SUSE-SU-2025:02923-1: important: Security update for the Linux Kernel
SLE-UPDATES
null at suse.de
Wed Aug 20 08:37:16 UTC 2025
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:02923-1
Release Date: 2025-08-20T07:24:59Z
Rating: important
References:
* bsc#1012628
* bsc#1139073
* bsc#1204142
* bsc#1210025
* bsc#1211226
* bsc#1215199
* bsc#1218184
* bsc#1219338
* bsc#1220112
* bsc#1223008
* bsc#1225707
* bsc#1226498
* bsc#1228557
* bsc#1228854
* bsc#1229491
* bsc#1230216
* bsc#1232504
* bsc#1232882
* bsc#1233300
* bsc#1235490
* bsc#1235613
* bsc#1235728
* bsc#1235837
* bsc#1235968
* bsc#1236208
* bsc#1236333
* bsc#1236897
* bsc#1237312
* bsc#1237913
* bsc#1238212
* bsc#1238859
* bsc#1238896
* bsc#1238982
* bsc#1239061
* bsc#1239470
* bsc#1239925
* bsc#1240180
* bsc#1240323
* bsc#1240577
* bsc#1240610
* bsc#1240686
* bsc#1240723
* bsc#1240814
* bsc#1240823
* bsc#1240866
* bsc#1240885
* bsc#1240966
* bsc#1241166
* bsc#1241278
* bsc#1241340
* bsc#1241345
* bsc#1241414
* bsc#1241457
* bsc#1241492
* bsc#1241519
* bsc#1241537
* bsc#1241538
* bsc#1241544
* bsc#1241572
* bsc#1241576
* bsc#1241590
* bsc#1241592
* bsc#1241595
* bsc#1241617
* bsc#1241625
* bsc#1241635
* bsc#1241644
* bsc#1241654
* bsc#1242035
* bsc#1242044
* bsc#1242086
* bsc#1242163
* bsc#1242343
* bsc#1242414
* bsc#1242501
* bsc#1242504
* bsc#1242512
* bsc#1242514
* bsc#1242515
* bsc#1242520
* bsc#1242521
* bsc#1242524
* bsc#1242529
* bsc#1242530
* bsc#1242531
* bsc#1242532
* bsc#1242556
* bsc#1242559
* bsc#1242563
* bsc#1242564
* bsc#1242565
* bsc#1242566
* bsc#1242567
* bsc#1242568
* bsc#1242569
* bsc#1242573
* bsc#1242574
* bsc#1242575
* bsc#1242578
* bsc#1242584
* bsc#1242587
* bsc#1242591
* bsc#1242709
* bsc#1242725
* bsc#1242727
* bsc#1242758
* bsc#1242760
* bsc#1242761
* bsc#1242764
* bsc#1242766
* bsc#1242770
* bsc#1242781
* bsc#1242782
* bsc#1242785
* bsc#1242792
* bsc#1242837
* bsc#1242846
* bsc#1242849
* bsc#1242850
* bsc#1242871
* bsc#1242873
* bsc#1242906
* bsc#1242907
* bsc#1242908
* bsc#1242930
* bsc#1242940
* bsc#1242945
* bsc#1242946
* bsc#1242948
* bsc#1242949
* bsc#1242953
* bsc#1242954
* bsc#1242955
* bsc#1242957
* bsc#1242959
* bsc#1242960
* bsc#1242961
* bsc#1242965
* bsc#1242973
* bsc#1242974
* bsc#1242977
* bsc#1242982
* bsc#1242990
* bsc#1242993
* bsc#1243000
* bsc#1243006
* bsc#1243011
* bsc#1243015
* bsc#1243049
* bsc#1243051
* bsc#1243060
* bsc#1243068
* bsc#1243074
* bsc#1243076
* bsc#1243082
* bsc#1243100
* bsc#1243330
* bsc#1243342
* bsc#1243456
* bsc#1243467
* bsc#1243469
* bsc#1243470
* bsc#1243471
* bsc#1243472
* bsc#1243473
* bsc#1243475
* bsc#1243476
* bsc#1243479
* bsc#1243480
* bsc#1243506
* bsc#1243509
* bsc#1243511
* bsc#1243515
* bsc#1243516
* bsc#1243517
* bsc#1243522
* bsc#1243523
* bsc#1243524
* bsc#1243528
* bsc#1243529
* bsc#1243530
* bsc#1243534
* bsc#1243536
* bsc#1243537
* bsc#1243538
* bsc#1243540
* bsc#1243542
* bsc#1243543
* bsc#1243544
* bsc#1243545
* bsc#1243551
* bsc#1243559
* bsc#1243560
* bsc#1243562
* bsc#1243567
* bsc#1243571
* bsc#1243572
* bsc#1243573
* bsc#1243574
* bsc#1243575
* bsc#1243589
* bsc#1243620
* bsc#1243621
* bsc#1243624
* bsc#1243625
* bsc#1243626
* bsc#1243627
* bsc#1243628
* bsc#1243649
* bsc#1243659
* bsc#1243660
* bsc#1243664
* bsc#1243669
* bsc#1243698
* bsc#1243774
* bsc#1243782
* bsc#1243806
* bsc#1243823
* bsc#1243827
* bsc#1243832
* bsc#1243836
* bsc#1243847
* bsc#1244100
* bsc#1244145
* bsc#1244172
* bsc#1244176
* bsc#1244229
* bsc#1244234
* bsc#1244241
* bsc#1244261
* bsc#1244274
* bsc#1244275
* bsc#1244277
* bsc#1244309
* bsc#1244313
* bsc#1244337
* bsc#1244457
* bsc#1244626
* bsc#1244725
* bsc#1244727
* bsc#1244729
* bsc#1244731
* bsc#1244732
* bsc#1244735
* bsc#1244736
* bsc#1244737
* bsc#1244738
* bsc#1244739
* bsc#1244743
* bsc#1244746
* bsc#1244749
* bsc#1244750
* bsc#1244759
* bsc#1244789
* bsc#1244792
* bsc#1244801
* bsc#1244862
* bsc#1244906
* bsc#1244938
* bsc#1244995
* bsc#1244996
* bsc#1244999
* bsc#1245001
* bsc#1245003
* bsc#1245004
* bsc#1245025
* bsc#1245042
* bsc#1245046
* bsc#1245078
* bsc#1245081
* bsc#1245082
* bsc#1245083
* bsc#1245151
* bsc#1245155
* bsc#1245183
* bsc#1245193
* bsc#1245201
* bsc#1245202
* bsc#1245210
* bsc#1245216
* bsc#1245217
* bsc#1245225
* bsc#1245226
* bsc#1245228
* bsc#1245260
* bsc#1245431
* bsc#1245440
* bsc#1245455
* bsc#1245457
* bsc#1245498
* bsc#1245499
* bsc#1245504
* bsc#1245506
* bsc#1245508
* bsc#1245510
* bsc#1245540
* bsc#1245598
* bsc#1245599
* bsc#1245646
* bsc#1245647
* bsc#1245649
* bsc#1245650
* bsc#1245654
* bsc#1245658
* bsc#1245660
* bsc#1245665
* bsc#1245666
* bsc#1245668
* bsc#1245669
* bsc#1245670
* bsc#1245671
* bsc#1245675
* bsc#1245676
* bsc#1245677
* bsc#1245679
* bsc#1245682
* bsc#1245683
* bsc#1245684
* bsc#1245688
* bsc#1245689
* bsc#1245690
* bsc#1245691
* bsc#1245695
* bsc#1245705
* bsc#1245708
* bsc#1245711
* bsc#1245713
* bsc#1245714
* bsc#1245719
* bsc#1245723
* bsc#1245729
* bsc#1245730
* bsc#1245731
* bsc#1245735
* bsc#1245737
* bsc#1245744
* bsc#1245745
* bsc#1245746
* bsc#1245747
* bsc#1245748
* bsc#1245749
* bsc#1245750
* bsc#1245751
* bsc#1245752
* bsc#1245757
* bsc#1245758
* bsc#1245765
* bsc#1245768
* bsc#1245769
* bsc#1245777
* bsc#1245781
* bsc#1245789
* bsc#1245937
* bsc#1245945
* bsc#1245951
* bsc#1245952
* bsc#1245954
* bsc#1245957
* bsc#1245966
* bsc#1245970
* bsc#1245976
* bsc#1245980
* bsc#1245983
* bsc#1245986
* bsc#1246000
* bsc#1246002
* bsc#1246006
* bsc#1246008
* bsc#1246020
* bsc#1246023
* bsc#1246029
* bsc#1246031
* bsc#1246037
* bsc#1246041
* bsc#1246042
* bsc#1246044
* bsc#1246045
* bsc#1246047
* bsc#1246049
* bsc#1246050
* bsc#1246055
* bsc#1246073
* bsc#1246093
* bsc#1246098
* bsc#1246109
* bsc#1246122
* bsc#1246125
* bsc#1246171
* bsc#1246173
* bsc#1246178
* bsc#1246182
* bsc#1246183
* bsc#1246186
* bsc#1246195
* bsc#1246203
* bsc#1246212
* bsc#1246220
* bsc#1246236
* bsc#1246240
* bsc#1246243
* bsc#1246246
* bsc#1246249
* bsc#1246250
* bsc#1246253
* bsc#1246258
* bsc#1246262
* bsc#1246264
* bsc#1246266
* bsc#1246268
* bsc#1246273
* bsc#1246283
* bsc#1246287
* bsc#1246292
* bsc#1246293
* bsc#1246295
* bsc#1246334
* bsc#1246337
* bsc#1246342
* bsc#1246349
* bsc#1246354
* bsc#1246358
* bsc#1246361
* bsc#1246364
* bsc#1246370
* bsc#1246375
* bsc#1246384
* bsc#1246386
* bsc#1246387
* bsc#1246438
* bsc#1246453
* bsc#1246473
* bsc#1246490
* bsc#1246506
* bsc#1246547
* bsc#1246777
* bsc#1246781
* bsc#1246870
* bsc#1246879
* bsc#1246911
* bsc#1247018
* bsc#1247023
* bsc#1247028
* bsc#1247031
* bsc#1247033
* bsc#1247035
* bsc#1247061
* bsc#1247089
* bsc#1247091
* bsc#1247097
* bsc#1247098
* bsc#1247101
* bsc#1247103
* bsc#1247104
* bsc#1247113
* bsc#1247118
* bsc#1247123
* bsc#1247125
* bsc#1247128
* bsc#1247132
* bsc#1247138
* bsc#1247141
* bsc#1247143
* bsc#1247145
* bsc#1247146
* bsc#1247147
* bsc#1247149
* bsc#1247150
* bsc#1247151
* bsc#1247153
* bsc#1247154
* bsc#1247156
* bsc#1247160
* bsc#1247164
* bsc#1247169
* bsc#1247170
* bsc#1247171
* bsc#1247172
* bsc#1247174
* bsc#1247176
* bsc#1247177
* bsc#1247178
* bsc#1247181
* bsc#1247209
* bsc#1247210
* bsc#1247227
* bsc#1247233
* bsc#1247236
* bsc#1247238
* bsc#1247241
* bsc#1247243
* bsc#1247251
* bsc#1247252
* bsc#1247253
* bsc#1247255
* bsc#1247271
* bsc#1247273
* bsc#1247274
* bsc#1247276
* bsc#1247277
* bsc#1247278
* bsc#1247279
* bsc#1247284
* bsc#1247285
* bsc#1247288
* bsc#1247289
* bsc#1247293
* bsc#1247311
* bsc#1247314
* bsc#1247317
* bsc#1247347
* bsc#1247348
* bsc#1247349
* bsc#1247374
* bsc#1247437
* bsc#1247450
* bsc#1247712
* jsc#PED-10253
* jsc#PED-12551
Cross-References:
* CVE-2019-11135
* CVE-2023-52888
* CVE-2023-53146
* CVE-2024-26831
* CVE-2024-36028
* CVE-2024-36348
* CVE-2024-36349
* CVE-2024-36350
* CVE-2024-36357
* CVE-2024-43869
* CVE-2024-44963
* CVE-2024-49568
* CVE-2024-49861
* CVE-2024-50106
* CVE-2024-56613
* CVE-2024-56699
* CVE-2024-56742
* CVE-2024-57947
* CVE-2024-57982
* CVE-2024-58053
* CVE-2024-58098
* CVE-2024-58099
* CVE-2024-58100
* CVE-2024-58237
* CVE-2025-21629
* CVE-2025-21658
* CVE-2025-21720
* CVE-2025-21839
* CVE-2025-21854
* CVE-2025-21868
* CVE-2025-21872
* CVE-2025-21898
* CVE-2025-21899
* CVE-2025-21920
* CVE-2025-21938
* CVE-2025-21959
* CVE-2025-21997
* CVE-2025-22005
* CVE-2025-22035
* CVE-2025-22066
* CVE-2025-22083
* CVE-2025-22089
* CVE-2025-22090
* CVE-2025-22095
* CVE-2025-22111
* CVE-2025-22113
* CVE-2025-22119
* CVE-2025-22120
* CVE-2025-22124
* CVE-2025-23141
* CVE-2025-23142
* CVE-2025-23144
* CVE-2025-23146
* CVE-2025-23147
* CVE-2025-23148
* CVE-2025-23149
* CVE-2025-23151
* CVE-2025-23155
* CVE-2025-23156
* CVE-2025-23157
* CVE-2025-23158
* CVE-2025-23159
* CVE-2025-23161
* CVE-2025-23163
* CVE-2025-37738
* CVE-2025-37740
* CVE-2025-37741
* CVE-2025-37742
* CVE-2025-37743
* CVE-2025-37747
* CVE-2025-37752
* CVE-2025-37754
* CVE-2025-37756
* CVE-2025-37757
* CVE-2025-37758
* CVE-2025-37765
* CVE-2025-37766
* CVE-2025-37767
* CVE-2025-37768
* CVE-2025-37769
* CVE-2025-37770
* CVE-2025-37771
* CVE-2025-37772
* CVE-2025-37781
* CVE-2025-37782
* CVE-2025-37786
* CVE-2025-37788
* CVE-2025-37792
* CVE-2025-37793
* CVE-2025-37794
* CVE-2025-37796
* CVE-2025-37798
* CVE-2025-37800
* CVE-2025-37801
* CVE-2025-37805
* CVE-2025-37810
* CVE-2025-37811
* CVE-2025-37812
* CVE-2025-37815
* CVE-2025-37819
* CVE-2025-37836
* CVE-2025-37839
* CVE-2025-37840
* CVE-2025-37841
* CVE-2025-37844
* CVE-2025-37849
* CVE-2025-37850
* CVE-2025-37851
* CVE-2025-37852
* CVE-2025-37853
* CVE-2025-37854
* CVE-2025-37856
* CVE-2025-37858
* CVE-2025-37859
* CVE-2025-37862
* CVE-2025-37864
* CVE-2025-37865
* CVE-2025-37867
* CVE-2025-37871
* CVE-2025-37873
* CVE-2025-37874
* CVE-2025-37875
* CVE-2025-37881
* CVE-2025-37884
* CVE-2025-37885
* CVE-2025-37889
* CVE-2025-37890
* CVE-2025-37891
* CVE-2025-37892
* CVE-2025-37897
* CVE-2025-37900
* CVE-2025-37901
* CVE-2025-37903
* CVE-2025-37905
* CVE-2025-37909
* CVE-2025-37911
* CVE-2025-37912
* CVE-2025-37913
* CVE-2025-37914
* CVE-2025-37915
* CVE-2025-37917
* CVE-2025-37918
* CVE-2025-37920
* CVE-2025-37921
* CVE-2025-37923
* CVE-2025-37925
* CVE-2025-37927
* CVE-2025-37928
* CVE-2025-37929
* CVE-2025-37930
* CVE-2025-37931
* CVE-2025-37932
* CVE-2025-37933
* CVE-2025-37936
* CVE-2025-37937
* CVE-2025-37938
* CVE-2025-37943
* CVE-2025-37944
* CVE-2025-37945
* CVE-2025-37946
* CVE-2025-37948
* CVE-2025-37951
* CVE-2025-37953
* CVE-2025-37954
* CVE-2025-37959
* CVE-2025-37961
* CVE-2025-37963
* CVE-2025-37967
* CVE-2025-37968
* CVE-2025-37969
* CVE-2025-37970
* CVE-2025-37972
* CVE-2025-37973
* CVE-2025-37978
* CVE-2025-37979
* CVE-2025-37980
* CVE-2025-37982
* CVE-2025-37983
* CVE-2025-37984
* CVE-2025-37985
* CVE-2025-37986
* CVE-2025-37987
* CVE-2025-37989
* CVE-2025-37990
* CVE-2025-37992
* CVE-2025-37994
* CVE-2025-37995
* CVE-2025-37997
* CVE-2025-37998
* CVE-2025-38000
* CVE-2025-38001
* CVE-2025-38003
* CVE-2025-38004
* CVE-2025-38005
* CVE-2025-38007
* CVE-2025-38009
* CVE-2025-38010
* CVE-2025-38011
* CVE-2025-38013
* CVE-2025-38014
* CVE-2025-38015
* CVE-2025-38018
* CVE-2025-38020
* CVE-2025-38022
* CVE-2025-38023
* CVE-2025-38024
* CVE-2025-38027
* CVE-2025-38031
* CVE-2025-38034
* CVE-2025-38035
* CVE-2025-38040
* CVE-2025-38043
* CVE-2025-38044
* CVE-2025-38045
* CVE-2025-38051
* CVE-2025-38052
* CVE-2025-38053
* CVE-2025-38057
* CVE-2025-38058
* CVE-2025-38059
* CVE-2025-38060
* CVE-2025-38061
* CVE-2025-38062
* CVE-2025-38063
* CVE-2025-38064
* CVE-2025-38065
* CVE-2025-38068
* CVE-2025-38072
* CVE-2025-38074
* CVE-2025-38077
* CVE-2025-38078
* CVE-2025-38079
* CVE-2025-38080
* CVE-2025-38081
* CVE-2025-38083
* CVE-2025-38084
* CVE-2025-38085
* CVE-2025-38087
* CVE-2025-38088
* CVE-2025-38089
* CVE-2025-38090
* CVE-2025-38094
* CVE-2025-38095
* CVE-2025-38097
* CVE-2025-38098
* CVE-2025-38099
* CVE-2025-38100
* CVE-2025-38102
* CVE-2025-38104
* CVE-2025-38105
* CVE-2025-38107
* CVE-2025-38108
* CVE-2025-38109
* CVE-2025-38110
* CVE-2025-38111
* CVE-2025-38112
* CVE-2025-38113
* CVE-2025-38115
* CVE-2025-38117
* CVE-2025-38118
* CVE-2025-38120
* CVE-2025-38122
* CVE-2025-38123
* CVE-2025-38124
* CVE-2025-38126
* CVE-2025-38127
* CVE-2025-38129
* CVE-2025-38131
* CVE-2025-38132
* CVE-2025-38135
* CVE-2025-38136
* CVE-2025-38138
* CVE-2025-38142
* CVE-2025-38143
* CVE-2025-38145
* CVE-2025-38147
* CVE-2025-38148
* CVE-2025-38149
* CVE-2025-38151
* CVE-2025-38153
* CVE-2025-38154
* CVE-2025-38155
* CVE-2025-38157
* CVE-2025-38158
* CVE-2025-38159
* CVE-2025-38161
* CVE-2025-38162
* CVE-2025-38165
* CVE-2025-38166
* CVE-2025-38173
* CVE-2025-38174
* CVE-2025-38177
* CVE-2025-38180
* CVE-2025-38181
* CVE-2025-38182
* CVE-2025-38183
* CVE-2025-38187
* CVE-2025-38188
* CVE-2025-38192
* CVE-2025-38193
* CVE-2025-38194
* CVE-2025-38197
* CVE-2025-38198
* CVE-2025-38200
* CVE-2025-38202
* CVE-2025-38203
* CVE-2025-38204
* CVE-2025-38206
* CVE-2025-38210
* CVE-2025-38211
* CVE-2025-38212
* CVE-2025-38213
* CVE-2025-38214
* CVE-2025-38215
* CVE-2025-38217
* CVE-2025-38220
* CVE-2025-38222
* CVE-2025-38225
* CVE-2025-38226
* CVE-2025-38227
* CVE-2025-38229
* CVE-2025-38231
* CVE-2025-38236
* CVE-2025-38239
* CVE-2025-38240
* CVE-2025-38244
* CVE-2025-38246
* CVE-2025-38248
* CVE-2025-38249
* CVE-2025-38250
* CVE-2025-38257
* CVE-2025-38259
* CVE-2025-38264
* CVE-2025-38272
* CVE-2025-38273
* CVE-2025-38275
* CVE-2025-38277
* CVE-2025-38279
* CVE-2025-38283
* CVE-2025-38286
* CVE-2025-38289
* CVE-2025-38290
* CVE-2025-38292
* CVE-2025-38293
* CVE-2025-38300
* CVE-2025-38303
* CVE-2025-38304
* CVE-2025-38305
* CVE-2025-38307
* CVE-2025-38310
* CVE-2025-38312
* CVE-2025-38313
* CVE-2025-38319
* CVE-2025-38323
* CVE-2025-38326
* CVE-2025-38328
* CVE-2025-38332
* CVE-2025-38334
* CVE-2025-38335
* CVE-2025-38336
* CVE-2025-38337
* CVE-2025-38338
* CVE-2025-38342
* CVE-2025-38343
* CVE-2025-38344
* CVE-2025-38345
* CVE-2025-38348
* CVE-2025-38349
* CVE-2025-38350
* CVE-2025-38352
* CVE-2025-38354
* CVE-2025-38362
* CVE-2025-38363
* CVE-2025-38364
* CVE-2025-38365
* CVE-2025-38369
* CVE-2025-38371
* CVE-2025-38373
* CVE-2025-38375
* CVE-2025-38376
* CVE-2025-38377
* CVE-2025-38380
* CVE-2025-38382
* CVE-2025-38384
* CVE-2025-38385
* CVE-2025-38386
* CVE-2025-38387
* CVE-2025-38389
* CVE-2025-38391
* CVE-2025-38392
* CVE-2025-38393
* CVE-2025-38395
* CVE-2025-38396
* CVE-2025-38399
* CVE-2025-38400
* CVE-2025-38401
* CVE-2025-38403
* CVE-2025-38404
* CVE-2025-38406
* CVE-2025-38409
* CVE-2025-38410
* CVE-2025-38412
* CVE-2025-38414
* CVE-2025-38415
* CVE-2025-38416
* CVE-2025-38420
* CVE-2025-38424
* CVE-2025-38425
* CVE-2025-38426
* CVE-2025-38428
* CVE-2025-38429
* CVE-2025-38430
* CVE-2025-38436
* CVE-2025-38443
* CVE-2025-38448
* CVE-2025-38449
* CVE-2025-38455
* CVE-2025-38457
* CVE-2025-38460
* CVE-2025-38461
* CVE-2025-38462
* CVE-2025-38463
* CVE-2025-38465
* CVE-2025-38467
* CVE-2025-38468
* CVE-2025-38470
* CVE-2025-38471
* CVE-2025-38473
* CVE-2025-38474
* CVE-2025-38476
* CVE-2025-38477
* CVE-2025-38478
* CVE-2025-38480
* CVE-2025-38481
* CVE-2025-38482
* CVE-2025-38483
* CVE-2025-38485
* CVE-2025-38487
* CVE-2025-38489
* CVE-2025-38490
* CVE-2025-38494
* CVE-2025-38495
* CVE-2025-38496
* CVE-2025-38497
* CVE-2025-38498
* CVE-2025-39735
* CVE-2025-40014
CVSS scores:
* CVE-2019-11135 ( SUSE ): 6.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2019-11135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-52888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53146 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26831 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26831 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36348 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
* CVE-2024-36349 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
* CVE-2024-36350 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-36357 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-43869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44963 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-44963 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49568 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49568 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-49861 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49861 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56613 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56613 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56613 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56699 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56699 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56742 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56742 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56742 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57947 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57947 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57982 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-58053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58099 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58099 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21629 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21629 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21658 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21872 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21898 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21920 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21938 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21959 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21959 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21997 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22005 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22035 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-22035 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-22066 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22083 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22089 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-22090 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22095 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22111 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22113 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22113 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22119 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22119 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-22120 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22124 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23141 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23146 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23161 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23163 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37738 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37740 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37741 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37742 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-37743 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37743 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37752 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37766 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37771 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-37786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37800 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37801 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37801 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37805 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37810 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37810 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-37811 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37812 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37812 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37839 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-37850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37851 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37851 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37853 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37854 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37854 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37856 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37856 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37858 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37858 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-37859 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37859 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37862 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37881 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37884 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37884 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37890 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37891 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-37892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37897 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37897 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37900 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37901 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37903 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37903 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-37905 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37905 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37909 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37909 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37911 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37911 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-37912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37913 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37915 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37917 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37917 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37918 ( SUSE ): 7.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37918 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37920 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37920 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-37921 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37921 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-37923 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37923 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37925 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-37925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37927 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37927 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37928 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37928 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37929 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37929 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-37930 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37930 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-37931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37932 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-37933 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37933 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-37951 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37954 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37954 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-37959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37963 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37983 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37983 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37984 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37984 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-37985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37992 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37994 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37994 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-37995 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37997 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37997 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37998 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37998 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38000 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38000 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38001 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38001 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38003 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38003 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38004 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38004 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38005 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38009 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38010 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38010 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38011 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38013 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38013 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38014 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38014 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38015 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38018 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38020 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38022 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38022 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38023 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38024 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38027 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38027 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38031 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38031 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38034 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38034 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38035 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38035 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38040 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38040 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38043 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38043 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-38044 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38044 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-38045 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38045 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38057 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38058 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38058 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38059 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38059 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38060 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38060 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38061 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38061 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38062 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38062 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38063 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38063 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38064 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38064 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38065 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38065 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38068 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38068 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38072 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38074 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38077 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38078 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38079 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38079 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38080 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38081 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38083 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38084 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38084 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38085 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38085 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38087 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38088 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38088 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38089 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38090 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38090 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38094 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38095 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38097 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38097 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38098 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38098 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38099 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38099 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38100 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38102 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38102 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38105 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38105 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38107 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38107 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38108 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38108 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38109 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38109 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38110 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38110 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38111 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38111 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38112 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38113 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38115 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38117 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38117 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38118 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38120 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38120 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-38122 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38123 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38124 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38126 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38126 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38127 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38129 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38131 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38131 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38132 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38132 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38135 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38136 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38138 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38142 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38142 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38143 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38145 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38148 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38149 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38149 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38151 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38153 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38154 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38154 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38155 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38157 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38157 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38158 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38159 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38159 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38161 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38161 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38162 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38165 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38166 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38166 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38173 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38173 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38174 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38174 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38177 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38180 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38181 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38181 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38183 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38183 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38187 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38187 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38188 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38192 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38192 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38193 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38193 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38194 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38197 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38197 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38198 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38200 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38200 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38202 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38203 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38203 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38204 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38204 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38206 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38206 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38211 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38211 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38212 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38212 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38213 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38213 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38214 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38215 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38217 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38217 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38220 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38220 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38222 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38222 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2025-38225 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38226 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38226 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38227 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38227 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38229 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38229 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2025-38231 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38231 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38236 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38236 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38239 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38239 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38240 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38240 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38244 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38244 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38248 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38249 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38249 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38250 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38250 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38257 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38259 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38264 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38272 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38273 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38273 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38275 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38277 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38279 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38283 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38286 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38286 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38289 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38289 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38290 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38290 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38292 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38292 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38293 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38293 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38300 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38300 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38303 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38303 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38304 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38307 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38310 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38310 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38312 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38313 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38319 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38323 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38326 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38328 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38332 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38334 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38334 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38335 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38336 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38337 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38338 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38338 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38342 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-38344 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38345 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38345 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38348 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38349 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38349 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-38350 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38350 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-38352 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38352 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38354 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38362 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38363 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38364 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38365 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38365 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38369 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38371 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38373 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38373 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38375 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38375 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38376 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38377 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38377 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38380 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38380 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38382 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38382 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38384 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38384 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38385 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38385 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38386 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38387 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38387 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38389 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38391 ( SUSE ): 5.2
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38391 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38392 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38393 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38393 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38395 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38395 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38396 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38396 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38399 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38400 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38400 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38401 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38401 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38403 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38403 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38404 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38404 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38406 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38409 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38409 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38410 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38412 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38414 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38415 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38415 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38416 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38416 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38420 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38424 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38425 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38425 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38426 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38428 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38428 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38429 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38429 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38430 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38436 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38436 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38443 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38443 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38448 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38448 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38449 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38449 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38455 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38455 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38457 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38460 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38460 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38461 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38461 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38462 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38462 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38463 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38463 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38465 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38467 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38467 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38468 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38470 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38471 ( SUSE ): 8.4
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38471 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H
* CVE-2025-38473 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38473 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38474 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38476 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38477 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38478 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38478 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38480 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38480 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38481 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38481 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38482 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38482 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38483 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38483 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38485 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38485 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38487 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38489 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38489 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38490 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38494 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38495 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38495 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38496 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38496 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38497 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38497 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38498 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38498 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39735 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39735 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-40014 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40014 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Confidential Computing Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 447 vulnerabilities, contains two features and has 69
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 Confidential Computing kernel was updated to
receive various security bugfixes.
