-2026-22982.html
  * https://www.suse.com/security/cve/CVE-2026-22989.html
  * https://www.suse.com/security/cve/CVE-2026-22998.html
  * https://www.suse.com/security/cve/CVE-2026-23003.html
  * https://www.suse.com/security/cve/CVE-2026-23004.html
  * https://www.suse.com/security/cve/CVE-2026-23010.html
  * https://www.suse.com/security/cve/CVE-2026-23017.html
  * https://www.suse.com/security/cve/CVE-2026-23021.html
  * https://www.suse.com/security/cve/CVE-2026-23023.html
  * https://www.suse.com/security/cve/CVE-2026-23026.html
  * https://www.suse.com/security/cve/CVE-2026-23033.html
  * https://www.suse.com/security/cve/CVE-2026-23035.html
  * https://www.suse.com/security/cve/CVE-2026-23037.html
  * https://www.suse.com/security/cve/CVE-2026-23038.html
  * https://www.suse.com/security/cve/CVE-2026-23049.html
  * https://www.suse.com/security/cve/CVE-2026-23053.html
  * https://www.suse.com/security/cve/CVE-2026-23054.html
  * https://www.suse.com/security/cve/CVE-2026-23056.html
  * https://www.suse.com/security/cve/CVE-2026-23057.html
  * https://www.suse.com/security/cve/CVE-2026-23058.html
  * https://www.suse.com/security/cve/CVE-2026-23060.html
  * https://www.suse.com/security/cve/CVE-2026-23061.html
  * https://www.suse.com/security/cve/CVE-2026-23062.html
  * https://www.suse.com/security/cve/CVE-2026-23063.html
  * https://www.suse.com/security/cve/CVE-2026-23064.html
  * https://www.suse.com/security/cve/CVE-2026-23065.html
  * https://www.suse.com/security/cve/CVE-2026-23068.html
  * https://www.suse.com/security/cve/CVE-2026-23069.html
  * https://www.suse.com/security/cve/CVE-2026-23070.html
  * https://www.suse.com/security/cve/CVE-2026-23071.html
  * https://www.suse.com/security/cve/CVE-2026-23073.html
  * https://www.suse.com/security/cve/CVE-2026-23074.html
  * https://www.suse.com/security/cve/CVE-2026-23076.html
  * https://www.suse.com/security/cve/CVE-2026-23078.html
  * https://www.suse.com/security/cve/CVE-2026-23080.html
  * https://www.suse.com/security/cve/CVE-2026-23082.html
  * https://www.suse.com/security/cve/CVE-2026-23083.html
  * https://www.suse.com/security/cve/CVE-2026-23084.html
  * https://www.suse.com/security/cve/CVE-2026-23085.html
  * https://www.suse.com/security/cve/CVE-2026-23086.html
  * https://www.suse.com/security/cve/CVE-2026-23088.html
  * https://www.suse.com/security/cve/CVE-2026-23089.html
  * https://www.suse.com/security/cve/CVE-2026-23090.html
  * https://www.suse.com/security/cve/CVE-2026-23091.html
  * https://www.suse.com/security/cve/CVE-2026-23094.html
  * https://www.suse.com/security/cve/CVE-2026-23095.html
  * https://www.suse.com/security/cve/CVE-2026-23096.html
  * https://www.suse.com/security/cve/CVE-2026-23099.html
  * https://www.suse.com/security/cve/CVE-2026-23101.html
  * https://www.suse.com/security/cve/CVE-2026-23102.html
  * https://www.suse.com/security/cve/CVE-2026-23104.html
  * https://www.suse.com/security/cve/CVE-2026-23105.html
  * https://www.suse.com/security/cve/CVE-2026-23107.html
  * https://www.suse.com/security/cve/CVE-2026-23108.html
  * https://www.suse.com/security/cve/CVE-2026-23110.html
  * https://www.suse.com/security/cve/CVE-2026-23111.html
  * https://www.suse.com/security/cve/CVE-2026-23112.html
