SUSE-SU-2025:02333-1: important: Security update for the Linux Kernel
SLE-UPDATES
null at suse.de
Wed Jul 16 16:37:02 UTC 2025
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:02333-1
Release Date: 2025-07-16T12:53:20Z
Rating: important
References:
* bsc#1012628
* bsc#1210025
* bsc#1211226
* bsc#1215199
* bsc#1218184
* bsc#1220112
* bsc#1223008
* bsc#1226498
* bsc#1228478
* bsc#1228557
* bsc#1228854
* bsc#1229491
* bsc#1230337
* bsc#1231913
* bsc#1232504
* bsc#1232882
* bsc#1233482
* bsc#1235064
* bsc#1235490
* bsc#1235728
* bsc#1235968
* bsc#1236208
* bsc#1237200
* bsc#1237312
* bsc#1237887
* bsc#1237895
* bsc#1237905
* bsc#1237910
* bsc#1237913
* bsc#1238212
* bsc#1238478
* bsc#1238495
* bsc#1238508
* bsc#1238741
* bsc#1238859
* bsc#1238965
* bsc#1238982
* bsc#1238995
* bsc#1239063
* bsc#1239090
* bsc#1239485
* bsc#1239925
* bsc#1240170
* bsc#1240180
* bsc#1240577
* bsc#1240579
* bsc#1240589
* bsc#1240610
* bsc#1240650
* bsc#1240686
* bsc#1240696
* bsc#1240702
* bsc#1240710
* bsc#1240723
* bsc#1240798
* bsc#1240814
* bsc#1240823
* bsc#1240866
* bsc#1240998
* bsc#1241166
* bsc#1241191
* bsc#1241278
* bsc#1241298
* bsc#1241340
* bsc#1241388
* bsc#1241414
* bsc#1241457
* bsc#1241492
* bsc#1241519
* bsc#1241538
* bsc#1241544
* bsc#1241572
* bsc#1241576
* bsc#1241590
* bsc#1241592
* bsc#1241595
* bsc#1241617
* bsc#1241625
* bsc#1241635
* bsc#1241644
* bsc#1241654
* bsc#1241689
* bsc#1242035
* bsc#1242044
* bsc#1242086
* bsc#1242163
* bsc#1242343
* bsc#1242414
* bsc#1242501
* bsc#1242504
* bsc#1242508
* bsc#1242512
* bsc#1242514
* bsc#1242515
* bsc#1242520
* bsc#1242521
* bsc#1242524
* bsc#1242529
* bsc#1242530
* bsc#1242531
* bsc#1242532
* bsc#1242556
* bsc#1242559
* bsc#1242563
* bsc#1242564
* bsc#1242565
* bsc#1242566
* bsc#1242567
* bsc#1242568
* bsc#1242569
* bsc#1242573
* bsc#1242574
* bsc#1242575
* bsc#1242577
* bsc#1242578
* bsc#1242584
* bsc#1242587
* bsc#1242591
* bsc#1242709
* bsc#1242724
* bsc#1242725
* bsc#1242727
* bsc#1242729
* bsc#1242758
* bsc#1242760
* bsc#1242761
* bsc#1242764
* bsc#1242766
* bsc#1242770
* bsc#1242781
* bsc#1242782
* bsc#1242785
* bsc#1242792
* bsc#1242834
* bsc#1242846
* bsc#1242849
* bsc#1242850
* bsc#1242863
* bsc#1242865
* bsc#1242871
* bsc#1242873
* bsc#1242906
* bsc#1242907
* bsc#1242908
* bsc#1242909
* bsc#1242930
* bsc#1242940
* bsc#1242943
* bsc#1242945
* bsc#1242946
* bsc#1242947
* bsc#1242948
* bsc#1242949
* bsc#1242952
* bsc#1242953
* bsc#1242954
* bsc#1242955
* bsc#1242957
* bsc#1242959
* bsc#1242961
* bsc#1242964
* bsc#1242966
* bsc#1242967
* bsc#1242973
* bsc#1242974
* bsc#1242977
* bsc#1242982
* bsc#1242990
* bsc#1243000
* bsc#1243006
* bsc#1243011
* bsc#1243015
* bsc#1243049
* bsc#1243051
* bsc#1243055
* bsc#1243060
* bsc#1243074
* bsc#1243076
* bsc#1243082
* bsc#1243330
* bsc#1243342
* bsc#1243456
* bsc#1243467
* bsc#1243469
* bsc#1243470
* bsc#1243471
* bsc#1243472
* bsc#1243473
* bsc#1243475
* bsc#1243476
* bsc#1243480
* bsc#1243506
* bsc#1243509
* bsc#1243511
* bsc#1243514
* bsc#1243515
* bsc#1243516
* bsc#1243517
* bsc#1243522
* bsc#1243523
* bsc#1243524
* bsc#1243528
* bsc#1243529
* bsc#1243530
* bsc#1243534
* bsc#1243536
* bsc#1243537
* bsc#1243538
* bsc#1243540
* bsc#1243542
* bsc#1243543
* bsc#1243544
* bsc#1243545
* bsc#1243548
* bsc#1243551
* bsc#1243559
* bsc#1243560
* bsc#1243562
* bsc#1243567
* bsc#1243571
* bsc#1243572
* bsc#1243573
* bsc#1243574
* bsc#1243575
* bsc#1243589
* bsc#1243620
* bsc#1243621
* bsc#1243624
* bsc#1243625
* bsc#1243626
* bsc#1243627
* bsc#1243628
* bsc#1243649
* bsc#1243659
* bsc#1243660
* bsc#1243664
* bsc#1243698
* bsc#1243774
* bsc#1243782
* bsc#1243823
* bsc#1243827
* bsc#1243832
* bsc#1243836
* bsc#1243847
* bsc#1244100
* bsc#1244145
* bsc#1244172
* bsc#1244174
* bsc#1244176
* bsc#1244229
* bsc#1244234
* bsc#1244241
* bsc#1244261
* bsc#1244274
* bsc#1244275
* bsc#1244277
* bsc#1244309
* bsc#1244313
* bsc#1244337
* bsc#1244626
* bsc#1244725
* bsc#1244727
* bsc#1244729
* bsc#1244731
* bsc#1244732
* bsc#1244736
* bsc#1244737
* bsc#1244738
* bsc#1244739
* bsc#1244743
* bsc#1244746
* bsc#1244747
* bsc#1244759
* bsc#1244789
* bsc#1244862
* bsc#1244906
* bsc#1244938
* bsc#1244995
* bsc#1244996
* bsc#1244999
* bsc#1245001
* bsc#1245003
* bsc#1245004
* bsc#1245025
* bsc#1245042
* bsc#1245046
* bsc#1245078
* bsc#1245081
* bsc#1245082
* bsc#1245083
* bsc#1245101
* bsc#1245155
* bsc#1245183
* bsc#1245193
* bsc#1245210
* bsc#1245217
* bsc#1245225
* bsc#1245226
* bsc#1245228
* bsc#1245431
* bsc#1245455
* jsc#PED-12551
* jsc#PED-13019
* jsc#PED-13094
Cross-References:
* CVE-2023-52888
* CVE-2023-53146
* CVE-2024-26762
* CVE-2024-26831
* CVE-2024-41085
* CVE-2024-43869
* CVE-2024-49568
* CVE-2024-50034
* CVE-2024-50106
* CVE-2024-50293
* CVE-2024-56541
* CVE-2024-56613
* CVE-2024-56699
* CVE-2024-57982
* CVE-2024-57987
* CVE-2024-57988
* CVE-2024-57995
* CVE-2024-58004
* CVE-2024-58015
* CVE-2024-58053
* CVE-2024-58062
* CVE-2024-58077
* CVE-2024-58098
* CVE-2024-58099
* CVE-2024-58100
* CVE-2024-58237
* CVE-2025-21629
* CVE-2025-21658
* CVE-2025-21713
* CVE-2025-21720
* CVE-2025-21770
* CVE-2025-21805
* CVE-2025-21824
* CVE-2025-21842
* CVE-2025-21849
* CVE-2025-21868
* CVE-2025-21880
* CVE-2025-21898
* CVE-2025-21899
* CVE-2025-21901
* CVE-2025-21911
* CVE-2025-21920
* CVE-2025-21938
* CVE-2025-21939
* CVE-2025-21940
* CVE-2025-21959
* CVE-2025-21987
* CVE-2025-21997
* CVE-2025-22005
* CVE-2025-22023
* CVE-2025-22035
* CVE-2025-22066
* CVE-2025-22083
* CVE-2025-22089
* CVE-2025-22095
* CVE-2025-22111
* CVE-2025-22113
* CVE-2025-22119
* CVE-2025-22120
* CVE-2025-22124
* CVE-2025-23141
* CVE-2025-23142
* CVE-2025-23144
* CVE-2025-23146
* CVE-2025-23147
* CVE-2025-23148
* CVE-2025-23149
* CVE-2025-23151
* CVE-2025-23155
* CVE-2025-23156
* CVE-2025-23157
* CVE-2025-23158
* CVE-2025-23159
* CVE-2025-23161
* CVE-2025-23162
* CVE-2025-37738
* CVE-2025-37740
* CVE-2025-37741
* CVE-2025-37742
* CVE-2025-37743
* CVE-2025-37747
* CVE-2025-37752
* CVE-2025-37754
* CVE-2025-37756
* CVE-2025-37757
* CVE-2025-37758
* CVE-2025-37761
* CVE-2025-37763
* CVE-2025-37764
* CVE-2025-37765
* CVE-2025-37766
* CVE-2025-37767
* CVE-2025-37768
* CVE-2025-37769
* CVE-2025-37770
* CVE-2025-37771
* CVE-2025-37772
* CVE-2025-37781
* CVE-2025-37782
* CVE-2025-37786
* CVE-2025-37788
* CVE-2025-37791
* CVE-2025-37792
* CVE-2025-37793
* CVE-2025-37794
* CVE-2025-37796
* CVE-2025-37798
* CVE-2025-37800
* CVE-2025-37801
* CVE-2025-37805
* CVE-2025-37810
* CVE-2025-37811
* CVE-2025-37812
* CVE-2025-37813
* CVE-2025-37814
* CVE-2025-37815
* CVE-2025-37816
* CVE-2025-37819
* CVE-2025-37836
* CVE-2025-37837
* CVE-2025-37839
* CVE-2025-37840
* CVE-2025-37841
* CVE-2025-37844
* CVE-2025-37847
* CVE-2025-37848
* CVE-2025-37849
* CVE-2025-37850
* CVE-2025-37851
* CVE-2025-37852
* CVE-2025-37853
* CVE-2025-37854
* CVE-2025-37858
* CVE-2025-37859
* CVE-2025-37861
* CVE-2025-37862
* CVE-2025-37865
* CVE-2025-37867
* CVE-2025-37868
* CVE-2025-37869
* CVE-2025-37871
* CVE-2025-37873
* CVE-2025-37874
* CVE-2025-37875
* CVE-2025-37881
* CVE-2025-37884
* CVE-2025-37888
* CVE-2025-37889
* CVE-2025-37890
* CVE-2025-37891
* CVE-2025-37892
* CVE-2025-37897
* CVE-2025-37900
* CVE-2025-37901
* CVE-2025-37903
* CVE-2025-37905
* CVE-2025-37909
* CVE-2025-37911
* CVE-2025-37912
* CVE-2025-37913
* CVE-2025-37914
* CVE-2025-37915
* CVE-2025-37917
* CVE-2025-37918
* CVE-2025-37921
* CVE-2025-37923
* CVE-2025-37925
* CVE-2025-37927
* CVE-2025-37928
* CVE-2025-37929
* CVE-2025-37930
* CVE-2025-37931
* CVE-2025-37932
* CVE-2025-37933
* CVE-2025-37934
* CVE-2025-37936
* CVE-2025-37937
* CVE-2025-37938
* CVE-2025-37943
* CVE-2025-37944
* CVE-2025-37945
* CVE-2025-37946
* CVE-2025-37948
* CVE-2025-37951
* CVE-2025-37953
* CVE-2025-37954
* CVE-2025-37959
* CVE-2025-37961
* CVE-2025-37963
* CVE-2025-37965
* CVE-2025-37967
* CVE-2025-37968
* CVE-2025-37969
* CVE-2025-37970
* CVE-2025-37972
* CVE-2025-37973
* CVE-2025-37978
* CVE-2025-37979
* CVE-2025-37980
* CVE-2025-37981
* CVE-2025-37982
* CVE-2025-37983
* CVE-2025-37985
* CVE-2025-37986
* CVE-2025-37987
* CVE-2025-37989
* CVE-2025-37990
* CVE-2025-37992
* CVE-2025-37994
* CVE-2025-37995
* CVE-2025-37997
* CVE-2025-37998
* CVE-2025-38000
* CVE-2025-38001
* CVE-2025-38003
* CVE-2025-38004
* CVE-2025-38005
* CVE-2025-38007
* CVE-2025-38009
* CVE-2025-38010
* CVE-2025-38011
* CVE-2025-38013
* CVE-2025-38014
* CVE-2025-38015
* CVE-2025-38018
* CVE-2025-38020
* CVE-2025-38022
* CVE-2025-38023
* CVE-2025-38024
* CVE-2025-38027
* CVE-2025-38031
* CVE-2025-38040
* CVE-2025-38043
* CVE-2025-38044
* CVE-2025-38045
* CVE-2025-38053
* CVE-2025-38055
* CVE-2025-38057
* CVE-2025-38059
* CVE-2025-38060
* CVE-2025-38065
* CVE-2025-38068
* CVE-2025-38072
* CVE-2025-38077
* CVE-2025-38078
* CVE-2025-38079
* CVE-2025-38080
* CVE-2025-38081
* CVE-2025-38083
* CVE-2025-38104
* CVE-2025-38240
* CVE-2025-39735
* CVE-2025-40014
CVSS scores:
* CVE-2023-52888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53146 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26762 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26831 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26831 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49568 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49568 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50034 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50293 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50293 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56541 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56541 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56613 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56613 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56613 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56699 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56699 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-57982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57982 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-57987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58077 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58099 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58099 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21629 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21629 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21658 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21898 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21901 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21920 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21938 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21940 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21959 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21959 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21987 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21997 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22005 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22023 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22023 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-22035 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-22035 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-22066 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22083 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22089 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-22095 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22111 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22113 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22113 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22119 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22119 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-22120 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22124 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23141 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23146 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23161 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23162 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37738 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37740 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37741 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37742 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-37743 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37743 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37752 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37766 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37771 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-37786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37800 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37801 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37801 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37805 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37810 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37810 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-37811 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37812 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37812 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37813 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37839 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-37850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37851 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37851 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37853 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37854 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37854 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37858 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37858 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-37859 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37859 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37861 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37861 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37862 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37881 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37884 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37884 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37890 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37891 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-37892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37897 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37897 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37900 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37901 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37903 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37903 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-37905 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37905 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37909 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37909 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37911 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37911 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-37912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37913 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37915 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37917 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37917 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37918 ( SUSE ): 7.