The following security bugs were fixed:
* CVE-2019-11135: TSX Asynchronous Abort condition (bsc#1139073).
* CVE-2023-52888: media: mediatek: vcodec: Only free buffer VA that is not
NULL (bsc#1228557).
* CVE-2024-36028: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when
dissolve_free_hugetlb_folio() (bsc#1225707).
* CVE-2024-36348, CVE-2024-36349, CVE-2024-36350, CVE-2024-36357: x86/process:
Move the buffer clearing before MONITOR (bsc#1238896).
* CVE-2024-44963: btrfs: do not BUG_ON() when freeing tree block after error
(bsc#1230216).
* CVE-2024-49568: net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when
receiving proposal msg (bsc#1235728).
* CVE-2024-49861: net: clear the dst when changing skb protocol (bsc#1245954).
* CVE-2024-57982: xfrm: state: fix out-of-bounds read during lookup
(bsc#1237913).
* CVE-2024-58053: rxrpc: Fix handling of received connection abort
(bsc#1238982).
* CVE-2024-56742: vfio/mlx5: Fix an unwind issue in
mlx5vf_add_migration_pages() (bsc#1235613).
* CVE-2025-38062: kABI: restore layout of struct msi_desc (bsc#1245216).
* CVE-2025-38220: ext4: only dirty folios when data journaling regular files
(bsc#1245966).
* CVE-2025-38244: smb: client: fix potential deadlock when reconnecting
channels (bsc#1246183).
* CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers()
and posix_cpu_timer_del() (bsc#1246911).
* CVE-2025-38371: drm/v3d: Disable interrupts before resetting the GPU
(bsc#1247178).
* CVE-2025-38392: idpf: convert control queue mutex to a spinlock
(bsc#1247169).
* CVE-2025-38399: scsi: target: Fix NULL pointer dereference in
core_scsi3_decode_spec_i_port() (bsc#1247097).
* CVE-2025-38426: drm/amdgpu: Add basic validation for RAS header
(bsc#1247252).
* CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not
exist (bsc#1247098).
* CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd()
(bsc#1247143).
* CVE-2025-38465: netlink: make sure we allow at least one dump skb
(bsc#1247118).
* CVE-2025-38470: kABI fix for net: vlan: fix VLAN 0 refcount imbalance of
toggling (bsc#1247288).
* CVE-2025-38471: tls: always refresh the queue when reading sock
(bsc#1247450).
* CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page()
(bsc#1247243).
* CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours
mounts (bsc#1247374).
* CVE-2025-21720: xfrm: delete intermediate secpath entry in packet offload
mode (bsc#1238859).
* CVE-2025-21839: KVM: x86: Load DR6 with guest value only before entering
.vcpu_run() loop (bsc#1239061).
* CVE-2025-21854: selftest/bpf: Add vsock test for sockmap rejecting
unconnected (bsc#1239470).
* CVE-2025-21868: kABI workaround for adding an header (bsc#1240180).
* CVE-2025-21872: efi/mokvar-table: Avoid repeated map/unmap of the same page
(bsc#1240323).
* CVE-2025-21898: ftrace: Avoid potential division by zero in
function_stat_show() (bsc#1240610).
* CVE-2025-21899: tracing: Fix bad hist from corrupting named_triggers list
(bsc#1240577).
* CVE-2025-21920: vlan: enforce underlying device type (bsc#1240686).
* CVE-2025-21938: mptcp: fix 'scheduling while atomic' in
mptcp_pm_nl_append_new_local_addr (bsc#1240723).
* CVE-2025-21959: netfilter: nf_conncount: Fully initialize struct
nf_conncount_tuple in insert_tree() (bsc#1240814).
* CVE-2025-21997: xsk: fix an integer overflow in xp_create_and_assign_umem()
(bsc#1240823).
* CVE-2025-22035: tracing: Fix use-after-free in print_graph_function_flags
during tracer switching (bsc#1241544).
* CVE-2025-22090: mm: (un)track_pfn_copy() fix + doc improvements
(bsc#1241537).
* CVE-2025-22111: kABI fix for net: Remove RTNL dance for SIOCBRADDIF and
SIOCBRDELIF (bsc#1241572).
* CVE-2025-22113: ext4: define ext4_journal_destroy wrapper (bsc#1241617).
* CVE-2025-23155: net: stmmac: Fix accessing freed irq affinity_hint
(bsc#1242573).
* CVE-2025-23163: net: vlan: do not propagate flags on open (bsc#1242837).
* CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846).
* CVE-2025-37743: wifi: ath12k: Avoid memory leak while enabling statistics
(bsc#1242163).
* CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
* CVE-2025-37756: net: tls: explicitly disallow disconnect (bsc#1242515).
* CVE-2025-37757: tipc: fix memory leak in tipc_link_xmit (bsc#1242521).
* CVE-2025-37786: net: dsa: free routing table on probe failure (bsc#1242725).
* CVE-2025-37800: driver core: fix potential NULL pointer dereference in
dev_uevent() (bsc#1242849).
* CVE-2025-37801: spi: spi-imx: Add check for spi_imx_setupxfer()
(bsc#1242850).
* CVE-2025-37811: usb: chipidea: ci_hdrc_imx: fix usbmisc handling
(bsc#1242907).
* CVE-2025-37844: cifs: avoid NULL pointer dereference in dbg call
(bsc#1242946).
* CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races
(bsc#1243068).
* CVE-2025-37859: page_pool: avoid infinite loop to schedule delayed worker
(bsc#1243051).
* CVE-2025-37862: HID: pidff: Fix null pointer dereference in
pidff_find_fields (bsc#1242982).
* CVE-2025-37864: net: dsa: clean up FDB, MDB, VLAN entries on unbind
(bsc#1242965).
* CVE-2025-37865: net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST
is unsupported (bsc#1242954).
* CVE-2025-37874: net: ngbe: fix memory leak in ngbe_probe() error path
(bsc#1242940).
* CVE-2025-37884: bpf: Fix deadlock between rcu_tasks_trace and event_mutex
(bsc#1243060).
* CVE-2025-37885: KVM: x86: Reset IRTE to host control if _new_ route isn't
postable (bsc#1242960).
* CVE-2025-37909: net: lan743x: Fix memleak issue when GSO enabled
(bsc#1243467).
* CVE-2025-37917: net: ethernet: mtk-star-emac: fix spinlock recursion issues
on rx/tx poll (bsc#1243475).
* CVE-2025-37920: kABI workaround for xsk: Fix race condition in AF_XDP
generic RX path (bsc#1243479).
* CVE-2025-37921: vxlan: vnifilter: Fix unlocked deletion of default FDB entry
(bsc#1243480).
* CVE-2025-37923: tracing: Fix oob write in trace_seq_to_buffer()
(bsc#1243551).
* CVE-2025-37927: iommu/amd: Fix potential buffer overflow in
parse_ivrs_acpihid (bsc#1243620).
* CVE-2025-37933: octeon_ep: Fix host hang issue during device reboot
(bsc#1243628).
* CVE-2025-37936: perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with
vCPU's value (bsc#1243537).
* CVE-2025-37938: tracing: Verify event formats that have "%*p.."
(bsc#1243544).
* CVE-2025-37945: net: phy: allow MDIO bus PM ops to start/stop state machine
for phylink-controlled PHY (bsc#1243538).
* CVE-2025-37954: smb: client: Avoid race in open_cached_dir with lease breaks
(bsc#1243664).
* CVE-2025-37961: ipvs: fix uninit-value for saddr in do_output_route4
(bsc#1243523).
* CVE-2025-37967: usb: typec: ucsi: displayport: Fix deadlock (bsc#1243572).
* CVE-2025-37968: iio: light: opt3001: fix deadlock due to concurrent flag
access (bsc#1243571).
* CVE-2025-37984: crypto: ecdsa - Harden against integer overflows in
DIV_ROUND_UP() (bsc#1243669).
* CVE-2025-37987: pds_core: Prevent possible adminq overflow/stuck condition
(bsc#1243542).
* CVE-2025-37992: net_sched: Flush gso_skb list too during ->change()
(bsc#1243698).
* CVE-2025-37995: module: ensure that kobject_put() is safe for module type
kobjects (bsc#1243827).
* CVE-2025-37997: netfilter: ipset: fix region locking in hash types
(bsc#1243832).
* CVE-2025-37998: openvswitch: Fix unsafe attribute parsing in
output_userspace() (bsc#1243836).
* CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in
hfsc_enqueue() (bsc#1244277).
* CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to
eltree twice (bsc#1244234).
* CVE-2025-38011: drm/amdgpu: csa unmap use uninterruptible lock
(bsc#1244729).
* CVE-2025-38018: net/tls: fix kernel panic when alloc_page failed
(bsc#1244999).
* CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in
btrfs__prelim_ref (bsc#1244792).
* CVE-2025-38035: nvmet-tcp: do not restore null sk_state_change
(bsc#1244801).
* CVE-2025-38051: smb: client: Fix use-after-free in cifs_fill_dirent
(bsc#1244750).
* CVE-2025-38053: idpf: fix null-ptr-deref in idpf_features_check
(bsc#1244746).
* CVE-2025-38057: espintcp: fix skb leaks (bsc#1244862).
* CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be
under mount_lock (bsc#1245151).
* CVE-2025-38060: bpf: abort verification if env->cur_state->loop_entry !=
NULL (bsc#1245155).
* CVE-2025-38061: net: pktgen: fix access outside of user given buffer in
pktgen_thread_write() (bsc#1245440).
* CVE-2025-38063: dm: fix unconditional IO throttle caused by REQ_PREFLUSH
(bsc#1245202).
* CVE-2025-38064: virtio: break and reset virtio devices on device_shutdown()
(bsc#1245201).
* CVE-2025-38072: libnvdimm/labels: Fix divide error in nd_label_data_init()
(bsc#1244743).
* CVE-2025-38074: vhost-scsi: protect vq->log_used with vq->mutex
(bsc#1244735).
* CVE-2025-38094: net: cadence: macb: Fix a possible deadlock in macb_halt_tx
(bsc#1245649).
* CVE-2025-38097: kabi: restore encap_sk in struct xfrm_state (bsc#1245660).
* CVE-2025-38098: drm/amd/display: Do not treat wb connector as physical in
(bsc#1245654).
* CVE-2025-38099: Bluetooth: btusb: Fix regression in the initialization of
fake Bluetooth controllers (bsc#1245671).
* CVE-2025-38100: x86/iopl: Cure TIF_IO_BITMAP inconsistencies (bsc#1245650).
* CVE-2025-38105: ALSA: usb-audio: Kill timer properly at removal
(bsc#1245682).
* CVE-2025-38115: net_sched: sch_sfq: fix a potential crash on gso_skb
handling (bsc#1245689).
* CVE-2025-38117: hci_dev centralize extra lock (bsc#1245695).
* CVE-2025-38126: net: stmmac: make sure that ptp_rate is not 0 before
configuring timestamping (bsc#1245708).
* CVE-2025-38131: coresight: prevent deactivate active config while enabling
the config (bsc#1245677).
* CVE-2025-38132: coresight: holding cscfg_csdev_lock while removing cscfg
from csdev (bsc#1245679).
* CVE-2025-38147: calipso: unlock rcu before returning -EAFNOSUPPORT
(bsc#1245768).
* CVE-2025-38158: hisi_acc_vfio_pci: fix XQE dma address error (bsc#1245750).
* CVE-2025-38162: netfilter: nft_set_pipapo: prevent overflow in lookup table
allocation (bsc#1245752).
* CVE-2025-38166: bpf: fix ktls panic with sockmap (bsc#1245758).
* CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
* CVE-2025-38182: ublk: santizize the arguments from userspace when adding a
device (bsc#1245937).
* CVE-2025-38183: net: lan743x: fix potential out-of-bounds write in
lan743x_ptp_io_event_clock_get() (bsc#1246006).
* CVE-2025-38187: drm/nouveau: fix a use-after-free in r535_gsp_rpc_push()
(bsc#1245951).
* CVE-2025-38188: drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE (bsc#1246098).
* CVE-2025-38200: i40e: fix MMIO write access to an invalid page in
i40e_clear_hw (bsc#1246045).
* CVE-2025-38202: bpf: Check rcu_read_lock_trace_held() in
bpf_map_lookup_percpu_elem() (bsc#1245980).
* CVE-2025-38203: jfs: Fix null-ptr-deref in jfs_ioc_trim (bsc#1246044).
* CVE-2025-38204: jfs: fix array-index-out-of-bounds read in
add_missing_indices (bsc#1245983).
* CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246073).
* CVE-2025-38210: configfs-tsm-report: Fix NULL dereference of tsm_ops
(bsc#1246020).
* CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246029).
* CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data
(bsc#1245976).
* CVE-2025-38236: af_unix: Disable MSG_OOB for unprivileged users
(bsc#1246093).
* CVE-2025-38239: scsi: megaraid_sas: Fix invalid node index (bsc#1246178).
* CVE-2025-38248: bridge: mcast: Fix use-after-free during router port
configuration (bsc#1246173).
* CVE-2025-38250: kABI workaround for bluetooth hci_dev changes (bsc#1246182).
* CVE-2025-38264: llist: add interface to check if a node is on a list
(bsc#1246387).
* CVE-2025-38272: net: dsa: b53: do not enable EEE on bcm63xx (bsc#1246268).
* CVE-2025-38279: selftests/bpf: Add tests with stack ptr register in
conditional jmp (bsc#1246264).
* CVE-2025-38283: hisi_acc_vfio_pci: bugfix live migration function without VF
device driver (bsc#1246273).
* CVE-2025-38303: Bluetooth: eir: Fix possible crashes on eir_create_adv_data
(bsc#1246354).
* CVE-2025-38310: seg6: Fix validation of nexthop addresses (bsc#1246361).
* CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
* CVE-2025-38334: x86/sgx: Prevent attempts to reclaim poisoned pages
(bsc#1246384).
* CVE-2025-38335: Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT
(bsc#1246250).
* CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in
jbd2_journal_dirty_metadata() (bsc#1246253).
* CVE-2025-38349: eventpoll: do not decrement ep refcount while still holding
the ep mutex (bsc#1246777).
* CVE-2025-38350: net/sched: Always pass notifications when child class
becomes empty (bsc#1246781).
* CVE-2025-38364: maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate()
(bsc#1247091).
* CVE-2025-38365: btrfs: fix a race between renames and directory logging
(bsc#1247023).
* CVE-2025-38375: virtio-net: ensure the received length does not exceed
allocated size (bsc#1247177).
* CVE-2025-38382: btrfs: fix iteration of extrefs during log replay
(bsc#1247031).
* CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem
LSM bypass (bsc#1247156).
* CVE-2025-38403: vsock/vmci: Clear the vmci transport packet properly when
initializing it (bsc#1247141).
* CVE-2025-38414: wifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for
WCN7850 (bsc#1247145).
* CVE-2025-38429: bus: mhi: ep: Update read pointer only after buffer is
written (bsc#1247253).
* CVE-2025-38455: KVM: SVM: Reject SEV{-ES} intra host migration if vCPU
creation is in-flight (bsc#1247101).
* CVE-2025-38461: vsock: Fix transport_* TOCTOU (bsc#1247103).
* CVE-2025-38462: vsock: Fix transport_{g2h,h2g} TOCTOU (bsc#1247104).
* CVE-2025-38463: tcp: Correct signedness in skb remaining space calculation
(bsc#1247113).
* CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write
(bsc#1247347).
The following non-security bugs were fixed:
* ACPI: CPPC: Fix NULL pointer dereference when nosmp is used (git-fixes).
* ACPI: HED: Always initialize before evged (stable-fixes).
* ACPI: LPSS: Remove AudioDSP related ID (git-fixes).
* ACPI: OSI: Stop advertising support for "3.0 _SCP Extensions" (git-fixes).
* ACPI: PNP: Add Intel OC Watchdog IDs to non-PNP device list (stable-fixes).
* ACPI: PRM: Reduce unnecessary printing to avoid user confusion
(bsc#1246122).
* ACPI: battery: negate current when discharging (stable-fixes).
* ACPI: bus: Bail out if acpi_kobj registration fails (stable-fixes).
* ACPI: processor: perflib: Fix initial _PPC limit application (git-fixes).
* ACPICA: Avoid sequence overread in call to strncmp() (stable-fixes).
* ACPICA: Refuse to evaluate a method if arguments are missing (stable-fixes).
* ACPICA: Utilities: Fix spelling mistake "Incremement" -> "Increment" (git-
fixes).
* ACPICA: exserial: do not forget to handle FFixedHW opregions for reading
(git-fixes).
* ACPICA: fix acpi operand cache leak in dswstate.c (stable-fixes).
* ACPICA: fix acpi parse and parseext cache leaks (stable-fixes).
* ACPICA: utilities: Fix overflow check in vsnprintf() (stable-fixes).
* ALSA: hda/intel: Add Thinkpad E15 to PM deny list (stable-fixes).
* ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx (stable-
fixes).
* ALSA: hda/realtek - Enable mute LED on HP Pavilion Laptop 15-eg100 (stable-
fixes).
* ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS (stable-fixes).
* ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx (stable-fixes).
* ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ASP10 (stable-fixes).
* ALSA: hda/realtek: Enable PC beep passthrough for HP EliteBook 855 G7
(stable-fixes).
* ALSA: hda/realtek: Fix built-in mic on ASUS VivoBook X507UAR (git-fixes).
* ALSA: hda/realtek: Fix built-in mic on ASUS VivoBook X513EA (git-fixes).
* ALSA: hda/realtek: enable headset mic on Latitude 5420 Rugged (stable-
fixes).
* ALSA: hda/tegra: Add Tegra264 support (stable-fixes).
* ALSA: hda: Add missing NVIDIA HDA codec IDs (stable-fixes).
* ALSA: hda: Add new pci id for AMD GPU display HD audio controller (stable-
fixes).
* ALSA: hda: Ignore unsol events for cards being shut down (stable-fixes).
* ALSA: pcm: Fix race of buffer access at PCM OSS layer (stable-fixes).
* ALSA: sb: Do not allow changing the DMA mode during operations (stable-
fixes).
* ALSA: sb: Force to disable DMAs once when DMA mode is changed (stable-
fixes).
* ALSA: seq: Improve data consistency at polling (stable-fixes).
* ALSA: usb-audio: Accept multiple protocols in GTBs (stable-fixes).
* ALSA: usb-audio: Add Pioneer DJ DJM-V10 support (stable-fixes).
* ALSA: usb-audio: Add a quirk for Lenovo Thinkpad Thunderbolt 3 dock (stable-
fixes).
* ALSA: usb-audio: Add implicit feedback quirk for RODE AI-1 (stable-fixes).
* ALSA: usb-audio: Add name for HP Engage Go dock (stable-fixes).
* ALSA: usb-audio: Check shutdown at endpoint_set_interface() (stable-fixes).
* ALSA: usb-audio: Fix NULL pointer deref in snd_usb_power_domain_set() (git-
fixes).
* ALSA: usb-audio: Fix duplicated name in MIDI substream names (stable-fixes).
* ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()
(git-fixes).
* ALSA: usb-audio: Rename ALSA kcontrol PCM and PCM1 for the KTMicro sound
card (stable-fixes).
* ALSA: usb-audio: Rename Pioneer mixer channel controls (git-fixes).
* ALSA: usb-audio: Set MIDI1 flag appropriately for GTB MIDI 1.0 entry
(stable-fixes).
* ALSA: usb-audio: Skip setting clock selector for single connections (stable-
fixes).
* ALSA: usb-audio: Support multiple control interfaces (stable-fixes).
* ALSA: usb-audio: Support read-only clock selector control (stable-fixes).
* ALSA: usb-audio: enable support for Presonus Studio 1824c within 1810c file
(stable-fixes).
* ALSA: usb-audio: mixer: Remove temporary string use in
parse_clock_source_unit (stable-fixes).
* ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out()
(git-fixes).
* ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() (git-
fixes).
* NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (git-fixes).
* NFS: Fix the setting of capabilities when automounting a new filesystem
(git-fixes).
* NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (git-
fixes).
* NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY (git-fixes).
* NFSv4.2: another fix for listxattr (git-fixes).
* PCI/MSI: Export pci_msix_prepare_desc() for dynamic MSI-X allocations
(bsc#1245457).
* PCI: hv: Allow dynamic MSI-X vector allocation (bsc#1245457).
* RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages (git-fixes)
* Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()"
(stable-fixes).
* SMB3: rename macro CIFS_SERVER_IS_CHAN to avoid confusion (git-fixes).
* [SMB3] send channel sequence number in SMB3 requests after reconnects (git-
fixes).
* af_unix: Add a prompt to CONFIG_AF_UNIX_OOB (bsc#1246093).
* audit,module: restore audit logging in load failure case (git-fixes).
* btrfs: fix log tree replay failure due to file with 0 links and extents
(git-fixes).
* cifs: reconnect helper should set reconnect for the right channel (git-
fixes).
* drm/amd/display: Do not overwrite dce60_clk_mgr (git-fixes).
* exfat: fdatasync flag should be same like generic_write_sync() (git-fixes).
* gpio: mlxbf2: use platform_get_irq_optional() (git-fixes).
* hv_netvsc: Use VF's tso_max_size value when data path is VF (bsc#1246203).
* ice, irdma: fix an off by one in error handling code (bsc#1247712).
* ice, irdma: move interrupts code to irdma (bsc#1247712).
* ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712).
* ice: count combined queues using Rx/Tx count (bsc#1247712).
* ice: devlink PF MSI-X max and min parameter (bsc#1247712).
* ice: enable_rdma devlink param (bsc#1247712).
* ice: get rid of num_lan_msix field (bsc#1247712).
* ice: init flow director before RDMA (bsc#1247712).
* ice: remove splitting MSI-X between features (bsc#1247712).
* ice: simplify VF MSI-X managing (bsc#1247712).
* ice: treat dyn_allowed only as suggestion (bsc#1247712).
* ipv6: reject malicious packets in ipv6_gso_segment() (git-fixes).
* irdma: free iwdev->rf after removing MSI-X (bsc#1247712).
* kABI: Fix the module::name type in audit_context (git-fixes).
* module: Fix memory deallocation on error path in move_module() (git-fixes).
* module: Remove unnecessary +1 from last_unloaded_module::name size (git-
fixes).
* module: Restore the moduleparam prefix length check (git-fixes).
* net/packet: fix a race in packet_set_ring() and packet_notifier() (git-
fixes).
* net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (git-
fixes).
* net/sched: taprio: enforce minimum value for picos_per_byte (git-fixes).
* net: mana: Add debug logs in MANA network driver (bsc#1246212).
* net: mana: Add handler for hardware servicing events (bsc#1245730).
* net: mana: Allocate MSI-X vectors dynamically (bsc#1245457).
* net: mana: Allow irq_setup() to skip cpus for affinity (bsc#1245457).
* net: mana: Allow tso_max_size to go up-to GSO_MAX_SIZE (bsc#1246203).
* net: mana: Expose additional hardware counters for drop and TC via ethtool
(bsc#1245729).
* net: mana: Set tx_packets to post gso processing packet count (bsc#1245731).
* net: mana: explain irq_setup() algorithm (bsc#1245457).
* net: usbnet: Fix the wrong netif_carrier_on() call (git-fixes).
* netpoll: prevent hanging NAPI when netcons gets enabled (git-fixes).
* pNFS/flexfiles: do not attempt pnfs on fatal DS errors (git-fixes).
* ring-buffer: Do not allow events in NMI with generic atomic64 cmpxchg()
(git-fixes).
* sched: Add test_and_clear_wake_up_bit() and atomic_dec_and_wake_up() (git-
fixes).
* smb3: move server check earlier when setting channel sequence number (git-
fixes).
* smb: client: fix parsing of device numbers (git-fixes).
* sunrpc: fix client side handling of tls alerts (git-fixes).
* sunrpc: fix handling of server side tls alerts (git-fixes).
* tracing/kprobe: Make trace_kprobe's module callback called after jump_label
update (git-fixes).
* tracing/kprobes: Fix to free objects when failed to copy a symbol (git-
fixes).
* ASoC: Intel: avs: Fix deadlock when the failing IPC is SET_D0IX (git-fixes).
* ASoC: Intel: avs: Verify content returned by parse_int_array() (git-fixes).
* ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013 (stable-
fixes).
* ASoC: SOF: ipc4-pcm: Adjust pipeline_list->pipelines allocation type (git-
fixes).
* ASoC: amd: yc: Add DMI quirk for Lenovo IdeaPad Slim 5 15 (stable-fixes).
* ASoC: amd: yc: Add quirk for Lenovo Yoga Pro 7 14ASP9 (stable-fixes).
* ASoC: amd: yc: Add quirk for MSI Bravo 17 D7VF internal mic (stable-fixes).
* ASoC: amd: yc: add quirk for Acer Nitro ANV15-41 internal mic (stable-
fixes).
* ASoC: amd: yc: update quirk data for HP Victus (stable-fixes).
* ASoC: apple: mca: Constrain channels according to TDM mask (git-fixes).
* ASoC: codec: wcd9335: Convert to GPIO descriptors (stable-fixes).
* ASoC: codecs: hda: Fix RPM usage count underflow (git-fixes).
* ASoC: codecs: pcm3168a: Allow for 24-bit in provider mode (stable-fixes).
* ASoC: codecs: wcd9335: Fix missing free of regulator supplies (git-fixes).
* ASoC: codecs: wcd9335: Handle nicer probe deferral and simplify with
dev_err_probe() (stable-fixes).
* ASoC: cs35l56: probe() should fail if the device ID is not recognized (git-
fixes).
* ASoC: fsl_asrc: use internal measured ratio for non-ideal ratio mode (git-
fixes).
* ASoC: fsl_xcvr: get channel status data when PHY is not exists (git-fixes).
* ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of()
(stable-fixes).
* ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect
(stable-fixes).
* ASoC: mediatek: mt8188: Add reference for dmic clocks (stable-fixes).
* ASoC: mediatek: mt8188: Treat DMIC_GAINx_CUR as non-volatile (stable-fixes).
* ASoC: meson: meson-card-utils: use of_property_present() for DT parsing
(git-fixes).
* ASoC: ops: Enforce platform maximum on initial value (stable-fixes).
* ASoC: ops: dynamically allocate struct snd_ctl_elem_value (git-fixes).