  * https://www.suse.com/security/cve/CVE-2026-23113.html
  * https://www.suse.com/security/cve/CVE-2026-23116.html
  * https://www.suse.com/security/cve/CVE-2026-23119.html
  * https://www.suse.com/security/cve/CVE-2026-23121.html
  * https://www.suse.com/security/cve/CVE-2026-23125.html
  * https://www.suse.com/security/cve/CVE-2026-23128.html
  * https://www.suse.com/security/cve/CVE-2026-23129.html
  * https://www.suse.com/security/cve/CVE-2026-23131.html
  * https://www.suse.com/security/cve/CVE-2026-23133.html
  * https://www.suse.com/security/cve/CVE-2026-23135.html
  * https://www.suse.com/security/cve/CVE-2026-23139.html
  * https://www.suse.com/security/cve/CVE-2026-23141.html
  * https://www.suse.com/security/cve/CVE-2026-23145.html
  * https://www.suse.com/security/cve/CVE-2026-23146.html
  * https://www.suse.com/security/cve/CVE-2026-23150.html
  * https://www.suse.com/security/cve/CVE-2026-23151.html
  * https://www.suse.com/security/cve/CVE-2026-23152.html
  * https://www.suse.com/security/cve/CVE-2026-23154.html
  * https://www.suse.com/security/cve/CVE-2026-23155.html
  * https://www.suse.com/security/cve/CVE-2026-23156.html
  * https://www.suse.com/security/cve/CVE-2026-23157.html
  * https://www.suse.com/security/cve/CVE-2026-23163.html
  * https://www.suse.com/security/cve/CVE-2026-23166.html
  * https://www.suse.com/security/cve/CVE-2026-23167.html
  * https://www.suse.com/security/cve/CVE-2026-23169.html
  * https://www.suse.com/security/cve/CVE-2026-23170.html
  * https://www.suse.com/security/cve/CVE-2026-23171.html
  * https://www.suse.com/security/cve/CVE-2026-23172.html
  * https://www.suse.com/security/cve/CVE-2026-23173.html
  * https://www.suse.com/security/cve/CVE-2026-23176.html
  * https://www.suse.com/security/cve/CVE-2026-23178.html
  * https://www.suse.com/security/cve/CVE-2026-23179.html
  * https://www.suse.com/security/cve/CVE-2026-23182.html
  * https://www.suse.com/security/cve/CVE-2026-23190.html
  * https://www.suse.com/security/cve/CVE-2026-23191.html
  * https://www.suse.com/security/cve/CVE-2026-23198.html
  * https://www.suse.com/security/cve/CVE-2026-23202.html
  * https://www.suse.com/security/cve/CVE-2026-23204.html
  * https://www.suse.com/security/cve/CVE-2026-23207.html
  * https://www.suse.com/security/cve/CVE-2026-23208.html
  * https://www.suse.com/security/cve/CVE-2026-23209.html
  * https://www.suse.com/security/cve/CVE-2026-23210.html
  * https://www.suse.com/security/cve/CVE-2026-23213.html
  * https://www.suse.com/security/cve/CVE-2026-23214.html
  * https://www.suse.com/security/cve/CVE-2026-23221.html
  * https://www.suse.com/security/cve/CVE-2026-23222.html
  * https://www.suse.com/security/cve/CVE-2026-23229.html
  * https://www.suse.com/security/cve/CVE-2026-23268.html
  * https://www.suse.com/security/cve/CVE-2026-23269.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1241345
  * https://bugzilla.suse.com/show_bug.cgi?id=1245728
  * https://bugzilla.suse.com/show_bug.cgi?id=1247180
  * https://bugzilla.suse.com/show_bug.cgi?id=1249587
  * https://bugzilla.suse.com/show_bug.cgi?id=1249998
  * https://bugzilla.suse.com/show_bug.cgi?id=1251135
  * https://bugzilla.suse.com/show_bug.cgi?id=1251186