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37918 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37921 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37921 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-37923 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37923 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37925 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-37925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37927 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37927 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37928 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37928 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37929 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37929 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-37930 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37930 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-37931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37932 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-37933 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37933 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-37951 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37954 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37954 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-37959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37963 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37965 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37983 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37983 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37992 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37994 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37994 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-37995 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37997 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37997 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37998 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37998 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38000 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38000 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38001 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38001 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38003 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38003 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38004 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38004 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38005 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38009 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38010 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38010 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38011 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38013 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38013 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38014 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38014 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38015 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38018 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38020 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38022 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38022 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38023 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38024 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38027 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38027 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38031 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38031 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38040 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38040 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38043 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38043 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-38044 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38044 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-38045 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38045 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38057 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38059 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38059 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38060 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38060 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38065 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38065 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38068 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38068 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38072 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38077 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38078 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38079 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38079 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38080 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38081 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38083 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38240 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38240 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39735 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39735 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-40014 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40014 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* SUSE Linux Enterprise Live Patching 15-SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Real Time Module 15-SP7
An update that solves 253 vulnerabilities, contains three features and has 48
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP7 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2023-52888: media: mediatek: vcodec: Only free buffer VA that is not
NULL (bsc#1228557).
* CVE-2024-49568: net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when
receiving proposal msg (bsc#1235728).
* CVE-2024-57982: xfrm: state: fix out-of-bounds read during lookup
(bsc#1237913).
* CVE-2024-57995: wifi: ath12k: fix read pointer after free in
ath12k_mac_assign_vif_to_vdev() (bsc#1237895).
* CVE-2024-58053: rxrpc: Fix handling of received connection abort
(bsc#1238982).
* CVE-2025-21720: xfrm: delete intermediate secpath entry in packet offload
mode (bsc#1238859).
* CVE-2025-21868: kABI workaround for adding an header (bsc#1240180).
* CVE-2025-21898: ftrace: Avoid potential division by zero in
function_stat_show() (bsc#1240610).
* CVE-2025-21899: tracing: Fix bad hist from corrupting named_triggers list
(bsc#1240577).
* CVE-2025-21920: vlan: enforce underlying device type (bsc#1240686).
* CVE-2025-21938: mptcp: fix 'scheduling while atomic' in
mptcp_pm_nl_append_new_local_addr (bsc#1240723).
* CVE-2025-21959: netfilter: nf_conncount: Fully initialize struct
nf_conncount_tuple in insert_tree() (bsc#1240814).
* CVE-2025-21997: xsk: fix an integer overflow in xp_create_and_assign_umem()
(bsc#1240823).
* CVE-2025-22035: tracing: Fix use-after-free in print_graph_function_flags
during tracer switching (bsc#1241544).
* CVE-2025-22111: kABI fix for net: Remove RTNL dance for SIOCBRADDIF and
SIOCBRDELIF (bsc#1241572).
* CVE-2025-22113: ext4: define ext4_journal_destroy wrapper (bsc#1241617).
* CVE-2025-23155: net: stmmac: Fix accessing freed irq affinity_hint
(bsc#1242573).
* CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846).
* CVE-2025-37743: wifi: ath12k: Avoid memory leak while enabling statistics
(bsc#1242163).
* CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
* CVE-2025-37756: net: tls: explicitly disallow disconnect (bsc#1242515).
* CVE-2025-37757: tipc: fix memory leak in tipc_link_xmit (bsc#1242521).
* CVE-2025-37786: net: dsa: free routing table on probe failure (bsc#1242725).
* CVE-2025-37800: driver core: fix potential NULL pointer dereference in
dev_uevent() (bsc#1242849).
* CVE-2025-37801: spi: spi-imx: Add check for spi_imx_setupxfer()
(bsc#1242850).
* CVE-2025-37811: usb: chipidea: ci_hdrc_imx: fix usbmisc handling
(bsc#1242907).
* CVE-2025-37837: iommu/tegra241-cmdqv: Fix warnings due to
dmam_free_coherent() (bsc#1242952).
* CVE-2025-37844: cifs: avoid NULL pointer dereference in dbg call
(bsc#1242946).
* CVE-2025-37859: page_pool: avoid infinite loop to schedule delayed worker
(bsc#1243051).
* CVE-2025-37862: HID: pidff: Fix null pointer dereference in
pidff_find_fields (bsc#1242982).
* CVE-2025-37865: net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST
is unsupported (bsc#1242954).
* CVE-2025-37874: net: ngbe: fix memory leak in ngbe_probe() error path
(bsc#1242940).
* CVE-2025-37884: bpf: Fix deadlock between rcu_tasks_trace and event_mutex
(bsc#1243060).
* CVE-2025-37909: net: lan743x: Fix memleak issue when GSO enabled
(bsc#1243467).
* CVE-2025-37917: net: ethernet: mtk-star-emac: fix spinlock recursion issues
on rx/tx poll (bsc#1243475).
* CVE-2025-37921: vxlan: vnifilter: Fix unlocked deletion of default FDB entry
(bsc#1243480).
* CVE-2025-37923: tracing: Fix oob write in trace_seq_to_buffer()
(bsc#1243551).
* CVE-2025-37927: iommu/amd: Fix potential buffer overflow in
parse_ivrs_acpihid (bsc#1243620).
* CVE-2025-37933: octeon_ep: Fix host hang issue during device reboot
(bsc#1243628).
* CVE-2025-37936: perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with
vCPU's value (bsc#1243537).
* CVE-2025-37938: tracing: Verify event formats that have "%*p.."
(bsc#1243544).
* CVE-2025-37945: net: phy: allow MDIO bus PM ops to start/stop state machine
for phylink-controlled PHY (bsc#1243538).
* CVE-2025-37954: smb: client: Avoid race in open_cached_dir with lease breaks
(bsc#1243664).
* CVE-2025-37961: ipvs: fix uninit-value for saddr in do_output_route4
(bsc#1243523).
* CVE-2025-37967: usb: typec: ucsi: displayport: Fix deadlock (bsc#1243572).
* CVE-2025-37968: iio: light: opt3001: fix deadlock due to concurrent flag
access (bsc#1243571).
* CVE-2025-37987: pds_core: Prevent possible adminq overflow/stuck condition
(bsc#1243542).
* CVE-2025-37992: net_sched: Flush gso_skb list too during ->change()
(bsc#1243698).
* CVE-2025-37995: module: ensure that kobject_put() is safe for module type
kobjects (bsc#1243827).
* CVE-2025-37997: netfilter: ipset: fix region locking in hash types
(bsc#1243832).
* CVE-2025-37998: openvswitch: Fix unsafe attribute parsing in
output_userspace() (bsc#1243836).
* CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in
hfsc_enqueue() (bsc#1244277).
* CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to
eltree twice (bsc#1244234).
* CVE-2025-38011: drm/amdgpu: csa unmap use uninterruptible lock
(bsc#1244729).
* CVE-2025-38018: net/tls: fix kernel panic when alloc_page failed
(bsc#1244999).
* CVE-2025-38053: idpf: fix null-ptr-deref in idpf_features_check
(bsc#1244746).
* CVE-2025-38055: perf/x86/intel: Fix segfault with PEBS-via-PT with
sample_freq (bsc#1244747).
* CVE-2025-38057: espintcp: fix skb leaks (bsc#1244862).
* CVE-2025-38060: bpf: abort verification if env->cur_state->loop_entry !=
NULL (bsc#1245155).
* CVE-2025-38072: libnvdimm/labels: Fix divide error in nd_label_data_init()
(bsc#1244743).
The following non-security bugs were fixed:
* ACPI: Add missing prototype for non CONFIG_SUSPEND/CONFIG_X86 case (stable-
fixes).
* ACPI: CPPC: Fix NULL pointer dereference when nosmp is used (git-fixes).
* ACPI: HED: Always initialize before evged (stable-fixes).
* ACPI: OSI: Stop advertising support for "3.0 _SCP Extensions" (git-fixes).
* ACPI: PNP: Add Intel OC Watchdog IDs to non-PNP device list (stable-fixes).
* ACPI: battery: negate current when discharging (stable-fixes).
* ACPI: bus: Bail out if acpi_kobj registration fails (stable-fixes).
* ACPICA: Avoid sequence overread in call to strncmp() (stable-fixes).
* ACPICA: Utilities: Fix spelling mistake "Incremement" -> "Increment" (git-
fixes).
* ACPICA: exserial: do not forget to handle FFixedHW opregions for reading
(git-fixes).
* ACPICA: fix acpi operand cache leak in dswstate.c (stable-fixes).
* ACPICA: fix acpi parse and parseext cache leaks (stable-fixes).
