<div class="container">
<h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:0784-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td></td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">bsc#1012628</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">bsc#1215199</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219367">bsc#1219367</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222672">bsc#1222672</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222803">bsc#1222803</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">bsc#1225742</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225981">bsc#1225981</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228521">bsc#1228521</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230235">bsc#1230235</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230438">bsc#1230438</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230439">bsc#1230439</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">bsc#1231920</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232159">bsc#1232159</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">bsc#1232198</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">bsc#1232201</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232508">bsc#1232508</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232520">bsc#1232520</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">bsc#1232919</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233109">bsc#1233109</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">bsc#1234853</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234857">bsc#1234857</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">bsc#1234891</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">bsc#1234963</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235032">bsc#1235032</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">bsc#1235054</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">bsc#1235061</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">bsc#1235073</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235435">bsc#1235435</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235592">bsc#1235592</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235609">bsc#1235609</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235932">bsc#1235932</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235933">bsc#1235933</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236113">bsc#1236113</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236114">bsc#1236114</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236115">bsc#1236115</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236122">bsc#1236122</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236123">bsc#1236123</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236133">bsc#1236133</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236138">bsc#1236138</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236199">bsc#1236199</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236200">bsc#1236200</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236203">bsc#1236203</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236205">bsc#1236205</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236573">bsc#1236573</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236575">bsc#1236575</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236576">bsc#1236576</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236591">bsc#1236591</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236661">bsc#1236661</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236677">bsc#1236677</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236700">bsc#1236700</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236752">bsc#1236752</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236821">bsc#1236821</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236822">bsc#1236822</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236896">bsc#1236896</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236897">bsc#1236897</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236952">bsc#1236952</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236967">bsc#1236967</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236994">bsc#1236994</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237007">bsc#1237007</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237017">bsc#1237017</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237025">bsc#1237025</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237028">bsc#1237028</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237045">bsc#1237045</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237126">bsc#1237126</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237132">bsc#1237132</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237139">bsc#1237139</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237155">bsc#1237155</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237158">bsc#1237158</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237159">bsc#1237159</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237232">bsc#1237232</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237234">bsc#1237234</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237325">bsc#1237325</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237415">bsc#1237415</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237452">bsc#1237452</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237558">bsc#1237558</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237562">bsc#1237562</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237563">bsc#1237563</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10028">jsc#PED-10028</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-12094">jsc#PED-12094</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-348">jsc#PED-348</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-6143">jsc#PED-6143</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52924.html">CVE-2023-52924</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52925.html">CVE-2023-52925</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26708.html">CVE-2024-26708</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26810.html">CVE-2024-26810</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41055.html">CVE-2024-41055</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44974.html">CVE-2024-44974</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45009.html">CVE-2024-45009</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45010.html">CVE-2024-45010</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47701.html">CVE-2024-47701</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49884.html">CVE-2024-49884</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49950.html">CVE-2024-49950</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50073.html">CVE-2024-50073</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50085.html">CVE-2024-50085</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">CVE-2024-50115</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50185.html">CVE-2024-50185</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53147.html">CVE-2024-53147</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53173.html">CVE-2024-53173</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53226.html">CVE-2024-53226</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53239.html">CVE-2024-53239</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56539.html">CVE-2024-56539</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