  * https://bugzilla.suse.com/show_bug.cgi?id=1251966
  * https://bugzilla.suse.com/show_bug.cgi?id=1251971
  * https://bugzilla.suse.com/show_bug.cgi?id=1252008
  * https://bugzilla.suse.com/show_bug.cgi?id=1252266
  * https://bugzilla.suse.com/show_bug.cgi?id=1252911
  * https://bugzilla.suse.com/show_bug.cgi?id=1252924
  * https://bugzilla.suse.com/show_bug.cgi?id=1253049
  * https://bugzilla.suse.com/show_bug.cgi?id=1253129
  * https://bugzilla.suse.com/show_bug.cgi?id=1253644
  * https://bugzilla.suse.com/show_bug.cgi?id=1253691
  * https://bugzilla.suse.com/show_bug.cgi?id=1254214
  * https://bugzilla.suse.com/show_bug.cgi?id=1254306
  * https://bugzilla.suse.com/show_bug.cgi?id=1254992
  * https://bugzilla.suse.com/show_bug.cgi?id=1255084
  * https://bugzilla.suse.com/show_bug.cgi?id=1255129
  * https://bugzilla.suse.com/show_bug.cgi?id=1255265
  * https://bugzilla.suse.com/show_bug.cgi?id=1255379
  * https://bugzilla.suse.com/show_bug.cgi?id=1255530
  * https://bugzilla.suse.com/show_bug.cgi?id=1255698
  * https://bugzilla.suse.com/show_bug.cgi?id=1255811
  * https://bugzilla.suse.com/show_bug.cgi?id=1256564
  * https://bugzilla.suse.com/show_bug.cgi?id=1256640
  * https://bugzilla.suse.com/show_bug.cgi?id=1256679
  * https://bugzilla.suse.com/show_bug.cgi?id=1256683
  * https://bugzilla.suse.com/show_bug.cgi?id=1256708
  * https://bugzilla.suse.com/show_bug.cgi?id=1256716
  * https://bugzilla.suse.com/show_bug.cgi?id=1256755
  * https://bugzilla.suse.com/show_bug.cgi?id=1256784
  * https://bugzilla.suse.com/show_bug.cgi?id=1256802
  * https://bugzilla.suse.com/show_bug.cgi?id=1256863
  * https://bugzilla.suse.com/show_bug.cgi?id=1257159
  * https://bugzilla.suse.com/show_bug.cgi?id=1257179
  * https://bugzilla.suse.com/show_bug.cgi?id=1257209
  * https://bugzilla.suse.com/show_bug.cgi?id=1257228
  * https://bugzilla.suse.com/show_bug.cgi?id=1257231
  * https://bugzilla.suse.com/show_bug.cgi?id=1257246
  * https://bugzilla.suse.com/show_bug.cgi?id=1257279
  * https://bugzilla.suse.com/show_bug.cgi?id=1257332
  * https://bugzilla.suse.com/show_bug.cgi?id=1257466
  * https://bugzilla.suse.com/show_bug.cgi?id=1257472
  * https://bugzilla.suse.com/show_bug.cgi?id=1257473
  * https://bugzilla.suse.com/show_bug.cgi?id=1257552
  * https://bugzilla.suse.com/show_bug.cgi?id=1257553
  * https://bugzilla.suse.com/show_bug.cgi?id=1257554
  * https://bugzilla.suse.com/show_bug.cgi?id=1257556
  * https://bugzilla.suse.com/show_bug.cgi?id=1257557
  * https://bugzilla.suse.com/show_bug.cgi?id=1257559
  * https://bugzilla.suse.com/show_bug.cgi?id=1257560
  * https://bugzilla.suse.com/show_bug.cgi?id=1257562
  * https://bugzilla.suse.com/show_bug.cgi?id=1257570
  * https://bugzilla.suse.com/show_bug.cgi?id=1257573
  * https://bugzilla.suse.com/show_bug.cgi?id=1257576
  * https://bugzilla.suse.com/show_bug.cgi?id=1257579
  * https://bugzilla.suse.com/show_bug.cgi?id=1257580
  * https://bugzilla.suse.com/show_bug.cgi?id=1257586
  * https://bugzilla.suse.com/show_bug.cgi?id=1257635
  * https://bugzilla.suse.com/show_bug.cgi?id=1257679
  * https://bugzilla.suse.com/show_bug.cgi?id=1257687
  * https://bugzilla.suse.com/show_bug.cgi?id=1257704
  * https://bugzilla.suse.com/show_bug.cgi?id=1257706