* ACPICA: utilities: Fix overflow check in vsnprintf() (stable-fixes).
* ALSA: hda/intel: Add Thinkpad E15 to PM deny list (stable-fixes).
* ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx (stable-fixes).
* ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ASP10 (stable-fixes).
* ALSA: hda/realtek: Enable PC beep passthrough for HP EliteBook 855 G7
(stable-fixes).
* ALSA: hda/realtek: Fix built-in mic on ASUS VivoBook X507UAR (git-fixes).
* ALSA: hda/realtek: Fix built-in mic on ASUS VivoBook X513EA (git-fixes).
* ALSA: hda/realtek: enable headset mic on Latitude 5420 Rugged (stable-
fixes).
* ALSA: pcm: Fix race of buffer access at PCM OSS layer (stable-fixes).
* ALSA: seq: Improve data consistency at polling (stable-fixes).
* ALSA: usb-audio: Accept multiple protocols in GTBs (stable-fixes).
* ALSA: usb-audio: Add Pioneer DJ DJM-V10 support (stable-fixes).
* ALSA: usb-audio: Add a quirk for Lenovo Thinkpad Thunderbolt 3 dock (stable-
fixes).
* ALSA: usb-audio: Add implicit feedback quirk for RODE AI-1 (stable-fixes).
* ALSA: usb-audio: Add name for HP Engage Go dock (stable-fixes).
* ALSA: usb-audio: Check shutdown at endpoint_set_interface() (stable-fixes).
* ALSA: usb-audio: Fix NULL pointer deref in snd_usb_power_domain_set() (git-
fixes).
* ALSA: usb-audio: Fix duplicated name in MIDI substream names (stable-fixes).
* ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()
(git-fixes).
* ALSA: usb-audio: Rename ALSA kcontrol PCM and PCM1 for the KTMicro sound
card (stable-fixes).
* ALSA: usb-audio: Rename Pioneer mixer channel controls (git-fixes).
* ALSA: usb-audio: Set MIDI1 flag appropriately for GTB MIDI 1.0 entry
(stable-fixes).
* ALSA: usb-audio: Skip setting clock selector for single connections (stable-
fixes).
* ALSA: usb-audio: Support multiple control interfaces (stable-fixes).
* ALSA: usb-audio: Support read-only clock selector control (stable-fixes).
* ALSA: usb-audio: enable support for Presonus Studio 1824c within 1810c file
(stable-fixes).
* ALSA: usb-audio: mixer: Remove temporary string use in
parse_clock_source_unit (stable-fixes).
* ASoC: Intel: avs: Fix deadlock when the failing IPC is SET_D0IX (git-fixes).
* ASoC: Intel: avs: Verify content returned by parse_int_array() (git-fixes).
* ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013 (stable-
fixes).
* ASoC: SOF: Intel: hda-bus: Use PIO mode on ACE2+ platforms (git-fixes).
* ASoC: SOF: ipc4-pcm: Adjust pipeline_list->pipelines allocation type (git-
fixes).
* ASoC: amd: yc: Add quirk for Lenovo Yoga Pro 7 14ASP9 (stable-fixes).
* ASoC: apple: mca: Constrain channels according to TDM mask (git-fixes).
* ASoC: codecs: hda: Fix RPM usage count underflow (git-fixes).
* ASoC: codecs: pcm3168a: Allow for 24-bit in provider mode (stable-fixes).
* ASoC: cs42l43: Disable headphone clamps during type detection (stable-
fixes).
* ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of()
(stable-fixes).
* ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect
(stable-fixes).
* ASoC: mediatek: mt8188: Add reference for dmic clocks (stable-fixes).
* ASoC: mediatek: mt8188: Treat DMIC_GAINx_CUR as non-volatile (stable-fixes).
* ASoC: mediatek: mt8195: Set ETDM1/2 IN/OUT to COMP_DUMMY() (git-fixes).
* ASoC: meson: meson-card-utils: use of_property_present() for DT parsing
(git-fixes).
* ASoC: ops: Enforce platform maximum on initial value (stable-fixes).
* ASoC: qcom: sdm845: Add error handling in sdm845_slim_snd_hw_params() (git-
fixes).
* ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup()
(stable-fixes).
* ASoC: rt722-sdca: Add some missing readable registers (stable-fixes).
* ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot() (stable-
fixes).
* ASoC: sun4i-codec: support hp-det-gpios property (stable-fixes).
* ASoC: tas2764: Add reg defaults for TAS2764_INT_CLK_CFG (stable-fixes).
* ASoC: tas2764: Enable main IRQs (git-fixes).
* ASoC: tas2764: Mark SW_RESET as volatile (stable-fixes).
* ASoC: tas2764: Power up/down amp on mute ops (stable-fixes).
* ASoC: tas2764: Reinit cache on part reset (git-fixes).
* ASoC: tas2770: Power cycle amp on ISENSE/VSENSE change (stable-fixes).
* ASoC: tegra210_ahub: Add check to of_device_get_match_data() (stable-fixes).
* ASoC: ti: omap-hdmi: Re-add dai_link->platform to fix card init (git-fixes).
* Bluetooth: Fix NULL pointer deference on eir_get_service_data (git-fixes).
* Bluetooth: L2CAP: Fix not responding with L2CAP_CR_LE_ENCRYPTION (git-
fixes).
* Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete (git-fixes).
* Bluetooth: MGMT: Fix sparse errors (git-fixes).
* Bluetooth: MGMT: Remove unused mgmt_pending_find_data (stable-fixes).
* Bluetooth: MGMT: iterate over mesh commands in mgmt_mesh_foreach() (git-
fixes).
* Bluetooth: Remove pending ACL connection attempts (stable-fixes).
* Bluetooth: btintel: Check dsbr size from EFI variable (git-fixes).
* Bluetooth: btintel_pcie: Fix driver not posting maximum rx buffers (git-
fixes).
* Bluetooth: btintel_pcie: Increase the tx and rx descriptor count (git-
fixes).
* Bluetooth: btintel_pcie: Reduce driver buffer posting to prevent race
condition (git-fixes).
* Bluetooth: eir: Fix possible crashes on eir_create_adv_data (git-fixes).
* Bluetooth: hci_conn: Fix UAF Write in __hci_acl_create_connection_sync (git-
fixes).
* Bluetooth: hci_conn: Only do ACL connections sequentially (stable-fixes).
* Bluetooth: hci_core: fix list_for_each_entry_rcu usage (git-fixes).
* Bluetooth: hci_event: Fix not using key encryption size when its known (git-
fixes).
* Bluetooth: hci_qca: move the SoC type check to the right place (git-fixes).
* Bluetooth: hci_sync: Fix UAF in hci_acl_create_conn_sync (git-fixes).
* Bluetooth: hci_sync: Fix UAF on hci_abort_conn_sync (git-fixes).
* Bluetooth: hci_sync: Fix broadcast/PA when using an existing instance (git-
fixes).
* Documentation/rtla: Fix duplicate text about timerlat tracer (git-fixes).
* Documentation/rtla: Fix typo in common_timerlat_description.rst (git-fixes).
* Documentation/rtla: Fix typo in rtla-timerlat.rst (git-fixes).
* Documentation: ACPI: Use all-string data node references (git-fixes).
* Documentation: fix typo in root= kernel parameter description (git-fixes).
* Enable livepatching related packages on -RT (jsc#PED-1706)
* HID: lenovo: Restrict F7/9/11 mode to compact keyboards only (git-fixes).
* HID: quirks: Add ADATA XPG alpha wireless mouse support (stable-fixes).
* HID: usbkbd: Fix the bit shift number for LED_KANA (stable-fixes).
* HID: wacom: fix kobject reference count leak (git-fixes).
* HID: wacom: fix memory leak on kobject creation failure (git-fixes).
* HID: wacom: fix memory leak on sysfs attribute creation failure (git-fixes).
* IB/cm: Drop lockdep assert and WARN when freeing old msg (git-fixes)
* Input: gpio-keys - fix possible concurrent access in gpio_keys_irq_timer()
(git-fixes).
* Input: ims-pcu - check record size in ims_pcu_flash_firmware() (git-fixes).
* Input: sparcspkr - avoid unannotated fall-through (stable-fixes).
* Input: xpad - add more controllers (stable-fixes).
* KVM: powerpc: Enable commented out BUILD_BUG_ON() assertion (bsc#1215199).
* KVM: s390: rename PROT_NONE to PROT_TYPE_DUMMY (git-fixes bsc#1245225).
* Merge branch 'SLE15-SP7' (8ab7501d9efd) into 'SLE15-SP7-RT'
* MyBS: Correctly generate build flags for non-multibuild package limit (bsc#
1244241) Fixes: 0999112774fc ("MyBS: Use buildflags to set which package to
build")
* MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b
("bs-upload-kernel: Pass limit_packages also on multibuild")
* MyBS: Simplify qa_expr generation Start with a 0 which makes the expression
valid even if there are no QA repositories (currently does not happen). Then
separator is always needed.
* NFC: nci: uart: Set tty->disc_data only in success path (git-fixes).
* NFS: Do not allow waiting for exiting tasks (git-fixes).
* NFSD: Insulate nfsd4_encode_read_plus() from page boundaries in the encode
buffer (git-fixes).
* NFSv4: Check for delegation validity in nfs_start_delegation_return_locked()
(git-fixes).
* NFSv4: Treat ENETUNREACH errors as fatal for state recovery (git-fixes).
* PCI/DPC: Initialize aer_err_info before using it (git-fixes).
* PCI/DPC: Log Error Source ID only when valid (git-fixes).
* PCI/DPC: Use defines with DPC reason fields (git-fixes).
* PCI/MSI: Size device MSI domain with the maximum number of vectors (git-
fixes).
* PCI/PM: Set up runtime PM even for devices without PCI PM (git-fixes).
* PCI: Add ACS quirk for Loongson PCIe (stable-fixes).
* PCI: Explicitly put devices into D0 when initializing (git-fixes).
* PCI: Fix lock symmetry in pci_slot_unlock() (git-fixes).
* PCI: Fix old_size lower bound in calculate_iosize() too (stable-fixes).
* PCI: apple: Set only available ports up (git-fixes).
* PCI: apple: Use gpiod_set_value_cansleep in probe flow (git-fixes).
* PCI: brcmstb: Add a softdep to MIP MSI-X driver (stable-fixes).
* PCI: brcmstb: Expand inbound window size up to 64GB (stable-fixes).
* PCI: cadence-ep: Correct PBA offset in .set_msix() callback (git-fixes).
* PCI: cadence: Fix runtime atomic count underflow (git-fixes).
* PCI: dw-rockchip: Fix PHY function call sequence in
rockchip_pcie_phy_deinit() (git-fixes).
* PCI: dw-rockchip: Remove PCIE_L0S_ENTRY check from rockchip_pcie_link_up()
(git-fixes).
* PCI: dwc: ep: Correct PBA offset in .set_msix() callback (git-fixes).
* PCI: dwc: ep: Ensure proper iteration over outbound map windows (stable-
fixes).
* PCI: endpoint: Retain fixed-size BAR size as well as aligned size (git-
fixes).
* PCI: vmd: Disable MSI remapping bypass under Xen (stable-fixes).
* PM: runtime: fix denying of auto suspend in pm_suspend_timer_fn() (stable-
fixes).
* PM: sleep: Fix power.is_suspended cleanup for direct-complete devices (git-
fixes).
* PM: sleep: Print PM debug messages during hibernation (git-fixes).
* PM: wakeup: Delete space in the end of string shown by pm_show_wakelocks()
(git-fixes).
* RDMA/core: Fix best page size finding when it can cross SG entries (git-
fixes)
* RDMA/uverbs: Propagate errors from rdma_lookup_get_uobject() (git-fixes)
* Remove compress-vmlinux.sh /usr/lib/rpm/brp-suse.d/brp-99-compress-vmlinux
was added in pesign-obs-integration during SLE12 RC. This workaround can be
removed.