56548.html">CVE-2024-56548</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56568.html">CVE-2024-56568</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56579.html">CVE-2024-56579</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56605.html">CVE-2024-56605</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56647.html">CVE-2024-56647</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56720.html">CVE-2024-56720</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57889.html">CVE-2024-57889</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57948.html">CVE-2024-57948</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21636.html">CVE-2025-21636</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21637.html">CVE-2025-21637</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21638.html">CVE-2025-21638</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21639.html">CVE-2025-21639</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21640.html">CVE-2025-21640</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21647.html">CVE-2025-21647</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21680.html">CVE-2025-21680</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21684.html">CVE-2025-21684</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21687.html">CVE-2025-21687</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21688.html">CVE-2025-21688</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21689.html">CVE-2025-21689</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21690.html">CVE-2025-21690</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21692.html">CVE-2025-21692</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21697.html">CVE-2025-21697</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21699.html">CVE-2025-21699</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21700.html">CVE-2025-21700</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52924</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">1.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52924</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">1.9</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52925</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52925</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52925</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26708</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26708</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26810</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26810</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41055</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41055</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44974</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.9</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44974</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44974</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45009</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45009</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45010</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45010</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-49884</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-49884</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-49950</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-49950</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.9</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50085</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50085</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50085</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.5</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50185</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-50185</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53147</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53147</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.3</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53226</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53226</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53226</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.5</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56539</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.6</span>
<span class="cvss-vector">CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56539</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.0</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56548</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.4</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56548</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56568</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56568</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56568</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56579</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56579</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56579</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.5</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56647</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56647</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56647</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56720</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56720</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56720</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-57889</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-57889</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-57948</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.4</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-57948</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21636</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21636</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21636</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21637</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21637</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21637</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21638</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21638</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21638</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21639</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21639</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21639</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21640</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21640</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21640</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21647</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.5</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21647</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21680</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.5</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21680</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21680</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21684</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21684</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21684</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21687</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.5</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21687</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21687</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21688</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21688</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21689</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21689</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21689</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21690</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21690</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21690</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21692</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.9</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21692</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21692</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21697</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21697</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21699</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21699</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21699</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21700</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21700</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-21700</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">Confidential