* ASoC: qcom: sdm845: Add error handling in sdm845_slim_snd_hw_params() (git-
fixes).
* ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup()
(stable-fixes).
* ASoC: rt722-sdca: Add some missing readable registers (stable-fixes).
* ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot() (stable-
fixes).
* ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() (git-
fixes).
* ASoC: sun4i-codec: support hp-det-gpios property (stable-fixes).
* ASoC: tas2764: Add reg defaults for TAS2764_INT_CLK_CFG (stable-fixes).
* ASoC: tas2764: Enable main IRQs (git-fixes).
* ASoC: tas2764: Mark SW_RESET as volatile (stable-fixes).
* ASoC: tas2764: Power up/down amp on mute ops (stable-fixes).
* ASoC: tas2764: Reinit cache on part reset (git-fixes).
* ASoC: tas2770: Power cycle amp on ISENSE/VSENSE change (stable-fixes).
* ASoC: tegra210_ahub: Add check to of_device_get_match_data() (stable-fixes).
* Bluetooth: Fix NULL pointer deference on eir_get_service_data (git-fixes).
* Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() (git-fixes).
* Bluetooth: L2CAP: Fix L2CAP MTU negotiation (stable-fixes).
* Bluetooth: L2CAP: Fix attempting to adjust outgoing MTU (git-fixes).
* Bluetooth: L2CAP: Fix not responding with L2CAP_CR_LE_ENCRYPTION (git-
fixes).
* Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete (git-fixes).
* Bluetooth: MGMT: Fix not generating command complete for MGMT_OP_DISCONNECT
(git-fixes).
* Bluetooth: MGMT: Fix sparse errors (git-fixes).
* Bluetooth: MGMT: Remove unused mgmt_pending_find_data (stable-fixes).
* Bluetooth: MGMT: iterate over mesh commands in mgmt_mesh_foreach() (git-
fixes).
* Bluetooth: MGMT: mesh_send: check instances prior disabling advertising
(git-fixes).
* Bluetooth: MGMT: set_mesh: update LE scan interval and window (git-fixes).
* Bluetooth: Prevent unintended pause by checking if advertising is active
(git-fixes).
* Bluetooth: Remove pending ACL connection attempts (stable-fixes).
* Bluetooth: SMP: Fix using HCI_ERROR_REMOTE_USER_TERM on timeout (git-fixes).
* Bluetooth: SMP: If an unallowed command is received consider it a failure
(git-fixes).
* Bluetooth: btusb: QCA: Fix downloading wrong NVM for WCN6855 GF variant
without board ID (git-fixes).
* Bluetooth: hci_conn: Fix UAF Write in __hci_acl_create_connection_sync (git-
fixes).
* Bluetooth: hci_conn: Fix sending BT_HCI_CMD_LE_CREATE_CONN_CANCEL (git-
fixes).
* Bluetooth: hci_conn: Only do ACL connections sequentially (stable-fixes).
* Bluetooth: hci_core: fix list_for_each_entry_rcu usage (git-fixes).
* Bluetooth: hci_event: Fix not marking Broadcast Sink BIS as connected (git-
fixes).
* Bluetooth: hci_event: Fix not using key encryption size when its known (git-
fixes).
* Bluetooth: hci_event: Mask data status from LE ext adv reports (git-fixes).
* Bluetooth: hci_qca: move the SoC type check to the right place (git-fixes).
* Bluetooth: hci_sync: Attempt to dequeue connection attempt (git-fixes).
* Bluetooth: hci_sync: Fix UAF in hci_acl_create_conn_sync (git-fixes).
* Bluetooth: hci_sync: Fix UAF on create_le_conn_complete (git-fixes).
* Bluetooth: hci_sync: Fix UAF on hci_abort_conn_sync (git-fixes).
* Bluetooth: hci_sync: Fix broadcast/PA when using an existing instance (git-
fixes).
* Bluetooth: hci_sync: Fix handling of HCI_OP_CREATE_CONN_CANCEL (git-fixes).
* Bluetooth: hci_sync: Fix not disabling advertising instance (git-fixes).
* Bluetooth: hci_sync: fix connectable extended advertising when using static
random address (git-fixes).
* Bluetooth: hci_sync: revert some mesh modifications (git-fixes).
* Docs/ABI: Fix sysfs-kernel-address_bits path (git-fixes).
* Documentation/rtla: Fix duplicate text about timerlat tracer (git-fixes).
* Documentation/rtla: Fix typo in common_timerlat_description.rst (git-fixes).
* Documentation/rtla: Fix typo in rtla-timerlat.rst (git-fixes).
* Documentation: ACPI: Fix parent device references (git-fixes).
* Documentation: fix typo in root= kernel parameter description (git-fixes).
* Documentation: usb: gadget: Wrap remaining usage snippets in literal code
block (git-fixes).
* Fix dma_unmap_sg() nents value (git-fixes)
* HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY (stable-fixes).
* HID: core: do not bypass hid_hw_raw_request (stable-fixes).
* HID: core: ensure __hid_request reserves the report ID as the first byte
(git-fixes).
* HID: core: ensure the allocated report buffer can contain the reserved
report ID (stable-fixes).
* HID: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2 (stable-
fixes).
* HID: lenovo: Restrict F7/9/11 mode to compact keyboards only (git-fixes).
* HID: quirks: Add ADATA XPG alpha wireless mouse support (stable-fixes).
* HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras (stable-
fixes).
* HID: usbkbd: Fix the bit shift number for LED_KANA (stable-fixes).
* HID: wacom: fix kobject reference count leak (git-fixes).
* HID: wacom: fix memory leak on kobject creation failure (git-fixes).
* HID: wacom: fix memory leak on sysfs attribute creation failure (git-fixes).
* IB/mlx5: Fix potential deadlock in MR deregistration (git-fixes)
* Input: gpio-keys - fix possible concurrent access in gpio_keys_irq_timer()
(git-fixes).
* Input: ims-pcu - check record size in ims_pcu_flash_firmware() (git-fixes).
* Input: iqs7222 - explicitly define number of external channels (git-fixes).
* Input: sparcspkr - avoid unannotated fall-through (stable-fixes).
* Input: xpad - add more controllers (stable-fixes).
* Input: xpad - adjust error handling for disconnect (git-fixes).
* Input: xpad - set correct controller type for Acer NGR200 (git-fixes).
* Input: xpad - support Acer NGR 200 Controller (stable-fixes).
* KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes).
* KVM: SVM: Remove the need to trigger an UNBLOCK event on AP creation (git-
fixes).
* KVM: powerpc: Enable commented out BUILD_BUG_ON() assertion (bsc#1215199).
* KVM: s390: rename PROT_NONE to PROT_TYPE_DUMMY (git-fixes bsc#1245225).
* Logitech C-270 even more broken (stable-fixes).
* Move upstreamed SCSI and ACPI patches into sorted section
* MyBS: Correctly generate build flags for non-multibuild package limit (bsc#
1244241)
* MyBS: Do not build kernel-obs-qa with limit_packages
* MyBS: Simplify qa_expr generation
* NFC: nci: uart: Set tty->disc_data only in success path (git-fixes).
* NFS: Do not allow waiting for exiting tasks (git-fixes).
* NFSD: Insulate nfsd4_encode_read_plus() from page boundaries in the encode
buffer (git-fixes).
* NFSD: detect mismatch of file handle and delegation stateid in OPEN op (git-
fixes).
* NFSv4.2: fix listxattr to return selinux security label (git-fixes).
* NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN (git-fixes).
* NFSv4: Always set NLINK even if the server does not support it (git-fixes).
* NFSv4: Check for delegation validity in nfs_start_delegation_return_locked()
(git-fixes).
* NFSv4: Treat ENETUNREACH errors as fatal for state recovery (git-fixes).
* NFSv4: xattr handlers should check for absent nfs filehandles (git-fixes).
* PCI/DPC: Initialize aer_err_info before using it (git-fixes).
* PCI/DPC: Log Error Source ID only when valid (git-fixes).
* PCI/DPC: Use defines with DPC reason fields (git-fixes).
* PCI/MSI: Size device MSI domain with the maximum number of vectors (git-
fixes).
* PCI/PM: Set up runtime PM even for devices without PCI PM (git-fixes).
* PCI: Explicitly put devices into D0 when initializing (git-fixes).
* PCI: Fix lock symmetry in pci_slot_unlock() (git-fixes).
* PCI: Fix old_size lower bound in calculate_iosize() too (stable-fixes).
* PCI: apple: Set only available ports up (git-fixes).
* PCI: apple: Use gpiod_set_value_cansleep in probe flow (git-fixes).
* PCI: brcmstb: Add a softdep to MIP MSI-X driver (stable-fixes).
* PCI: brcmstb: Expand inbound window size up to 64GB (stable-fixes).
* PCI: cadence-ep: Correct PBA offset in .set_msix() callback (git-fixes).
* PCI: cadence: Fix runtime atomic count underflow (git-fixes).
* PCI: dw-rockchip: Fix PHY function call sequence in
rockchip_pcie_phy_deinit() (git-fixes).
* PCI: dw-rockchip: Remove PCIE_L0S_ENTRY check from rockchip_pcie_link_up()
(git-fixes).
* PCI: dwc: Make link training more robust by setting PORT_LOGIC_LINK_WIDTH to
one lane (stable-fixes).
* PCI: dwc: ep: Correct PBA offset in .set_msix() callback (git-fixes).
* PCI: dwc: ep: Ensure proper iteration over outbound map windows (stable-
fixes).
* PCI: endpoint: Fix configfs group list head handling (git-fixes).
* PCI: endpoint: Fix configfs group removal on driver teardown (git-fixes).
* PCI: endpoint: Retain fixed-size BAR size as well as aligned size (git-
fixes).
* PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute
(git-fixes).
* PCI: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar()
fails (git-fixes).
* PCI: rockchip-host: Fix "Unexpected Completion" log message (git-fixes).
* PCI: vmd: Disable MSI remapping bypass under Xen (stable-fixes).
* PM / devfreq: Check governor before using governor->name (git-fixes).
* PM: runtime: fix denying of auto suspend in pm_suspend_timer_fn() (stable-
fixes).
* PM: sleep: Fix power.is_suspended cleanup for direct-complete devices (git-
fixes).
* PM: sleep: Print PM debug messages during hibernation (git-fixes).
* PM: wakeup: Delete space in the end of string shown by pm_show_wakelocks()
(git-fixes).
* RDMA/core: Fix best page size finding when it can cross SG entries (git-
fixes)
* RDMA/core: Rate limit GID cache warning messages (git-fixes)
* RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters
(git-fixes)
* RDMA/hns: Drop GFP_NOWARN (git-fixes)
* RDMA/hns: Fix -Wframe-larger-than issue (git-fixes)
* RDMA/hns: Fix HW configurations not cleared in error flow (git-fixes)
* RDMA/hns: Fix accessing uninitialized resources (git-fixes)
* RDMA/hns: Fix double destruction of rsv_qp (git-fixes)
* RDMA/hns: Get message length of ack_req from FW (git-fixes)
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes)
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes)
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes)
* RDMA/mlx5: Fix CC counters query for MPV (git-fixes)
* RDMA/mlx5: Fix HW counters query for non-representor devices (git-fixes)
* RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes)
* RDMA/mlx5: Fix vport loopback for MPV device (git-fixes)
* RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert (git-fixes)
* RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes)
* RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes)
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes)
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git-
fixes)
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes)
* RDMA/uverbs: Propagate errors from rdma_lookup_get_uobject() (git-fixes)
* Reapply "wifi: mac80211: Update skb's control block key in
ieee80211_tx_dequeue()" (git-fixes).
* Remove compress-vmlinux.sh
* Remove host-memcpy-hack.h
* Remove try-disable-staging-driver
* Revert "ACPI: battery: negate current when discharging" (stable-fixes).
* Revert "ALSA: usb-audio: Skip setting clock selector for single connections"
(stable-fixes).
* Revert "arm64: dts: allwinner: h6: Use RSB for AXP805 PMIC (git-fixes)
* Revert "bus: ti-sysc: Probe for l4_wkup and l4_cfg interconnect devices
first" (stable-fixes).
* Revert "cgroup_freezer: cgroup_freezing: Check if not frozen" (bsc#1219338).
* Revert "drm/amdgpu: do not allow userspace to create a doorbell BO" (stable-
fixes).
* Revert "drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1"
(stable-fixes).
* Revert "ipv6: save dontfrag in cork (git-fixes)."
* Revert "kABI: ipv6: save dontfrag in cork (git-fixes)."
* Revert "mmc: sdhci: Disable SD card clock before changing parameters" (git-
fixes).
* Revert "usb: xhci: Implement xhci_handshake_check_state() helper" (git-
fixes).
* Revert "wifi: mt76: mt7996: fill txd by host driver" (stable-fixes).
* SUNRPC: Do not allow waiting for exiting tasks (git-fixes).
* SUNRPC: Prevent hang on NFS mount with xprtsec=[m]tls (git-fixes).
* SUNRPC: rpc_clnt_set_transport() must not change the autobind setting (git-
fixes).
* SUNRPC: rpcbind should never reset the port to the value '0' (git-fixes).
* USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI (stable-fixes).
* USB: serial: option: add Foxconn T99W640 (stable-fixes).
* USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition (stable-
fixes).
* USB: serial: pl2303: add new chip PL2303GC-Q20 and PL2303GT-2AB (stable-
fixes).
* VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify
(git-fixes).
* accel/qaic: Mask out SR-IOV PCI resources (stable-fixes).
* acpi-cpufreq: Fix nominal_freq units to KHz in get_max_boost_ratio() (git-
fixes).
* add bug reference to existing hv_storvsc change (bsc#1245455).
* af_packet: fix the SO_SNDTIMEO constraint not effective on tpacked_snd()
(git-fixes).
* amd/amdkfd: fix a kfd_process ref leak (stable-fixes).
* aoe: clean device rq_list in aoedev_downdev() (git-fixes).
* apple-mfi-fastcharge: protect first device name (git-fixes).
* arm64: dts: marvell: uDPU: define pinctrl state for alarm LEDs (git-fixes)
* ata: libata-eh: Do not use ATAPI DMA for a device limited to PIO mode
(stable-fixes).
* ata: pata_cs5536: fix build on 32-bit UML (stable-fixes).
* ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 (stable-fixes).
* ath10k: snoc: fix unbalanced IRQ enable in crash recovery (git-fixes).
* backlight: pm8941: Add NULL check in wled_configure() (git-fixes).
* bnxt: properly flush XDP redirect lists (git-fixes).
* bpf, sockmap: Fix sk_msg_reset_curr (git-fixes).
* bpf/lpm_trie: Inline longest_prefix_match for fastpath (git-fixes).
* bpf/selftests: Check errno when percpu map value size exceeds (git-fixes).
* bpf: Add a possibly-zero-sized read test (git-fixes).
* bpf: Avoid **hidden** attribute in static object (git-fixes).
* bpf: Check percpu map value size first (git-fixes).
* bpf: Disable some `attribute ignored' warnings in GCC (git-fixes).
* bpf: Fix memory leak in bpf_core_apply (git-fixes).
* bpf: Fix potential integer overflow in resolve_btfids (git-fixes).
* bpf: Force uprobe bpf program to always return 0 (git-fixes).
* bpf: Harden __bpf_kfunc tag against linker kfunc removal (git-fixes).
* bpf: Make the pointer returned by iter next method valid (git-fixes).
* bpf: Simplify checking size of helper accesses (git-fixes).
* bpf: fix order of args in call to bpf_map_kvcalloc (git-fixes).
* bpf: sockmap, updating the sg structure should also update curr (git-fixes).
* bpftool: Fix missing pids during link show (git-fixes).
* bpftool: Fix undefined behavior caused by shifting into the sign bit (git-
fixes).
* bpftool: Mount bpffs on provided dir instead of parent dir (git-fixes).
* bpftool: Remove unnecessary source files from bootstrap version (git-fixes).
* bpftool: Un-const bpf_func_info to fix it for llvm 17 and newer (git-fixes).
* bs-upload-kernel: Pass limit_packages also on multibuild
* btrfs: do not ignore inode missing when replaying log tree (git-fixes).
* btrfs: do not silently ignore unexpected extent type when replaying log
(git-fixes).
* btrfs: do not skip remaining extrefs if dir not found during log replay
(git-fixes).
* btrfs: explicitly ref count block_group on new_bgs list (bsc#1243068)
* btrfs: fix assertion when building free space tree (git-fixes).
* btrfs: fix fsync of files with no hard links not persisting deletion (git-
fixes).
* btrfs: fix inode lookup error handling during log replay (git-fixes).
* btrfs: fix invalid data space release when truncating block in NOCOW mode
(git-fixes).
* btrfs: fix invalid inode pointer dereferences during log replay (git-fixes).
* btrfs: fix missing error handling when searching for inode refs during log
replay (git-fixes).
* btrfs: fix non-empty delayed iputs list on unmount due to async workers
(git-fixes).
* btrfs: fix qgroup reservation leak on failure to allocate ordered extent
(git-fixes).
* btrfs: fix ssd_spread overallocation (git-fixes).
* btrfs: fix wrong start offset for delalloc space release during mmap write
(git-fixes).
* btrfs: make btrfs_discard_workfn() block_group ref explicit (bsc#1243068)
* btrfs: propagate last_unlink_trans earlier when doing a rmdir (git-fixes).
* btrfs: remove end_no_trans label from btrfs_log_inode_parent() (git-fixes).
* btrfs: rename err to ret in btrfs_rmdir() (git-fixes).
* btrfs: return a btrfs_inode from btrfs_iget_logging() (git-fixes).
* btrfs: return a btrfs_inode from read_one_inode() (git-fixes).
* btrfs: simplify condition for logging new dentries at
btrfs_log_inode_parent() (git-fixes).
* btrfs: tests: fix chunk map leak after failure to add it to the tree (git-
fixes).
* btrfs: update superblock's device bytes_used when dropping chunk (git-
fixes).
* btrfs: use NOFS context when getting inodes during logging and log replay
(git-fixes).
* btrfs: use btrfs_record_snapshot_destroy() during rmdir (git-fixes).
* bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint()
(git-fixes).
* bus: fsl-mc: do not add a device-link for the UAPI used DPMCP device (git-
fixes).
* bus: fsl-mc: fix GET/SET_TAILDROP command ids (git-fixes).
* bus: fsl-mc: fix double-free on mc_dev (git-fixes).
* bus: fsl-mc: increase MC_CMD_COMPLETION_TIMEOUT_MS value (stable-fixes).
* bus: mhi: host: Detect events pointing to unexpected TREs (git-fixes).
* bus: mhi: host: Fix conflict between power_up and SYSERR (git-fixes).
* calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (git-fixes).
* can: c_can: Use of_property_present() to test existence of DT property
(stable-fixes).
* can: dev: can_restart(): move debug message and stats after successful
restart (stable-fixes).
* can: dev: can_restart(): reverse logic to remove need for goto (stable-
fixes).
* can: kvaser_pciefd: Store device channel index (git-fixes).
* can: kvaser_usb: Assign netdev.dev_port based on device channel index (git-
fixes).
* can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to
debug level (git-fixes).
* can: netlink: can_changelink(): fix NULL pointer deref of struct
can_priv::do_set_mode (git-fixes).
* can: peak_usb: fix USB FD devices potential malfunction (git-fixes).
* can: tcan4x5x: fix power regulator retrieval during probe (git-fixes).
* cdc-acm: fix race between initial clearing halt and open (git-fixes).
* ceph: Fix incorrect flush end position calculation (git-fixes).
* ceph: allocate sparse_ext map only for sparse reads (git-fixes).
* ceph: fix memory leaks in __ceph_sync_read() (git-fixes).
* cgroup,freezer: fix incomplete freezing when attaching tasks (bsc#1245789).
* cgroup/cpuset: Extend kthread_is_per_cpu() check to all PF_NO_SETAFFINITY
tasks (bsc#1241166).
* cgroup/cpuset: Fix race between newly created partition and dying one
(bsc#1241166).
* cifs: change tcon status when need_reconnect is set on it (git-fixes).
* clk: clk-axi-clkgen: fix fpfd_max frequency for zynq (git-fixes).
* clk: davinci: Add NULL check in davinci_lpsc_clk_register() (git-fixes).
* clk: sunxi-ng: v3s: Fix de clock definition (git-fixes).
* clk: xilinx: vcu: unregister pll_post only if registered correctly (git-
fixes).
* clocksource: Fix brown-bag boolean thinko in (git-fixes)
* clocksource: Make watchdog and suspend-timing multiplication (git-fixes)
* clocksource: Scale the watchdog read retries automatically (bsc#1241345
bsc#1244457).
* clocksource: Set cs_watchdog_read() checks based on .uncertainty_margin
(bsc#1241345 bsc#1244457).
* comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large (git-fixes).
* comedi: Fix initialization of data for instructions that write to subdevice
(git-fixes).
* comedi: Fix some signed shift left operations (git-fixes).
* comedi: Fix use of uninitialized data in insn_rw_emulate_bits() (git-fixes).
* comedi: aio_iiro_16: Fix bit shift out of bounds (git-fixes).
* comedi: das16m1: Fix bit shift out of bounds (git-fixes).
* comedi: das6402: Fix bit shift out of bounds (git-fixes).
* comedi: pcl812: Fix bit shift out of bounds (git-fixes).
* compiler_types.h: Define **retain for __attribute** (( **retain** )) (git-
fixes).
* crypto: arm/aes-neonbs - work around gcc-15 warning (git-fixes).
* crypto: ccp - Fix crash when rebind ccp device for ccp.ko (git-fixes).
* crypto: ccp - Fix locking on alloc failure handling (git-fixes).
* crypto: img-hash - Fix dma_unmap_sg() nents value (git-fixes).
* crypto: inside-secure - Fix `dma_unmap_sg()` nents value (git-fixes).
* crypto: keembay - Fix dma_unmap_sg() nents value (git-fixes).
* crypto: lrw - Only add ecb if it is not already there (git-fixes).
* crypto: lzo - Fix compression buffer overrun (stable-fixes).
* crypto: marvell/cesa - Avoid empty transfer descriptor (git-fixes).
* crypto: marvell/cesa - Do not chain submitted requests (git-fixes).
* crypto: marvell/cesa - Fix engine load inaccuracy (git-fixes).
* crypto: marvell/cesa - Handle zero-length skcipher requests (git-fixes).
* crypto: octeontx2 - suppress auth failure screaming due to negative tests
(stable-fixes).
* crypto: qat - add shutdown handler to qat_420xx (git-fixes).
* crypto: qat - add shutdown handler to qat_4xxx (git-fixes).
* crypto: qat - allow enabling VFs in the absence of IOMMU (git-fixes).
* crypto: qat - disable ZUC-256 capability for QAT GEN5 (git-fixes).
* crypto: qat - fix DMA direction for compression on GEN2 devices (git-fixes).
* crypto: qat - fix seq_file position update in adf_ring_next() (git-fixes).
* crypto: qat - fix state restore for banks with exceptions (git-fixes).
* crypto: qat - flush misc workqueue during device shutdown (git-fixes).
* crypto: qat - use unmanaged allocation for dc_data (git-fixes).
* crypto: skcipher - Zap type in crypto_alloc_sync_skcipher (stable-fixes).
* crypto: sun8i-ce - fix nents passed to dma_unmap_sg() (git-fixes).
* crypto: sun8i-ce - move fallback ahash_request to the end of the struct
(git-fixes).
* crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare()
(git-fixes).
* crypto: sun8i-ss - do not use sg_dma_len before calling DMA functions (git-
fixes).
* crypto: xts - Only add ecb if it is not already there (git-fixes).
* devlink: Fix referring to hw_addr attribute during state validation (git-
fixes).
* devlink: fix port dump cmd type (git-fixes).
* dlm: mask sk_shutdown value (bsc#1228854).
* dlm: use SHUT_RDWR for SCTP shutdown (bsc#1228854).
* dm-bufio: fix sched in atomic context (git-fixes).
* dm-flakey: error all IOs when num_features is absent (git-fixes).
* dm-flakey: make corrupting read bios work (git-fixes).
* dm-mirror: fix a tiny race condition (git-fixes).
* dm-raid: fix variable in journal device check (git-fixes).
* dm-verity: fix a memory leak if some arguments are specified multiple times
(git-fixes).
* dm: do not change md if dm_table_set_restrictions() fails (git-fixes).
* dm: free table mempools if not used in __bind (git-fixes).
* dm: restrict dm device size to 2^63-512 bytes (git-fixes).
* dma-buf: fix timeout handling in dma_resv_wait_timeout v2 (stable-fixes).
* dmaengine: dw-edma: Drop unused dchan2dev() and chan2dev() (git-fixes).
* dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver
before using (stable-fixes).
* dmaengine: idxd: cdev: Fix uninitialized use of sva in idxd_cdev_open
(stable-fixes).
* dmaengine: mv_xor: Fix missing check after DMA map and missing unmap (git-
fixes).
* dmaengine: nbpfaxi: Add missing check after DMA map (git-fixes).
* dmaengine: nbpfaxi: Fix memory corruption in probe() (git-fixes).
* dmaengine: qcom: gpi: Drop unused gpi_write_reg_field() (git-fixes).
* dmaengine: ti: Add NULL check in udma_probe() (git-fixes).
* dmaengine: xilinx_dma: Set dma_device directions (stable-fixes).
* drivers/rapidio/rio_cm.c: prevent possible heap overwrite (stable-fixes).
* drm/amd/display/dm: drop hw_support check in amdgpu_dm_i2c_xfer() (stable-
fixes).
* drm/amd/display: Add null pointer check for get_first_active_display() (git-
fixes).
* drm/amd/display: Do not try AUX transactions on disconnected link (stable-
fixes).
* drm/amd/display: Fix incorrect DPCD configs while Replay/PSR switch (stable-
fixes).
* drm/amd/display: Guard against setting dispclk low for dcn31x (stable-
fixes).
* drm/amd/display: Increase block_sequence array size (stable-fixes).
* drm/amd/display: Initial psr_version with correct setting (stable-fixes).
* drm/amd/display: Skip checking FRL_MODE bit for PCON BW determination
(stable-fixes).
* drm/amd/display: Update CR AUX RD interval interpretation (stable-fixes).
* drm/amd/display: fix link_set_dpms_off multi-display MST corner case
(stable-fixes).
* drm/amd/display: remove minimum Dispclk and apply oem panel timing (stable-
fixes).
* drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value (git-
fixes).
* drm/amd/pp: Fix potential NULL pointer dereference in
atomctrl_initialize_mc_reg_table (git-fixes).
* drm/amdgpu/gfx8: reset compute ring wptr on the GPU on resume (git-fixes).
* drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c
(stable-fixes).
* drm/amdgpu: Set snoop bit for SDMA for MI series (stable-fixes).
* drm/amdgpu: Update SRIOV video codec caps (stable-fixes).
* drm/amdgpu: amdgpu_vram_mgr_new(): Clamp lpfn to total vram (stable-fixes).
* drm/amdgpu: enlarge the VBIOS binary size limit (stable-fixes).
* drm/amdgpu: reset psp->cmd to NULL after releasing the buffer (stable-
fixes).
* drm/amdgpu: switch job hw_fence to amdgpu_fence (git-fixes).
* drm/amdkfd: Fix race in GWS queue scheduling (stable-fixes).
* drm/amdkfd: KFD release_work possible circular locking (stable-fixes).
* drm/amdkfd: Set per-process flags only once cik/vi (stable-fixes).
* drm/ast: Find VBIOS mode from regular display size (stable-fixes).
* drm/ast: Fix comment on modeset lock (git-fixes).
* drm/atomic: clarify the rules around drm_atomic_state->allow_modeset
(stable-fixes).