* Remove host-memcpy-hack.h This might have been usefult at some point but we
have more things that depend on specific library versions today.
* Remove try-disable-staging-driver The config for linux-next is autogenerated
from master config, and defaults filled for missing options. This is
unlikely to enable any staging driver in the first place.
* Revert "ALSA: usb-audio: Skip setting clock selector for single connections"
(stable-fixes).
* Revert "arm64: dts: allwinner: h6: Use RSB for AXP805 PMIC (git-fixes)
* Revert "bus: ti-sysc: Probe for l4_wkup and l4_cfg interconnect devices
first" (stable-fixes).
* Revert "drm/amdgpu: do not allow userspace to create a doorbell BO" (stable-
fixes).
* Revert "ipv6: save dontfrag in cork (git-fixes)."
* Revert "kABI: ipv6: save dontfrag in cork (git-fixes)."
* Revert "wifi: mt76: mt7996: fill txd by host driver" (stable-fixes).
* Revert "wifi: mwifiex: Fix HT40 bandwidth issue." (git-fixes).
* SUNRPC: Do not allow waiting for exiting tasks (git-fixes).
* SUNRPC: Prevent hang on NFS mount with xprtsec=[m]tls (git-fixes).
* SUNRPC: rpc_clnt_set_transport() must not change the autobind setting (git-
fixes).
* SUNRPC: rpcbind should never reset the port to the value '0' (git-fixes).
* USB: serial: pl2303: add new chip PL2303GC-Q20 and PL2303GT-2AB (stable-
fixes).
* VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify
(git-fixes).
* accel/ivpu: Improve buffer object logging (git-fixes).
* accel/ivpu: Use dma_resv_lock() instead of a custom mutex (git-fixes).
* accel/qaic: Mask out SR-IOV PCI resources (stable-fixes).
* acpi-cpufreq: Fix nominal_freq units to KHz in get_max_boost_ratio() (git-
fixes).
* add bug reference to existing hv_storvsc change (bsc#1245455).
* arm64: dts: marvell: uDPU: define pinctrl state for alarm LEDs (git-fixes)
* ata: libata-eh: Do not use ATAPI DMA for a device limited to PIO mode
(stable-fixes).
* ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 (stable-fixes).
* ath10k: snoc: fix unbalanced IRQ enable in crash recovery (git-fixes).
* backlight: pm8941: Add NULL check in wled_configure() (git-fixes).
* bnxt: properly flush XDP redirect lists (git-fixes).
* bpf: Force uprobe bpf program to always return 0 (git-fixes).
* bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc
("MyBS: Use buildflags to set which package to build") Fixes: 747f601d4156
("bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501,
boo#1211226, bsc#1218184)")
* btrfs: fix fsync of files with no hard links not persisting deletion (git-
fixes).
* btrfs: fix invalid data space release when truncating block in NOCOW mode
(git-fixes).
* btrfs: fix qgroup reservation leak on failure to allocate ordered extent
(git-fixes).
* btrfs: fix wrong start offset for delalloc space release during mmap write
(git-fixes).
* btrfs: remove end_no_trans label from btrfs_log_inode_parent() (git-fixes).
* btrfs: simplify condition for logging new dentries at
btrfs_log_inode_parent() (git-fixes).
* bus: fsl-mc: do not add a device-link for the UAPI used DPMCP device (git-
fixes).
* bus: fsl-mc: fix GET/SET_TAILDROP command ids (git-fixes).
* bus: fsl-mc: fix double-free on mc_dev (git-fixes).
* bus: fsl-mc: increase MC_CMD_COMPLETION_TIMEOUT_MS value (stable-fixes).
* bus: mhi: host: Fix conflict between power_up and SYSERR (git-fixes).
* calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (git-fixes).
* can: c_can: Use of_property_present() to test existence of DT property
(stable-fixes).
* can: tcan4x5x: fix power regulator retrieval during probe (git-fixes).
* ceph: Fix incorrect flush end position calculation (git-fixes).
* ceph: allocate sparse_ext map only for sparse reads (git-fixes).
* ceph: fix memory leaks in __ceph_sync_read() (git-fixes).
* cgroup/cpuset: Do not allow creation of local partition over a remote one
(bsc#1241166).
* cgroup/cpuset: Fix race between newly created partition and dying one
(bsc#1241166).
* cifs: change tcon status when need_reconnect is set on it (git-fixes).
* clocksource: Fix brown-bag boolean thinko in (git-fixes)
* clocksource: Make watchdog and suspend-timing multiplication (git-fixes)
* crypto: lrw - Only add ecb if it is not already there (git-fixes).
* crypto: lzo - Fix compression buffer overrun (stable-fixes).
* crypto: marvell/cesa - Avoid empty transfer descriptor (git-fixes).
* crypto: marvell/cesa - Do not chain submitted requests (git-fixes).
* crypto: marvell/cesa - Handle zero-length skcipher requests (git-fixes).
* crypto: octeontx2 - suppress auth failure screaming due to negative tests
(stable-fixes).
* crypto: qat - add shutdown handler to qat_420xx (git-fixes).
* crypto: qat - add shutdown handler to qat_4xxx (git-fixes).
* crypto: skcipher - Zap type in crypto_alloc_sync_skcipher (stable-fixes).
* crypto: sun8i-ce - move fallback ahash_request to the end of the struct
(git-fixes).
* crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare()
(git-fixes).
* crypto: sun8i-ss - do not use sg_dma_len before calling DMA functions (git-
fixes).
* crypto: xts - Only add ecb if it is not already there (git-fixes).
* devlink: Fix referring to hw_addr attribute during state validation (git-
fixes).
* devlink: fix port dump cmd type (git-fixes).
* dlm: mask sk_shutdown value (bsc#1228854).
* dlm: use SHUT_RDWR for SCTP shutdown (bsc#1228854).
* dmaengine: idxd: cdev: Fix uninitialized use of sva in idxd_cdev_open
(stable-fixes).
* dmaengine: ti: Add NULL check in udma_probe() (git-fixes).
* drivers/rapidio/rio_cm.c: prevent possible heap overwrite (stable-fixes).
* drm/amd/display/dm: drop hw_support check in amdgpu_dm_i2c_xfer() (stable-
fixes).
* drm/amd/display: Add debugging message for brightness caps (bsc#1240650).
* drm/amd/display: Add null pointer check for get_first_active_display() (git-
fixes).
* drm/amd/display: Add support for disconnected eDP streams (stable-fixes).
* drm/amd/display: Call FP Protect Before Mode Programming/Mode Support
(stable-fixes).
* drm/amd/display: Configure DTBCLK_P with OPTC only for dcn401 (stable-
fixes).
* drm/amd/display: Correct timing_adjust_pending flag setting (stable-fixes).
* drm/amd/display: Defer BW-optimization-blocked DRR adjustments (git-fixes).
* drm/amd/display: Do not enable replay when vtotal update is pending (stable-
fixes).
* drm/amd/display: Do not treat wb connector as physical in
create_validate_stream_for_sink (stable-fixes).
* drm/amd/display: Do not try AUX transactions on disconnected link (stable-
fixes).
* drm/amd/display: Ensure DMCUB idle before reset on DCN31/DCN35 (stable-
fixes).
* drm/amd/display: Fix BT2020 YCbCr limited/full range input (stable-fixes).
* drm/amd/display: Fix DMUB reset sequence for DCN401 (stable-fixes).
* drm/amd/display: Fix default DC and AC levels (bsc#1240650).
* drm/amd/display: Fix incorrect DPCD configs while Replay/PSR switch (stable-
fixes).
* drm/amd/display: Fix p-state type when p-state is unsupported (stable-
fixes).
* drm/amd/display: Guard against setting dispclk low for dcn31x (stable-
fixes).
* drm/amd/display: Guard against setting dispclk low when active (stable-
fixes).
* drm/amd/display: Increase block_sequence array size (stable-fixes).
* drm/amd/display: Initial psr_version with correct setting (stable-fixes).
* drm/amd/display: Populate register address for dentist for dcn401 (stable-
fixes).
* drm/amd/display: Read LTTPR ALPM caps during link cap retrieval (stable-
fixes).
* drm/amd/display: Request HW cursor on DCN3.2 with SubVP (stable-fixes).
* drm/amd/display: Skip checking FRL_MODE bit for PCON BW determination
(stable-fixes).
* drm/amd/display: Support multiple options during psr entry (stable-fixes).
* drm/amd/display: Update CR AUX RD interval interpretation (stable-fixes).
* drm/amd/display: Use Nominal vBlank If Provided Instead Of Capping It
(stable-fixes).
* drm/amd/display: calculate the remain segments for all pipes (stable-fixes).
* drm/amd/display: check stream id dml21 wrapper to get plane_id (stable-
fixes).
* drm/amd/display: fix dcn4x init failed (stable-fixes).
* drm/amd/display: fix link_set_dpms_off multi-display MST corner case
(stable-fixes).
* drm/amd/display: handle max_downscale_src_width fail check (stable-fixes).
* drm/amd/display: not abort link train when bw is low (stable-fixes).
* drm/amd/display: pass calculated dram_speed_mts to dml2 (stable-fixes).
* drm/amd/display: remove minimum Dispclk and apply oem panel timing (stable-
fixes).
* drm/amd/pm: Fetch current power limit from PMFW (stable-fixes).
* drm/amd/pm: Skip P2S load for SMU v13.0.12 (stable-fixes).
* drm/amd/pp: Fix potential NULL pointer dereference in
atomctrl_initialize_mc_reg_table (git-fixes).
* drm/amd: Adjust output for discovery error handling (git-fixes).
* drm/amdgpu/discovery: check ip_discovery fw file available (stable-fixes).
* drm/amdgpu/gfx11: do not read registers in mqd init (stable-fixes).
* drm/amdgpu/gfx12: do not read registers in mqd init (stable-fixes).
* drm/amdgpu/mes11: fix set_hw_resources_1 calculation (stable-fixes).
* drm/amdgpu: Allow P2P access through XGMI (stable-fixes).
* drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c
(stable-fixes).
* drm/amdgpu: Fix missing drain retry fault the last entry (stable-fixes).
* drm/amdgpu: Fix the race condition for draining retry fault (stable-fixes).
* drm/amdgpu: Set snoop bit for SDMA for MI series (stable-fixes).
* drm/amdgpu: Skip pcie_replay_count sysfs creation for VF (stable-fixes).
* drm/amdgpu: Update SRIOV video codec caps (stable-fixes).
* drm/amdgpu: Use active umc info from discovery (stable-fixes).
* drm/amdgpu: adjust drm_firmware_drivers_only() handling (stable-fixes).
* drm/amdgpu: enlarge the VBIOS binary size limit (stable-fixes).
* drm/amdgpu: read back register after written for VCN v4.0.5 (stable-fixes).
* drm/amdgpu: release xcp_mgr on exit (stable-fixes).
* drm/amdgpu: remove all KFD fences from the BO on release (stable-fixes).
* drm/amdgpu: reset psp->cmd to NULL after releasing the buffer (stable-
fixes).
* drm/amdgpu: switch job hw_fence to amdgpu_fence (git-fixes).
* drm/amdkfd: Correct F8_MODE for gfx950 (git-fixes).
* drm/amdkfd: KFD release_work possible circular locking (stable-fixes).
* drm/amdkfd: Set per-process flags only once cik/vi (stable-fixes).
* drm/amdkfd: Set per-process flags only once for gfx9/10/11/12 (stable-
fixes).
* drm/amdkfd: fix missing L2 cache info in topology (stable-fixes).
* drm/amdkfd: set precise mem ops caps to disabled for gfx 11 and 12 (stable-
fixes).