Computing Module 15-SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 44 vulnerabilities, contains four features and has 33 security fixes can now be installed.</p>
<h2>Description:</h2>
<p>The SUSE Linux Enterprise 15 SP6 Confidential Computing kernel was updated to receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2024-26708: mptcp: fastopen and PM-trigger subflow shutdown can race (bsc#1222672).</li>
<li>CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235).</li>
<li>CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438).</li>
<li>CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439).</li>
<li>CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508).</li>
<li>CVE-2024-50185: mptcp: handle consistently DSS corruption (bsc#1233109).</li>
<li>CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857).</li>
<li>CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device bound (bsc#1235032).</li>
<li>CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435).</li>
<li>CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592).</li>
<li>CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113).</li>
<li>CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114).</li>
<li>CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115).</li>
<li>CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122).</li>
<li>CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123).</li>
<li>CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133).</li>
<li>CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700).</li>
<li>CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045).</li>
<li>CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).</li>
<li>CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V (stable-fixes).</li>
<li>ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes).</li>
<li>ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED (stable-fixes).</li>
<li>ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes).</li>
<li>ALSA: hda: Add error check for snd_ctl_rename_id() in snd_hda_create_dig_out_ctls() (git-fixes).</li>
<li>ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes).</li>
<li>APEI: GHES: Have GHES honor the panic= setting (stable-fixes).</li>
<li>ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V (stable-fixes).</li>
<li>ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes).</li>
<li>ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (git-fixes).</li>
<li>ASoC: amd: Add ACPI dependency to fix build error (stable-fixes).</li>
<li>ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes).</li>
<li>ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git-fixes).</li>
<li>Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (stable-fixes).</li>
<li>HID: Wacom: Add PCI Wacom device support (stable-fixes).</li>
<li>HID: hid-steam: Add Deck IMU support (stable-fixes).</li>
<li>HID: hid-steam: Add gamepad-only mode switched to by holding options (stable-fixes).</li>
<li>HID: hid-steam: Avoid overwriting smoothing parameter (stable-fixes).</li>
<li>HID: hid-steam: Clean up locking (stable-fixes).</li>
<li>HID: hid-steam: Disable watchdog instead of using a heartbeat (stable-fixes).</li>
<li>HID: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git-fixes).</li>
<li>HID: hid-steam: Fix cleanup in probe() (git-fixes).</li>
<li>HID: hid-steam: Make sure rumble work is canceled on removal (stable-fixes).</li>
<li>HID: hid-steam: Move hidraw input (un)registering to work (git-fixes).</li>
<li>HID: hid-steam: Update list of identifiers from SDL (stable-fixes).</li>
<li>HID: hid-steam: remove pointless error message (stable-fixes).</li>
<li>HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() (git-fixes).</li>
<li>HID: multitouch: Add NULL check in mt_input_configured (git-fixes).</li>
<li>Input: allocate keycode for phone linking (stable-fixes).</li>
<li>KVM: SVM: Propagate error from snp_guest_req_init() to userspace (jsc#PED-348).</li>
<li>KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared (git-fixes).</li>
<li>KVM: VMX: Fix comment of handle_vmx_instruction() (git-fixes).</li>
<li>KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes).</li>
<li>KVM: arm64: Do not eagerly teardown the vgic on init error (git-fixes).</li>
<li>KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (git-fixes).</li>
<li>KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes).</li>
<li>KVM: arm64: Flush hyp bss section after initialization of variables in bss (git-fixes).</li>
<li>KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (git-fixes)</li>
<li>KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes).</li>
<li>KVM: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes).</li>
<li>KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes).</li>
<li>KVM: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes bsc#1237155).</li>
<li>KVM: x86/mmu: Process atomically-zapped SPTEs after TLB flush (jsc#PED-6143).</li>
<li>KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE (git-fixes).</li>
<li>KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes).</li>
<li>KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX (git-fixes).</li>
<li>KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes).</li>
<li>KVM: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes).</li>
<li>KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git-fixes).</li>
<li>KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git-fixes).</li>
<li>KVM: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348).</li>
<li>KVM: x86: Zero out PV features cache when the CPUID leaf is not present (git-fixes).</li>
<li>PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes).</li>
<li>PCI: Use downstream bridges for distributing resources (bsc#1237325).</li>
<li>PCI: hookup irq_get_affinity callback (bsc#1236896).</li>
<li>PCI: imx6: Simplify clock handling by using clk_bulk*() function (git-fixes).</li>
<li>PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes).</li>
<li>Pickup RXE code change introduced by upstream.</li>
<li>RDMA/efa: Reset device on probe failure (git-fixes)</li>
<li>RDMA/rxe: Improve newline in printing messages (git-fixes)</li>
<li>Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes).</li>
<li>Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes).</li>
<li>USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable-fixes).</li>
<li>USB: Fix the issue of task recovery failure caused by USB status when S4 wakes up (git-fixes).</li>
<li>USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes).</li>
<li>USB: gadget: f_midi: f_midi_complete to call queue_work (git-fixes).</li>