* drm/bridge: cdns-dsi: Check return value when getting default PHY config
(git-fixes).
* drm/bridge: cdns-dsi: Fix connecting to next bridge (git-fixes).
* drm/bridge: cdns-dsi: Fix phy de-init and flag it so (git-fixes).
* drm/bridge: cdns-dsi: Fix the clock variable for mode_valid() (git-fixes).
* drm/bridge: cdns-dsi: Wait for Clk and Data Lanes to be ready (git-fixes).
* drm/bridge: lt9611uxc: Fix an error handling path in lt9611uxc_probe() (git-
fixes).
* drm/bridge: panel: move prepare_prev_first handling to
drm_panel_bridge_add_typed (git-fixes).
* drm/bridge: ti-sn65dsi86: Add HPD for DisplayPort connector type (git-
fixes).
* drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe()
(git-fixes).
* drm/bridge: ti-sn65dsi86: make use of debugfs_init callback (stable-fixes).
* drm/etnaviv: Protect the scheduler's pending list with its lock (git-fixes).
* drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling (git-fixes).
* drm/exynos: fimd: Guard display clock control with runtime PM calls (git-
fixes).
* drm/framebuffer: Acquire internal references on GEM handles (git-fixes).
* drm/gem: Acquire references on GEM handles for framebuffers (stable-fixes).
* drm/gem: Fix race in drm_gem_handle_create_tail() (stable-fixes).
* drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1 (git-fixes).
* drm/i915/gsc: mei interrupt top half should be in irq disabled context (git-
fixes).
* drm/i915/gt: Fix timeline left held on VMA alloc error (git-fixes).
* drm/i915/pmu: Fix build error with GCOV and AutoFDO enabled (git-fixes).
* drm/i915/selftests: Change mock_request() to return error pointers (git-
fixes).
* drm/i915: fix build error some more (git-fixes).
* drm/mediatek: Fix kobject put for component sub-drivers (git-fixes).
* drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence (stable-
fixes).
* drm/mediatek: mtk_drm_drv: Fix kobject put for mtk_mutex device ptr (git-
fixes).
* drm/mediatek: mtk_drm_drv: Unbind secondary mmsys components on err (git-
fixes).
* drm/msm/disp: Correct porch timing for SDM845 (git-fixes).
* drm/msm/dpu: Fill in min_prefill_lines for SC8180X (git-fixes).
* drm/msm/dsi/dsi_phy_10nm: Fix missing initial VCO rate (git-fixes).
* drm/msm/gpu: Fix crash when throttling GPU immediately during boot (git-
fixes).
* drm/msm: Fix a fence leak in submit error path (stable-fixes).
* drm/msm: Fix another leak in the submit error path (stable-fixes).
* drm/nouveau/bl: increase buffer size to avoid truncate warning (git-fixes).
* drm/panel-edp: Add Starry 116KHD024006 (stable-fixes).
* drm/panel: samsung-sofef00: Drop s6e3fc2x01 support (git-fixes).
* drm/panfrost: Fix panfrost device variable name in devfreq (git-fixes).
* drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed (git-fixes).
* drm/rockchip: vop2: Add uv swap for cluster window (stable-fixes).
* drm/sched: Increment job count before swapping tail spsc queue (git-fixes).
* drm/sched: Remove optimization that causes hang when killing dependent jobs
(git-fixes).
* drm/scheduler: signal scheduled fence when kill job (stable-fixes).
* drm/ssd130x: fix ssd132x_clear_screen() columns (git-fixes).
* drm/tegra: Assign plane type before registration (git-fixes).
* drm/tegra: Fix a possible null pointer dereference (git-fixes).
* drm/tegra: nvdec: Fix dma_alloc_coherent error check (git-fixes).
* drm/tegra: rgb: Fix the unbound reference count (git-fixes).
* drm/ttm: fix error handling in ttm_buffer_object_transfer (git-fixes).
* drm/udl: Unregister device before cleaning up on disconnect (git-fixes).
* drm/v3d: Add clock handling (stable-fixes).
* drm/vc4: tests: Use return instead of assert (git-fixes).
* drm/vkms: Adjust vkms_state->active_planes allocation type (git-fixes).
* drm/vmwgfx: Add seqno waiter for sync_files (git-fixes).
* drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel (git-fixes).
* drm: Add valid clones check (stable-fixes).
* drm: bridge: adv7511: fill stream capabilities (stable-fixes).
* drm: rcar-du: Fix memory leak in rcar_du_vsps_init() (git-fixes).
* e1000e: set fixed clock frequency indication for Nahum 11 and Nahum 13 (git-
fixes).
* fbcon: Fix outdated registered_fb reference in comment (git-fixes).
* fbcon: Make sure modelist not set on unregistered console (stable-fixes).
* fbcon: Use correct erase colour for clearing in fbcon (stable-fixes).
* fbdev/efifb: Remove PM for parent device (bsc#1244261).
* fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in
fb_videomode_to_var (git-fixes).
* fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var (git-
fixes).
* fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() (git-fixes).
* fbdev: core: tileblit: Implement missing margin clearing for tileblit
(stable-fixes).
* fbdev: fsl-diu-fb: add missing device_remove_file() (stable-fixes).
* fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref (git-fixes).
* fgraph: Still initialize idle shadow stacks when starting (git-fixes).
* firewire: ohci: correct code comments about bus_reset tasklet (git-fixes).
* firmware: SDEI: Allow sdei initialization without ACPI_APEI_GHES (git-
fixes).
* firmware: arm_ffa: Reject higher major version as incompatible (stable-
fixes).
* firmware: arm_ffa: Set dma_mask for ffa devices (stable-fixes).
* firmware: arm_scmi: Relax duplicate name constraint across protocol ids
(stable-fixes).
* firmware: psci: Fix refcount leak in psci_dt_init (git-fixes).
* fpga: altera-cvp: Increase credit timeout (stable-fixes).
* fs/jfs: consolidate sanity checking in dbMount (git-fixes).
* fs/nfs/read: fix double-unlock bug in nfs_return_empty_folio() (git-fixes).
* fs/orangefs: Allow 2 more characters in do_c_string() (git-fixes).
* gpio: mlxbf3: only get IRQ for device instance 0 (git-fixes).
* gpio: pca953x: Simplify code with cleanup helpers (stable-fixes).
* gpio: pca953x: Split pca953x_restore_context() and pca953x_save_context()
(stable-fixes).
* gpio: pca953x: fix IRQ storm on system wake up (git-fixes).
* gpio: pca953x: log an error when failing to get the reset GPIO (git-fixes).
* gpio: sim: include a missing header (git-fixes).
* gpio: vf610: add locking to gpio direction functions (git-fixes).
* gpio: virtio: Fix config space reading (git-fixes).
* gpiolib: Fix debug messaging in gpiod_find_and_request() (git-fixes).
* gpiolib: Handle no pin_ranges in gpiochip_generic_config() (git-fixes).
* gpiolib: Revert "Do not WARN on gpiod_put() for optional GPIO" (stable-
fixes).
* gpiolib: acpi: Do not use GPIO chip fwnode in acpi_gpiochip_find()
(bsc#1233300).
* gpiolib: acpi: Fix failed in acpi_gpiochip_find() by adding parent node
match (bsc#1233300).
* gpiolib: cdev: Ignore reconfiguration without direction (git-fixes).
* gpiolib: of: Add polarity quirk for s5m8767 (stable-fixes).
* gve: Fix RX_BUFFERS_POSTED stat to report per-queue fill_cnt (git-fixes).
* gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO (git-
fixes).
* hfs: make splice write available again (git-fixes).
* hfsplus: make splice write available again (git-fixes).
* hfsplus: remove mutex_lock check in hfsplus_free_extents (git-fixes).
* hwmon: (asus-ec-sensors) check sensor index in read_string() (git-fixes).
* hwmon: (corsair-cpro) Validate the size of the received input buffer (git-
fixes).
* hwmon: (dell-smm) Increment the number of fans (stable-fixes).
* hwmon: (ftsteutates) Fix TOCTOU race in fts_read() (git-fixes).
* hwmon: (gpio-fan) Add missing mutex locks (stable-fixes).
* hwmon: (gsc-hwmon) fix fan pwm setpoint show functions (git-fixes).
* hwmon: (nct6775): Actually make use of the HWMON_NCT6775 symbol namespace
(git-fixes).
* hwmon: (occ) Rework attribute registration for stack usage (git-fixes).
* hwmon: (occ) fix unaligned accesses (git-fixes).
* hwmon: (peci/dimmtemp) Do not provide fake thresholds data (git-fixes).
* hwmon: (pmbus/max34440) Fix support for max34451 (stable-fixes).
* hwmon: (xgene-hwmon) use appropriate type for the latency value (stable-
fixes).
* hwmon: corsair-psu: add USB id of HX1200i Series 2023 psu (git-fixes).
* hwrng: mtk - handle devm_pm_runtime_enable errors (git-fixes).
* i2c/designware: Fix an initialization issue (git-fixes).
* i2c: designware: Invoke runtime suspend on quick slave re-registration
(stable-fixes).
* i2c: npcm: Add clock toggle recovery (stable-fixes).
* i2c: pxa: fix call balance of i2c->clk handling routines (stable-fixes).
* i2c: qup: Vote for interconnect bandwidth to DRAM (stable-fixes).
* i2c: qup: jump out of the loop in case of timeout (git-fixes).
* i2c: robotfuzz-osif: disable zero-length read messages (git-fixes).
* i2c: stm32: fix the device used for the DMA map (git-fixes).
* i2c: tegra: Fix reset error handling with ACPI (git-fixes).
* i2c: tegra: check msg length in SMBUS block read (bsc#1242086)
* i2c: tiny-usb: disable zero-length read messages (git-fixes).
* i2c: virtio: Avoid hang by using interruptible completion wait (git-fixes).
* i3c: fix module_i3c_i2c_driver() with I3C=n (git-fixes).
* i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work()
(git-fixes).
* i3c: master: svc: Fix missing STOP for master request (stable-fixes).
* i3c: master: svc: Flush FIFO before sending Dynamic Address Assignment(DAA)
(stable-fixes).
* i40e: retry VFLR handling if there is ongoing VF reset (git-fixes).
* i40e: return false from i40e_reset_vf if reset is in progress (git-fixes).
* ice: Fix LACP bonds without SRIOV environment (git-fixes).
* ice: create new Tx scheduler nodes for new queues only (git-fixes).
* ice: fix Tx scheduler error handling in XDP callback (git-fixes).
* ice: fix rebuilding the Tx scheduler tree for large queue counts (git-
fixes).
* ice: fix vf->num_mac count with port representors (git-fixes).
* ieee802154: ca8210: Use proper setters and getters for bitwise types
(stable-fixes).
* iio: accel: fxls8962af: Fix temperature scan element sign (git-fixes).
* iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush (git-
fixes).
* iio: adc: ad7124: Fix 3dB filter frequency reading (git-fixes).
* iio: adc: ad7606_spi: fix reg write value mask (git-fixes).
* iio: adc: ad7949: use spi_is_bpw_supported() (git-fixes).
* iio: adc: ad_sigma_delta: Fix use of uninitialized status_pos (stable-
fixes).
* iio: adc: ad_sigma_delta: change to buffer predisable (git-fixes).
* iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] (stable-fixes).
* iio: adc: max1363: Reorder mode_list[] entries (stable-fixes).
* iio: adc: stm32-adc: Fix race in installing chained IRQ handler (git-fixes).
* iio: filter: admv8818: Support frequencies >= 2^32 (git-fixes).
* iio: filter: admv8818: fix band 4, state 15 (git-fixes).
* iio: filter: admv8818: fix integer overflow (git-fixes).
* iio: filter: admv8818: fix range calculation (git-fixes).
* iio: imu: bno055: fix OOB access of hw_xlate array (git-fixes).
* iio: imu: inv_icm42600: Fix temperature calculation (git-fixes).
* iio: pressure: zpa2326: Use aligned_s64 for the timestamp (stable-fixes).
* ima: Suspend PCR extends and log appends when rebooting (bsc#1210025
ltc#196650).
* ima: process_measurement() needlessly takes inode_lock() on MAY_READ
(stable-fixes).
* intel_th: avoid using deprecated page->mapping, index fields (stable-fixes).
* iommu/amd: Fix geometry.aperture_end for V2 tables (git-fixes).
* iommu/amd: Set the pgsize_bitmap correctly (git-fixes).
* iommu/arm-smmu-qcom: Add SM6115 MDSS compatible (git-fixes).
* iommu/vt-d: Fix possible circular locking dependency (git-fixes).
* iommu/vt-d: Fix system hang on reboot -f (git-fixes).
* iommu: Protect against overflow in iommu_pgsize() (git-fixes).
* iommu: Skip PASID validation for devices without PASID capability
(bsc#1244100)
* iommu: Validate the PASID in iommu_attach_device_pasid() (bsc#1244100)
* ip6mr: fix tables suspicious RCU usage (git-fixes).
* ip_tunnel: annotate data-races around t->parms.link (git-fixes).
* ipmr: fix incorrect parameter validation in the ip_mroute_getsockopt()
function (git-fixes).
* ipmr: fix tables suspicious RCU usage (git-fixes).
* ipv4: Convert ip_route_input() to dscp_t (git-fixes).
* ipv4: Correct/silence an endian warning in __ip_do_redirect (git-fixes).
* ipv6: fix possible infinite loop in fib6_info_uses_dev() (git-fixes).
* ipv6: mcast: Delay put pmc->idev in mld_del_delrec() (git-fixes).
* ipv6: prevent infinite loop in rt6_nlmsg_size() (git-fixes).
* ipv6: save dontfrag in cork (git-fixes).
* ipvs: Always clear ipvs_property flag in skb_scrub_packet() (git-fixes).
* isolcpus: fix bug in returning number of allocated cpumask (bsc#1243774).
* iwlwifi: Add missing check for alloc_ordered_workqueue (git-fixes).
* jffs2: check jffs2_prealloc_raw_node_refs() result in few other places (git-
fixes).
* jffs2: check that raw node were preallocated before writing summary (git-
fixes).
* jfs: fix metapage reference count leak in dbAllocCtl (git-fixes).
* kABI fix after KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes).
* kABI workaround for hda_codec.beep_just_power_on flag (git-fixes).
* kABI workaround for struct drm_framebuffer changes (git-fixes).
* kABI: PCI: endpoint: Retain fixed-size BAR size as well as aligned size
(git-fixes).
* kABI: ipv6: save dontfrag in cork (git-fixes).
* kABI: serial: mctrl_gpio: split disable_ms into sync and no_sync APIs (git-
fixes).
* kabi: restore layout of struct cgroup_subsys (bsc#1241166).
* kabi: restore layout of struct mem_control (jsc#PED-12551).
* kabi: restore layout of struct page_counter (jsc#PED-12551).
* kasan: remove kasan_find_vm_area() to prevent possible deadlock (git-fixes).
* kernel-obs-qa: Do not depend on srchash when qemu emulation is used In this
case the dependency is never fulfilled
* kernel-source: Do not use multiple -r in sed parameters
* kernel-source: Remove log.sh from sources
* kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).
* leds: multicolor: Fix intensity setting while SW blinking (stable-fixes).
* leds: pwm-multicolor: Add check for fwnode_property_read_u32 (stable-fixes).
* lib/group_cpus.c: avoid acquiring cpu hotplug lock in group_cpus_evenly
(bsc#1236897).
* lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly()
(bsc#1236897).
* loop: Add sanity check for read/write_iter (git-fixes).
* loop: add file_start_write() and file_end_write() (git-fixes).
* mailbox: use error ret code of of_parse_phandle_with_args() (stable-fixes).
* maple_tree: fix mt_destroy_walk() on root leaf node (git-fixes).
* md/md-bitmap: fix dm-raid max_write_behind setting (git-fixes).
* md/raid1,raid10: do not handle IO error for REQ_RAHEAD and REQ_NOWAIT (git-
fixes).
* md/raid1: Add check for missing source disk in process_checks() (git-fixes).
* media: adv7180: Disable test-pattern control on adv7180 (stable-fixes).
* media: c8sectpfe: Call of_node_put(i2c_bus) only once in c8sectpfe_probe()
(stable-fixes).
* media: ccs-pll: Check for too high VT PLL multiplier in dual PLL case (git-
fixes).
* media: ccs-pll: Correct the upper limit of maximum op_pre_pll_clk_div (git-
fixes).
* media: ccs-pll: Start OP pre-PLL multiplier search from correct value (git-
fixes).
* media: ccs-pll: Start VT pre-PLL multiplier search from correct value (git-
fixes).
* media: cx231xx: set device_caps for 417 (stable-fixes).
* media: cxusb: no longer judge rbuf when the write fails (git-fixes).
* media: davinci: vpif: Fix memory leak in probe error path (git-fixes).
* media: gspca: Add bounds checking to firmware parser (git-fixes).
* media: gspca: Add error handling for stv06xx_read_sensor() (git-fixes).
* media: hi556: correct the test pattern configuration (git-fixes).
* media: i2c: imx219: Correct the minimum vblanking value (stable-fixes).
* media: imx-jpeg: Cleanup after an allocation error (git-fixes).
* media: imx-jpeg: Drop the first error frames (git-fixes).
* media: imx-jpeg: Move mxc_jpeg_free_slot_data() ahead (git-fixes).
* media: imx-jpeg: Reset slot data pointers when freed (git-fixes).
* media: imx: fix a potential memory leak in
imx_media_csc_scaler_device_init() (git-fixes).
* media: nxp: imx8-isi: better handle the m2m usage_count (git-fixes).
* media: omap3isp: use sgtable-based scatterlist wrappers (git-fixes).
* media: ov2659: Fix memory leaks in ov2659_probe() (git-fixes).
* media: ov5675: suppress probe deferral errors (git-fixes).
* media: ov8856: suppress probe deferral errors (git-fixes).
* media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is
available (stable-fixes).
* media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() (git-
fixes).
* media: rkvdec: Fix frame size enumeration (git-fixes).
* media: tc358746: improve calculation of the D-PHY timing registers (stable-
fixes).
* media: test-drivers: vivid: do not call schedule in loop (stable-fixes).
* media: usbtv: Lock resolution while streaming (git-fixes).
* media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map (stable-fixes).
* media: uvcvideo: Do not mark valid metadata as invalid (git-fixes).
* media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (git-
fixes).
* media: uvcvideo: Fix deferred probing error (git-fixes).
* media: uvcvideo: Handle uvc menu translation inside uvc_get_le_value
(stable-fixes).
* media: uvcvideo: Return the number of processed controls (git-fixes).
* media: v4l2-ctrls: Do not reset handler's error in v4l2_ctrl_handler_free()
(git-fixes).
* media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check (git-fixes).
* media: v4l2-dev: fix error handling in __video_register_device() (git-
fixes).
* media: v4l: Memset argument to 0 before calling get_mbus_config pad op
(stable-fixes).
* media: venus: Add a check for packet size after reading from shared memory
(git-fixes).
* media: venus: Fix probe error handling (git-fixes).
* media: venus: hfi: explicitly release IRQ during teardown (git-fixes).
* media: venus: protect against spurious interrupts during probe (git-fixes).
* media: venus: vdec: Clamp param smaller than 1fps and bigger than 240 (git-
fixes).
* media: venus: venc: Clamp param smaller than 1fps and bigger than 240 (git-
fixes).
* media: videobuf2: use sgtable-based scatterlist wrappers (git-fixes).
* media: vidtv: Terminating the subsequent process of initialization failure
(git-fixes).
* media: vivid: Change the siize of the composing (git-fixes).
* media: vivid: fix wrong pixel_array control size (git-fixes).
* memstick: core: Zero initialize id_reg in h_memstick_read_dev_id() (git-
fixes).
* mfd: exynos-lpass: Avoid calling exynos_lpass_disable() twice in
exynos_lpass_remove() (git-fixes).
* mfd: max14577: Fix wakeup source leaks on device unbind (stable-fixes).
* mfd: stmpe-spi: Correct the name used in MODULE_DEVICE_TABLE (git-fixes).
* mfd: tps65219: Remove TPS65219_REG_TI_DEV_ID check (stable-fixes).
* misc: rtsx: usb: Ensure mmc child device is active when card is present
(git-fixes).
* mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).
* mm, memcg: cg2 memory{.swap,}.peak write handlers (jsc#PED-12551).
* mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).
* mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).
* mm/memcontrol: export memcg.swap watermark via sysfs for v2 memcg
(jsc#PED-12551).
* mmc: Add quirk to disable DDR50 tuning (stable-fixes).
* mmc: bcm2835: Fix dma_unmap_sg() nents value (git-fixes).
* mmc: core: sd: Apply BROKEN_SD_DISCARD quirk earlier (git-fixes).
* mmc: dw_mmc: add exynos7870 DW MMC support (stable-fixes).
* mmc: host: Wait for Vdd to settle on card power off (stable-fixes).
* mmc: sdhci-pci: Quirk for broken command queuing on Intel GLK-based Positivo
models (git-fixes).
* mmc: sdhci: Add a helper function for dump register in dynamic debug mode
(stable-fixes).
* mmc: sdhci: Disable SD card clock before changing parameters (stable-fixes).
* mmc: sdhci_am654: Workaround for Errata i2312 (git-fixes).
* mtd: fix possible integer overflow in erase_xfer() (git-fixes).
* mtd: nand: ecc-mxic: Fix use of uninitialized variable ret (git-fixes).
* mtd: nand: sunxi: Add randomizer configuration before randomizer enable
(git-fixes).
* mtd: rawnand: atmel: Fix dma_mapping_error() address (git-fixes).
* mtd: rawnand: atmel: set pmecc data setup time (git-fixes).
* mtd: rawnand: fsmc: Add missing check after DMA map (git-fixes).
* mtd: rawnand: renesas: Add missing check after DMA map (git-fixes).
* mtd: rawnand: rockchip: Add missing check after DMA map (git-fixes).
* mtd: rawnand: sunxi: Add randomizer configuration in
sunxi_nfc_hw_ecc_write_chunk (git-fixes).
* mtd: spi-nor: Fix spi_nor_try_unlock_all() (git-fixes).
* mtd: spinand: fix memory leak of ECC engine conf (stable-fixes).
* mtd: spinand: propagate spinand_wait() errors from spinand_write_page()
(git-fixes).
* mtk-sd: Fix a pagefault in dma_unmap_sg() for not prepared data (git-fixes).
* mtk-sd: Prevent memory corruption from DMA map failure (git-fixes).
* mtk-sd: reset host->mrq on prepare_data() error (git-fixes).
* mwl8k: Add missing check after DMA map (git-fixes).
* nbd: fix uaf in nbd_genl_connect() error path (git-fixes).
* neighbour: Do not let neigh_forced_gc() disable preemption for long (git-
fixes).
* net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (git-
fixes).
* net/mdiobus: Fix potential out-of-bounds read/write access (git-fixes).
* net/mlx4_en: Prevent potential integer overflow calculating Hz (git-fixes).
* net/mlx5: Add error handling in mlx5_query_nic_vport_node_guid() (git-
fixes).
* net/mlx5: Ensure fw pages are always allocated on same NUMA (git-fixes).
* net/mlx5: Fix ECVF vports unload on shutdown flow (git-fixes).
* net/mlx5: Fix return value when searching for existing flow group (git-
fixes).
* net/mlx5_core: Add error handling inmlx5_query_nic_vport_qkey_viol_cntr()
(git-fixes).
* net/mlx5e: Fix leak of Geneve TLV option object (git-fixes).
* net/neighbor: clear error in case strict check is not set (git-fixes).
* net/sched: Restrict conditions for adding duplicating netems to qdisc tree
(git-fixes).
* net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (git-
fixes).
* net/sched: fix use-after-free in taprio_dev_notifier (git-fixes).
* net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
qfq_delete_class (git-fixes).
* net/sched: sch_qfq: Fix race condition on qfq_aggregate (git-fixes).
* net: Fix TOCTOU issue in sk_is_readable() (git-fixes).
* net: Implement missing getsockopt(SO_TIMESTAMPING_NEW) (git-fixes).
* net: add rcu safety to rtnl_prop_list_size() (git-fixes).
* net: fix udp gso skb_segment after pull from frag_list (git-fixes).
* net: give more chances to rcu in netdev_wait_allrefs_any() (git-fixes).
* net: ice: Perform accurate aRFS flow match (git-fixes).
* net: ipv4: fix a memleak in ip_setup_cork (git-fixes).
* net: linkwatch: use system_unbound_wq (git-fixes).
* net: mana: Add support for Multi Vports on Bare metal (bsc#1244229).
* net: mana: Record doorbell physical address in PF mode (bsc#1244229).
* net: page_pool: fix warning code (git-fixes).
* net: phy: Do not register LEDs for genphy (git-fixes).
* net: phy: clear phydev->devlink when the link is deleted (git-fixes).
* net: phy: fix up const issues in to_mdio_device() and to_phy_device() (git-
fixes).
* net: phy: micrel: fix KSZ8081/KSZ8091 cable test (git-fixes).
* net: phy: microchip: limit 100M workaround to link-down events on LAN88xx
(git-fixes).
* net: phy: move phy_link_change() prior to mdio_bus_phy_may_suspend()
(bsc#1243538)
* net: phy: mscc: Fix memory leak when using one step timestamping (git-
fixes).
* net: phy: mscc: Stop clearing the the UDPv4 checksum for L2 frames (git-
fixes).
* net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap (git-
fixes).
* net: phy: smsc: Fix link failure in forced mode with Auto-MDIX (git-fixes).
* net: sched: cls_u32: Fix allocation size in u32_init() (git-fixes).
* net: sched: consistently use rcu_replace_pointer() in taprio_change() (git-
fixes).
* net: sched: em_text: fix possible memory leak in em_text_destroy() (git-
fixes).
* net: sched: fix erspan_opt settings in cls_flower (git-fixes).
* net: usb: aqc111: debug info before sanitation (git-fixes).
* net: usb: aqc111: fix error handling of usbnet read calls (git-fixes).
* net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect (git-
fixes).
* net: usb: qmi_wwan: add SIMCom 8230C composition (stable-fixes).
* net: usbnet: Avoid potential RCU stall on LINK_CHANGE event (git-fixes).
* net: wwan: t7xx: Fix napi rx poll issue (git-fixes).
* net_sched: ets: fix a race in ets_qdisc_change() (git-fixes).
* net_sched: prio: fix a race in prio_tune() (git-fixes).
* net_sched: red: fix a race in __red_change() (git-fixes).
* net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
* net_sched: sch_sfq: reject invalid perturb period (git-fixes).
* net_sched: sch_sfq: use a temporary work area for validating configuration
(bsc#1232504)
* net_sched: tbf: fix a race in tbf_change() (git-fixes).
* netdev-genl: Hold rcu_read_lock in napi_get (git-fixes).
* netlink: fix potential sleeping issue in mqueue_flush_file (git-fixes).
* netlink: specs: dpll: replace underscores with dashes in names (git-fixes).
* netpoll: Use rcu_access_pointer() in __netpoll_setup (git-fixes).
* netpoll: hold rcu read lock in __netpoll_send_skb() (git-fixes).
* nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails (git-
fixes).
* nfsd: Initialize ssc before laundromat_work to prevent NULL dereference
(git-fixes).
* nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
(git-fixes).
* nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request (git-
fixes).
* nfsd: validate the nfsd_serv pointer before calling svc_wake_up (git-fixes).
* nilfs2: reject invalid file types when reading inodes (git-fixes).
* ntp: Clamp maxerror and esterror to operating range (git-fixes)
* ntp: Remove invalid cast in time offset math (git-fixes)
* ntp: Safeguard against time_constant overflow (git-fixes)
* nvme-fc: do not reference lsrsp after failure (bsc#1245193).
* nvme-pci: add NVME_QUIRK_NO_DEEPEST_PS quirk for SOLIDIGM P44 Pro (git-
fixes).