* drm/ast: Find VBIOS mode from regular display size (stable-fixes).
* drm/ast: Fix comment on modeset lock (git-fixes).
* drm/atomic: clarify the rules around drm_atomic_state->allow_modeset
(stable-fixes).
* drm/bridge: cdns-dsi: Check return value when getting default PHY config
(git-fixes).
* drm/bridge: cdns-dsi: Fix connecting to next bridge (git-fixes).
* drm/bridge: cdns-dsi: Fix phy de-init and flag it so (git-fixes).
* drm/bridge: cdns-dsi: Fix the clock variable for mode_valid() (git-fixes).
* drm/bridge: cdns-dsi: Wait for Clk and Data Lanes to be ready (git-fixes).
* drm/bridge: lt9611uxc: Fix an error handling path in lt9611uxc_probe() (git-
fixes).
* drm/buddy: fix issue that force_merge cannot free all roots (stable-fixes).
* drm/etnaviv: Protect the scheduler's pending list with its lock (git-fixes).
* drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1 (git-fixes).
* drm/i915/guc: Check if expecting reply before decrementing
outstanding_submission_g2h (git-fixes).
* drm/i915/guc: Handle race condition where wakeref count drops below 0 (git-
fixes).
* drm/i915/pmu: Fix build error with GCOV and AutoFDO enabled (git-fixes).
* drm/i915/psr: Fix using wrong mask in REG_FIELD_PREP (git-fixes).
* drm/i915: fix build error some more (git-fixes).
* drm/mediatek: Fix kobject put for component sub-drivers (git-fixes).
* drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence (stable-
fixes).
* drm/mediatek: mtk_drm_drv: Fix kobject put for mtk_mutex device ptr (git-
fixes).
* drm/mediatek: mtk_drm_drv: Unbind secondary mmsys components on err (git-
fixes).
* drm/msm/a6xx: Disable rgb565_predicator on Adreno 7c3 (git-fixes).
* drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE (git-fixes).
* drm/msm/disp: Correct porch timing for SDM845 (git-fixes).
* drm/msm/dpu: Clear CTL_FETCH_PIPE_ACTIVE before blend setup (git-fixes).
* drm/msm/dpu: Clear CTL_FETCH_PIPE_ACTIVE on ctl_path reset (git-fixes).
* drm/msm/dpu: enable SmartDMA on SC8180X (git-fixes).
* drm/msm/dpu: enable SmartDMA on SM8150 (git-fixes).
* drm/msm/dsi/dsi_phy_10nm: Fix missing initial VCO rate (git-fixes).
* drm/msm/gpu: Fix crash when throttling GPU immediately during boot (git-
fixes).
* drm/msm: Fix CP_RESET_CONTEXT_STATE bitfield names (git-fixes).
* drm/nouveau/bl: increase buffer size to avoid truncate warning (git-fixes).
* drm/nouveau: fix the broken marco GSP_MSG_MAX_SIZE (stable-fixes).
* drm/panel-edp: Add Starry 116KHD024006 (stable-fixes).
* drm/panel-simple: fix the warnings for the Evervision VGG644804 (git-fixes).
* drm/panel: samsung-sofef00: Drop s6e3fc2x01 support (git-fixes).
* drm/panic: add missing space (git-fixes).
* drm/panthor: Fix GPU_COHERENCY_ACE[_LITE] definitions (git-fixes).
* drm/panthor: Update panthor_mmu::irq::mask when needed (git-fixes).
* drm/rockchip: vop2: Add uv swap for cluster window (stable-fixes).
* drm/rockchip: vop2: Improve display modes handling on RK3588 HDMI0 (stable-
fixes).
* drm/ssd130x: fix ssd132x_clear_screen() columns (git-fixes).
* drm/tegra: Assign plane type before registration (git-fixes).
* drm/tegra: Fix a possible null pointer dereference (git-fixes).
* drm/tegra: rgb: Fix the unbound reference count (git-fixes).
* drm/udl: Unregister device before cleaning up on disconnect (git-fixes).
* drm/v3d: Add clock handling (stable-fixes).
* drm/v3d: Avoid NULL pointer dereference in `v3d_job_update_stats()` (stable-
fixes).
* drm/vc4: tests: Use return instead of assert (git-fixes).
* drm/vkms: Adjust vkms_state->active_planes allocation type (git-fixes).
* drm/vmwgfx: Add error path for xa_store in vmw_bo_add_detached_resource
(git-fixes).
* drm/vmwgfx: Add seqno waiter for sync_files (git-fixes).
* drm/vmwgfx: Fix dumb buffer leak (git-fixes).
* drm/xe/bmg: Update Wa_16023588340 (git-fixes).
* drm/xe/d3cold: Set power state to D3Cold during s2idle/s3 (git-fixes).
* drm/xe/debugfs: Add missing xe_pm_runtime_put in wedge_mode_set (stable-
fixes).
* drm/xe/debugfs: fixed the return value of wedged_mode_set (stable-fixes).
* drm/xe/display: Add check for alloc_ordered_workqueue() (git-fixes).
* drm/xe/gt: Update handling of xe_force_wake_get return (stable-fixes).
* drm/xe/oa: Ensure that polled read returns latest data (stable-fixes).
* drm/xe/pf: Create a link between PF and VF devices (stable-fixes).
* drm/xe/pf: Reset GuC VF config when unprovisioning critical resource
(stable-fixes).
* drm/xe/relay: Do not use GFP_KERNEL for new transactions (stable-fixes).
* drm/xe/sa: Always call drm_suballoc_manager_fini() (stable-fixes).
* drm/xe/sched: stop re-submitting signalled jobs (git-fixes).
* drm/xe/vf: Retry sending MMIO request to GUC on timeout error (stable-
fixes).
* drm/xe/vm: move rebind_work init earlier (git-fixes).
* drm/xe/xe2hpg: Add Wa_22021007897 (stable-fixes).
* drm/xe: Create LRC BO without VM (git-fixes).
* drm/xe: Do not attempt to bootstrap VF in execlists mode (stable-fixes).
* drm/xe: Fix memset on iomem (git-fixes).
* drm/xe: Fix xe_tile_init_noalloc() error propagation (stable-fixes).
* drm/xe: Make xe_gt_freq part of the Documentation (git-fixes).
* drm/xe: Move suballocator init to after display init (stable-fixes).
* drm/xe: Nuke VM's mapping upon close (stable-fixes).
* drm/xe: Process deferred GGTT node removals on device unwind (git-fixes).
* drm/xe: Reject BO eviction if BO is bound to current VM (stable-fixes).
* drm/xe: Retry BO allocation (stable-fixes).
* drm/xe: Rework eviction rejection of bound external bos (git-fixes).
* drm/xe: Save the gt pointer in lrc and drop the tile (stable-fixes).
* drm/xe: Stop ignoring errors from xe_ttm_stolen_mgr_init() (stable-fixes).
* drm/xe: Wire up device shutdown handler (stable-fixes).
* drm/xe: remove unmatched xe_vm_unlock() from __xe_exec_queue_init() (git-
fixes).
* drm/xe: xe_gen_wa_oob: replace program_invocation_short_name (stable-fixes).
* drm: Add valid clones check (stable-fixes).
* drm: bridge: adv7511: fill stream capabilities (stable-fixes).
* drm: rcar-du: Fix memory leak in rcar_du_vsps_init() (git-fixes).
* dummycon: Trigger redraw when switching consoles with deferred takeover
(git-fixes).
* e1000e: set fixed clock frequency indication for Nahum 11 and Nahum 13 (git-
fixes).
* efi/libstub: Describe missing 'out' parameter in efi_load_initrd (git-
fixes).
* fbcon: Make sure modelist not set on unregistered console (stable-fixes).
* fbcon: Use correct erase colour for clearing in fbcon (stable-fixes).
* fbdev/efifb: Remove PM for parent device (bsc#1244261).
* fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in
fb_videomode_to_var (git-fixes).
* fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var (git-
fixes).
* fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() (git-fixes).
* fbdev: core: tileblit: Implement missing margin clearing for tileblit
(stable-fixes).
* fbdev: fsl-diu-fb: add missing device_remove_file() (stable-fixes).
* fgraph: Still initialize idle shadow stacks when starting (git-fixes).
* firmware: SDEI: Allow sdei initialization without ACPI_APEI_GHES (git-
fixes).
* firmware: arm_ffa: Reject higher major version as incompatible (stable-
fixes).
* firmware: arm_ffa: Set dma_mask for ffa devices (stable-fixes).
* firmware: arm_scmi: Relax duplicate name constraint across protocol ids
(stable-fixes).
* firmware: psci: Fix refcount leak in psci_dt_init (git-fixes).
* fpga: altera-cvp: Increase credit timeout (stable-fixes).
* fs/nfs/read: fix double-unlock bug in nfs_return_empty_folio() (git-fixes).
* gpio: mlxbf3: only get IRQ for device instance 0 (git-fixes).
* gpio: pca953x: Simplify code with cleanup helpers (stable-fixes).
* gpio: pca953x: Split pca953x_restore_context() and pca953x_save_context()
(stable-fixes).
* gpio: pca953x: fix IRQ storm on system wake up (git-fixes).
* gpiolib: Revert "Do not WARN on gpiod_put() for optional GPIO" (stable-
fixes).
* gve: Fix RX_BUFFERS_POSTED stat to report per-queue fill_cnt (git-fixes).
* gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO (git-
fixes).
* hwmon: (asus-ec-sensors) check sensor index in read_string() (git-fixes).
* hwmon: (dell-smm) Increment the number of fans (stable-fixes).
* hwmon: (ftsteutates) Fix TOCTOU race in fts_read() (git-fixes).
* hwmon: (gpio-fan) Add missing mutex locks (stable-fixes).
* hwmon: (nct6775): Actually make use of the HWMON_NCT6775 symbol namespace
(git-fixes).
* hwmon: (occ) Rework attribute registration for stack usage (git-fixes).
* hwmon: (occ) fix unaligned accesses (git-fixes).
* hwmon: (peci/dimmtemp) Do not provide fake thresholds data (git-fixes).
* hwmon: (xgene-hwmon) use appropriate type for the latency value (stable-
fixes).
* hwmon: corsair-psu: add USB id of HX1200i Series 2023 psu (git-fixes).
* i2c: designware: Invoke runtime suspend on quick slave re-registration
(stable-fixes).
* i2c: npcm: Add clock toggle recovery (stable-fixes).
* i2c: pxa: fix call balance of i2c->clk handling routines (stable-fixes).
* i2c: qup: Vote for interconnect bandwidth to DRAM (stable-fixes).
* i2c: robotfuzz-osif: disable zero-length read messages (git-fixes).
* i2c: tegra: check msg length in SMBUS block read (bsc#1242086)
* i2c: tiny-usb: disable zero-length read messages (git-fixes).
* i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work()
(git-fixes).
* i3c: master: svc: Fix missing STOP for master request (stable-fixes).
* i3c: master: svc: Flush FIFO before sending Dynamic Address Assignment(DAA)
(stable-fixes).
* i40e: retry VFLR handling if there is ongoing VF reset (git-fixes).
* i40e: return false from i40e_reset_vf if reset is in progress (git-fixes).
* ice: Fix LACP bonds without SRIOV environment (git-fixes).
* ice: create new Tx scheduler nodes for new queues only (git-fixes).
* ice: fix Tx scheduler error handling in XDP callback (git-fixes).
* ice: fix rebuilding the Tx scheduler tree for large queue counts (git-
fixes).
* ice: fix vf->num_mac count with port representors (git-fixes).
* ieee802154: ca8210: Use proper setters and getters for bitwise types
(stable-fixes).
* iio: accel: fxls8962af: Fix temperature scan element sign (git-fixes).
* iio: adc: ad7124: Fix 3dB filter frequency reading (git-fixes).
* iio: adc: ad7606_spi: fix reg write value mask (git-fixes).