<li>USB: hub: Ignore non-compliant devices with too many configs or interfaces (stable-fixes).</li>
<li>USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes).</li>
<li>USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes).</li>
<li>USB: serial: option: add MeiG Smart SLM828 (stable-fixes).</li>
<li>USB: serial: option: add Telit Cinterion FN990B compositions (stable-fixes).</li>
<li>USB: serial: option: drop MeiG Smart defines (stable-fixes).</li>
<li>USB: serial: option: fix Telit Cinterion FN990A name (stable-fixes).</li>
<li>Use gcc-13 for build on SLE16 (jsc#PED-10028).</li>
<li>acct: block access to kernel internal filesystems (git-fixes).</li>
<li>acct: perform last write from workqueue (git-fixes).</li>
<li>arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes)</li>
<li>arm64: Handle .ARM.attributes section in linker scripts (git-fixes)</li>
<li>arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes)</li>
<li>ata: libata-sff: Ensure that we cannot write outside the allocated buffer (stable-fixes).</li>
<li>batman-adv: Drop unmanaged ELP metric worker (git-fixes).</li>
<li>batman-adv: Ignore neighbor throughput metrics in error case (stable-fixes).</li>
<li>batman-adv: fix panic during interface removal (git-fixes).</li>
<li>bio-integrity: do not restrict the size of integrity metadata (git-fixes).</li>
<li>blk-cgroup: Fix class @block_class's subsystem refcount leakage (bsc#1237558).</li>
<li>blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git-fixes).</li>
<li>blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long (git-fixes).</li>
<li>blk-mq: add number of queue calc helper (bsc#1236897).</li>
<li>blk-mq: create correct map for fallback case (bsc#1236896).</li>
<li>blk-mq: do not count completed flush data request as inflight in case of quiesce (git-fixes).</li>
<li>blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896).</li>
<li>blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1236897).</li>
<li>blk-mq: move cpuhp callback registering out of q->sysfs_lock (git-fixes).</li>
<li>blk-mq: register cpuhp callback after hctx is added to xarray table (git-fixes).</li>
<li>blk-mq: use hk cpus only when isolcpus=managed_irq is enabled (bsc#1236897).</li>
<li>blk_iocost: remove some duplicate irq disable/enables (git-fixes).</li>
<li>block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes).</li>
<li>block: Clear zone limits for a non-zoned stacked queue (git-fixes).</li>
<li>block: Fix elevator_get_default() checking for NULL q->tag_set (git-fixes).</li>
<li>block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes).</li>
<li>block: Fix page refcounts for unaligned buffers in __bio_release_pages() (git-fixes).</li>
<li>block: Provide bdev_open_* functions (git-fixes).</li>
<li>block: Remove special-casing of compound pages (git-fixes).</li>
<li>block: Set memalloc_noio to false on device_add_disk() error path (git-fixes).</li>
<li>block: add a disk_has_partscan helper (git-fixes).</li>
<li>block: add a partscan sysfs attribute for disks (git-fixes).</li>
<li>block: add check of 'minors' and 'first_minor' in device_add_disk() (git-fixes).</li>
<li>block: avoid to reuse <code>hctx</code> not removed from cpuhp callback list (git-fixes).</li>
<li>block: change rq_integrity_vec to respect the iterator (git-fixes).</li>
<li>block: copy back bounce buffer to user-space correctly in case of split (git-fixes).</li>
<li>block: ensure we hold a queue reference when using queue limits (git-fixes).</li>
<li>block: fix and simplify blkdevparts= cmdline parsing (git-fixes).</li>
<li>block: fix bio_split_rw_at to take zone_write_granularity into account (git-fixes).</li>
<li>block: fix integer overflow in BLKSECDISCARD (git-fixes).</li>
<li>block: fix missing dispatching request when queue is started or unquiesced (git-fixes).</li>
<li>block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git-fixes).</li>
<li>block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding (git-fixes).</li>
<li>block: fix sanity checks in blk_rq_map_user_bvec (git-fixes).</li>
<li>block: propagate partition scanning errors to the BLKRRPART ioctl (git-fixes).</li>
<li>block: remove the blk_flush_integrity call in blk_integrity_unregister (git-fixes).</li>
<li>block: retry call probe after request_module in blk_request_module (git-fixes).</li>
<li>block: return unsigned int from bdev_io_min (git-fixes).</li>
<li>block: sed-opal: avoid possible wrong address reference in read_sed_opal_key() (git-fixes).</li>
<li>block: support to account io_ticks precisely (git-fixes).</li>
<li>block: use the right type for stub rq_integrity_vec() (git-fixes).</li>
<li>bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes).</li>
<li>bnxt_en: Refactor bnxt_ptp_init() (git-fixes).</li>
<li>bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes).</li>
<li>btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1237232).</li>
<li>btrfs: fix extent map merging not happening for adjacent extents (bsc#1237232).</li>
<li>can: c_can: fix unbalanced runtime PM disable in error path (git-fixes).</li>
<li>can: ctucanfd: handle skb allocation failure (git-fixes).</li>
<li>can: etas_es58x: fix potential NULL pointer dereference on udev->serial (git-fixes).</li>
<li>can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero (git-fixes).</li>
<li>chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes).</li>
<li>clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git-fixes).</li>
<li>clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes).</li>
<li>clk: mediatek: mt2701-img: add missing dummy clk (git-fixes).</li>
<li>clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes).</li>
<li>clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes).</li>
<li>clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes).</li>
<li>clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes).</li>
<li>clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg (git-fixes).</li>
<li>clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes).</li>
<li>clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable() (git-fixes).</li>
<li>clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes).</li>
<li>cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562).</li>
<li>cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562).</li>
<li>cpufreq: s3c64xx: Fix compilation warning (stable-fixes).</li>
<li>cxgb4: Avoid removal of uninserted tid (git-fixes).</li>
<li>cxgb4: use port number to set mac addr (git-fixes).</li>
<li>devlink: avoid potential loop in devlink_rel_nested_in_notify_work() (bsc#1237234).</li>
<li>dlm: fix srcu_read_lock() return type to int (git-fixes).</li>
<li>doc: update managed_irq documentation (bsc#1236897).</li>
<li>driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896).</li>
<li>drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor (stable-fixes).</li>
<li>drm/amd/pm: Mark MM activity as unsupported (stable-fixes).</li>
<li>drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable-fixes).</li>
<li>drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() (git-fixes).</li>
<li>drm/amdkfd: only flush the validate MES contex (stable-fixes).</li>
<li>drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable-fixes).</li>
<li>drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes).</li>
<li>drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes).</li>
<li>drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes).</li>
<li>drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes).</li>
<li>drm/i915/selftests: avoid using uninitialized context (git-fixes).</li>
<li>drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes).</li>
<li>drm/i915: Fix page cleanup on DMA remap failure (git-fixes).</li>