* nvme-pci: add quirks for WDC Blue SN550 15b7:5009 (git-fixes).
* nvme-pci: add quirks for device 126f:1001 (git-fixes).
* nvme-pci: refresh visible attrs after being checked (git-fixes).
* nvme: Fix incorrect cdw15 value in passthru error logging (git-fixes).
* nvme: always punt polled uring_cmd end_io work to task_work (git-fixes).
* nvme: fix command limits status code (git-fixes).
* nvme: fix endianness of command word prints in nvme_log_err_passthru() (git-
fixes).
* nvme: fix implicit bool to flags conversion (git-fixes).
* nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list()
(git-fixes).
* nvme: fix misaccounting of nvme-mpath inflight I/O (git-fixes).
* nvmet-fc: free pending reqs on tgtport unregister (bsc#1245193).
* nvmet-fc: take tgtport refs for portentry (bsc#1245193).
* nvmet-fcloop: access fcpreq only when holding reqlock (bsc#1245193).
* nvmet-fcloop: add missing fcloop_callback_host_done (bsc#1245193).
* nvmet-fcloop: allocate/free fcloop_lsreq directly (bsc#1245193).
* nvmet-fcloop: do not wait for lport cleanup (bsc#1245193).
* nvmet-fcloop: drop response if targetport is gone (bsc#1245193).
* nvmet-fcloop: prevent double port deletion (bsc#1245193).
* nvmet-fcloop: refactor fcloop_delete_local_port (bsc#1245193).
* nvmet-fcloop: refactor fcloop_nport_alloc and track lport (bsc#1245193).
* nvmet-fcloop: remove nport from list on last user (bsc#1245193).
* nvmet-fcloop: track ref counts for nports (bsc#1245193).
* nvmet-fcloop: update refs on tfcp_req (bsc#1245193).
* nvmet-tcp: fix callback lock for TLS handshake (git-fixes).
* objtool: Fix INSN_CONTEXT_SWITCH handling in validate_unret() (git-fixes).
* objtool: Fix UNWIND_HINT_{SAVE,RESTORE} across basic blocks (git-fixes).
* objtool: Fix _THIS_IP_ detection for cold functions (git-fixes).
* objtool: Fix error handling inconsistencies in check() (git-fixes).
* objtool: Ignore dangling jump table entries (git-fixes).
* objtool: Ignore end-of-section jumps for KCOV/GCOV (git-fixes).
* objtool: Properly disable uaccess validation (git-fixes).
* objtool: Silence more KCOV warnings (git-fixes).
* objtool: Silence more KCOV warnings, part 2 (git-fixes).
* objtool: Stop UNRET validation on UD2 (git-fixes).
* orangefs: Do not truncate file size (git-fixes).
* pNFS/flexfiles: Report ENETDOWN as a connection error (git-fixes).
* page_pool: Fix use-after-free in page_pool_recycle_in_ring (git-fixes).
* pch_uart: Fix dma_sync_sg_for_device() nents value (git-fixes).
* perf: Fix sample vs do_exit() (bsc#1246547).
* phy: core: do not require set_mode() callback for phy_get_mode() to work
(stable-fixes).
* phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug (git-fixes).
* phy: renesas: rcar-gen3-usb2: Add support to initialize the bus (stable-
fixes).
* phy: renesas: rcar-gen3-usb2: Assert PLL reset on PHY power off (git-fixes).
* phy: renesas: rcar-gen3-usb2: Lock around hardware registers and driver data
(git-fixes).
* phy: renesas: rcar-gen3-usb2: Move IRQ request in probe (stable-fixes).
* phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode (git-
fixes).
* pinctrl-tegra: Restore SFSEL bit when freeing pins (stable-fixes).
* pinctrl: amd: Clear GPIO debounce for suspend (git-fixes).
* pinctrl: armada-37xx: propagate error from armada_37xx_gpio_get() (stable-
fixes).
* pinctrl: armada-37xx: propagate error from armada_37xx_gpio_get_direction()
(stable-fixes).
* pinctrl: armada-37xx: propagate error from
armada_37xx_pmx_gpio_set_direction() (stable-fixes).
* pinctrl: armada-37xx: propagate error from armada_37xx_pmx_set_by_name()
(stable-fixes).
* pinctrl: armada-37xx: set GPIO output value before setting direction (git-
fixes).
* pinctrl: armada-37xx: use correct OUTPUT_VAL register for GPIOs > 31 (git-
fixes).
* pinctrl: at91: Fix possible out-of-boundary access (git-fixes).
* pinctrl: bcm281xx: Use "unsigned int" instead of bare "unsigned" (stable-
fixes).
* pinctrl: devicetree: do not goto err when probing hogs in pinctrl_dt_to_map
(stable-fixes).
* pinctrl: mcp23s08: Reset all pins to input at probe (stable-fixes).
* pinctrl: meson: define the pull up/down resistor value as 60 kOhm (stable-
fixes).
* pinctrl: qcom: msm: mark certain pins as invalid for interrupts (git-fixes).
* pinctrl: qcom: pinctrl-qcm2290: Add missing pins (git-fixes).
* pinctrl: st: Drop unused st_gpio_bank() function (git-fixes).
* pinctrl: sunxi: Fix memory leak on krealloc failure (git-fixes).
* pinctrl: tegra: Fix off by one in tegra_pinctrl_get_group() (git-fixes).
* pinmux: fix race causing mux_owner NULL with active mux_usecount (git-
fixes).
* platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() (git-
fixes).
* platform/mellanox: mlxbf-pmc: Fix duplicate event ID for CACHE_DATA1 (git-
fixes).
* platform/mellanox: mlxbf-tmfifo: fix vring_desc.len assignment (git-fixes).
* platform/mellanox: mlxreg-lc: Fix logic error in power state check (git-
fixes).
* platform/mellanox: nvsw-sn2201: Fix bus number in adapter error message
(git-fixes).
* platform/x86/amd/pmc: Add PCSpecialist Lafite Pro V 14M to 8042 quirks list
(stable-fixes).
* platform/x86/amd: pmc: Clear metrics table at start of cycle (git-fixes).
* platform/x86/intel-uncore-freq: Fail module load when plat_info is NULL
(git-fixes).
* platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs
callbacks (git-fixes).
* platform/x86: dell_rbu: Fix list usage (git-fixes).
* platform/x86: dell_rbu: Stop overwriting data buffer (git-fixes).
* platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (git-fixes).
* platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (stable-fixes).
* platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots
(git-fixes).
* platform/x86: ideapad-laptop: use usleep_range() for EC polling (git-fixes).
* platform/x86: think-lmi: Create ksets consecutively (stable-fixes).
* platform/x86: think-lmi: Fix kobject cleanup (git-fixes).
* platform/x86: think-lmi: Fix sysfs group cleanup (git-fixes).
* platform/x86: thinkpad_acpi: Ignore battery threshold change event
notification (stable-fixes).
* platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (git-fixes).
* platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (stable-fixes).
* power: reset: at91-reset: Optimize at91_reset() (git-fixes).
* power: supply: bq27xxx: Retrieve again when busy (stable-fixes).
* power: supply: collie: Fix wakeup source leaks on device unbind (stable-
fixes).
* power: supply: cpcap-charger: Fix null check for power_supply_get_by_name
(git-fixes).
* power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set (git-
fixes).
* powercap: call put_device() on an error path in
powercap_register_control_type() (stable-fixes).
* powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() (git-
fixes).
* powercap: intel_rapl: Do not change CLAMPING bit if ENABLE bit cannot be
changed (git-fixes).
* powerpc/bpf: enforce full ordering for ATOMIC operations with BPF_FETCH
(git-fixes).
* powerpc/eeh: Fix missing PE bridge reconfiguration during VFIO EEH recovery
(bsc#1215199).
* powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap
(bsc#1244309 ltc#213790).
* powerpc/pseries/msi: Avoid reading PCI device registers in reduced power
states (bsc#1215199).
* powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309
ltc#213790).
* pstore: Change kmsg_bytes storage size to u32 (git-fixes).
* ptp: fix breakage after ptp_vclock_in_use() rework (bsc#1246506).
* ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use() (git-fixes).
* pwm: imx-tpm: Reset counter if CMOD is 0 (git-fixes).
* pwm: mediatek: Ensure to disable clocks in error path (git-fixes).
* r8152: add vendor/device ID pair for Dell Alienware AW1022z (git-fixes).
* regmap: fix potential memory leak of regmap_bus (git-fixes).
* regulator: ad5398: Add device tree support (stable-fixes).
* regulator: fan53555: add enable_time support and soft-start times (stable-
fixes).
* regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods (git-
fixes).
* regulator: max14577: Add error check for max14577_read_reg() (git-fixes).
* regulator: max20086: Change enable gpio to optional (git-fixes).
* regulator: max20086: Fix MAX200086 chip id (git-fixes).
* regulator: max20086: Fix refcount leak in max20086_parse_regulators_dt()
(git-fixes).
* regulator: pwm-regulator: Calculate the output voltage for disabled PWMs
(stable-fixes).
* resource: fix false warning in __request_region() (git-fixes).
* restore UCSI_CONNECTOR_RESET_HARD definition (git-fixes).
* rose: fix dangling neighbour pointers in rose_rt_device_down() (git-fixes).
* rpl: Fix use-after-free in rpl_do_srh_inline() (git-fixes).
* rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when
someone tries (needs) to build the kernel with clang.
* rpm/kernel-source.changes.old: Drop bogus bugzilla reference (bsc#1244725)
* rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation
(bsc#1246879)
* rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337)
* rpm: Stop using is_kotd_qa macro
* rtc: Fix offset calculation for .start_secs < 0 (git-fixes).
* rtc: Make rtc_time64_to_tm() support dates before 1970 (stable-fixes).
* rtc: at91rm9200: drop unused module alias (git-fixes).
* rtc: cmos: use spin_lock_irqsave in cmos_interrupt (git-fixes).
* rtc: cpcap: drop unused module alias (git-fixes).
* rtc: da9063: drop unused module alias (git-fixes).
* rtc: ds1307: fix incorrect maximum clock rate handling (git-fixes).
* rtc: ds1307: stop disabling alarms on probe (stable-fixes).
* rtc: hym8563: fix incorrect maximum clock rate handling (git-fixes).
* rtc: jz4740: drop unused module alias (git-fixes).
* rtc: nct3018y: fix incorrect maximum clock rate handling (git-fixes).
* rtc: pcf85063: fix incorrect maximum clock rate handling (git-fixes).
* rtc: pcf8563: fix incorrect maximum clock rate handling (git-fixes).
* rtc: pm8xxx: drop unused module alias (git-fixes).
* rtc: rv3028: fix incorrect maximum clock rate handling (git-fixes).
* rtc: rv3032: fix EERD location (stable-fixes).
* rtc: s3c: drop unused module alias (git-fixes).
* rtc: sh: assign correct interrupts with DT (git-fixes).
* rtc: stm32: drop unused module alias (git-fixes).
* s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again (git-fixes
bsc#1246870).
* s390/entry: Fix last breaking event handling in case of stack corruption
(git-fixes bsc#1243806).
* s390/pci: Allow re-add of a reserved but not yet removed device
(bsc#1244145).
* s390/pci: Do not try re-enabling load/store if device is disabled (git-fixes
bsc#1245646).
* s390/pci: Fix __pcilg_mio_inuser() inline assembly (git-fixes bsc#1245226).
* s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child
VFs (git-fixes bsc#1244145).
* s390/pci: Fix potential double remove of hotplug slot (bsc#1244145).
* s390/pci: Fix stale function handles in error handling (git-fixes
bsc#1245647).
* s390/pci: Prevent self deletion in disable_slot() (bsc#1244145).
* s390/pci: Remove redundant bus removal and disable from
zpci_release_device() (bsc#1244145).
* s390/pci: Serialize device addition and removal (bsc#1244145).
* s390/pci: introduce lock to synchronize state of zpci_dev's (jsc#PED-10253
bsc#1244145).
* s390/pci: remove hotplug slot when releasing the device (bsc#1244145).
* s390/pci: rename lock member in struct zpci_dev (jsc#PED-10253 bsc#1244145).
* s390/pkey: Prevent overflow in size calculation for memdup_user() (git-fixes
bsc#1245598).
* s390/tty: Fix a potential memory leak bug (git-fixes bsc#1245228).
* s390: Add z17 elf platform (LTC#214086 bsc#1245540).
* samples: mei: Fix building on musl libc (git-fixes).
* sched,freezer: Remove unnecessary warning in __thaw_task (bsc#1219338).
* scsi: Improve CDL control (git-fixes).
* scsi: core: Enforce unlimited max_segment_size when virt_boundary_mask is
set (git-fixes).
* scsi: dc395x: Remove DEBUG conditional compilation (git-fixes).
* scsi: dc395x: Remove leftover if statement in reselect() (git-fixes).
* scsi: elx: efct: Fix memory leak in efct_hw_parse_filter() (git-fixes).
* scsi: hisi_sas: Call I_T_nexus after soft reset for SATA disk (git-fixes).
* scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git-
fixes).
* scsi: iscsi: Fix incorrect error path labels for flashnode operations (git-
fixes).
* scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure
(bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Early return out of FDMI cmpl for locally rejected statuses
(bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Ensure HBA_SETUP flag is used only for SLI4 in
dev_loss_tmo_callbk (bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Modify end-of-life adapters' model descriptions (bsc#1245260
bsc#1243100 bsc#1246125 bsc#1204142).
* scsi: lpfc: Move clearing of HBA_SETUP flag to before lpfc_sli4_queue_unset
(bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Relocate clearing initial phba flags from link up to link down
hdlr (bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Revise CQ_CREATE_SET mailbox bitfield definitions (bsc#1245260
bsc#1243100 bsc#1246125).
* scsi: lpfc: Revise logging format for failed CT MIB requests (bsc#1245260
bsc#1243100 bsc#1246125).
* scsi: lpfc: Simplify error handling for failed lpfc_get_sli4_parameters cmd
(bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Skip RSCN processing when FC_UNLOADING flag is set (bsc#1245260
bsc#1243100 bsc#1246125).
* scsi: lpfc: Update debugfs trace ring initialization messages (bsc#1245260
bsc#1243100 bsc#1246125).
* scsi: lpfc: Update lpfc version to 14.4.0.10 (bsc#1245260 bsc#1243100
bsc#1246125).
* scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes).
* scsi: megaraid_sas: Fix invalid node index (git-fixes).
* scsi: mpi3mr: Add level check to control event logging (git-fixes).
* scsi: mpt3sas: Send a diag reset if target reset fails (git-fixes).
* scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes).
* scsi: qedf: Use designated initializer for struct qed_fcoe_cb_ops (git-
fixes).
* scsi: qla2xxx: Fix DMA mapping test in qla24xx_get_port_database() (git-
fixes).
* scsi: qla4xxx: Fix missing DMA mapping error in qla4xxx_alloc_pdu() (git-
fixes).
* scsi: s390: zfcp: Ensure synchronous unit_add (git-fixes bsc#1245599).
* scsi: sd_zbc: block: Respect bio vector limits for REPORT ZONES buffer (git-
fixes).
* scsi: st: ERASE does not change tape location (git-fixes).
* scsi: st: Restore some drive settings after reset (git-fixes).
* scsi: st: Tighten the page format heuristics with MODE SELECT (git-fixes).
* scsi: storvsc: Do not report the host packet status as the hv status (git-
fixes).
* scsi: storvsc: Increase the timeouts to storvsc_timeout (git-fixes).
* selftests/bpf: Add CFLAGS per source file and runner (git-fixes).
* selftests/bpf: Add tests for iter next method returning valid pointer (git-
fixes).
* selftests/bpf: Change functions definitions to support GCC (git-fixes).
* selftests/bpf: Fix a few tests for GCC related warnings (git-fixes).
* selftests/bpf: Fix bpf_nf selftest failure (git-fixes).
* selftests/bpf: Fix pointer arithmetic in test_xdp_do_redirect (git-fixes).
* selftests/bpf: Fix prog numbers in test_sockmap (git-fixes).
* selftests/mm: restore default nr_hugepages value during cleanup in
hugetlb_reparenting_test.sh (git-fixes).
* selftests/net: have `gro.sh -t` return a correct exit code (stable-fixes).
* selftests/seccomp: fix syscall_restart test for arm compat (git-fixes).
* serial: Fix potential null-ptr-deref in mlb_usio_probe() (git-fixes).
* serial: imx: Restore original RXTL for console to fix data loss (git-fixes).
* serial: mctrl_gpio: split disable_ms into sync and no_sync APIs (git-fixes).
* serial: sh-sci: Move runtime PM enable to sci_probe_single() (stable-fixes).
* serial: sh-sci: Save and restore more registers (git-fixes).
* serial: sh-sci: Update the suspend/resume support (stable-fixes).
* smb3: fix Open files on server counter going negative (git-fixes).
* smb: client: Use str_yes_no() helper function (git-fixes).
* smb: client: allow more DFS referrals to be cached (git-fixes).
* smb: client: avoid unnecessary reconnects when refreshing referrals (git-
fixes).
* smb: client: change return value in open_cached_dir_by_dentry() if !cfids
(git-fixes).
* smb: client: do not retry DFS targets on server shutdown (git-fixes).
* smb: client: do not trust DFSREF_STORAGE_SERVER bit (git-fixes).
* smb: client: do not try following DFS links in cifs_tree_connect() (git-
fixes).
* smb: client: fix DFS interlink failover (git-fixes).
* smb: client: fix DFS mount against old servers with NTLMSSP (git-fixes).
* smb: client: fix hang in wait_for_response() for negproto (bsc#1242709).
* smb: client: fix potential race in cifs_put_tcon() (git-fixes).
* smb: client: fix return value of parse_dfs_referrals() (git-fixes).
* smb: client: get rid of @nlsc param in cifs_tree_connect() (git-fixes).
* smb: client: get rid of TCP_Server_Info::refpath_lock (git-fixes).
* smb: client: get rid of kstrdup() in get_ses_refpath() (git-fixes).
* smb: client: improve purging of cached referrals (git-fixes).
* smb: client: introduce av_for_each_entry() helper (git-fixes).
* smb: client: optimize referral walk on failed link targets (git-fixes).
* smb: client: parse DNS domain name from domain= option (git-fixes).
* smb: client: parse av pair type 4 in CHALLENGE_MESSAGE (git-fixes).
* smb: client: provide dns_resolve_{unc,name} helpers (git-fixes).
* smb: client: refresh referral without acquiring refpath_lock (git-fixes).
* smb: client: remove unnecessary checks in open_cached_dir() (git-fixes).
* soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS (git-fixes).
* soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop() (git-fixes).
* soc: aspeed: lpc-snoop: Cleanup resources in stack-order (git-fixes).
* soc: aspeed: lpc-snoop: Do not disable channels that are not enabled (git-
fixes).
* soc: aspeed: lpc: Fix impossible judgment condition (git-fixes).
* soc: qcom: QMI encoding/decoding for big endian (git-fixes).
* soc: qcom: fix endianness for QMI header (git-fixes).
* soc: qcom: pmic_glink: fix OF node leak (git-fixes).
* soc: qcom: smp2p: Fix fallback to qcom,ipc parse (git-fixes).
* soc: ti: k3-socinfo: Do not use syscon helper to build regmap (stable-
fixes).
* software node: Correct a OOB check in software_node_get_reference_args()
(stable-fixes).
* soundwire: amd: change the soundwire wake enable/disable sequence (stable-
fixes).
* soundwire: amd: fix for clearing command status register (git-fixes).
* soundwire: stream: restore params when prepare ports fail (git-fixes).
* spi-rockchip: Fix register out of bounds access (stable-fixes).
* spi: bcm63xx-hsspi: fix shared reset (git-fixes).
* spi: bcm63xx-spi: fix shared reset (git-fixes).
* spi: sh-msiof: Fix maximum DMA transfer size (git-fixes).
* spi: spi-fsl-dspi: Clear completion counter before initiating transfer (git-
fixes).
* spi: spi-sun4i: fix early activation (stable-fixes).
* spi: tegra210-quad: Fix X1_X2_X4 encoding and support x4 transfers (git-
fixes).
* spi: tegra210-quad: modify chip select (CS) deactivation (git-fixes).
* spi: tegra210-quad: remove redundant error handling code (git-fixes).
* spi: zynqmp-gqspi: Always acknowledge interrupts (stable-fixes).
* staging: axis-fifo: remove sysfs interface (git-fixes).
* staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() (git-
fixes).
* staging: iio: ad5933: Correct settling cycles encoding per datasheet (git-
fixes).
* staging: nvec: Fix incorrect null termination of battery manufacturer (git-
fixes).
* staging: rtl8723bs: Avoid memset() in aes_cipher() and aes_decipher() (git-
fixes).
* struct cdns: move new member to the end (git-fixes).
* struct ucsi_operations: use padding for new operation (git-fixes).
* struct usci: hide additional member (git-fixes).
* sunrpc: do not immediately retransmit on seqno miss (git-fixes).
* sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (git-
fixes).
* supported.conf: add missing entries for armv7hl
* supported.conf: move nvme-apple to optional again
* supported.conf: sort entries again
* tcp/dccp: allow a connection when sk_max_ack_backlog is zero (git-fixes).
* tcp/dccp: bypass empty buckets in inet_twsk_purge() (git-fixes).
* tcp/dccp: complete lockless accesses to sk->sk_max_ack_backlog (git-fixes).
* tcp: bring back NUMA dispersion in inet_ehash_locks_alloc() (git-fixes).
* tcp: call tcp_measure_rcv_mss() for ooo packets (git-fixes).
* tcp_metrics: optimize tcp_metrics_flush_all() (git-fixes).
* thermal/drivers/qoriq: Power down TMU on system suspend (stable-fixes).
* thunderbolt: Do not add non-active NVM if NVM upgrade is disabled for
retimer (stable-fixes).
* thunderbolt: Do not double dequeue a configuration request (stable-fixes).
* thunderbolt: Fix a logic error in wake on connect (git-fixes).
* thunderbolt: Fix bit masking in tb_dp_port_set_hops() (git-fixes).
* thunderbolt: Fix copy+paste error in match_service_id() (git-fixes).
* thunderbolt: Fix wake on connect at runtime (git-fixes).
* timekeeping: Fix bogus clock_was_set() invocation in (git-fixes)
* timekeeping: Fix cross-timestamp interpolation corner case (git-fixes)
* timekeeping: Fix cross-timestamp interpolation for non-x86 (git-fixes)
* timekeeping: Fix cross-timestamp interpolation on counter (git-fixes)
* trace/trace_event_perf: remove duplicate samples on the first tracepoint
event (git-fixes).
* tracing/eprobe: Fix to release eprobe when failed to add dyn_event (git-
fixes).
* tracing: Add __print_dynamic_array() helper (bsc#1243544).
* tracing: Add __string_len() example (bsc#1243544).
* tracing: Fix cmp_entries_dup() to respect sort() comparison rules (git-
fixes).
* tracing: Fix compilation warning on arm32 (bsc#1243551).
* tracing: Use atomic64_inc_return() in trace_clock_counter() (git-fixes).
* truct dwc3 hide new member wakeup_pending_funcs (git-fixes).
* types: Complement the aligned types with signed 64-bit one (stable-fixes).
* ucount: fix atomic_long_inc_below() argument type (git-fixes).
* ucsi-glink: adapt to kABI consistency (git-fixes).
* ucsi_ccg: Refine the UCSI Interrupt handling (git-fixes).
* ucsi_debugfs_entry: hide signedness change (git-fixes).
* ucsi_operations: add stubs for all operations (git-fixes).
* ucsi_ops: adapt update_connector to kABI consistency (git-fixes).
* udp: annotate data-races around up->pending (git-fixes).
* udp: fix incorrect parameter validation in the udp_lib_getsockopt() function
(git-fixes).
* udp: fix receiving fraglist GSO packets (git-fixes).
* udp: preserve the connected status if only UDP cmsg (git-fixes).
* uprobes: Use kzalloc to allocate xol area (git-fixes).
* usb: Add checks for snprintf() calls in usb_alloc_dev() (stable-fixes).
* usb: Flush altsetting 0 endpoints before reinitializating them after reset
(git-fixes).
* usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init()
(git-fixes).
* usb: cdc-wdm: avoid setting WDM_READ for ZLP-s (stable-fixes).
* usb: cdnsp: Fix issue with CV Bad Descriptor test (git-fixes).
* usb: cdnsp: Fix issue with detecting USB 3.2 speed (git-fixes).
* usb: cdnsp: Fix issue with detecting command completion event (git-fixes).
* usb: cdnsp: Fix issue with resuming from L1 (git-fixes).
* usb: cdnsp: Replace snprintf() with the safer scnprintf() variant (stable-
fixes).
* usb: cdnsp: do not disable slot for disabled slot (git-fixes).
* usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume
(git-fixes).
* usb: common: usb-conn-gpio: use a unique name for usb connector device
(stable-fixes).
* usb: dwc2: also exit clock_gating when stopping udc while suspended (stable-
fixes).
* usb: dwc3: gadget: Make gadget_wakeup asynchronous (git-fixes).
* usb: dwc3: meson-g12a: fix device leaks at unbind (git-fixes).
* usb: early: xhci-dbc: Fix early_ioremap leak (git-fixes).
* usb: gadget : fix use-after-free in composite_dev_cleanup() (git-fixes).
* usb: gadget: u_serial: Fix race condition in TTY wakeup (git-fixes).
* usb: gadget: udc: renesas_usb3: fix device leak at unbind (git-fixes).
* usb: host: xhci-plat: fix incorrect type for of_match variable in
xhci_plat_probe() (git-fixes).
* usb: hub: Do not try to recover devices lost during warm reset (git-fixes).
* usb: misc: apple-mfi-fastcharge: Make power supply names unique (git-fixes).
* usb: musb: fix gadget state on disconnect (git-fixes).
* usb: musb: omap2430: fix device leak at unbind (git-fixes).
* usb: net: sierra: check for no status endpoint (git-fixes).
* usb: potential integer overflow in usbg_make_tpg() (stable-fixes).
* usb: quirks: Add NO_LPM quirk for SanDisk Extreme 55AE (stable-fixes).
* usb: renesas_usbhs: Reorder clock handling and power management in probe
(git-fixes).
* usb: storage: Ignore UAS driver for SanDisk 3.2 Gen2 storage device (stable-
fixes).
* usb: typec: Update sysfs when setting ops (git-fixes).
* usb: typec: altmodes/displayport: do not index invalid pin_assignments (git-
fixes).
* usb: typec: displayport: Fix potential deadlock (git-fixes).
* usb: typec: displayport: Receive DP Status Update NAK request exit dp
altmode (stable-fixes).
* usb: typec: mux: do not return on EOPNOTSUPP in {mux, switch}_set (stable-
fixes).
* usb: typec: tcpm/tcpci_maxim: Fix bounds check in process_rx() (git-fixes).
* usb: typec: tcpm: allow switching to mode accessory to mux properly (stable-
fixes).
* usb: typec: tcpm: allow to use sink in accessory mode (stable-fixes).
* usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach (git-
fixes).
* usb: typec: ucsi: Add DATA_RESET option of Connector Reset command (git-
fixes).
* usb: typec: ucsi: Add qcm6490-pmic-glink as needing PDOS quirk (git-fixes).
* usb: typec: ucsi: Delay alternate mode discovery (git-fixes).
* usb: typec: ucsi: Fix busy loop on ASUS VivoBooks (git-fixes).
* usb: typec: ucsi: Fix the partner PD revision (git-fixes).
* usb: typec: ucsi: Get PD revision for partner (git-fixes).
* usb: typec: ucsi: Only enable supported notifications (git-fixes).
* usb: typec: ucsi: Set orientation as none when connector is unplugged (git-
fixes).