* iio: filter: admv8818: Support frequencies >= 2^32 (git-fixes).
* iio: filter: admv8818: fix band 4, state 15 (git-fixes).
* iio: filter: admv8818: fix integer overflow (git-fixes).
* iio: filter: admv8818: fix range calculation (git-fixes).
* iio: imu: inv_icm42600: Fix temperature calculation (git-fixes).
* ima: Suspend PCR extends and log appends when rebooting (bsc#1210025
ltc#196650).
* ima: process_measurement() needlessly takes inode_lock() on MAY_READ
(stable-fixes).
* intel_th: avoid using deprecated page->mapping, index fields (stable-fixes).
* iommu: Protect against overflow in iommu_pgsize() (git-fixes).
* iommu: Skip PASID validation for devices without PASID capability
(bsc#1244100)
* iommu: Validate the PASID in iommu_attach_device_pasid() (bsc#1244100)
* ip6mr: fix tables suspicious RCU usage (git-fixes).
* ip_tunnel: annotate data-races around t->parms.link (git-fixes).
* ipmr: fix incorrect parameter validation in the ip_mroute_getsockopt()
function (git-fixes).
* ipmr: fix tables suspicious RCU usage (git-fixes).
* ipv4: Convert ip_route_input() to dscp_t (git-fixes).
* ipv4: Correct/silence an endian warning in __ip_do_redirect (git-fixes).
* ipv6: save dontfrag in cork (git-fixes).
* ipvs: Always clear ipvs_property flag in skb_scrub_packet() (git-fixes).
* isolcpus: fix bug in returning number of allocated cpumask (bsc#1243774).
* jffs2: check jffs2_prealloc_raw_node_refs() result in few other places (git-
fixes).
* jffs2: check that raw node were preallocated before writing summary (git-
fixes).
* kABI workaround for hda_codec.beep_just_power_on flag (git-fixes).
* kABI: PCI: endpoint: Retain fixed-size BAR size as well as aligned size
(git-fixes).
* kABI: ipv6: save dontfrag in cork (git-fixes).
* kABI: serial: mctrl_gpio: split disable_ms into sync and no_sync APIs (git-
fixes).
* kabi: restore layout of struct cgroup_subsys (bsc#1241166).
* kabi: restore layout of struct mem_control (jsc#PED-12551).
* kabi: restore layout of struct page_counter (jsc#PED-12551).
* kernel-source: Remove log.sh from sources
* leds: pwm-multicolor: Add check for fwnode_property_read_u32 (stable-fixes).
* loop: Add sanity check for read/write_iter (git-fixes).
* loop: add file_start_write() and file_end_write() (git-fixes).
* mailbox: use error ret code of of_parse_phandle_with_args() (stable-fixes).
* md/raid1,raid10: do not handle IO error for REQ_RAHEAD and REQ_NOWAIT (git-
fixes).
* md/raid1: Add check for missing source disk in process_checks() (git-fixes).
* media: adv7180: Disable test-pattern control on adv7180 (stable-fixes).
* media: c8sectpfe: Call of_node_put(i2c_bus) only once in c8sectpfe_probe()
(stable-fixes).
* media: ccs-pll: Check for too high VT PLL multiplier in dual PLL case (git-
fixes).
* media: ccs-pll: Correct the upper limit of maximum op_pre_pll_clk_div (git-
fixes).
* media: ccs-pll: Start OP pre-PLL multiplier search from correct value (git-
fixes).
* media: ccs-pll: Start VT pre-PLL multiplier search from correct value (git-
fixes).
* media: cx231xx: set device_caps for 417 (stable-fixes).
* media: cxusb: no longer judge rbuf when the write fails (git-fixes).
* media: davinci: vpif: Fix memory leak in probe error path (git-fixes).
* media: gspca: Add error handling for stv06xx_read_sensor() (git-fixes).
* media: i2c: imx219: Correct the minimum vblanking value (stable-fixes).
* media: imx-jpeg: Cleanup after an allocation error (git-fixes).
* media: imx-jpeg: Drop the first error frames (git-fixes).
* media: imx-jpeg: Move mxc_jpeg_free_slot_data() ahead (git-fixes).
* media: imx-jpeg: Reset slot data pointers when freed (git-fixes).
* media: intel/ipu6: Fix dma mask for non-secure mode (git-fixes).
* media: ipu6: Remove workaround for Meteor Lake ES2 (git-fixes).
* media: nxp: imx8-isi: better handle the m2m usage_count (git-fixes).
* media: omap3isp: use sgtable-based scatterlist wrappers (git-fixes).
* media: ov2740: Move pm-runtime cleanup on probe-errors to proper place (git-
fixes).
* media: ov5675: suppress probe deferral errors (git-fixes).
* media: ov8856: suppress probe deferral errors (git-fixes).
* media: platform: mtk-mdp3: Remove unused mdp_get_plat_device (git-fixes).
* media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is
available (stable-fixes).
* media: rkvdec: Fix frame size enumeration (git-fixes).
* media: tc358746: improve calculation of the D-PHY timing registers (stable-
fixes).
* media: test-drivers: vivid: do not call schedule in loop (stable-fixes).
* media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map (stable-fixes).
* media: uvcvideo: Fix deferred probing error (git-fixes).
* media: uvcvideo: Handle uvc menu translation inside uvc_get_le_value
(stable-fixes).
* media: uvcvideo: Return the number of processed controls (git-fixes).
* media: v4l2-dev: fix error handling in __video_register_device() (git-
fixes).
* media: v4l: Memset argument to 0 before calling get_mbus_config pad op
(stable-fixes).
* media: venus: Fix probe error handling (git-fixes).
* media: verisilicon: Free post processor buffers on error (git-fixes).
* media: videobuf2: use sgtable-based scatterlist wrappers (git-fixes).
* media: vidtv: Terminating the subsequent process of initialization failure
(git-fixes).
* media: vivid: Change the siize of the composing (git-fixes).
* mfd: exynos-lpass: Avoid calling exynos_lpass_disable() twice in
exynos_lpass_remove() (git-fixes).
* mfd: stmpe-spi: Correct the name used in MODULE_DEVICE_TABLE (git-fixes).
* mfd: tps65219: Remove TPS65219_REG_TI_DEV_ID check (stable-fixes).
* mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).
* mm, memcg: cg2 memory{.swap,}.peak write handlers (jsc#PED-12551).
* mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).
* mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).
* mm/memcontrol: export memcg.swap watermark via sysfs for v2 memcg
(jsc#PED-12551).
* mmc: Add quirk to disable DDR50 tuning (stable-fixes).
* mmc: dw_mmc: add exynos7870 DW MMC support (stable-fixes).
* mmc: host: Wait for Vdd to settle on card power off (stable-fixes).
* mmc: sdhci: Disable SD card clock before changing parameters (stable-fixes).
* mtd: nand: ecc-mxic: Fix use of uninitialized variable ret (git-fixes).
* mtd: nand: sunxi: Add randomizer configuration before randomizer enable
(git-fixes).
* mtd: rawnand: sunxi: Add randomizer configuration in
sunxi_nfc_hw_ecc_write_chunk (git-fixes).
* neighbour: Do not let neigh_forced_gc() disable preemption for long (git-
fixes).
* net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (git-
fixes).
* net/mdiobus: Fix potential out-of-bounds read/write access (git-fixes).
* net/mlx4_en: Prevent potential integer overflow calculating Hz (git-fixes).
* net/mlx5: Add error handling in mlx5_query_nic_vport_node_guid() (git-
fixes).
* net/mlx5: Ensure fw pages are always allocated on same NUMA (git-fixes).
* net/mlx5: Fix ECVF vports unload on shutdown flow (git-fixes).
* net/mlx5: Fix return value when searching for existing flow group (git-
fixes).
* net/mlx5_core: Add error handling inmlx5_query_nic_vport_qkey_viol_cntr()
(git-fixes).
* net/mlx5e: Fix leak of Geneve TLV option object (git-fixes).
* net/neighbor: clear error in case strict check is not set (git-fixes).
* net/sched: fix use-after-free in taprio_dev_notifier (git-fixes).
* net: Fix TOCTOU issue in sk_is_readable() (git-fixes).
* net: Implement missing getsockopt(SO_TIMESTAMPING_NEW) (git-fixes).
* net: add rcu safety to rtnl_prop_list_size() (git-fixes).
* net: fix udp gso skb_segment after pull from frag_list (git-fixes).
* net: give more chances to rcu in netdev_wait_allrefs_any() (git-fixes).
* net: ice: Perform accurate aRFS flow match (git-fixes).
* net: ipv4: fix a memleak in ip_setup_cork (git-fixes).
* net: linkwatch: use system_unbound_wq (git-fixes).
* net: mana: Add support for Multi Vports on Bare metal (bsc#1244229).
* net: mana: Record doorbell physical address in PF mode (bsc#1244229).
* net: page_pool: fix warning code (git-fixes).
* net: phy: clear phydev->devlink when the link is deleted (git-fixes).
* net: phy: fix up const issues in to_mdio_device() and to_phy_device() (git-
fixes).
* net: phy: move phy_link_change() prior to mdio_bus_phy_may_suspend()
(bsc#1243538)
* net: phy: mscc: Fix memory leak when using one step timestamping (git-
fixes).
* net: phy: mscc: Stop clearing the the UDPv4 checksum for L2 frames (git-
fixes).
* net: sched: cls_u32: Fix allocation size in u32_init() (git-fixes).
* net: sched: consistently use rcu_replace_pointer() in taprio_change() (git-
fixes).
* net: sched: em_text: fix possible memory leak in em_text_destroy() (git-
fixes).
* net: sched: fix erspan_opt settings in cls_flower (git-fixes).
* net: usb: aqc111: debug info before sanitation (git-fixes).
* net: usb: aqc111: fix error handling of usbnet read calls (git-fixes).
* net: wwan: t7xx: Fix napi rx poll issue (git-fixes).
* net_sched: ets: fix a race in ets_qdisc_change() (git-fixes).
* net_sched: prio: fix a race in prio_tune() (git-fixes).
* net_sched: red: fix a race in __red_change() (git-fixes).
* net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
* net_sched: sch_sfq: reject invalid perturb period (git-fixes).
* net_sched: sch_sfq: use a temporary work area for validating configuration
(bsc#1232504)
* net_sched: tbf: fix a race in tbf_change() (git-fixes).
* netdev-genl: Hold rcu_read_lock in napi_get (git-fixes).
* netlink: fix potential sleeping issue in mqueue_flush_file (git-fixes).
* netlink: specs: dpll: replace underscores with dashes in names (git-fixes).
* netpoll: Use rcu_access_pointer() in __netpoll_setup (git-fixes).
* netpoll: hold rcu read lock in __netpoll_send_skb() (git-fixes).
* nfsd: Initialize ssc before laundromat_work to prevent NULL dereference
(git-fixes).
* nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request (git-
fixes).
* nfsd: validate the nfsd_serv pointer before calling svc_wake_up (git-fixes).
* ntp: Clamp maxerror and esterror to operating range (git-fixes)
* ntp: Remove invalid cast in time offset math (git-fixes)
* ntp: Safeguard against time_constant overflow (git-fixes)
* nvme-fc: do not reference lsrsp after failure (bsc#1245193).
* nvme-pci: add NVME_QUIRK_NO_DEEPEST_PS quirk for SOLIDIGM P44 Pro (git-
fixes).
* nvme-pci: add quirks for WDC Blue SN550 15b7:5009 (git-fixes).
* nvme-pci: add quirks for device 126f:1001 (git-fixes).
* nvme: always punt polled uring_cmd end_io work to task_work (git-fixes).
* nvme: fix command limits status code (git-fixes).
* nvme: fix implicit bool to flags conversion (git-fixes).
* nvmet-fc: free pending reqs on tgtport unregister (bsc#1245193).