<li>drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes).</li>
<li>drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes).</li>
<li>drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields (git-fixes).</li>
<li>drm/msm: Avoid rounding up to one jiffy (git-fixes).</li>
<li>drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes).</li>
<li>drm/virtio: New fence for every plane update (stable-fixes).</li>
<li>efi: Avoid cold plugged memory for placing the kernel (stable-fixes).</li>
<li>efi: libstub: Use '-std=gnu11' to fix build with GCC 15 (stable-fixes).</li>
<li>eth: gve: use appropriate helper to set xdp_features (git-fixes).</li>
<li>exfat: convert to ctime accessor functions (git-fixes).</li>
<li>exfat: fix file being changed by unaligned direct write (git-fixes).</li>
<li>exfat: fix zero the unwritten part for dio read (git-fixes).</li>
<li>fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes).</li>
<li>gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes).</li>
<li>gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes).</li>
<li>gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git-fixes).</li>
<li>gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock (git-fixes).</li>
<li>gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes).</li>
<li>hfs: Sanity check the root record (git-fixes).</li>
<li>i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes).</li>
<li>iavf: allow changing VLAN state without calling PF (git-fixes).</li>
<li>ice: Skip PTP HW writes during PTP reset procedure (git-fixes).</li>
<li>ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1237415).</li>
<li>ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415).</li>
<li>ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git-fixes).</li>
<li>ice: fix incorrect PHY settings for 100 GB/s (git-fixes).</li>
<li>ice: fix max values for dpll pin phase adjust (git-fixes).</li>
<li>ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415).</li>
<li>ice: gather page_count()'s of each frag right before XDP prog call (git-fixes).</li>
<li>ice: put Rx buffers after being done with current frame (git-fixes).</li>
<li>ice: stop storing XDP verdict within ice_rx_buf (git-fixes).</li>
<li>ice: use internal pf id instead of function number (git-fixes).</li>
<li>idpf: add read memory barrier when checking descriptor done bit (git-fixes).</li>
<li>idpf: call set_real_num_queues in idpf_open (bsc#1236661).</li>
<li>idpf: convert workqueues to unbound (git-fixes).</li>
<li>idpf: fix VF dynamic interrupt ctl register initialization (git-fixes).</li>
<li>idpf: fix handling rsc packet with a single segment (git-fixes).</li>
<li>igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes).</li>
<li>igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes).</li>
<li>igc: return early when failing to read EECD register (git-fixes).</li>
<li>iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes).</li>
<li>kabi: fix bus type (bsc#1236896).</li>
<li>kabi: fix group_cpus_evenly (bsc#1236897).</li>
<li>kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes).</li>
<li>kbuild: userprogs: fix bitsize and target detection on clang (git-fixes).</li>
<li>kvm: svm: Fix gctx page leak on invalid inputs (jsc#PED-348).</li>
<li>lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897).</li>
<li>lib/group_cpus: let group_cpu_evenly return number initialized masks (bsc#1236897).</li>
<li>lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes).</li>
<li>lib: stackinit: hide never-taken branch from compiler (stable-fixes).</li>
<li>lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes).</li>
<li>loop: do not set QUEUE_FLAG_NOMERGES (git-fixes).</li>
<li>media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes).</li>
<li>media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes).</li>
<li>media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a camera (stable-fixes).</li>
<li>media: uvcvideo: Implement dual stream quirk to fix loss of usb packets (stable-fixes).</li>
<li>media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes).</li>
<li>mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable-fixes).</li>
<li>mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes).</li>
<li>mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes).</li>
<li>mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes).</li>
<li>mptcp: export local_address (git-fixes)</li>
<li>mptcp: fix NL PM announced address accounting (git-fixes)</li>
<li>mptcp: fix data races on local_id (git-fixes)</li>
<li>mptcp: fix inconsistent state on fastopen race (bsc#1222672).</li>
<li>mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes)</li>
<li>mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes)</li>
<li>mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git-fixes)</li>
<li>mptcp: pm: deny endp with signal + subflow + port (git-fixes)</li>
<li>mptcp: pm: do not ignore 'subflow' if 'signal' flag is also set (git-fixes)</li>
<li>mptcp: pm: do not try to create sf if alloc failed (git-fixes)</li>
<li>mptcp: pm: fullmesh: select the right ID later (git-fixes)</li>
<li>mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes)</li>
<li>mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes)</li>
<li>mptcp: pm: re-using ID of unused flushed subflows (git-fixes)</li>
<li>mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes)</li>
<li>mptcp: pm: re-using ID of unused removed subflows (git-fixes)</li>
<li>mptcp: pm: reduce indentation blocks (git-fixes)</li>
<li>mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes)</li>
<li>mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes)</li>
<li>mptcp: unify pm get_local_id interfaces (git-fixes)</li>
<li>mptcp: unify pm set_flags interfaces (git-fixes)</li>
<li>mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes).</li>
<li>mtd: rawnand: cadence: fix incorrect device in dma_unmap_single (git-fixes).</li>
<li>mtd: rawnand: cadence: fix unchecked dereference (git-fixes).</li>
<li>mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes).</li>
<li>nbd: Fix signal handling (git-fixes).</li>
<li>nbd: Improve the documentation of the locking assumptions (git-fixes).</li>
<li>nbd: do not allow reconnect after disconnect (git-fixes).</li>
<li>net/mlx5: Correct TASR typo into TSAR (git-fixes).</li>
<li>net/mlx5: Fix RDMA TX steering prio (git-fixes).</li>
<li>net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981).</li>
<li>net/mlx5: SF, Fix add port error handling (git-fixes).</li>
<li>net/mlx5: Verify support for scheduling element and TSAR type (git-fixes).</li>
<li>net/mlx5e: Always start IPsec sequence number from 1 (git-fixes).</li>
<li>net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes).</li>
<li>net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes).</li>
<li>net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994).</li>
<li>net: rose: lock the socket in rose_bind() (git-fixes).</li>
<li>net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes).</li>
<li>net: smc: fix spurious error message from __sock_release() (bsc#1237126).</li>
<li>net: wwan: iosm: Fix hibernation by re-binding the driver around it (stable-fixes).</li>
<li>nouveau/svm: fix missing folio unlock + put after make_device_exclusive_range() (git-fixes).</li>
<li>null_blk: Do not allow runt zone with zone capacity smaller then zone size (git-fixes).</li>
<li>null_blk: Fix missing mutex_destroy() at module removal (git-fixes).</li>
<li>null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git-fixes).</li>
<li>null_blk: Print correct max open zones limit in null_init_zoned_dev() (git-fixes).</li>
<li>null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes).</li>