* usb: typec: ucsi: Update power_supply on power role change (git-fixes).
* usb: typec: ucsi: add callback for connector status updates (git-fixes).
* usb: typec: ucsi: add update_connector callback (git-fixes).
* usb: typec: ucsi: allow non-partner GET_PDOS for Qualcomm devices (git-
fixes).
* usb: typec: ucsi: do not retrieve PDOs if not supported (git-fixes).
* usb: typec: ucsi: extract code to read PD caps (git-fixes).
* usb: typec: ucsi: fix Clang -Wsign-conversion warning (git-fixes).
* usb: typec: ucsi: fix UCSI on SM8550 & SM8650 Qualcomm devices (git-fixes).
* usb: typec: ucsi: fix UCSI on buggy Qualcomm devices (git-fixes).
* usb: typec: ucsi: glink: fix off-by-one in connector_status (git-fixes).
* usb: typec: ucsi: glink: increase max ports for x1e80100 (git-fixes).
* usb: typec: ucsi: glink: move GPIO reading into connector_status callback
(git-fixes).
* usb: typec: ucsi: glink: use typec_set_orientation (git-fixes).
* usb: typec: ucsi: limit the UCSI_NO_PARTNER_PDOS even further (git-fixes).
* usb: typec: ucsi: move ucsi_acknowledge() from ucsi_read_error() (git-
fixes).
* usb: typec: ucsi: properly register partner's PD device (git-fixes).
* usb: typec: ucsi: support delaying GET_PDOS for device (git-fixes).
* usb: typec: ucsi_acpi: Add LG Gram quirk (git-fixes).
* usb: typec: ucsi_glink: drop NO_PARTNER_PDOS quirk for sm8550 / sm8650 (git-
fixes).
* usb: typec: ucsi_glink: enable the UCSI_DELAY_DEVICE_PDOS quirk (git-fixes).
* usb: typec: ucsi_glink: enable the UCSI_DELAY_DEVICE_PDOS quirk on qcm6490
(git-fixes).
* usb: typec: ucsi_glink: rework quirks implementation (git-fixes).
* usb: usbtmc: Fix read_stb function and get_stb ioctl (git-fixes).
* usb: usbtmc: Fix timeout value in get_stb (git-fixes).
* usb: xhci: Do not change the status of stalled TDs on failed Stop EP
(stable-fixes).
* usb: xhci: Skip xhci_reset in xhci_resume if xhci is being removed (git-
fixes).
* usb: xhci: quirk for data loss in ISOC transfers (stable-fixes).
* usb:cdnsp: remove TRB_FLUSH_ENDPOINT command (stable-fixes).
* usbnet: asix AX88772: leave the carrier control to phylink (stable-fixes).
* vgacon: Add check for vc_origin address range in vgacon_scroll() (git-
fixes).
* virtgpu: do not reset on shutdown (git-fixes).
* vmci: Prevent the dispatching of uninitialized payloads (git-fixes).
* vmxnet3: correctly report gso type for UDP tunnels (bsc#1244626).
* vmxnet3: support higher link speeds from vmxnet3 v9 (bsc#1244626).
* vmxnet3: update MTU after device quiesce (bsc#1244626).
* vt: add missing notification when switching back to text mode (stable-
fixes).
* vt: defkeymap: Map keycodes above 127 to K_HOLE (git-fixes).
* vt: keyboard: Do not process Unicode characters in K_OFF mode (git-fixes).
* vt: remove VT_RESIZE and VT_RESIZEX from vt_compat_ioctl() (git-fixes).
* watchdog: da9052_wdt: respect TWDMIN (stable-fixes).
* watchdog: exar: Shorten identity name to fit correctly (git-fixes).
* watchdog: fix watchdog may detect false positive of softlockup (stable-
fixes).
* watchdog: it87_wdt: add PWRGD enable quirk for Qotom QCML04 (git-fixes).
* watchdog: mediatek: Add support for MT6735 TOPRGU/WDT (git-fixes).
* watchdog: ziirave_wdt: check record length in ziirave_firm_verify() (git-
fixes).
* wifi: ath11k: Fix QMI memory reuse logic (stable-fixes).
* wifi: ath11k: avoid burning CPU in ath11k_debugfs_fw_stats_request() (git-
fixes).
* wifi: ath11k: clear initialized flag for deinit-ed srng lists (git-fixes).
* wifi: ath11k: convert timeouts to secs_to_jiffies() (stable-fixes).
* wifi: ath11k: do not use static variables in
ath11k_debugfs_fw_stats_process() (git-fixes).
* wifi: ath11k: do not wait when there is no vdev started (git-fixes).
* wifi: ath11k: fix dest ring-buffer corruption (git-fixes).
* wifi: ath11k: fix dest ring-buffer corruption when ring is full (git-fixes).
* wifi: ath11k: fix node corruption in ar->arvifs list (git-fixes).
* wifi: ath11k: fix ring-buffer corruption (git-fixes).
* wifi: ath11k: fix rx completion meta data corruption (git-fixes).
* wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()
(git-fixes).
* wifi: ath11k: fix soc_dp_stats debugfs file permission (stable-fixes).
* wifi: ath11k: fix source ring-buffer corruption (git-fixes).
* wifi: ath11k: fix suspend use-after-free after probe failure (git-fixes).
* wifi: ath11k: move some firmware stats related functions outside of debugfs
(git-fixes).
* wifi: ath11k: update channel list in worker when wait flag is set
(bsc#1243847).
* wifi: ath11k: validate ath11k_crypto_mode on top of
ath11k_core_qmi_firmware_ready (git-fixes).
* wifi: ath12k: Add MSDU length validation for TKIP MIC error (git-fixes).
* wifi: ath12k: Avoid napi_sync() before napi_enable() (stable-fixes).
* wifi: ath12k: Fix WMI tag for EHT rate in peer assoc (git-fixes).
* wifi: ath12k: Fix end offset bit definition in monitor ring descriptor
(stable-fixes).
* wifi: ath12k: Fix invalid memory access while forming 802.11 header (git-
fixes).
* wifi: ath12k: Fix memory leak during vdev_id mismatch (git-fixes).
* wifi: ath12k: Fix the QoS control field offset to build QoS header (git-
fixes).
* wifi: ath12k: Improve BSS discovery with hidden SSID in 6 GHz band (stable-
fixes).
* wifi: ath12k: Pass correct values of center freq1 and center freq2 for 160
MHz (stable-fixes).
* wifi: ath12k: Report proper tx completion status to mac80211 (stable-fixes).
* wifi: ath12k: fix a possible dead lock caused by ab->base_lock (stable-
fixes).
* wifi: ath12k: fix ath12k_hal_tx_cmd_ext_desc_setup() info1 override (stable-
fixes).
* wifi: ath12k: fix cleanup path after mhi init (git-fixes).
* wifi: ath12k: fix dest ring-buffer corruption (git-fixes).
* wifi: ath12k: fix dest ring-buffer corruption when ring is full (git-fixes).
* wifi: ath12k: fix endianness handling while accessing wmi service bit (git-
fixes).
* wifi: ath12k: fix failed to set mhi state error during reboot with hardware
grouping (stable-fixes).
* wifi: ath12k: fix incorrect CE addresses (stable-fixes).
* wifi: ath12k: fix invalid access to memory (git-fixes).
* wifi: ath12k: fix link valid field initialization in the monitor Rx (stable-
fixes).
* wifi: ath12k: fix macro definition HAL_RX_MSDU_PKT_LENGTH_GET (stable-
fixes).
* wifi: ath12k: fix node corruption in ar->arvifs list (git-fixes).
* wifi: ath12k: fix ring-buffer corruption (git-fixes).
* wifi: ath12k: fix source ring-buffer corruption (git-fixes).
* wifi: ath6kl: remove WARN on bad firmware input (stable-fixes).
* wifi: ath9k: return by of_get_mac_address (stable-fixes).
* wifi: ath9k_htc: Abort software beacon handling if disabled (git-fixes).
* wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE
(git-fixes).
* wifi: brcmsmac: Remove const from tbl_ptr parameter in
wlc_lcnphy_common_read_table() (git-fixes).
* wifi: carl9170: do not ping device which has failed to load firmware (git-
fixes).
* wifi: iwlfiwi: mvm: Fix the rate reporting (git-fixes).
* wifi: iwlwifi: Add missing MODULE_FIRMWARE for Qu-c0-jf-b0 (stable-fixes).
* wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (git-fixes).
* wifi: iwlwifi: Fix memory leak in iwl_mvm_init() (git-fixes).
* wifi: iwlwifi: add support for Killer on MTL (stable-fixes).
* wifi: iwlwifi: fix debug actions order (stable-fixes).
* wifi: iwlwifi: pcie: make sure to lock rxq->read (stable-fixes).
* wifi: iwlwifi: return ERR_PTR from opmode start() (stable-fixes).
* wifi: mac80211: Add link iteration macro for link data (stable-fixes).
* wifi: mac80211: Check 802.11 encaps offloading in
ieee80211_tx_h_select_key() (git-fixes).
* wifi: mac80211: Do not call fq_flow_idx() for management frames (git-fixes).
* wifi: mac80211: Do not schedule stopped TXQs (git-fixes).
* wifi: mac80211: VLAN traffic in multicast path (stable-fixes).
* wifi: mac80211: chan: chandef is non-NULL for reserved (stable-fixes).
* wifi: mac80211: do not offer a mesh path if forwarding is disabled (stable-
fixes).
* wifi: mac80211: do not unconditionally call drv_mgd_complete_tx() (stable-
fixes).
* wifi: mac80211: drop invalid source address OCB frames (stable-fixes).
* wifi: mac80211: fix beacon interval calculation overflow (git-fixes).
* wifi: mac80211: reject TDLS operations when station is not associated (git-
fixes).
* wifi: mac80211: remove misplaced drv_mgd_complete_tx() call (stable-fixes).
* wifi: mac80211_hwsim: Prevent tsf from setting if beacon is disabled
(stable-fixes).
* wifi: mt76: mt76x2: Add support for LiteOn WN4516R,WN4519R (stable-fixes).
* wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init() (git-
fixes).
* wifi: mt76: mt7921: add 160 MHz AP for mt7922 device (stable-fixes).
* wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init() (git-fixes).
* wifi: mt76: mt7925: ensure all MCU commands wait for response (git-fixes).
* wifi: mt76: mt7925: fix host interrupt register initialization (git-fixes).
* wifi: mt76: mt7925: fix invalid array index in ssid assignment during hw
scan (git-fixes).
* wifi: mt76: mt7925: fix the wrong config for tx interrupt (git-fixes).
* wifi: mt76: mt7925: prevent multiple scan commands (git-fixes).
* wifi: mt76: mt7925: refine the sniffer commnad (git-fixes).
* wifi: mt76: mt7996: drop fragments with multicast or broadcast RA (stable-
fixes).
* wifi: mt76: mt7996: fix RX buffer size of MCU event (git-fixes).
* wifi: mt76: mt7996: revise TXS size (stable-fixes).
* wifi: mt76: mt7996: set EHT max ampdu length capability (git-fixes).
* wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2 (stable-
fixes).
* wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() (git-fixes).
* wifi: plfxlc: Fix error handling in usb driver probe (git-fixes).
* wifi: prevent A-MSDU attacks in mesh networks (stable-fixes).
* wifi: rtl818x: Kill URBs before clearing tx status queue (git-fixes).
* wifi: rtlwifi: disable ASPM for RTL8723BE with subsystem ID 11ad:1723 (git-
fixes).
* wifi: rtw88: Do not use static local variable in
rtw8822b_set_tx_power_index_by_rate (stable-fixes).
* wifi: rtw88: Fix __rtw_download_firmware() for RTL8814AU (stable-fixes).
* wifi: rtw88: Fix download_firmware_validate() for RTL8814AU (stable-fixes).
* wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31 (stable-fixes).
* wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU (stable-fixes).
* wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU (stable-fixes).
* wifi: rtw88: do not ignore hardware read error during DPK (git-fixes).
* wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (git-
fixes).
* wifi: rtw88: sdio: call rtw_sdio_indicate_tx_status unconditionally (git-
fixes).
* wifi: rtw88: sdio: map mgmt frames to queue TX_DESC_QSEL_MGMT (git-fixes).
* wifi: rtw88: usb: Reduce control message timeout to 500 ms (git-fixes).
* wifi: rtw89: add wiphy_lock() to work that isn't held wiphy_lock() yet
(stable-fixes).
* wifi: rtw89: avoid NULL dereference when RX problematic packet on
unsupported 6 GHz band (git-fixes).
* wifi: rtw89: fw: propagate error code from rtw89_h2c_tx() (stable-fixes).
* wifi: rtw89: leave idle mode when setting WEP encryption for AP mode
(stable-fixes).
* wifi: rtw89: pci: enlarge retry times of RX tag to 1000 (git-fixes).
* wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()
(git-fixes).
* x86/cpu/amd: Fix workaround for erratum 1054 (git-fixes).
* x86/idle: Remove MFENCEs for X86_BUG_CLFLUSH_MONITOR in
mwait_idle_with_hints() and prefer_mwait_c1_over_halt() (git-fixes).
* x86/kaslr: Reduce KASLR entropy on most x86 systems (git-fixes).
* x86/mce/amd: Add default names for MCA banks and blocks (git-fixes).
* x86/mce/amd: Fix threshold limit reset (git-fixes).
* x86/mce: Do not remove sysfs if thresholding sysfs init fails (git-fixes).
* x86/mce: Make sure CMCI banks are cleared during shutdown on Intel (git-
fixes).
* x86/microcode/AMD: Add get_patch_level() (git-fixes).
* x86/microcode/AMD: Do not return error when microcode update is not
necessary (git-fixes).
* x86/microcode/AMD: Get rid of the _load_microcode_amd() forward declaration
(git-fixes).
* x86/microcode/AMD: Have __apply_microcode_amd() return bool (git-fixes).
* x86/microcode/AMD: Make __verify_patch_size() return bool (git-fixes).
* x86/microcode/AMD: Merge early_apply_microcode() into its single callsite
(git-fixes).
* x86/microcode/AMD: Remove ugly linebreak in __verify_patch_section()
signature (git-fixes).
* x86/microcode/AMD: Return bool from find_blobs_in_containers() (git-fixes).
* x86/microcode: Consolidate the loader enablement checking (git-fixes).
* x86/mm/init: Handle the special case of device private pages in add_pages(),
to not increase max_pfn and trigger dma_addressing_limited() bounce buffers
(git-fixes).
* x86/tdx: Fix __noreturn build warning around __tdx_hypercall_failed() (git-
fixes).
* x86/traps: Initialize DR6 by writing its architectural reset value (git-
fixes).
* x86/virt/tdx: Avoid indirect calls to TDX assembly functions (git-fixes).
* x86/xen: fix balloon target initialization for PVH dom0 (git-fixes).
* x86: UV RTC: Add parameter to disable RTC clocksource (bsc#1241345).
* xen/arm: call uaccess_ttbr0_enable for dm_op hypercall (git-fixes)
* xen/x86: fix initial memory balloon target (git-fixes).
* xfs: fix off-by-one error in fsmap's end_daddr usage (bsc#1235837).
* xfs: only create event xfs_file_compat_ioctl when CONFIG_COMPAT is configure
(git-fixes).
* xfs: remove unused event xfs_alloc_near_error (git-fixes).
* xfs: remove unused event xfs_alloc_near_nominleft (git-fixes).
* xfs: remove unused event xfs_attr_node_removename (git-fixes).
* xfs: remove unused event xfs_ioctl_clone (git-fixes).
* xfs: remove unused event xfs_pagecache_inval (git-fixes).
* xfs: remove unused event xlog_iclog_want_sync (git-fixes).
* xfs: remove unused trace event xfs_attr_remove_iter_return (git-fixes).
* xfs: remove unused trace event xfs_attr_rmtval_set (git-fixes).
* xfs: remove unused trace event xfs_reflink_cow_enospc (git-fixes).
* xfs: remove unused xfs_attr events (git-fixes).
* xfs: remove unused xfs_reflink_compare_extents events (git-fixes).
* xfs: remove usused xfs_end_io_direct events (git-fixes).
* xhci: Disable stream for xHC controller with XHCI_BROKEN_STREAMS (git-
fixes).
* xhci: dbc: Flush queued requests before stopping dbc (git-fixes).
* xhci: dbctty: disable ECHO flag by default (git-fixes).
* xsk: always clear DMA mapping information when unmapping the pool (git-
fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Confidential Computing Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Confidential-Computing-15-SP6-2025-2923=1
## Package List:
* Confidential Computing Module 15-SP6 (nosrc x86_64)
* kernel-coco-6.4.0-15061.28.coco15sp6.1
* kernel-coco_debug-6.4.0-15061.28.coco15sp6.1
* Confidential Computing Module 15-SP6 (x86_64)
* kernel-coco_debug-devel-6.4.0-15061.28.coco15sp6.1
* kernel-coco-devel-6.4.0-15061.28.coco15sp6.1
* kernel-coco_debug-debuginfo-6.4.0-15061.28.coco15sp6.1
* kernel-coco_debug-devel-debuginfo-6.4.0-15061.28.coco15sp6.1
* kernel-coco-debuginfo-6.4.0-15061.28.coco15sp6.1
* reiserfs-kmp-coco-debuginfo-6.4.0-15061.28.coco15sp6.1
* kernel-coco-debugsource-6.4.0-15061.28.coco15sp6.1
* reiserfs-kmp-coco-6.4.0-15061.28.coco15sp6.1
* kernel-coco-vdso-debuginfo-6.4.0-15061.28.coco15sp6.1
* kernel-syms-coco-6.4.0-15061.28.coco15sp6.1
* kernel-coco_debug-debugsource-6.4.0-15061.28.coco15sp6.1
* Confidential Computing Module 15-SP6 (noarch)
* kernel-devel-coco-6.4.0-15061.28.coco15sp6.1
* kernel-source-coco-6.4.0-15061.28.coco15sp6.1
## References:
* https://www.suse.com/security/cve/CVE-2019-11135.html
* https://www.suse.com/security/cve/CVE-2023-52888.html
* https://www.suse.com/security/cve/CVE-2023-53146.html
* https://www.suse.com/security/cve/CVE-2024-26831.html
* https://www.suse.com/security/cve/CVE-2024-36028.html
* https://www.suse.com/security/cve/CVE-2024-36348.html
* https://www.suse.com/security/cve/CVE-2024-36349.html
* https://www.suse.com/security/cve/CVE-2024-36350.html
* https://www.suse.com/security/cve/CVE-2024-36357.html
* https://www.suse.com/security/cve/CVE-2024-43869.html
* https://www.suse.com/security/cve/CVE-2024-44963.html
* https://www.suse.com/security/cve/CVE-2024-49568.html
* https://www.suse.com/security/cve/CVE-2024-49861.html
* https://www.suse.com/security/cve/CVE-2024-50106.html
* https://www.suse.com/security/cve/CVE-2024-56613.html
* https://www.suse.com/security/cve/CVE-2024-56699.html
* https://www.suse.com/security/cve/CVE-2024-56742.html
* https://www.suse.com/security/cve/CVE-2024-57947.html
* https://www.suse.com/security/cve/CVE-2024-57982.html
* https://www.suse.com/security/cve/CVE-2024-58053.html
* https://www.suse.com/security/cve/CVE-2024-58098.html
* https://www.suse.com/security/cve/CVE-2024-58099.html
* https://www.suse.com/security/cve/CVE-2024-58100.html
* https://www.suse.com/security/cve/CVE-2024-58237.html
* https://www.suse.com/security/cve/CVE-2025-21629.html
* https://www.suse.com/security/cve/CVE-2025-21658.html
* https://www.suse.com/security/cve/CVE-2025-21720.html
* https://www.suse.com/security/cve/CVE-2025-21839.html
* https://www.suse.com/security/cve/CVE-2025-21854.html
* https://www.suse.com/security/cve/CVE-2025-21868.html
* https://www.suse.com/security/cve/CVE-2025-21872.html
* https://www.suse.com/security/cve/CVE-2025-21898.html
* https://www.suse.com/security/cve/CVE-2025-21899.html
* https://www.suse.com/security/cve/CVE-2025-21920.html
* https://www.suse.com/security/cve/CVE-2025-21938.html
* https://www.suse.com/security/cve/CVE-2025-21959.html
* https://www.suse.com/security/cve/CVE-2025-21997.html
* https://www.suse.com/security/cve/CVE-2025-22005.html
* https://www.suse.com/security/cve/CVE-2025-22035.html
* https://www.suse.com/security/cve/CVE-2025-22066.html
* https://www.suse.com/security/cve/CVE-2025-22083.html
* https://www.suse.com/security/cve/CVE-2025-22089.html
* https://www.suse.com/security/cve/CVE-2025-22090.html
* https://www.suse.com/security/cve/CVE-2025-22095.html
* https://www.suse.com/security/cve/CVE-2025-22111.html
* https://www.suse.com/security/cve/CVE-2025-22113.html
* https://www.suse.com/security/cve/CVE-2025-22119.html
* https://www.suse.com/security/cve/CVE-2025-22120.html
* https://www.suse.com/security/cve/CVE-2025-22124.html
* https://www.suse.com/security/cve/CVE-2025-23141.html
* https://www.suse.com/security/cve/CVE-2025-23142.html
* https://www.suse.com/security/cve/CVE-2025-23144.html
* https://www.suse.com/security/cve/CVE-2025-23146.html
* https://www.suse.com/security/cve/CVE-2025-23147.html
* https://www.suse.com/security/cve/CVE-2025-23148.html
* https://www.suse.com/security/cve/CVE-2025-23149.html
* https://www.suse.com/security/cve/CVE-2025-23151.html
* https://www.suse.com/security/cve/CVE-2025-23155.html
* https://www.suse.com/security/cve/CVE-2025-23156.html
* https://www.suse.com/security/cve/CVE-2025-23157.html
* https://www.suse.com/security/cve/CVE-2025-23158.html
* https://www.suse.com/security/cve/CVE-2025-23159.html
* https://www.suse.com/security/cve/CVE-2025-23161.html
* https://www.suse.com/security/cve/CVE-2025-23163.html
* https://www.suse.com/security/cve/CVE-2025-37738.html
* https://www.suse.com/security/cve/CVE-2025-37740.html
* https://www.suse.com/security/cve/CVE-2025-37741.html
* https://www.suse.com/security/cve/CVE-2025-37742.html
* https://www.suse.com/security/cve/CVE-2025-37743.html
* https://www.suse.com/security/cve/CVE-2025-37747.html
* https://www.suse.com/security/cve/CVE-2025-37752.html
* https://www.suse.com/security/cve/CVE-2025-37754.html
* https://www.suse.com/security/cve/CVE-2025-37756.html
* https://www.suse.com/security/cve/CVE-2025-37757.html
* https://www.suse.com/security/cve/CVE-2025-37758.html
* https://www.suse.com/security/cve/CVE-2025-37765.html
* https://www.suse.com/security/cve/CVE-2025-37766.html
* https://www.suse.com/security/cve/CVE-2025-37767.html
* https://www.suse.com/security/cve/CVE-2025-37768.html
* https://www.suse.com/security/cve/CVE-2025-37769.html
* https://www.suse.com/security/cve/CVE-2025-37770.html
* https://www.suse.com/security/cve/CVE-2025-37771.html
* https://www.suse.com/security/cve/CVE-2025-37772.html
* https://www.suse.com/security/cve/CVE-2025-37781.html
* https://www.suse.com/security/cve/CVE-2025-37782.html
* https://www.suse.com/security/cve/CVE-2025-37786.html
* https://www.suse.com/security/cve/CVE-2025-37788.html
* https://www.suse.com/security/cve/CVE-2025-37792.html
* https://www.suse.com/security/cve/CVE-2025-37793.html
* https://www.suse.com/security/cve/CVE-2025-37794.html
* https://www.suse.com/security/cve/CVE-2025-37796.html
* https://www.suse.com/security/cve/CVE-2025-37798.html
* https://www.suse.com/security/cve/CVE-2025-37800.html
* https://www.suse.com/security/cve/CVE-2025-37801.html
* https://www.suse.com/security/cve/CVE-2025-37805.html
* https://www.suse.com/security/cve/CVE-2025-37810.html
* https://www.suse.com/security/cve/CVE-2025-37811.html
* https://www.suse.com/security/cve/CVE-2025-37812.html
* https://www.suse.com/security/cve/CVE-2025-37815.html
* https://www.suse.com/security/cve/CVE-2025-37819.html
* https://www.suse.com/security/cve/CVE-2025-37836.html
* https://www.suse.com/security/cve/CVE-2025-37839.html
* https://www.suse.com/security/cve/CVE-2025-37840.html
* https://www.suse.com/security/cve/CVE-2025-37841.html
* https://www.suse.com/security/cve/CVE-2025-37844.html
* https://www.suse.com/security/cve/CVE-2025-37849.html
* https://www.suse.com/security/cve/CVE-2025-37850.html
* https://www.suse.com/security/cve/CVE-2025-37851.html
* https://www.suse.com/security/cve/CVE-2025-37852.html
* https://www.suse.com/security/cve/CVE-2025-37853.html
* https://www.suse.com/security/cve/CVE-2025-37854.html
* https://www.suse.com/security/cve/CVE-2025-37856.html
* https://www.suse.com/security/cve/CVE-2025-37858.html
* https://www.suse.com/security/cve/CVE-2025-37859.html
* https://www.suse.com/security/cve/CVE-2025-37862.html
* https://www.suse.com/security/cve/CVE-2025-37864.html
* https://www.suse.com/security/cve/CVE-2025-37865.html
* https://www.suse.com/security/cve/CVE-2025-37867.html
* https://www.suse.com/security/cve/CVE-2025-37871.html
* https://www.suse.com/security/cve/CVE-2025-37873.html
* https://www.suse.com/security/cve/CVE-2025-37874.html
* https://www.suse.com/security/cve/CVE-2025-37875.html
* https://www.suse.com/security/cve/CVE-2025-37881.html
* https://www.suse.com/security/cve/CVE-2025-37884.html