* nvmet-fc: take tgtport refs for portentry (bsc#1245193).
* nvmet-fcloop: access fcpreq only when holding reqlock (bsc#1245193).
* nvmet-fcloop: add missing fcloop_callback_host_done (bsc#1245193).
* nvmet-fcloop: allocate/free fcloop_lsreq directly (bsc#1245193).
* nvmet-fcloop: do not wait for lport cleanup (bsc#1245193).
* nvmet-fcloop: drop response if targetport is gone (bsc#1245193).
* nvmet-fcloop: prevent double port deletion (bsc#1245193).
* nvmet-fcloop: refactor fcloop_delete_local_port (bsc#1245193).
* nvmet-fcloop: refactor fcloop_nport_alloc and track lport (bsc#1245193).
* nvmet-fcloop: remove nport from list on last user (bsc#1245193).
* nvmet-fcloop: track ref counts for nports (bsc#1245193).
* nvmet-fcloop: update refs on tfcp_req (bsc#1245193).
* orangefs: Do not truncate file size (git-fixes).
* pNFS/flexfiles: Report ENETDOWN as a connection error (git-fixes).
* page_pool: Fix use-after-free in page_pool_recycle_in_ring (git-fixes).
* phy: core: do not require set_mode() callback for phy_get_mode() to work
(stable-fixes).
* phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug (git-fixes).
* phy: renesas: rcar-gen3-usb2: Add support to initialize the bus (stable-
fixes).
* phy: renesas: rcar-gen3-usb2: Assert PLL reset on PHY power off (git-fixes).
* phy: renesas: rcar-gen3-usb2: Lock around hardware registers and driver data
(git-fixes).
* phy: renesas: rcar-gen3-usb2: Move IRQ request in probe (stable-fixes).
* pinctrl-tegra: Restore SFSEL bit when freeing pins (stable-fixes).
* pinctrl: armada-37xx: propagate error from armada_37xx_gpio_get() (stable-
fixes).
* pinctrl: armada-37xx: propagate error from armada_37xx_gpio_get_direction()
(stable-fixes).
* pinctrl: armada-37xx: propagate error from
armada_37xx_pmx_gpio_set_direction() (stable-fixes).
* pinctrl: armada-37xx: propagate error from armada_37xx_pmx_set_by_name()
(stable-fixes).
* pinctrl: armada-37xx: set GPIO output value before setting direction (git-
fixes).
* pinctrl: armada-37xx: use correct OUTPUT_VAL register for GPIOs > 31 (git-
fixes).
* pinctrl: at91: Fix possible out-of-boundary access (git-fixes).
* pinctrl: bcm281xx: Use "unsigned int" instead of bare "unsigned" (stable-
fixes).
* pinctrl: devicetree: do not goto err when probing hogs in pinctrl_dt_to_map
(stable-fixes).
* pinctrl: mcp23s08: Reset all pins to input at probe (stable-fixes).
* pinctrl: meson: define the pull up/down resistor value as 60 kOhm (stable-
fixes).
* pinctrl: qcom: pinctrl-qcm2290: Add missing pins (git-fixes).
* pinctrl: st: Drop unused st_gpio_bank() function (git-fixes).
* pinctrl: tegra: Fix off by one in tegra_pinctrl_get_group() (git-fixes).
* platform/x86/amd/hsmp: Add new error code and error logs (jsc#PED-13094).
* platform/x86/amd/hsmp: Add support for HSMP protocol version 7 messages
(jsc#PED-13094).
* platform/x86/amd/hsmp: Change generic plat_dev name to hsmp_pdev
(jsc#PED-13094).
* platform/x86/amd/hsmp: Change the error type (jsc#PED-13094).
* platform/x86/amd/hsmp: Convert amd_hsmp_rdwr() to a function pointer
(jsc#PED-13094).
* platform/x86/amd/hsmp: Create hsmp/ directory (jsc#PED-13094).
* platform/x86/amd/hsmp: Create separate ACPI, plat and common drivers
(jsc#PED-13094).
* platform/x86/amd/hsmp: Create wrapper function init_acpi() (jsc#PED-13094).
* platform/x86/amd/hsmp: Make amd_hsmp and hsmp_acpi as mutually exclusive
drivers (jsc#PED-13094).
* platform/x86/amd/hsmp: Make hsmp_pdev static instead of global
(jsc#PED-13094).
* platform/x86/amd/hsmp: Move ACPI code to acpi.c (jsc#PED-13094).
* platform/x86/amd/hsmp: Move platform device specific code to plat.c
(jsc#PED-13094).
* platform/x86/amd/hsmp: Move structure and macros to header file
(jsc#PED-13094).
* platform/x86/amd/hsmp: Report power via hwmon sensor (jsc#PED-13094).
* platform/x86/amd/hsmp: Use a single DRIVER_VERSION for all hsmp modules
(jsc#PED-13094).
* platform/x86/amd/hsmp: Use dev_groups in the driver structure
(jsc#PED-13094).
* platform/x86/amd/hsmp: Use name space while exporting module symbols
(jsc#PED-13094).
* platform/x86/amd/hsmp: acpi: Add sysfs files to display HSMP telemetry
(jsc#PED-13094).
* platform/x86/amd/hsmp: fix building with CONFIG_HWMON=m (jsc#PED-13094).
* platform/x86/amd/hsmp: mark hsmp_msg_desc_table as maybe_unused (git-fixes).
* platform/x86/amd: pmc: Clear metrics table at start of cycle (git-fixes).
* platform/x86/intel-uncore-freq: Fail module load when plat_info is NULL
(git-fixes).
* platform/x86: amd: Use _-y instead of_ -objs in Makefiles (jsc#PED-13094).
* platform/x86: dell_rbu: Fix list usage (git-fixes).
* platform/x86: dell_rbu: Stop overwriting data buffer (git-fixes).
* platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (git-fixes).
* platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (stable-fixes).
* platform/x86: hp-bioscfg: Annotate struct bios_args with __counted_by
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Change how enum possible values size is evaluated
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Change how order list size is evaluated
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Change how password encoding size is evaluated
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Change how prerequisites size is evaluated
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Fix error handling in hp_add_other_attributes()
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Fix memory leaks in attribute packages
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Fix reference leak (jsc#PED-13019).
* platform/x86: hp-bioscfg: Fix uninitialized variable errors (jsc#PED-13019).
* platform/x86: hp-bioscfg: Makefile (jsc#PED-13019).
* platform/x86: hp-bioscfg: Remove duplicate use of variable in inner loop
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Remove unused obj in hp_add_other_attributes()
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Removed needless asm-generic (jsc#PED-13019).
* platform/x86: hp-bioscfg: Replace the word HACK from source code
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Simplify return check in hp_add_other_attributes()
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Update steps order list elements are evaluated
(jsc#PED-13019).
* platform/x86: hp-bioscfg: Use kmemdup() to replace kmalloc + memcpy
(jsc#PED-13019).
* platform/x86: hp-bioscfg: biosattr-interface (jsc#PED-13019).
* platform/x86: hp-bioscfg: bioscfg (jsc#PED-13019).
* platform/x86: hp-bioscfg: bioscfg-h (jsc#PED-13019).
* platform/x86: hp-bioscfg: enum-attributes (jsc#PED-13019).
* platform/x86: hp-bioscfg: fix a signedness bug in hp_wmi_perform_query()
(jsc#PED-13019).
* platform/x86: hp-bioscfg: fix error reporting in hp_add_other_attributes()
(jsc#PED-13019).
* platform/x86: hp-bioscfg: int-attributes (jsc#PED-13019).
* platform/x86: hp-bioscfg: move mutex_lock() down in
hp_add_other_attributes() (jsc#PED-13019).
* platform/x86: hp-bioscfg: order-list-attributes (jsc#PED-13019).
* platform/x86: hp-bioscfg: passwdobj-attributes (jsc#PED-13019).
* platform/x86: hp-bioscfg: prevent a small buffer overflow (jsc#PED-13019).
* platform/x86: hp-bioscfg: spmobj-attributes (jsc#PED-13019).
* platform/x86: hp-bioscfg: string-attributes (jsc#PED-13019).
* platform/x86: hp-bioscfg: surestart-attributes (jsc#PED-13019).
* platform/x86: ideapad-laptop: use usleep_range() for EC polling (git-fixes).
* platform/x86: thinkpad_acpi: Ignore battery threshold change event
notification (stable-fixes).
* platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (git-fixes).
* platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (stable-fixes).
* power: reset: at91-reset: Optimize at91_reset() (git-fixes).
* power: supply: bq27xxx: Retrieve again when busy (stable-fixes).
* power: supply: collie: Fix wakeup source leaks on device unbind (stable-
fixes).
* powerpc/eeh: Fix missing PE bridge reconfiguration during VFIO EEH recovery
(bsc#1215199).
* powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap
(bsc#1244309 ltc#213790).
* powerpc/pseries/msi: Avoid reading PCI device registers in reduced power
states (bsc#1215199).
* powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309
ltc#213790).
* pstore: Change kmsg_bytes storage size to u32 (git-fixes).
* ptp: ocp: fix start time alignment in ptp_ocp_signal_set (git-fixes).
* ptp: ocp: reject unsupported periodic output flags (git-fixes).
* ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use() (git-fixes).
* r8152: add vendor/device ID pair for Dell Alienware AW1022z (git-fixes).
* regulator: ad5398: Add device tree support (stable-fixes).
* regulator: max14577: Add error check for max14577_read_reg() (git-fixes).
* regulator: max20086: Change enable gpio to optional (git-fixes).
* regulator: max20086: Fix MAX200086 chip id (git-fixes).
* regulator: max20086: Fix refcount leak in max20086_parse_regulators_dt()
(git-fixes).
* rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when
someone tries (needs) to build the kernel with clang.
* rpm/kernel-source.changes.old: Drop bogus bugzilla reference (bsc#1244725)
* rpm: Stop using is_kotd_qa macro This macro is set by bs-upload-kernel, and
a conditional in each spec file is used to determine when to build the spec
file. This logic should not really be in the spec file. Previously this was
done with package links and package meta for the individula links. However,
the use of package links is rejected for packages in git based release
projects (nothing to do with git actually, new policy). An alternative to
package links is multibuild. However, for multibuild packages package meta
cannot be used to set which spec file gets built. Use prjcon buildflags
instead, and remove this conditional. Depends on bs-upload-kernel adding the
build flag.
* rtc: Fix offset calculation for .start_secs < 0 (git-fixes).
* rtc: Make rtc_time64_to_tm() support dates before 1970 (stable-fixes).
* rtc: at91rm9200: drop unused module alias (git-fixes).
* rtc: cmos: use spin_lock_irqsave in cmos_interrupt (git-fixes).
* rtc: cpcap: drop unused module alias (git-fixes).
* rtc: da9063: drop unused module alias (git-fixes).
* rtc: ds1307: stop disabling alarms on probe (stable-fixes).
* rtc: jz4740: drop unused module alias (git-fixes).
* rtc: pm8xxx: drop unused module alias (git-fixes).
* rtc: rv3032: fix EERD location (stable-fixes).
* rtc: s3c: drop unused module alias (git-fixes).
* rtc: sh: assign correct interrupts with DT (git-fixes).
* rtc: stm32: drop unused module alias (git-fixes).
* s390/pci: Allow re-add of a reserved but not yet removed device
(bsc#1244145).
* s390/pci: Fix __pcilg_mio_inuser() inline assembly (git-fixes bsc#1245226).
* s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child
VFs (git-fixes bsc#1244145).
* s390/pci: Fix potential double remove of hotplug slot (bsc#1244145).
* s390/pci: Prevent self deletion in disable_slot() (bsc#1244145).
* s390/pci: Remove redundant bus removal and disable from
zpci_release_device() (bsc#1244145).