  * https://bugzilla.suse.com/show_bug.cgi?id=1257707
  * https://bugzilla.suse.com/show_bug.cgi?id=1257709
  * https://bugzilla.suse.com/show_bug.cgi?id=1257714
  * https://bugzilla.suse.com/show_bug.cgi?id=1257715
  * https://bugzilla.suse.com/show_bug.cgi?id=1257716
  * https://bugzilla.suse.com/show_bug.cgi?id=1257718
  * https://bugzilla.suse.com/show_bug.cgi?id=1257722
  * https://bugzilla.suse.com/show_bug.cgi?id=1257723
  * https://bugzilla.suse.com/show_bug.cgi?id=1257729
  * https://bugzilla.suse.com/show_bug.cgi?id=1257732
  * https://bugzilla.suse.com/show_bug.cgi?id=1257734
  * https://bugzilla.suse.com/show_bug.cgi?id=1257735
  * https://bugzilla.suse.com/show_bug.cgi?id=1257739
  * https://bugzilla.suse.com/show_bug.cgi?id=1257740
  * https://bugzilla.suse.com/show_bug.cgi?id=1257741
  * https://bugzilla.suse.com/show_bug.cgi?id=1257742
  * https://bugzilla.suse.com/show_bug.cgi?id=1257743
  * https://bugzilla.suse.com/show_bug.cgi?id=1257745
  * https://bugzilla.suse.com/show_bug.cgi?id=1257749
  * https://bugzilla.suse.com/show_bug.cgi?id=1257750
  * https://bugzilla.suse.com/show_bug.cgi?id=1257755
  * https://bugzilla.suse.com/show_bug.cgi?id=1257757
  * https://bugzilla.suse.com/show_bug.cgi?id=1257758
  * https://bugzilla.suse.com/show_bug.cgi?id=1257759
  * https://bugzilla.suse.com/show_bug.cgi?id=1257761
  * https://bugzilla.suse.com/show_bug.cgi?id=1257762
  * https://bugzilla.suse.com/show_bug.cgi?id=1257763
  * https://bugzilla.suse.com/show_bug.cgi?id=1257765
  * https://bugzilla.suse.com/show_bug.cgi?id=1257768
  * https://bugzilla.suse.com/show_bug.cgi?id=1257770
  * https://bugzilla.suse.com/show_bug.cgi?id=1257772
  * https://bugzilla.suse.com/show_bug.cgi?id=1257775
  * https://bugzilla.suse.com/show_bug.cgi?id=1257776
  * https://bugzilla.suse.com/show_bug.cgi?id=1257788
  * https://bugzilla.suse.com/show_bug.cgi?id=1257789
  * https://bugzilla.suse.com/show_bug.cgi?id=1257790
  * https://bugzilla.suse.com/show_bug.cgi?id=1257805
  * https://bugzilla.suse.com/show_bug.cgi?id=1257808
  * https://bugzilla.suse.com/show_bug.cgi?id=1257809
  * https://bugzilla.suse.com/show_bug.cgi?id=1257811
  * https://bugzilla.suse.com/show_bug.cgi?id=1257813
  * https://bugzilla.suse.com/show_bug.cgi?id=1257814
  * https://bugzilla.suse.com/show_bug.cgi?id=1257816
  * https://bugzilla.suse.com/show_bug.cgi?id=1257830
  * https://bugzilla.suse.com/show_bug.cgi?id=1257891
  * https://bugzilla.suse.com/show_bug.cgi?id=1257952
  * https://bugzilla.suse.com/show_bug.cgi?id=1258037
  * https://bugzilla.suse.com/show_bug.cgi?id=1258153
  * https://bugzilla.suse.com/show_bug.cgi?id=1258176
  * https://bugzilla.suse.com/show_bug.cgi?id=1258181
  * https://bugzilla.suse.com/show_bug.cgi?id=1258184
  * https://bugzilla.suse.com/show_bug.cgi?id=1258222
  * https://bugzilla.suse.com/show_bug.cgi?id=1258226
  * https://bugzilla.suse.com/show_bug.cgi?id=1258234
  * https://bugzilla.suse.com/show_bug.cgi?id=1258237
  * https://bugzilla.suse.com/show_bug.cgi?id=1258245
  * https://bugzilla.suse.com/show_bug.cgi?id=1258249
  * https://bugzilla.suse.com/show_bug.cgi?id=1258252
  * https://bugzilla.suse.com/show_bug.cgi?id=1258256
  * https://bugzilla.suse.com/show_bug.cgi?id=1258259