* https://www.suse.com/security/cve/CVE-2025-37885.html
* https://www.suse.com/security/cve/CVE-2025-37889.html
* https://www.suse.com/security/cve/CVE-2025-37890.html
* https://www.suse.com/security/cve/CVE-2025-37891.html
* https://www.suse.com/security/cve/CVE-2025-37892.html
* https://www.suse.com/security/cve/CVE-2025-37897.html
* https://www.suse.com/security/cve/CVE-2025-37900.html
* https://www.suse.com/security/cve/CVE-2025-37901.html
* https://www.suse.com/security/cve/CVE-2025-37903.html
* https://www.suse.com/security/cve/CVE-2025-37905.html
* https://www.suse.com/security/cve/CVE-2025-37909.html
* https://www.suse.com/security/cve/CVE-2025-37911.html
* https://www.suse.com/security/cve/CVE-2025-37912.html
* https://www.suse.com/security/cve/CVE-2025-37913.html
* https://www.suse.com/security/cve/CVE-2025-37914.html
* https://www.suse.com/security/cve/CVE-2025-37915.html
* https://www.suse.com/security/cve/CVE-2025-37917.html
* https://www.suse.com/security/cve/CVE-2025-37918.html
* https://www.suse.com/security/cve/CVE-2025-37920.html
* https://www.suse.com/security/cve/CVE-2025-37921.html
* https://www.suse.com/security/cve/CVE-2025-37923.html
* https://www.suse.com/security/cve/CVE-2025-37925.html
* https://www.suse.com/security/cve/CVE-2025-37927.html
* https://www.suse.com/security/cve/CVE-2025-37928.html
* https://www.suse.com/security/cve/CVE-2025-37929.html
* https://www.suse.com/security/cve/CVE-2025-37930.html
* https://www.suse.com/security/cve/CVE-2025-37931.html
* https://www.suse.com/security/cve/CVE-2025-37932.html
* https://www.suse.com/security/cve/CVE-2025-37933.html
* https://www.suse.com/security/cve/CVE-2025-37936.html
* https://www.suse.com/security/cve/CVE-2025-37937.html
* https://www.suse.com/security/cve/CVE-2025-37938.html
* https://www.suse.com/security/cve/CVE-2025-37943.html
* https://www.suse.com/security/cve/CVE-2025-37944.html
* https://www.suse.com/security/cve/CVE-2025-37945.html
* https://www.suse.com/security/cve/CVE-2025-37946.html
* https://www.suse.com/security/cve/CVE-2025-37948.html
* https://www.suse.com/security/cve/CVE-2025-37951.html
* https://www.suse.com/security/cve/CVE-2025-37953.html
* https://www.suse.com/security/cve/CVE-2025-37954.html
* https://www.suse.com/security/cve/CVE-2025-37959.html
* https://www.suse.com/security/cve/CVE-2025-37961.html
* https://www.suse.com/security/cve/CVE-2025-37963.html
* https://www.suse.com/security/cve/CVE-2025-37967.html
* https://www.suse.com/security/cve/CVE-2025-37968.html
* https://www.suse.com/security/cve/CVE-2025-37969.html
* https://www.suse.com/security/cve/CVE-2025-37970.html
* https://www.suse.com/security/cve/CVE-2025-37972.html
* https://www.suse.com/security/cve/CVE-2025-37973.html
* https://www.suse.com/security/cve/CVE-2025-37978.html
* https://www.suse.com/security/cve/CVE-2025-37979.html
* https://www.suse.com/security/cve/CVE-2025-37980.html
* https://www.suse.com/security/cve/CVE-2025-37982.html
* https://www.suse.com/security/cve/CVE-2025-37983.html
* https://www.suse.com/security/cve/CVE-2025-37984.html
* https://www.suse.com/security/cve/CVE-2025-37985.html
* https://www.suse.com/security/cve/CVE-2025-37986.html
* https://www.suse.com/security/cve/CVE-2025-37987.html
* https://www.suse.com/security/cve/CVE-2025-37989.html
* https://www.suse.com/security/cve/CVE-2025-37990.html
* https://www.suse.com/security/cve/CVE-2025-37992.html
* https://www.suse.com/security/cve/CVE-2025-37994.html
* https://www.suse.com/security/cve/CVE-2025-37995.html
* https://www.suse.com/security/cve/CVE-2025-37997.html
* https://www.suse.com/security/cve/CVE-2025-37998.html
* https://www.suse.com/security/cve/CVE-2025-38000.html
* https://www.suse.com/security/cve/CVE-2025-38001.html
* https://www.suse.com/security/cve/CVE-2025-38003.html
* https://www.suse.com/security/cve/CVE-2025-38004.html
* https://www.suse.com/security/cve/CVE-2025-38005.html
* https://www.suse.com/security/cve/CVE-2025-38007.html
* https://www.suse.com/security/cve/CVE-2025-38009.html
* https://www.suse.com/security/cve/CVE-2025-38010.html
* https://www.suse.com/security/cve/CVE-2025-38011.html
* https://www.suse.com/security/cve/CVE-2025-38013.html
* https://www.suse.com/security/cve/CVE-2025-38014.html
* https://www.suse.com/security/cve/CVE-2025-38015.html
* https://www.suse.com/security/cve/CVE-2025-38018.html
* https://www.suse.com/security/cve/CVE-2025-38020.html
* https://www.suse.com/security/cve/CVE-2025-38022.html
* https://www.suse.com/security/cve/CVE-2025-38023.html
* https://www.suse.com/security/cve/CVE-2025-38024.html
* https://www.suse.com/security/cve/CVE-2025-38027.html
* https://www.suse.com/security/cve/CVE-2025-38031.html
* https://www.suse.com/security/cve/CVE-2025-38034.html
* https://www.suse.com/security/cve/CVE-2025-38035.html
* https://www.suse.com/security/cve/CVE-2025-38040.html
* https://www.suse.com/security/cve/CVE-2025-38043.html
* https://www.suse.com/security/cve/CVE-2025-38044.html
* https://www.suse.com/security/cve/CVE-2025-38045.html
* https://www.suse.com/security/cve/CVE-2025-38051.html
* https://www.suse.com/security/cve/CVE-2025-38052.html
* https://www.suse.com/security/cve/CVE-2025-38053.html
* https://www.suse.com/security/cve/CVE-2025-38057.html
* https://www.suse.com/security/cve/CVE-2025-38058.html
* https://www.suse.com/security/cve/CVE-2025-38059.html
* https://www.suse.com/security/cve/CVE-2025-38060.html
* https://www.suse.com/security/cve/CVE-2025-38061.html
* https://www.suse.com/security/cve/CVE-2025-38062.html
* https://www.suse.com/security/cve/CVE-2025-38063.html
* https://www.suse.com/security/cve/CVE-2025-38064.html
* https://www.suse.com/security/cve/CVE-2025-38065.html
* https://www.suse.com/security/cve/CVE-2025-38068.html
* https://www.suse.com/security/cve/CVE-2025-38072.html
* https://www.suse.com/security/cve/CVE-2025-38074.html
* https://www.suse.com/security/cve/CVE-2025-38077.html
* https://www.suse.com/security/cve/CVE-2025-38078.html
* https://www.suse.com/security/cve/CVE-2025-38079.html
* https://www.suse.com/security/cve/CVE-2025-38080.html
* https://www.suse.com/security/cve/CVE-2025-38081.html
* https://www.suse.com/security/cve/CVE-2025-38083.html
* https://www.suse.com/security/cve/CVE-2025-38084.html
* https://www.suse.com/security/cve/CVE-2025-38085.html
* https://www.suse.com/security/cve/CVE-2025-38087.html
* https://www.suse.com/security/cve/CVE-2025-38088.html
* https://www.suse.com/security/cve/CVE-2025-38089.html
* https://www.suse.com/security/cve/CVE-2025-38090.html
* https://www.suse.com/security/cve/CVE-2025-38094.html
* https://www.suse.com/security/cve/CVE-2025-38095.html
* https://www.suse.com/security/cve/CVE-2025-38097.html
* https://www.suse.com/security/cve/CVE-2025-38098.html
* https://www.suse.com/security/cve/CVE-2025-38099.html
* https://www.suse.com/security/cve/CVE-2025-38100.html
* https://www.suse.com/security/cve/CVE-2025-38102.html
* https://www.suse.com/security/cve/CVE-2025-38104.html
* https://www.suse.com/security/cve/CVE-2025-38105.html
* https://www.suse.com/security/cve/CVE-2025-38107.html
* https://www.suse.com/security/cve/CVE-2025-38108.html
* https://www.suse.com/security/cve/CVE-2025-38109.html
* https://www.suse.com/security/cve/CVE-2025-38110.html
* https://www.suse.com/security/cve/CVE-2025-38111.html
* https://www.suse.com/security/cve/CVE-2025-38112.html
* https://www.suse.com/security/cve/CVE-2025-38113.html
* https://www.suse.com/security/cve/CVE-2025-38115.html
* https://www.suse.com/security/cve/CVE-2025-38117.html
* https://www.suse.com/security/cve/CVE-2025-38118.html
* https://www.suse.com/security/cve/CVE-2025-38120.html
* https://www.suse.com/security/cve/CVE-2025-38122.html
* https://www.suse.com/security/cve/CVE-2025-38123.html
* https://www.suse.com/security/cve/CVE-2025-38124.html
* https://www.suse.com/security/cve/CVE-2025-38126.html
* https://www.suse.com/security/cve/CVE-2025-38127.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://www.suse.com/security/cve/CVE-2025-38131.html
* https://www.suse.com/security/cve/CVE-2025-38132.html
* https://www.suse.com/security/cve/CVE-2025-38135.html
* https://www.suse.com/security/cve/CVE-2025-38136.html
* https://www.suse.com/security/cve/CVE-2025-38138.html
* https://www.suse.com/security/cve/CVE-2025-38142.html
* https://www.suse.com/security/cve/CVE-2025-38143.html
* https://www.suse.com/security/cve/CVE-2025-38145.html
* https://www.suse.com/security/cve/CVE-2025-38147.html
* https://www.suse.com/security/cve/CVE-2025-38148.html
* https://www.suse.com/security/cve/CVE-2025-38149.html
* https://www.suse.com/security/cve/CVE-2025-38151.html
* https://www.suse.com/security/cve/CVE-2025-38153.html
* https://www.suse.com/security/cve/CVE-2025-38154.html
* https://www.suse.com/security/cve/CVE-2025-38155.html
* https://www.suse.com/security/cve/CVE-2025-38157.html
* https://www.suse.com/security/cve/CVE-2025-38158.html
* https://www.suse.com/security/cve/CVE-2025-38159.html
* https://www.suse.com/security/cve/CVE-2025-38161.html
* https://www.suse.com/security/cve/CVE-2025-38162.html
* https://www.suse.com/security/cve/CVE-2025-38165.html
* https://www.suse.com/security/cve/CVE-2025-38166.html
* https://www.suse.com/security/cve/CVE-2025-38173.html
* https://www.suse.com/security/cve/CVE-2025-38174.html
* https://www.suse.com/security/cve/CVE-2025-38177.html
* https://www.suse.com/security/cve/CVE-2025-38180.html
* https://www.suse.com/security/cve/CVE-2025-38181.html
* https://www.suse.com/security/cve/CVE-2025-38182.html
* https://www.suse.com/security/cve/CVE-2025-38183.html
* https://www.suse.com/security/cve/CVE-2025-38187.html
* https://www.suse.com/security/cve/CVE-2025-38188.html
* https://www.suse.com/security/cve/CVE-2025-38192.html
* https://www.suse.com/security/cve/CVE-2025-38193.html
* https://www.suse.com/security/cve/CVE-2025-38194.html
* https://www.suse.com/security/cve/CVE-2025-38197.html
* https://www.suse.com/security/cve/CVE-2025-38198.html
* https://www.suse.com/security/cve/CVE-2025-38200.html
* https://www.suse.com/security/cve/CVE-2025-38202.html
* https://www.suse.com/security/cve/CVE-2025-38203.html
* https://www.suse.com/security/cve/CVE-2025-38204.html
* https://www.suse.com/security/cve/CVE-2025-38206.html
* https://www.suse.com/security/cve/CVE-2025-38210.html
* https://www.suse.com/security/cve/CVE-2025-38211.html
* https://www.suse.com/security/cve/CVE-2025-38212.html
* https://www.suse.com/security/cve/CVE-2025-38213.html
* https://www.suse.com/security/cve/CVE-2025-38214.html
* https://www.suse.com/security/cve/CVE-2025-38215.html
* https://www.suse.com/security/cve/CVE-2025-38217.html
* https://www.suse.com/security/cve/CVE-2025-38220.html
* https://www.suse.com/security/cve/CVE-2025-38222.html
* https://www.suse.com/security/cve/CVE-2025-38225.html
* https://www.suse.com/security/cve/CVE-2025-38226.html
* https://www.suse.com/security/cve/CVE-2025-38227.html
* https://www.suse.com/security/cve/CVE-2025-38229.html
* https://www.suse.com/security/cve/CVE-2025-38231.html
* https://www.suse.com/security/cve/CVE-2025-38236.html
* https://www.suse.com/security/cve/CVE-2025-38239.html
* https://www.suse.com/security/cve/CVE-2025-38240.html
* https://www.suse.com/security/cve/CVE-2025-38244.html
* https://www.suse.com/security/cve/CVE-2025-38246.html
* https://www.suse.com/security/cve/CVE-2025-38248.html
* https://www.suse.com/security/cve/CVE-2025-38249.html
* https://www.suse.com/security/cve/CVE-2025-38250.html
* https://www.suse.com/security/cve/CVE-2025-38257.html
* https://www.suse.com/security/cve/CVE-2025-38259.html
* https://www.suse.com/security/cve/CVE-2025-38264.html
* https://www.suse.com/security/cve/CVE-2025-38272.html
* https://www.suse.com/security/cve/CVE-2025-38273.html
* https://www.suse.com/security/cve/CVE-2025-38275.html
* https://www.suse.com/security/cve/CVE-2025-38277.html
* https://www.suse.com/security/cve/CVE-2025-38279.html
* https://www.suse.com/security/cve/CVE-2025-38283.html
* https://www.suse.com/security/cve/CVE-2025-38286.html
* https://www.suse.com/security/cve/CVE-2025-38289.html
* https://www.suse.com/security/cve/CVE-2025-38290.html
* https://www.suse.com/security/cve/CVE-2025-38292.html
* https://www.suse.com/security/cve/CVE-2025-38293.html
* https://www.suse.com/security/cve/CVE-2025-38300.html
* https://www.suse.com/security/cve/CVE-2025-38303.html
* https://www.suse.com/security/cve/CVE-2025-38304.html
* https://www.suse.com/security/cve/CVE-2025-38305.html
* https://www.suse.com/security/cve/CVE-2025-38307.html
* https://www.suse.com/security/cve/CVE-2025-38310.html
* https://www.suse.com/security/cve/CVE-2025-38312.html
* https://www.suse.com/security/cve/CVE-2025-38313.html
* https://www.suse.com/security/cve/CVE-2025-38319.html
* https://www.suse.com/security/cve/CVE-2025-38323.html
* https://www.suse.com/security/cve/CVE-2025-38326.html
* https://www.suse.com/security/cve/CVE-2025-38328.html
* https://www.suse.com/security/cve/CVE-2025-38332.html
* https://www.suse.com/security/cve/CVE-2025-38334.html
* https://www.suse.com/security/cve/CVE-2025-38335.html
* https://www.suse.com/security/cve/CVE-2025-38336.html
* https://www.suse.com/security/cve/CVE-2025-38337.html
* https://www.suse.com/security/cve/CVE-2025-38338.html
* https://www.suse.com/security/cve/CVE-2025-38342.html
* https://www.suse.com/security/cve/CVE-2025-38343.html
* https://www.suse.com/security/cve/CVE-2025-38344.html
* https://www.suse.com/security/cve/CVE-2025-38345.html
* https://www.suse.com/security/cve/CVE-2025-38348.html
* https://www.suse.com/security/cve/CVE-2025-38349.html
* https://www.suse.com/security/cve/CVE-2025-38350.html
* https://www.suse.com/security/cve/CVE-2025-38352.html
* https://www.suse.com/security/cve/CVE-2025-38354.html
* https://www.suse.com/security/cve/CVE-2025-38362.html
* https://www.suse.com/security/cve/CVE-2025-38363.html
* https://www.suse.com/security/cve/CVE-2025-38364.html
* https://www.suse.com/security/cve/CVE-2025-38365.html
* https://www.suse.com/security/cve/CVE-2025-38369.html
* https://www.suse.com/security/cve/CVE-2025-38371.html
* https://www.suse.com/security/cve/CVE-2025-38373.html
* https://www.suse.com/security/cve/CVE-2025-38375.html
* https://www.suse.com/security/cve/CVE-2025-38376.html
* https://www.suse.com/security/cve/CVE-2025-38377.html
* https://www.suse.com/security/cve/CVE-2025-38380.html
* https://www.suse.com/security/cve/CVE-2025-38382.html
* https://www.suse.com/security/cve/CVE-2025-38384.html
* https://www.suse.com/security/cve/CVE-2025-38385.html
* https://www.suse.com/security/cve/CVE-2025-38386.html
* https://www.suse.com/security/cve/CVE-2025-38387.html
* https://www.suse.com/security/cve/CVE-2025-38389.html
* https://www.suse.com/security/cve/CVE-2025-38391.html
* https://www.suse.com/security/cve/CVE-2025-38392.html
* https://www.suse.com/security/cve/CVE-2025-38393.html
* https://www.suse.com/security/cve/CVE-2025-38395.html
* https://www.suse.com/security/cve/CVE-2025-38396.html
* https://www.suse.com/security/cve/CVE-2025-38399.html
* https://www.suse.com/security/cve/CVE-2025-38400.html
* https://www.suse.com/security/cve/CVE-2025-38401.html
* https://www.suse.com/security/cve/CVE-2025-38403.html
* https://www.suse.com/security/cve/CVE-2025-38404.html
* https://www.suse.com/security/cve/CVE-2025-38406.html
* https://www.suse.com/security/cve/CVE-2025-38409.html
* https://www.suse.com/security/cve/CVE-2025-38410.html
* https://www.suse.com/security/cve/CVE-2025-38412.html
* https://www.suse.com/security/cve/CVE-2025-38414.html
* https://www.suse.com/security/cve/CVE-2025-38415.html
* https://www.suse.com/security/cve/CVE-2025-38416.html
* https://www.suse.com/security/cve/CVE-2025-38420.html
* https://www.suse.com/security/cve/CVE-2025-38424.html
* https://www.suse.com/security/cve/CVE-2025-38425.html
* https://www.suse.com/security/cve/CVE-2025-38426.html
* https://www.suse.com/security/cve/CVE-2025-38428.html
* https://www.suse.com/security/cve/CVE-2025-38429.html
* https://www.suse.com/security/cve/CVE-2025-38430.html
* https://www.suse.com/security/cve/CVE-2025-38436.html
* https://www.suse.com/security/cve/CVE-2025-38443.html
* https://www.suse.com/security/cve/CVE-2025-38448.html
* https://www.suse.com/security/cve/CVE-2025-38449.html
* https://www.suse.com/security/cve/CVE-2025-38455.html
* https://www.suse.com/security/cve/CVE-2025-38457.html
* https://www.suse.com/security/cve/CVE-2025-38460.html
* https://www.suse.com/security/cve/CVE-2025-38461.html
* https://www.suse.com/security/cve/CVE-2025-38462.html
* https://www.suse.com/security/cve/CVE-2025-38463.html
* https://www.suse.com/security/cve/CVE-2025-38465.html
* https://www.suse.com/security/cve/CVE-2025-38467.html
* https://www.suse.com/security/cve/CVE-2025-38468.html
* https://www.suse.com/security/cve/CVE-2025-38470.html
* https://www.suse.com/security/cve/CVE-2025-38471.html
* https://www.suse.com/security/cve/CVE-2025-38473.html
* https://www.suse.com/security/cve/CVE-2025-38474.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38477.html
* https://www.suse.com/security/cve/CVE-2025-38478.html
* https://www.suse.com/security/cve/CVE-2025-38480.html
* https://www.suse.com/security/cve/CVE-2025-38481.html
* https://www.suse.com/security/cve/CVE-2025-38482.html
* https://www.suse.com/security/cve/CVE-2025-38483.html
* https://www.suse.com/security/cve/CVE-2025-38485.html
* https://www.suse.com/security/cve/CVE-2025-38487.html
* https://www.suse.com/security/cve/CVE-2025-38489.html
* https://www.suse.com/security/cve/CVE-2025-38490.html
* https://www.suse.com/security/cve/CVE-2025-38494.html
* https://www.suse.com/security/cve/CVE-2025-38495.html
* https://www.suse.com/security/cve/CVE-2025-38496.html
* https://www.suse.com/security/cve/CVE-2025-38497.html
* https://www.suse.com/security/cve/CVE-2025-38498.html
* https://www.suse.com/security/cve/CVE-2025-39735.html
* https://www.suse.com/security/cve/CVE-2025-40014.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1139073
* https://bugzilla.suse.com/show_bug.cgi?id=1204142
* https://bugzilla.suse.com/show_bug.cgi?id=1210025
* https://bugzilla.suse.com/show_bug.cgi?id=1211226
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1218184
* https://bugzilla.suse.com/show_bug.cgi?id=1219338
* https://bugzilla.suse.com/show_bug.cgi?id=1220112
* https://bugzilla.suse.com/show_bug.cgi?id=1223008
* https://bugzilla.suse.com/show_bug.cgi?id=1225707
* https://bugzilla.suse.com/show_bug.cgi?id=1226498
* https://bugzilla.suse.com/show_bug.cgi?id=1228557
* https://bugzilla.suse.com/show_bug.cgi?id=1228854
* https://bugzilla.suse.com/show_bug.cgi?id=1229491
* https://bugzilla.suse.com/show_bug.cgi?id=1230216
* https://bugzilla.suse.com/show_bug.cgi?id=1232504
* https://bugzilla.suse.com/show_bug.cgi?id=1232882
* https://bugzilla.suse.com/show_bug.cgi?id=1233300
* https://bugzilla.suse.com/show_bug.cgi?id=1235490
* https://bugzilla.suse.com/show_bug.cgi?id=1235613
* https://bugzilla.suse.com/show_bug.cgi?id=1235728
* https://bugzilla.suse.com/show_bug.cgi?id=1235837
* https://bugzilla.suse.com/show_bug.cgi?id=1235968
* https://bugzilla.suse.com/show_bug.cgi?id=1236208
* https://bugzilla.suse.com/show_bug.cgi?id=1236333
* https://bugzilla.suse.com/show_bug.cgi?id=1236897
* https://bugzilla.suse.com/show_bug.cgi?id=1237312
* https://bugzilla.suse.com/show_bug.cgi?id=1237913
* https://bugzilla.suse.com/show_bug.cgi?id=1238212
* https://bugzilla.suse.com/show_bug.cgi?id=1238859
* https://bugzilla.suse.com/show_bug.cgi?id=1238896
* https://bugzilla.suse.com/show_bug.cgi?id=1238982
* https://bugzilla.suse.com/show_bug.cgi?id=1239061
* https://bugzilla.suse.com/show_bug.cgi?id=1239470
* https://bugzilla.suse.com/show_bug.cgi?id=1239925
* https://bugzilla.suse.com/show_bug.cgi?id=1240180
* https://bugzilla.suse.com/show_bug.cgi?id=1240323
* https://bugzilla.suse.com/show_bug.cgi?id=1240577
* https://bugzilla.suse.com/show_bug.cgi?id=1240610
* https://bugzilla.suse.com/show_bug.cgi?id=1240686
* https://bugzilla.suse.com/show_bug.cgi?id=1240723
* https://bugzilla.suse.com/show_bug.cgi?id=1240814
* https://bugzilla.suse.com/show_bug.cgi?id=1240823
* https://bugzilla.suse.com/show_bug.cgi?id=1240866
* https://bugzilla.suse.com/show_bug.cgi?id=1240885
* https://bugzilla.suse.com/show_bug.cgi?id=1240966
* https://bugzilla.suse.com/show_bug.cgi?id=1241166
* https://bugzilla.suse.com/show_bug.cgi?id=1241278
* https://bugzilla.suse.com/show_bug.cgi?id=1241340
* https://bugzilla.suse.com/show_bug.cgi?id=1241345
* https://bugzilla.suse.com/show_bug.cgi?id=1241414
* https://bugzilla.suse.com/show_bug.cgi?id=1241457
* https://bugzilla.suse.com/show_bug.cgi?id=1241492
* https://bugzilla.suse.com/show_bug.cgi?id=1241519
* https://bugzilla.suse.com/show_bug.cgi?id=1241537
* https://bugzilla.suse.com/show_bug.cgi?id=1241538
* https://bugzilla.suse.com/show_bug.cgi?id=1241544
* https://bugzilla.suse.com/show_bug.cgi?id=1241572
* https://bugzilla.suse.com/show_bug.cgi?id=1241576
* https://bugzilla.suse.com/show_bug.cgi?id=1241590
* https://bugzilla.suse.com/show_bug.cgi?id=1241592
* https://bugzilla.suse.com/show_bug.cgi?id=1241595
* https://bugzilla.suse.com/show_bug.cgi?id=1241617
* https://bugzilla.suse.com/show_bug.cgi?id=1241625
* https://bugzilla.suse.com/show_bug.cgi?id=1241635
* https://bugzilla.suse.com/show_bug.cgi?id=1241644
* https://bugzilla.suse.com/show_bug.cgi?id=1241654
* https://bugzilla.suse.com/show_bug.cgi?id=1242035
* https://bugzilla.suse.com/show_bug.cgi?id=1242044
* https://bugzilla.suse.com/show_bug.cgi?id=1242086
* https://bugzilla.suse.com/show_bug.cgi?id=1242163
* https://bugzilla.suse.com/show_bug.cgi?id=1242343
* https://bugzilla.suse.com/show_bug.cgi?id=1242414
* https://bugzilla.suse.com/show_bug.cgi?id=1242501
* https://bugzilla.suse.com/show_bug.cgi?id=1242504
* https://bugzilla.suse.com/show_bug.cgi?id=1242512
* https://bugzilla.suse.com/show_bug.cgi?id=1242514
* https://bugzilla.suse.com/show_bug.cgi?id=1242515
* https://bugzilla.suse.com/show_bug.cgi?id=1242520
* https://bugzilla.suse.com/show_bug.cgi?id=1242521
* https://bugzilla.suse.com/show_bug.cgi?id=1242524
* https://bugzilla.suse.com/show_bug.cgi?id=1242529
* https://bugzilla.suse.com/show_bug.cgi?id=1242530
* https://bugzilla.suse.com/show_bug.cgi?id=1242531
* https://bugzilla.suse.com/show_bug.cgi?id=1242532
* https://bugzilla.suse.com/show_bug.cgi?id=1242556
* https://bugzilla.suse.com/show_bug.cgi?id=1242559