<li>null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes).</li>
<li>null_blk: fix validation of block size (git-fixes).</li>
<li>nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897).</li>
<li>nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896).</li>
<li>ocfs2: fix incorrect CPU endianness conversion causing mount failure (bsc#1236138).</li>
<li>padata: Clean up in padata_do_multithreaded() (bsc#1237563).</li>
<li>padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563).</li>
<li>partitions: ldm: remove the initial kernel-doc notation (git-fixes).</li>
<li>pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes).</li>
<li>platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452).</li>
<li>platform/x86/intel-uncore-freq: Increase minor number support (bsc#1237452).</li>
<li>platform/x86/intel/tpmi: Add defines to get version information (bsc#1237452).</li>
<li>platform/x86: ISST: Ignore minor version change (bsc#1237452).</li>
<li>platform/x86: acer-wmi: Ignore AC events (stable-fixes).</li>
<li>platform/x86: int3472: Check for adev == NULL (stable-fixes).</li>
<li>power: supply: da9150-fg: fix potential overflow (git-fixes).</li>
<li>powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199).</li>
<li>powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline (bsc#1215199).</li>
<li>powerpc/code-patching: Disable KASAN report during patching via temporary mm (bsc#1215199).</li>
<li>powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC (bsc#1215199).</li>
<li>powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode (bsc#1235933 bsc#1235932).</li>
<li>powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967).</li>
<li>rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings (git-fixes).</li>
<li>rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes).</li>
<li>rbd: do not move requests to the running list on errors (git-fixes).</li>
<li>rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes).</li>
<li>regmap-irq: Add missing kfree() (git-fixes).</li>
<li>s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes bsc#1236205).</li>
<li>s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158).</li>
<li>s390/iucv: fix receive buffer virtual vs physical address confusion (git-fixes bsc#1236200).</li>
<li>s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752).</li>
<li>s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails (bsc#1236752).</li>
<li>s390/pci: Ignore RID for isolated VFs (bsc#1236752).</li>
<li>s390/pci: Sort PCI functions prior to creating virtual busses (bsc#1236752).</li>
<li>s390/pci: Use topology ID for multi-function devices (bsc#1236752).</li>
<li>s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199).</li>
<li>s390/topology: Improve topology detection (bsc#1236591).</li>
<li>s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes bsc#1236203).</li>
<li>scripts/gdb: fix aarch64 userspace detection in get_current_task (stable-fixes).</li>
<li>scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896).</li>
<li>scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes).</li>
<li>scsi: use block layer helpers to calculate num of queues (bsc#1236897).</li>
<li>selftest: hugetlb_dio: fix test naming (git-fixes).</li>
<li>selftest: mm: Test if hugepage does not get leaked during __bio_release_pages() (git-fixes).</li>
<li>selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable-fixes).</li>
<li>selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes).</li>
<li>selftests: hugetlb_dio: check for initial conditions to skip in the start (git-fixes).</li>
<li>selftests: hugetlb_dio: fixup check for initial conditions to skip in the start (git-fixes).</li>
<li>selftests: mptcp: connect: -f: no reconnect (git-fixes).</li>
<li>selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes).</li>
<li>serial: 8250: Fix fifo underflow on flush (git-fixes).</li>
<li>smb: client: fix corruption in cifs_extend_writeback (bsc#1235609).</li>
<li>soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes).</li>
<li>spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes).</li>
<li>spi: atmel-quadspi: Create <code>atmel_qspi_ops</code> to support newer SoC families (stable-fixes).</li>
<li>spi: sn-f-ospi: Fix division by zero (git-fixes).</li>
<li>tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367).</li>
<li>tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes).</li>
<li>tools: fix annoying "mkdir -p ..." logs when building tools in parallel (git-fixes).</li>
<li>ublk: fix error code for unsupported command (git-fixes).</li>
<li>ublk: fix ublk_ch_mmap() for 64K page size (git-fixes).</li>
<li>ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes).</li>
<li>ublk: move zone report data out of request pdu (git-fixes).</li>
<li>usb: cdc-acm: Check control transfer buffer size before access (git-fixes).</li>
<li>usb: cdc-acm: Fix handling of oversized fragments (git-fixes).</li>
<li>usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes).</li>
<li>usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes).</li>
<li>usb: dwc3: Fix timeout issue during controller enter/exit from halt state (git-fixes).</li>
<li>usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes).</li>
<li>usb: gadget: core: flush gadget workqueue after device removal (git-fixes).</li>
<li>usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind retries (git-fixes).</li>
<li>usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes).</li>
<li>usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes).</li>
<li>usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device (git-fixes).</li>
<li>usb: roles: set switch registered flag early on (git-fixes).</li>
<li>usb: xhci: Fix NULL pointer dereference on certain command aborts (git-fixes).</li>
<li>usbnet: ipheth: document scope of NCM implementation (stable-fixes).</li>
<li>util_macros.h: fix/rework find_closest() macros (git-fixes).</li>
<li>vhost/net: Set num_buffers for virtio 1.0 (git-fixes).</li>
<li>virtio: blk/scsi: replace blk_mq_virtio_map_queues with blk_mq_map_hw_queues (bsc#1236896).</li>
<li>virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1236897).</li>
<li>virtio: hookup irq_get_affinity callback (bsc#1236896).</li>
<li>virtio_blk: reverse request order in virtio_queue_rqs (git-fixes).</li>
<li>wifi: ath12k: fix handling of 6 GHz rules (git-fixes).</li>
<li>wifi: brcmfmac: Check the return value of of_property_read_string_index() (stable-fixes).</li>
<li>wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable-fixes).</li>
<li>wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (stable-fixes).</li>
<li>wifi: iwlwifi: avoid memory leak (stable-fixes).</li>
<li>wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes).</li>
<li>wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes).</li>
<li>wifi: rtw89: add crystal_cap check to avoid setting as overflow value (stable-fixes).</li>
<li>x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes).</li>
<li>x86/asm: Make serialize() always_inline (git-fixes).</li>
<li>x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes).</li>
<li>x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes).</li>
<li>x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation (git-fixes).</li>
<li>x86/mm: Carve out INVLPG inline asm for use by others (git-fixes).</li>
<li>x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).</li>
<li>x86/xen: allow larger contiguous memory regions in PV guests (git-fixes).</li>
<li>x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes).</li>
<li>x86/xen: Grab mm lock before grabbing pt lock (git-fixes).</li>
<li>xen/swiotlb: relax alignment requirements (git-fixes).</li>