  * https://bugzilla.suse.com/show_bug.cgi?id=1258272
  * https://bugzilla.suse.com/show_bug.cgi?id=1258273
  * https://bugzilla.suse.com/show_bug.cgi?id=1258277
  * https://bugzilla.suse.com/show_bug.cgi?id=1258278
  * https://bugzilla.suse.com/show_bug.cgi?id=1258279
  * https://bugzilla.suse.com/show_bug.cgi?id=1258286
  * https://bugzilla.suse.com/show_bug.cgi?id=1258293
  * https://bugzilla.suse.com/show_bug.cgi?id=1258297
  * https://bugzilla.suse.com/show_bug.cgi?id=1258298
  * https://bugzilla.suse.com/show_bug.cgi?id=1258299
  * https://bugzilla.suse.com/show_bug.cgi?id=1258304
  * https://bugzilla.suse.com/show_bug.cgi?id=1258309
  * https://bugzilla.suse.com/show_bug.cgi?id=1258313
  * https://bugzilla.suse.com/show_bug.cgi?id=1258317
  * https://bugzilla.suse.com/show_bug.cgi?id=1258321
  * https://bugzilla.suse.com/show_bug.cgi?id=1258326
  * https://bugzilla.suse.com/show_bug.cgi?id=1258338
  * https://bugzilla.suse.com/show_bug.cgi?id=1258340
  * https://bugzilla.suse.com/show_bug.cgi?id=1258349
  * https://bugzilla.suse.com/show_bug.cgi?id=1258354
  * https://bugzilla.suse.com/show_bug.cgi?id=1258358
  * https://bugzilla.suse.com/show_bug.cgi?id=1258374
  * https://bugzilla.suse.com/show_bug.cgi?id=1258376
  * https://bugzilla.suse.com/show_bug.cgi?id=1258377
  * https://bugzilla.suse.com/show_bug.cgi?id=1258379
  * https://bugzilla.suse.com/show_bug.cgi?id=1258389
  * https://bugzilla.suse.com/show_bug.cgi?id=1258394
  * https://bugzilla.suse.com/show_bug.cgi?id=1258395
  * https://bugzilla.suse.com/show_bug.cgi?id=1258397
  * https://bugzilla.suse.com/show_bug.cgi?id=1258411
  * https://bugzilla.suse.com/show_bug.cgi?id=1258415
  * https://bugzilla.suse.com/show_bug.cgi?id=1258419
  * https://bugzilla.suse.com/show_bug.cgi?id=1258422
  * https://bugzilla.suse.com/show_bug.cgi?id=1258424
  * https://bugzilla.suse.com/show_bug.cgi?id=1258429
  * https://bugzilla.suse.com/show_bug.cgi?id=1258442
  * https://bugzilla.suse.com/show_bug.cgi?id=1258464
  * https://bugzilla.suse.com/show_bug.cgi?id=1258465
  * https://bugzilla.suse.com/show_bug.cgi?id=1258468
  * https://bugzilla.suse.com/show_bug.cgi?id=1258469
  * https://bugzilla.suse.com/show_bug.cgi?id=1258484
  * https://bugzilla.suse.com/show_bug.cgi?id=1258517
  * https://bugzilla.suse.com/show_bug.cgi?id=1258518
  * https://bugzilla.suse.com/show_bug.cgi?id=1258519
  * https://bugzilla.suse.com/show_bug.cgi?id=1258520
  * https://bugzilla.suse.com/show_bug.cgi?id=1258524
  * https://bugzilla.suse.com/show_bug.cgi?id=1258544
  * https://bugzilla.suse.com/show_bug.cgi?id=1258660
  * https://bugzilla.suse.com/show_bug.cgi?id=1258824
  * https://bugzilla.suse.com/show_bug.cgi?id=1258832
  * https://bugzilla.suse.com/show_bug.cgi?id=1258849
  * https://bugzilla.suse.com/show_bug.cgi?id=1258860
  * https://bugzilla.suse.com/show_bug.cgi?id=1258928
  * https://bugzilla.suse.com/show_bug.cgi?id=1259070
  * https://bugzilla.suse.com/show_bug.cgi?id=1259130
  * https://bugzilla.suse.com/show_bug.cgi?id=1259558
  * https://bugzilla.suse.com/show_bug.cgi?id=1259580

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260323/d9990517/attachment.htm>


More information about the sle-security-updates mailing list