* https://bugzilla.suse.com/show_bug.cgi?id=1242563
* https://bugzilla.suse.com/show_bug.cgi?id=1242564
* https://bugzilla.suse.com/show_bug.cgi?id=1242565
* https://bugzilla.suse.com/show_bug.cgi?id=1242566
* https://bugzilla.suse.com/show_bug.cgi?id=1242567
* https://bugzilla.suse.com/show_bug.cgi?id=1242568
* https://bugzilla.suse.com/show_bug.cgi?id=1242569
* https://bugzilla.suse.com/show_bug.cgi?id=1242573
* https://bugzilla.suse.com/show_bug.cgi?id=1242574
* https://bugzilla.suse.com/show_bug.cgi?id=1242575
* https://bugzilla.suse.com/show_bug.cgi?id=1242578
* https://bugzilla.suse.com/show_bug.cgi?id=1242584
* https://bugzilla.suse.com/show_bug.cgi?id=1242587
* https://bugzilla.suse.com/show_bug.cgi?id=1242591
* https://bugzilla.suse.com/show_bug.cgi?id=1242709
* https://bugzilla.suse.com/show_bug.cgi?id=1242725
* https://bugzilla.suse.com/show_bug.cgi?id=1242727
* https://bugzilla.suse.com/show_bug.cgi?id=1242758
* https://bugzilla.suse.com/show_bug.cgi?id=1242760
* https://bugzilla.suse.com/show_bug.cgi?id=1242761
* https://bugzilla.suse.com/show_bug.cgi?id=1242764
* https://bugzilla.suse.com/show_bug.cgi?id=1242766
* https://bugzilla.suse.com/show_bug.cgi?id=1242770
* https://bugzilla.suse.com/show_bug.cgi?id=1242781
* https://bugzilla.suse.com/show_bug.cgi?id=1242782
* https://bugzilla.suse.com/show_bug.cgi?id=1242785
* https://bugzilla.suse.com/show_bug.cgi?id=1242792
* https://bugzilla.suse.com/show_bug.cgi?id=1242837
* https://bugzilla.suse.com/show_bug.cgi?id=1242846
* https://bugzilla.suse.com/show_bug.cgi?id=1242849
* https://bugzilla.suse.com/show_bug.cgi?id=1242850
* https://bugzilla.suse.com/show_bug.cgi?id=1242871
* https://bugzilla.suse.com/show_bug.cgi?id=1242873
* https://bugzilla.suse.com/show_bug.cgi?id=1242906
* https://bugzilla.suse.com/show_bug.cgi?id=1242907
* https://bugzilla.suse.com/show_bug.cgi?id=1242908
* https://bugzilla.suse.com/show_bug.cgi?id=1242930
* https://bugzilla.suse.com/show_bug.cgi?id=1242940
* https://bugzilla.suse.com/show_bug.cgi?id=1242945
* https://bugzilla.suse.com/show_bug.cgi?id=1242946
* https://bugzilla.suse.com/show_bug.cgi?id=1242948
* https://bugzilla.suse.com/show_bug.cgi?id=1242949
* https://bugzilla.suse.com/show_bug.cgi?id=1242953
* https://bugzilla.suse.com/show_bug.cgi?id=1242954
* https://bugzilla.suse.com/show_bug.cgi?id=1242955
* https://bugzilla.suse.com/show_bug.cgi?id=1242957
* https://bugzilla.suse.com/show_bug.cgi?id=1242959
* https://bugzilla.suse.com/show_bug.cgi?id=1242960
* https://bugzilla.suse.com/show_bug.cgi?id=1242961
* https://bugzilla.suse.com/show_bug.cgi?id=1242965
* https://bugzilla.suse.com/show_bug.cgi?id=1242973
* https://bugzilla.suse.com/show_bug.cgi?id=1242974
* https://bugzilla.suse.com/show_bug.cgi?id=1242977
* https://bugzilla.suse.com/show_bug.cgi?id=1242982
* https://bugzilla.suse.com/show_bug.cgi?id=1242990
* https://bugzilla.suse.com/show_bug.cgi?id=1242993
* https://bugzilla.suse.com/show_bug.cgi?id=1243000
* https://bugzilla.suse.com/show_bug.cgi?id=1243006
* https://bugzilla.suse.com/show_bug.cgi?id=1243011
* https://bugzilla.suse.com/show_bug.cgi?id=1243015
* https://bugzilla.suse.com/show_bug.cgi?id=1243049
* https://bugzilla.suse.com/show_bug.cgi?id=1243051
* https://bugzilla.suse.com/show_bug.cgi?id=1243060
* https://bugzilla.suse.com/show_bug.cgi?id=1243068
* https://bugzilla.suse.com/show_bug.cgi?id=1243074
* https://bugzilla.suse.com/show_bug.cgi?id=1243076
* https://bugzilla.suse.com/show_bug.cgi?id=1243082
* https://bugzilla.suse.com/show_bug.cgi?id=1243100
* https://bugzilla.suse.com/show_bug.cgi?id=1243330
* https://bugzilla.suse.com/show_bug.cgi?id=1243342
* https://bugzilla.suse.com/show_bug.cgi?id=1243456
* https://bugzilla.suse.com/show_bug.cgi?id=1243467
* https://bugzilla.suse.com/show_bug.cgi?id=1243469
* https://bugzilla.suse.com/show_bug.cgi?id=1243470
* https://bugzilla.suse.com/show_bug.cgi?id=1243471
* https://bugzilla.suse.com/show_bug.cgi?id=1243472
* https://bugzilla.suse.com/show_bug.cgi?id=1243473
* https://bugzilla.suse.com/show_bug.cgi?id=1243475
* https://bugzilla.suse.com/show_bug.cgi?id=1243476
* https://bugzilla.suse.com/show_bug.cgi?id=1243479
* https://bugzilla.suse.com/show_bug.cgi?id=1243480
* https://bugzilla.suse.com/show_bug.cgi?id=1243506
* https://bugzilla.suse.com/show_bug.cgi?id=1243509
* https://bugzilla.suse.com/show_bug.cgi?id=1243511
* https://bugzilla.suse.com/show_bug.cgi?id=1243515
* https://bugzilla.suse.com/show_bug.cgi?id=1243516
* https://bugzilla.suse.com/show_bug.cgi?id=1243517
* https://bugzilla.suse.com/show_bug.cgi?id=1243522
* https://bugzilla.suse.com/show_bug.cgi?id=1243523
* https://bugzilla.suse.com/show_bug.cgi?id=1243524
* https://bugzilla.suse.com/show_bug.cgi?id=1243528
* https://bugzilla.suse.com/show_bug.cgi?id=1243529
* https://bugzilla.suse.com/show_bug.cgi?id=1243530
* https://bugzilla.suse.com/show_bug.cgi?id=1243534
* https://bugzilla.suse.com/show_bug.cgi?id=1243536
* https://bugzilla.suse.com/show_bug.cgi?id=1243537
* https://bugzilla.suse.com/show_bug.cgi?id=1243538
* https://bugzilla.suse.com/show_bug.cgi?id=1243540
* https://bugzilla.suse.com/show_bug.cgi?id=1243542
* https://bugzilla.suse.com/show_bug.cgi?id=1243543
* https://bugzilla.suse.com/show_bug.cgi?id=1243544
* https://bugzilla.suse.com/show_bug.cgi?id=1243545
* https://bugzilla.suse.com/show_bug.cgi?id=1243551
* https://bugzilla.suse.com/show_bug.cgi?id=1243559
* https://bugzilla.suse.com/show_bug.cgi?id=1243560
* https://bugzilla.suse.com/show_bug.cgi?id=1243562
* https://bugzilla.suse.com/show_bug.cgi?id=1243567
* https://bugzilla.suse.com/show_bug.cgi?id=1243571
* https://bugzilla.suse.com/show_bug.cgi?id=1243572
* https://bugzilla.suse.com/show_bug.cgi?id=1243573
* https://bugzilla.suse.com/show_bug.cgi?id=1243574
* https://bugzilla.suse.com/show_bug.cgi?id=1243575
* https://bugzilla.suse.com/show_bug.cgi?id=1243589
* https://bugzilla.suse.com/show_bug.cgi?id=1243620
* https://bugzilla.suse.com/show_bug.cgi?id=1243621
* https://bugzilla.suse.com/show_bug.cgi?id=1243624
* https://bugzilla.suse.com/show_bug.cgi?id=1243625
* https://bugzilla.suse.com/show_bug.cgi?id=1243626
* https://bugzilla.suse.com/show_bug.cgi?id=1243627
* https://bugzilla.suse.com/show_bug.cgi?id=1243628
* https://bugzilla.suse.com/show_bug.cgi?id=1243649
* https://bugzilla.suse.com/show_bug.cgi?id=1243659
* https://bugzilla.suse.com/show_bug.cgi?id=1243660
* https://bugzilla.suse.com/show_bug.cgi?id=1243664
* https://bugzilla.suse.com/show_bug.cgi?id=1243669
* https://bugzilla.suse.com/show_bug.cgi?id=1243698
* https://bugzilla.suse.com/show_bug.cgi?id=1243774
* https://bugzilla.suse.com/show_bug.cgi?id=1243782
* https://bugzilla.suse.com/show_bug.cgi?id=1243806
* https://bugzilla.suse.com/show_bug.cgi?id=1243823
* https://bugzilla.suse.com/show_bug.cgi?id=1243827
* https://bugzilla.suse.com/show_bug.cgi?id=1243832
* https://bugzilla.suse.com/show_bug.cgi?id=1243836
* https://bugzilla.suse.com/show_bug.cgi?id=1243847
* https://bugzilla.suse.com/show_bug.cgi?id=1244100
* https://bugzilla.suse.com/show_bug.cgi?id=1244145
* https://bugzilla.suse.com/show_bug.cgi?id=1244172
* https://bugzilla.suse.com/show_bug.cgi?id=1244176
* https://bugzilla.suse.com/show_bug.cgi?id=1244229
* https://bugzilla.suse.com/show_bug.cgi?id=1244234
* https://bugzilla.suse.com/show_bug.cgi?id=1244241
* https://bugzilla.suse.com/show_bug.cgi?id=1244261
* https://bugzilla.suse.com/show_bug.cgi?id=1244274
* https://bugzilla.suse.com/show_bug.cgi?id=1244275
* https://bugzilla.suse.com/show_bug.cgi?id=1244277
* https://bugzilla.suse.com/show_bug.cgi?id=1244309
* https://bugzilla.suse.com/show_bug.cgi?id=1244313
* https://bugzilla.suse.com/show_bug.cgi?id=1244337
* https://bugzilla.suse.com/show_bug.cgi?id=1244457
* https://bugzilla.suse.com/show_bug.cgi?id=1244626
* https://bugzilla.suse.com/show_bug.cgi?id=1244725
* https://bugzilla.suse.com/show_bug.cgi?id=1244727
* https://bugzilla.suse.com/show_bug.cgi?id=1244729
* https://bugzilla.suse.com/show_bug.cgi?id=1244731
* https://bugzilla.suse.com/show_bug.cgi?id=1244732
* https://bugzilla.suse.com/show_bug.cgi?id=1244735
* https://bugzilla.suse.com/show_bug.cgi?id=1244736
* https://bugzilla.suse.com/show_bug.cgi?id=1244737
* https://bugzilla.suse.com/show_bug.cgi?id=1244738
* https://bugzilla.suse.com/show_bug.cgi?id=1244739
* https://bugzilla.suse.com/show_bug.cgi?id=1244743
* https://bugzilla.suse.com/show_bug.cgi?id=1244746
* https://bugzilla.suse.com/show_bug.cgi?id=1244749
* https://bugzilla.suse.com/show_bug.cgi?id=1244750
* https://bugzilla.suse.com/show_bug.cgi?id=1244759
* https://bugzilla.suse.com/show_bug.cgi?id=1244789
* https://bugzilla.suse.com/show_bug.cgi?id=1244792
* https://bugzilla.suse.com/show_bug.cgi?id=1244801
* https://bugzilla.suse.com/show_bug.cgi?id=1244862
* https://bugzilla.suse.com/show_bug.cgi?id=1244906
* https://bugzilla.suse.com/show_bug.cgi?id=1244938
* https://bugzilla.suse.com/show_bug.cgi?id=1244995
* https://bugzilla.suse.com/show_bug.cgi?id=1244996
* https://bugzilla.suse.com/show_bug.cgi?id=1244999
* https://bugzilla.suse.com/show_bug.cgi?id=1245001
* https://bugzilla.suse.com/show_bug.cgi?id=1245003
* https://bugzilla.suse.com/show_bug.cgi?id=1245004
* https://bugzilla.suse.com/show_bug.cgi?id=1245025
* https://bugzilla.suse.com/show_bug.cgi?id=1245042
* https://bugzilla.suse.com/show_bug.cgi?id=1245046
* https://bugzilla.suse.com/show_bug.cgi?id=1245078
* https://bugzilla.suse.com/show_bug.cgi?id=1245081
* https://bugzilla.suse.com/show_bug.cgi?id=1245082
* https://bugzilla.suse.com/show_bug.cgi?id=1245083
* https://bugzilla.suse.com/show_bug.cgi?id=1245151
* https://bugzilla.suse.com/show_bug.cgi?id=1245155
* https://bugzilla.suse.com/show_bug.cgi?id=1245183
* https://bugzilla.suse.com/show_bug.cgi?id=1245193
* https://bugzilla.suse.com/show_bug.cgi?id=1245201
* https://bugzilla.suse.com/show_bug.cgi?id=1245202
* https://bugzilla.suse.com/show_bug.cgi?id=1245210
* https://bugzilla.suse.com/show_bug.cgi?id=1245216
* https://bugzilla.suse.com/show_bug.cgi?id=1245217
* https://bugzilla.suse.com/show_bug.cgi?id=1245225
* https://bugzilla.suse.com/show_bug.cgi?id=1245226
* https://bugzilla.suse.com/show_bug.cgi?id=1245228
* https://bugzilla.suse.com/show_bug.cgi?id=1245260
* https://bugzilla.suse.com/show_bug.cgi?id=1245431
* https://bugzilla.suse.com/show_bug.cgi?id=1245440
* https://bugzilla.suse.com/show_bug.cgi?id=1245455
* https://bugzilla.suse.com/show_bug.cgi?id=1245457
* https://bugzilla.suse.com/show_bug.cgi?id=1245498
* https://bugzilla.suse.com/show_bug.cgi?id=1245499
* https://bugzilla.suse.com/show_bug.cgi?id=1245504
* https://bugzilla.suse.com/show_bug.cgi?id=1245506
* https://bugzilla.suse.com/show_bug.cgi?id=1245508
* https://bugzilla.suse.com/show_bug.cgi?id=1245510
* https://bugzilla.suse.com/show_bug.cgi?id=1245540
* https://bugzilla.suse.com/show_bug.cgi?id=1245598
* https://bugzilla.suse.com/show_bug.cgi?id=1245599
* https://bugzilla.suse.com/show_bug.cgi?id=1245646
* https://bugzilla.suse.com/show_bug.cgi?id=1245647
* https://bugzilla.suse.com/show_bug.cgi?id=1245649
* https://bugzilla.suse.com/show_bug.cgi?id=1245650
* https://bugzilla.suse.com/show_bug.cgi?id=1245654
* https://bugzilla.suse.com/show_bug.cgi?id=1245658
* https://bugzilla.suse.com/show_bug.cgi?id=1245660
* https://bugzilla.suse.com/show_bug.cgi?id=1245665
* https://bugzilla.suse.com/show_bug.cgi?id=1245666
* https://bugzilla.suse.com/show_bug.cgi?id=1245668
* https://bugzilla.suse.com/show_bug.cgi?id=1245669
* https://bugzilla.suse.com/show_bug.cgi?id=1245670
* https://bugzilla.suse.com/show_bug.cgi?id=1245671
* https://bugzilla.suse.com/show_bug.cgi?id=1245675
* https://bugzilla.suse.com/show_bug.cgi?id=1245676
* https://bugzilla.suse.com/show_bug.cgi?id=1245677
* https://bugzilla.suse.com/show_bug.cgi?id=1245679
* https://bugzilla.suse.com/show_bug.cgi?id=1245682
* https://bugzilla.suse.com/show_bug.cgi?id=1245683
* https://bugzilla.suse.com/show_bug.cgi?id=1245684
* https://bugzilla.suse.com/show_bug.cgi?id=1245688
* https://bugzilla.suse.com/show_bug.cgi?id=1245689
* https://bugzilla.suse.com/show_bug.cgi?id=1245690
* https://bugzilla.suse.com/show_bug.cgi?id=1245691
* https://bugzilla.suse.com/show_bug.cgi?id=1245695
* https://bugzilla.suse.com/show_bug.cgi?id=1245705
* https://bugzilla.suse.com/show_bug.cgi?id=1245708
* https://bugzilla.suse.com/show_bug.cgi?id=1245711
* https://bugzilla.suse.com/show_bug.cgi?id=1245713
* https://bugzilla.suse.com/show_bug.cgi?id=1245714
* https://bugzilla.suse.com/show_bug.cgi?id=1245719
* https://bugzilla.suse.com/show_bug.cgi?id=1245723
* https://bugzilla.suse.com/show_bug.cgi?id=1245729
* https://bugzilla.suse.com/show_bug.cgi?id=1245730
* https://bugzilla.suse.com/show_bug.cgi?id=1245731
* https://bugzilla.suse.com/show_bug.cgi?id=1245735
* https://bugzilla.suse.com/show_bug.cgi?id=1245737
* https://bugzilla.suse.com/show_bug.cgi?id=1245744
* https://bugzilla.suse.com/show_bug.cgi?id=1245745
* https://bugzilla.suse.com/show_bug.cgi?id=1245746
* https://bugzilla.suse.com/show_bug.cgi?id=1245747
* https://bugzilla.suse.com/show_bug.cgi?id=1245748
* https://bugzilla.suse.com/show_bug.cgi?id=1245749
* https://bugzilla.suse.com/show_bug.cgi?id=1245750
* https://bugzilla.suse.com/show_bug.cgi?id=1245751
* https://bugzilla.suse.com/show_bug.cgi?id=1245752
* https://bugzilla.suse.com/show_bug.cgi?id=1245757
* https://bugzilla.suse.com/show_bug.cgi?id=1245758
* https://bugzilla.suse.com/show_bug.cgi?id=1245765
* https://bugzilla.suse.com/show_bug.cgi?id=1245768
* https://bugzilla.suse.com/show_bug.cgi?id=1245769
* https://bugzilla.suse.com/show_bug.cgi?id=1245777
* https://bugzilla.suse.com/show_bug.cgi?id=1245781
* https://bugzilla.suse.com/show_bug.cgi?id=1245789
* https://bugzilla.suse.com/show_bug.cgi?id=1245937
* https://bugzilla.suse.com/show_bug.cgi?id=1245945
* https://bugzilla.suse.com/show_bug.cgi?id=1245951
* https://bugzilla.suse.com/show_bug.cgi?id=1245952
* https://bugzilla.suse.com/show_bug.cgi?id=1245954
* https://bugzilla.suse.com/show_bug.cgi?id=1245957
* https://bugzilla.suse.com/show_bug.cgi?id=1245966
* https://bugzilla.suse.com/show_bug.cgi?id=1245970
* https://bugzilla.suse.com/show_bug.cgi?id=1245976
* https://bugzilla.suse.com/show_bug.cgi?id=1245980
* https://bugzilla.suse.com/show_bug.cgi?id=1245983
* https://bugzilla.suse.com/show_bug.cgi?id=1245986
* https://bugzilla.suse.com/show_bug.cgi?id=1246000
* https://bugzilla.suse.com/show_bug.cgi?id=1246002
* https://bugzilla.suse.com/show_bug.cgi?id=1246006
* https://bugzilla.suse.com/show_bug.cgi?id=1246008
* https://bugzilla.suse.com/show_bug.cgi?id=1246020
* https://bugzilla.suse.com/show_bug.cgi?id=1246023
* https://bugzilla.suse.com/show_bug.cgi?id=1246029
* https://bugzilla.suse.com/show_bug.cgi?id=1246031
* https://bugzilla.suse.com/show_bug.cgi?id=1246037
* https://bugzilla.suse.com/show_bug.cgi?id=1246041
* https://bugzilla.suse.com/show_bug.cgi?id=1246042
* https://bugzilla.suse.com/show_bug.cgi?id=1246044
* https://bugzilla.suse.com/show_bug.cgi?id=1246045
* https://bugzilla.suse.com/show_bug.cgi?id=1246047
* https://bugzilla.suse.com/show_bug.cgi?id=1246049
* https://bugzilla.suse.com/show_bug.cgi?id=1246050
* https://bugzilla.suse.com/show_bug.cgi?id=1246055
* https://bugzilla.suse.com/show_bug.cgi?id=1246073
* https://bugzilla.suse.com/show_bug.cgi?id=1246093
* https://bugzilla.suse.com/show_bug.cgi?id=1246098
* https://bugzilla.suse.com/show_bug.cgi?id=1246109
* https://bugzilla.suse.com/show_bug.cgi?id=1246122
* https://bugzilla.suse.com/show_bug.cgi?id=1246125
* https://bugzilla.suse.com/show_bug.cgi?id=1246171
* https://bugzilla.suse.com/show_bug.cgi?id=1246173
* https://bugzilla.suse.com/show_bug.cgi?id=1246178
* https://bugzilla.suse.com/show_bug.cgi?id=1246182
* https://bugzilla.suse.com/show_bug.cgi?id=1246183
* https://bugzilla.suse.com/show_bug.cgi?id=1246186
* https://bugzilla.suse.com/show_bug.cgi?id=1246195
* https://bugzilla.suse.com/show_bug.cgi?id=1246203
* https://bugzilla.suse.com/show_bug.cgi?id=1246212
* https://bugzilla.suse.com/show_bug.cgi?id=1246220
* https://bugzilla.suse.com/show_bug.cgi?id=1246236
* https://bugzilla.suse.com/show_bug.cgi?id=1246240
* https://bugzilla.suse.com/show_bug.cgi?id=1246243
* https://bugzilla.suse.com/show_bug.cgi?id=1246246
* https://bugzilla.suse.com/show_bug.cgi?id=1246249
* https://bugzilla.suse.com/show_bug.cgi?id=1246250
* https://bugzilla.suse.com/show_bug.cgi?id=1246253
* https://bugzilla.suse.com/show_bug.cgi?id=1246258
* https://bugzilla.suse.com/show_bug.cgi?id=1246262
* https://bugzilla.suse.com/show_bug.cgi?id=1246264
* https://bugzilla.suse.com/show_bug.cgi?id=1246266
* https://bugzilla.suse.com/show_bug.cgi?id=1246268
* https://bugzilla.suse.com/show_bug.cgi?id=1246273
* https://bugzilla.suse.com/show_bug.cgi?id=1246283
* https://bugzilla.suse.com/show_bug.cgi?id=1246287
* https://bugzilla.suse.com/show_bug.cgi?id=1246292
* https://bugzilla.suse.com/show_bug.cgi?id=1246293
* https://bugzilla.suse.com/show_bug.cgi?id=1246295
* https://bugzilla.suse.com/show_bug.cgi?id=1246334
* https://bugzilla.suse.com/show_bug.cgi?id=1246337
* https://bugzilla.suse.com/show_bug.cgi?id=1246342
* https://bugzilla.suse.com/show_bug.cgi?id=1246349
* https://bugzilla.suse.com/show_bug.cgi?id=1246354
* https://bugzilla.suse.com/show_bug.cgi?id=1246358
* https://bugzilla.suse.com/show_bug.cgi?id=1246361
* https://bugzilla.suse.com/show_bug.cgi?id=1246364
* https://bugzilla.suse.com/show_bug.cgi?id=1246370
* https://bugzilla.suse.com/show_bug.cgi?id=1246375
* https://bugzilla.suse.com/show_bug.cgi?id=1246384
* https://bugzilla.suse.com/show_bug.cgi?id=1246386
* https://bugzilla.suse.com/show_bug.cgi?id=1246387
* https://bugzilla.suse.com/show_bug.cgi?id=1246438
* https://bugzilla.suse.com/show_bug.cgi?id=1246453
* https://bugzilla.suse.com/show_bug.cgi?id=1246473
* https://bugzilla.suse.com/show_bug.cgi?id=1246490
* https://bugzilla.suse.com/show_bug.cgi?id=1246506
* https://bugzilla.suse.com/show_bug.cgi?id=1246547
* https://bugzilla.suse.com/show_bug.cgi?id=1246777
* https://bugzilla.suse.com/show_bug.cgi?id=1246781
* https://bugzilla.suse.com/show_bug.cgi?id=1246870
* https://bugzilla.suse.com/show_bug.cgi?id=1246879
* https://bugzilla.suse.com/show_bug.cgi?id=1246911
* https://bugzilla.suse.com/show_bug.cgi?id=1247018
* https://bugzilla.suse.com/show_bug.cgi?id=1247023
* https://bugzilla.suse.com/show_bug.cgi?id=1247028
* https://bugzilla.suse.com/show_bug.cgi?id=1247031
* https://bugzilla.suse.com/show_bug.cgi?id=1247033
* https://bugzilla.suse.com/show_bug.cgi?id=1247035
* https://bugzilla.suse.com/show_bug.cgi?id=1247061
* https://bugzilla.suse.com/show_bug.cgi?id=1247089
* https://bugzilla.suse.com/show_bug.cgi?id=1247091
* https://bugzilla.suse.com/show_bug.cgi?id=1247097
* https://bugzilla.suse.com/show_bug.cgi?id=1247098
* https://bugzilla.suse.com/show_bug.cgi?id=1247101
* https://bugzilla.suse.com/show_bug.cgi?id=1247103
* https://bugzilla.suse.com/show_bug.cgi?id=1247104
* https://bugzilla.suse.com/show_bug.cgi?id=1247113
* https://bugzilla.suse.com/show_bug.cgi?id=1247118
* https://bugzilla.suse.com/show_bug.cgi?id=1247123
* https://bugzilla.suse.com/show_bug.cgi?id=1247125
* https://bugzilla.suse.com/show_bug.cgi?id=1247128
* https://bugzilla.suse.com/show_bug.cgi?id=1247132
* https://bugzilla.suse.com/show_bug.cgi?id=1247138
* https://bugzilla.suse.com/show_bug.cgi?id=1247141
* https://bugzilla.suse.com/show_bug.cgi?id=1247143
* https://bugzilla.suse.com/show_bug.cgi?id=1247145
* https://bugzilla.suse.com/show_bug.cgi?id=1247146
* https://bugzilla.suse.com/show_bug.cgi?id=1247147
* https://bugzilla.suse.com/show_bug.cgi?id=1247149
* https://bugzilla.suse.com/show_bug.cgi?id=1247150
* https://bugzilla.suse.com/show_bug.cgi?id=1247151
* https://bugzilla.suse.com/show_bug.cgi?id=1247153
* https://bugzilla.suse.com/show_bug.cgi?id=1247154
* https://bugzilla.suse.com/show_bug.cgi?id=1247156
* https://bugzilla.suse.com/show_bug.cgi?id=1247160
* https://bugzilla.suse.com/show_bug.cgi?id=1247164
* https://bugzilla.suse.com/show_bug.cgi?id=1247169
* https://bugzilla.suse.com/show_bug.cgi?id=1247170
* https://bugzilla.suse.com/show_bug.cgi?id=1247171
* https://bugzilla.suse.com/show_bug.cgi?id=1247172
* https://bugzilla.suse.com/show_bug.cgi?id=1247174
* https://bugzilla.suse.com/show_bug.cgi?id=1247176
* https://bugzilla.suse.com/show_bug.cgi?id=1247177
* https://bugzilla.suse.com/show_bug.cgi?id=1247178
* https://bugzilla.suse.com/show_bug.cgi?id=1247181
* https://bugzilla.suse.com/show_bug.cgi?id=1247209
* https://bugzilla.suse.com/show_bug.cgi?id=1247210
* https://bugzilla.suse.com/show_bug.cgi?id=1247227
* https://bugzilla.suse.com/show_bug.cgi?id=1247233
* https://bugzilla.suse.com/show_bug.cgi?id=1247236
* https://bugzilla.suse.com/show_bug.cgi?id=1247238
* https://bugzilla.suse.com/show_bug.cgi?id=1247241
* https://bugzilla.suse.com/show_bug.cgi?id=1247243
* https://bugzilla.suse.com/show_bug.cgi?id=1247251
* https://bugzilla.suse.com/show_bug.cgi?id=1247252
* https://bugzilla.suse.com/show_bug.cgi?id=1247253
* https://bugzilla.suse.com/show_bug.cgi?id=1247255
* https://bugzilla.suse.com/show_bug.cgi?id=1247271
* https://bugzilla.suse.com/show_bug.cgi?id=1247273
* https://bugzilla.suse.com/show_bug.cgi?id=1247274
* https://bugzilla.suse.com/show_bug.cgi?id=1247276
* https://bugzilla.suse.com/show_bug.cgi?id=1247277
* https://bugzilla.suse.com/show_bug.cgi?id=1247278
* https://bugzilla.suse.com/show_bug.cgi?id=1247279
* https://bugzilla.suse.com/show_bug.cgi?id=1247284
* https://bugzilla.suse.com/show_bug.cgi?id=1247285
* https://bugzilla.suse.com/show_bug.cgi?id=1247288
* https://bugzilla.suse.com/show_bug.cgi?id=1247289
* https://bugzilla.suse.com/show_bug.cgi?id=1247293
* https://bugzilla.suse.com/show_bug.cgi?id=1247311
* https://bugzilla.suse.com/show_bug.cgi?id=1247314
* https://bugzilla.suse.com/show_bug.cgi?id=1247317
* https://bugzilla.suse.com/show_bug.cgi?id=1247347
* https://bugzilla.suse.com/show_bug.cgi?id=1247348
* https://bugzilla.suse.com/show_bug.cgi?id=1247349
* https://bugzilla.suse.com/show_bug.cgi?id=1247374
* https://bugzilla.suse.com/show_bug.cgi?id=1247437
* https://bugzilla.suse.com/show_bug.cgi?id=1247450
* https://bugzilla.suse.com/show_bug.cgi?id=1247712
* https://jira.suse.com/browse/PED-10253
* https://jira.suse.com/browse/PED-12551
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250820/a12d68cb/attachment.htm>
More information about the sle-updates
mailing list