<li>xhci: dbgtty: remove kfifo_out() wrapper (git-fixes).</li>
</ul>
<h2>Special Instructions and Notes:</h2>
<ul>
<li>Please reboot the system after installing this update.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
Confidential Computing Module 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Confidential-Computing-15-SP6-2025-784=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
Confidential Computing Module 15-SP6 (nosrc x86_64)
<ul>
<li>kernel-coco-6.4.0-15061.18.coco15sp6.1</li>
<li>kernel-coco_debug-6.4.0-15061.18.coco15sp6.1</li>
</ul>
</li>
<li>
Confidential Computing Module 15-SP6 (x86_64)
<ul>
<li>reiserfs-kmp-coco-debuginfo-6.4.0-15061.18.coco15sp6.1</li>
<li>kernel-coco_debug-devel-6.4.0-15061.18.coco15sp6.1</li>
<li>kernel-syms-coco-6.4.0-15061.18.coco15sp6.1</li>
<li>kernel-coco_debug-debuginfo-6.4.0-15061.18.coco15sp6.1</li>
<li>kernel-coco-vdso-debuginfo-6.4.0-15061.18.coco15sp6.1</li>
<li>kernel-coco-devel-6.4.0-15061.18.coco15sp6.1</li>
<li>kernel-coco_debug-devel-debuginfo-6.4.0-15061.18.coco15sp6.1</li>
<li>kernel-coco_debug-debugsource-6.4.0-15061.18.coco15sp6.1</li>
<li>reiserfs-kmp-coco-6.4.0-15061.18.coco15sp6.1</li>
<li>kernel-coco-debugsource-6.4.0-15061.18.coco15sp6.1</li>
<li>kernel-coco-debuginfo-6.4.0-15061.18.coco15sp6.1</li>
</ul>
</li>
<li>
Confidential Computing Module 15-SP6 (noarch)
<ul>
<li>kernel-devel-coco-6.4.0-15061.18.coco15sp6.1</li>
<li>kernel-source-coco-6.4.0-15061.18.coco15sp6.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52924.html">https://www.suse.com/security/cve/CVE-2023-52924.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52925.html">https://www.suse.com/security/cve/CVE-2023-52925.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26708.html">https://www.suse.com/security/cve/CVE-2024-26708.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26810.html">https://www.suse.com/security/cve/CVE-2024-26810.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41055.html">https://www.suse.com/security/cve/CVE-2024-41055.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44974.html">https://www.suse.com/security/cve/CVE-2024-44974.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45009.html">https://www.suse.com/security/cve/CVE-2024-45009.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45010.html">https://www.suse.com/security/cve/CVE-2024-45010.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47701.html">https://www.suse.com/security/cve/CVE-2024-47701.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49884.html">https://www.suse.com/security/cve/CVE-2024-49884.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49950.html">https://www.suse.com/security/cve/CVE-2024-49950.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50073.html">https://www.suse.com/security/cve/CVE-2024-50073.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50085.html">https://www.suse.com/security/cve/CVE-2024-50085.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">https://www.suse.com/security/cve/CVE-2024-50115.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50185.html">https://www.suse.com/security/cve/CVE-2024-50185.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53147.html">https://www.suse.com/security/cve/CVE-2024-53147.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53173.html">https://www.suse.com/security/cve/CVE-2024-53173.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53226.html">https://www.suse.com/security/cve/CVE-2024-53226.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53239.html">https://www.suse.com/security/cve/CVE-2024-53239.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56539.html">https://www.suse.com/security/cve/CVE-2024-56539.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56548.html">https://www.suse.com/security/cve/CVE-2024-56548.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56568.html">https://www.suse.com/security/cve/CVE-2024-56568.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56579.html">https://www.suse.com/security/cve/CVE-2024-56579.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56605.html">https://www.suse.com/security/cve/CVE-2024-56605.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56647.html">https://www.suse.com/security/cve/CVE-2024-56647.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56720.html">https://www.suse.com/security/cve/CVE-2024-56720.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57889.html">https://www.suse.com/security/cve/CVE-2024-57889.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57948.html">https://www.suse.com/security/cve/CVE-2024-57948.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21636.html">https://www.suse.com/security/cve/CVE-2025-21636.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21637.html">https://www.suse.com/security/cve/CVE-2025-21637.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21638.html">https://www.suse.com/security/cve/CVE-2025-21638.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21639.html">https://www.suse.com/security/cve/CVE-2025-21639.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21640.html">https://www.suse.com/security/cve/CVE-2025-21640.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21647.html">https://www.suse.com/security/cve/CVE-2025-21647.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21680.html">https://www.suse.com/security/cve/CVE-2025-21680.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21684.html">https://www.suse.com/security/cve/CVE-2025-21684.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21687.html">https://www.suse.com/security/cve/CVE-2025-21687.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21688.html">https://www.suse.com/security/cve/CVE-2025-21688.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21689.html">https://www.suse.com/security/cve/CVE-2025-21689.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21690.html">https://www.suse.com/security/cve/CVE-2025-21690.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21692.html">https://www.suse.com/security/cve/CVE-2025-21692.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21697.html">https://www.suse.com/security/cve/CVE-2025-21697.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21699.html">https://www.suse.com/security/cve/CVE-2025-21699.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21700.html">https://www.suse.com/security/cve/CVE-2025-21700.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">https://bugzilla.suse.com/show_bug.cgi?id=1012628</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">https://bugzilla.suse.com/show_bug.cgi?id=1215199</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219367">https://bugzilla.suse.com/show_bug.cgi?id=1219367</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222672">https://bugzilla.suse.com/show_bug.cgi?id=1222672</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222803">https://bugzilla.suse.com/show_bug.cgi?id=1222803</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">https://bugzilla.suse.com/show_bug.cgi?id=1225742</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225981">https://bugzilla.suse.com/show_bug.cgi?id=1225981</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228521">https://bugzilla.suse.com/show_bug.cgi?id=1228521</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230235">https://bugzilla.suse.com/show_bug.cgi?id=1230235</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230438">https://bugzilla.suse.com/show_bug.cgi?id=1230438</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230439">https://bugzilla.suse.com/show_bug.cgi?id=1230439</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">https://bugzilla.suse.com/show_bug.cgi?id=1231920</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232159">https://bugzilla.suse.com/show_bug.cgi?id=1232159</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">https://bugzilla.suse.com/show_bug.cgi?id=1232198</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">https://bugzilla.suse.com/show_bug.cgi?id=1232201</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232508">https://bugzilla.suse.com/show_bug.cgi?id=1232508</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232520">https://bugzilla.suse.com/show_bug.cgi?id=1232520</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">https://bugzilla.suse.com/show_bug.cgi?id=1232919</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233109">https://bugzilla.suse.com/show_bug.cgi?id=1233109</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">https://bugzilla.suse.com/show_bug.cgi?id=1234853</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234857">https://bugzilla.suse.com/show_bug.cgi?id=1234857</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">https://bugzilla.suse.com/show_bug.cgi?id=1234891</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">https://bugzilla.suse.com/show_bug.cgi?id=1234963</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235032">https://bugzilla.suse.com/show_bug.cgi?id=1235032</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">https://bugzilla.suse.com/show_bug.cgi?id=1235054</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">https://bugzilla.suse.com/show_bug.cgi?id=1235061</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">https://bugzilla.suse.com/show_bug.cgi?id=1235073</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235435">https://bugzilla.suse.com/show_bug.cgi?id=1235435</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235592">https://bugzilla.suse.com/show_bug.cgi?id=1235592</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235609">https://bugzilla.suse.com/show_bug.cgi?id=1235609</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235932">https://bugzilla.suse.com/show_bug.cgi?id=1235932</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235933">https://bugzilla.suse.com/show_bug.cgi?id=1235933</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236113">https://bugzilla.suse.com/show_bug.cgi?id=1236113</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236114">https://bugzilla.suse.com/show_bug.cgi?id=1236114</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236115">https://bugzilla.suse.com/show_bug.cgi?id=1236115</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236122">https://bugzilla.suse.com/show_bug.cgi?id=1236122</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236123">https://bugzilla.suse.com/show_bug.cgi?id=1236123</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236133">https://bugzilla.suse.com/show_bug.cgi?id=1236133</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236138">https://bugzilla.suse.com/show_bug.cgi?id=1236138</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236199">https://bugzilla.suse.com/show_bug.cgi?id=1236199</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236200">https://bugzilla.suse.com/show_bug.cgi?id=1236200</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236203">https://bugzilla.suse.com/show_bug.cgi?id=1236203</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236205">https://bugzilla.suse.com/show_bug.cgi?id=1236205</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236573">https://bugzilla.suse.com/show_bug.cgi?id=1236573</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236575">https://bugzilla.suse.com/show_bug.cgi?id=1236575</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236576">https://bugzilla.suse.com/show_bug.cgi?id=1236576</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236591">https://bugzilla.suse.com/show_bug.cgi?id=1236591</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236661">https://bugzilla.suse.com/show_bug.cgi?id=1236661</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236677">https://bugzilla.suse.com/show_bug.cgi?id=1236677</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236700">https://bugzilla.suse.com/show_bug.cgi?id=1236700</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236752">https://bugzilla.suse.com/show_bug.cgi?id=1236752</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236821">https://bugzilla.suse.com/show_bug.cgi?id=1236821</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236822">https://bugzilla.suse.com/show_bug.cgi?id=1236822</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236896">https://bugzilla.suse.com/show_bug.cgi?id=1236896</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236897">https://bugzilla.suse.com/show_bug.cgi?id=1236897</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236952">https://bugzilla.suse.com/show_bug.cgi?id=1236952</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236967">https://bugzilla.suse.com/show_bug.cgi?id=1236967</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236994">https://bugzilla.suse.com/show_bug.cgi?id=1236994</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237007">https://bugzilla.suse.com/show_bug.cgi?id=1237007</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237017">https://bugzilla.suse.com/show_bug.cgi?id=1237017</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237025">https://bugzilla.suse.com/show_bug.cgi?id=1237025</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237028">https://bugzilla.suse.com/show_bug.cgi?id=1237028</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237045">https://bugzilla.suse.com/show_bug.cgi?id=1237045</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237126">https://bugzilla.suse.com/show_bug.cgi?id=1237126</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237132">https://bugzilla.suse.com/show_bug.cgi?id=1237132</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237139">https://bugzilla.suse.com/show_bug.cgi?id=1237139</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237155">https://bugzilla.suse.com/show_bug.cgi?id=1237155</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237158">https://bugzilla.suse.com/show_bug.cgi?id=1237158</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237159">https://bugzilla.suse.com/show_bug.cgi?id=1237159</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237232">https://bugzilla.suse.com/show_bug.cgi?id=1237232</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237234">https://bugzilla.suse.com/show_bug.cgi?id=1237234</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237325">https://bugzilla.suse.com/show_bug.cgi?id=1237325</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237415">https://bugzilla.suse.com/show_bug.cgi?id=1237415</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237452">https://bugzilla.suse.com/show_bug.cgi?id=1237452</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237558">https://bugzilla.suse.com/show_bug.cgi?id=1237558</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237562">https://bugzilla.suse.com/show_bug.cgi?id=1237562</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237563">https://bugzilla.suse.com/show_bug.cgi?id=1237563</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-10028">https://jira.suse.com/browse/PED-10028</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-12094">https://jira.suse.com/browse/PED-12094</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-348">https://jira.suse.com/browse/PED-348</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-6143">https://jira.suse.com/browse/PED-6143</a>
</li>
</ul>
</div>