* s390/pci: Serialize device addition and removal (bsc#1244145).
* s390/pci: introduce lock to synchronize state of zpci_dev's (jsc#PED-10253
bsc#1244145).
* s390/pci: remove hotplug slot when releasing the device (bsc#1244145).
* s390/pci: rename lock member in struct zpci_dev (jsc#PED-10253 bsc#1244145).
* s390/tty: Fix a potential memory leak bug (git-fixes bsc#1245228).
* scsi: Improve CDL control (git-fixes).
* scsi: dc395x: Remove DEBUG conditional compilation (git-fixes).
* scsi: dc395x: Remove leftover if statement in reselect() (git-fixes).
* scsi: elx: efct: Fix memory leak in efct_hw_parse_filter() (git-fixes).
* scsi: hisi_sas: Call I_T_nexus after soft reset for SATA disk (git-fixes).
* scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git-
fixes).
* scsi: iscsi: Fix incorrect error path labels for flashnode operations (git-
fixes).
* scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes).
* scsi: mpi3mr: Add level check to control event logging (git-fixes).
* scsi: mpt3sas: Fix _ctl_get_mpt_mctp_passthru_adapter() to return IOC
pointer (git-fixes).
* scsi: mpt3sas: Send a diag reset if target reset fails (git-fixes).
* scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes).
* scsi: qedf: Use designated initializer for struct qed_fcoe_cb_ops (git-
fixes).
* scsi: sd_zbc: block: Respect bio vector limits for REPORT ZONES buffer (git-
fixes).
* scsi: smartpqi: Fix smp_processor_id() call trace for preemptible kernels
(git-fixes).
* scsi: st: ERASE does not change tape location (git-fixes).
* scsi: st: Restore some drive settings after reset (git-fixes).
* scsi: st: Tighten the page format heuristics with MODE SELECT (git-fixes).
* scsi: storvsc: Do not report the host packet status as the hv status (git-
fixes).
* scsi: storvsc: Increase the timeouts to storvsc_timeout (git-fixes).
* selftests/bpf: Fix bpf_nf selftest failure (git-fixes).
* selftests/mm: restore default nr_hugepages value during cleanup in
hugetlb_reparenting_test.sh (git-fixes).
* selftests/net: have `gro.sh -t` return a correct exit code (stable-fixes).
* selftests/seccomp: fix syscall_restart test for arm compat (git-fixes).
* serial: Fix potential null-ptr-deref in mlb_usio_probe() (git-fixes).
* serial: core: restore of_node information in sysfs (git-fixes).
* serial: imx: Restore original RXTL for console to fix data loss (git-fixes).
* serial: jsm: fix NPE during jsm_uart_port_init (git-fixes).
* serial: mctrl_gpio: split disable_ms into sync and no_sync APIs (git-fixes).
* serial: sh-sci: Move runtime PM enable to sci_probe_single() (stable-fixes).
* serial: sh-sci: Save and restore more registers (git-fixes).
* serial: sh-sci: Update the suspend/resume support (stable-fixes).
* smb3: fix Open files on server counter going negative (git-fixes).
* smb: client: Use str_yes_no() helper function (git-fixes).
* smb: client: allow more DFS referrals to be cached (git-fixes).
* smb: client: avoid unnecessary reconnects when refreshing referrals (git-
fixes).
* smb: client: change return value in open_cached_dir_by_dentry() if !cfids
(git-fixes).
* smb: client: do not retry DFS targets on server shutdown (git-fixes).
* smb: client: do not trust DFSREF_STORAGE_SERVER bit (git-fixes).
* smb: client: do not try following DFS links in cifs_tree_connect() (git-
fixes).
* smb: client: fix DFS interlink failover (git-fixes).
* smb: client: fix DFS mount against old servers with NTLMSSP (git-fixes).
* smb: client: fix hang in wait_for_response() for negproto (bsc#1242709).
* smb: client: fix potential race in cifs_put_tcon() (git-fixes).
* smb: client: fix return value of parse_dfs_referrals() (git-fixes).
* smb: client: get rid of @nlsc param in cifs_tree_connect() (git-fixes).
* smb: client: get rid of TCP_Server_Info::refpath_lock (git-fixes).
* smb: client: get rid of kstrdup() in get_ses_refpath() (git-fixes).
* smb: client: improve purging of cached referrals (git-fixes).
* smb: client: introduce av_for_each_entry() helper (git-fixes).
* smb: client: optimize referral walk on failed link targets (git-fixes).
* smb: client: parse DNS domain name from domain= option (git-fixes).
* smb: client: parse av pair type 4 in CHALLENGE_MESSAGE (git-fixes).
* smb: client: provide dns_resolve_{unc,name} helpers (git-fixes).
* smb: client: refresh referral without acquiring refpath_lock (git-fixes).
* smb: client: remove unnecessary checks in open_cached_dir() (git-fixes).
* soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop() (git-fixes).
* soc: aspeed: lpc: Fix impossible judgment condition (git-fixes).
* soc: qcom: smp2p: Fix fallback to qcom,ipc parse (git-fixes).
* soc: ti: k3-socinfo: Do not use syscon helper to build regmap (stable-
fixes).
* software node: Correct a OOB check in software_node_get_reference_args()
(stable-fixes).
* soundwire: amd: change the soundwire wake enable/disable sequence (stable-
fixes).
* spi-rockchip: Fix register out of bounds access (stable-fixes).
* spi: bcm63xx-hsspi: fix shared reset (git-fixes).
* spi: bcm63xx-spi: fix shared reset (git-fixes).
* spi: sh-msiof: Fix maximum DMA transfer size (git-fixes).
* spi: spi-sun4i: fix early activation (stable-fixes).
* spi: tegra210-quad: Fix X1_X2_X4 encoding and support x4 transfers (git-
fixes).
* spi: tegra210-quad: modify chip select (CS) deactivation (git-fixes).
* spi: tegra210-quad: remove redundant error handling code (git-fixes).
* spi: zynqmp-gqspi: Always acknowledge interrupts (stable-fixes).
* staging: iio: ad5933: Correct settling cycles encoding per datasheet (git-
fixes).
* staging: rtl8723bs: Avoid memset() in aes_cipher() and aes_decipher() (git-
fixes).
* struct usci: hide additional member (git-fixes).
* sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (git-
fixes).
* supported.conf: Add SNP SVSM vTPM driver
* supported.conf: add it
* supported.conf: support firmware_attributes_class
* svsm: Add header with SVSM_VTPM_CMD helpers (bsc#1241191).
* sysfb: Fix screen_info type check for VGA (git-fixes).
* tcp/dccp: allow a connection when sk_max_ack_backlog is zero (git-fixes).
* tcp/dccp: bypass empty buckets in inet_twsk_purge() (git-fixes).
* tcp/dccp: complete lockless accesses to sk->sk_max_ack_backlog (git-fixes).
* tcp: bring back NUMA dispersion in inet_ehash_locks_alloc() (git-fixes).
* tcp_metrics: optimize tcp_metrics_flush_all() (git-fixes).
* thermal/drivers/mediatek/lvts: Fix debugfs unregister on failure (git-
fixes).
* thermal/drivers/qoriq: Power down TMU on system suspend (stable-fixes).
* thunderbolt: Do not add non-active NVM if NVM upgrade is disabled for
retimer (stable-fixes).
* thunderbolt: Do not double dequeue a configuration request (stable-fixes).
* thunderbolt: Fix a logic error in wake on connect (git-fixes).
* thunderbolt: Improve redrive mode handling (git-fixes).
* timekeeping: Fix bogus clock_was_set() invocation in (git-fixes)
* timekeeping: Fix cross-timestamp interpolation corner case (git-fixes)
* timekeeping: Fix cross-timestamp interpolation for non-x86 (git-fixes)
* timekeeping: Fix cross-timestamp interpolation on counter (git-fixes)
* tpm: Add SNP SVSM vTPM driver (bsc#1241191).
* tpm: Make chip->{status,cancel,req_canceled} opt (bsc#1241191).
* trace/trace_event_perf: remove duplicate samples on the first tracepoint
event (git-fixes).
* tracing/eprobe: Fix to release eprobe when failed to add dyn_event (git-
fixes).
* tracing: Add __print_dynamic_array() helper (bsc#1243544).
* tracing: Add __string_len() example (bsc#1243544).
* tracing: Fix cmp_entries_dup() to respect sort() comparison rules (git-
fixes).
* tracing: Fix compilation warning on arm32 (bsc#1243551).
* tracing: Use atomic64_inc_return() in trace_clock_counter() (git-fixes).
* truct dwc3 hide new member wakeup_pending_funcs (git-fixes).
* tty: serial: 8250_omap: fix TX with DMA for am33xx (git-fixes).
* ucsi_debugfs_entry: hide signedness change (git-fixes).
* udp: annotate data-races around up->pending (git-fixes).
* udp: fix incorrect parameter validation in the udp_lib_getsockopt() function
(git-fixes).
* udp: fix receiving fraglist GSO packets (git-fixes).
* udp: preserve the connected status if only UDP cmsg (git-fixes).
* uprobes: Use kzalloc to allocate xol area (git-fixes).
* usb: Flush altsetting 0 endpoints before reinitializating them after reset
(git-fixes).
* usb: cdnsp: Fix issue with detecting USB 3.2 speed (git-fixes).
* usb: cdnsp: Fix issue with detecting command completion event (git-fixes).
* usb: dwc3: gadget: Make gadget_wakeup asynchronous (git-fixes).
* usb: misc: onboard_usb_dev: fix support for Cypress HX3 hubs (git-fixes).
* usb: quirks: Add NO_LPM quirk for SanDisk Extreme 55AE (stable-fixes).
* usb: renesas_usbhs: Reorder clock handling and power management in probe
(git-fixes).
* usb: storage: Ignore UAS driver for SanDisk 3.2 Gen2 storage device (stable-
fixes).
* usb: typec: tcpm/tcpci_maxim: Fix bounds check in process_rx() (git-fixes).
* usb: typec: tcpm: move tcpm_queue_vdm_unlocked to asynchronous work (git-
fixes).
* usb: typec: ucsi: Only enable supported notifications (git-fixes).
* usb: typec: ucsi: allow non-partner GET_PDOS for Qualcomm devices (git-
fixes).
* usb: typec: ucsi: fix Clang -Wsign-conversion warning (git-fixes).
* usb: typec: ucsi: fix UCSI on buggy Qualcomm devices (git-fixes).
* usb: typec: ucsi: limit the UCSI_NO_PARTNER_PDOS even further (git-fixes).
* usb: usbtmc: Fix read_stb function and get_stb ioctl (git-fixes).
* usb: usbtmc: Fix timeout value in get_stb (git-fixes).
* usb: xhci: Do not change the status of stalled TDs on failed Stop EP
(stable-fixes).
* usbnet: asix AX88772: leave the carrier control to phylink (stable-fixes).
* vgacon: Add check for vc_origin address range in vgacon_scroll() (git-
fixes).
* vmxnet3: correctly report gso type for UDP tunnels (bsc#1244626).
* vmxnet3: support higher link speeds from vmxnet3 v9 (bsc#1244626).
* vmxnet3: update MTU after device quiesce (bsc#1244626).
* vt: remove VT_RESIZE and VT_RESIZEX from vt_compat_ioctl() (git-fixes).
* watchdog: da9052_wdt: respect TWDMIN (stable-fixes).
* watchdog: exar: Shorten identity name to fit correctly (git-fixes).
* watchdog: fix watchdog may detect false positive of softlockup (stable-
fixes).
* watchdog: it87_wdt: add PWRGD enable quirk for Qotom QCML04 (git-fixes).
* watchdog: mediatek: Add support for MT6735 TOPRGU/WDT (git-fixes).
* wifi: ath11k: Fix QMI memory reuse logic (stable-fixes).
* wifi: ath11k: avoid burning CPU in ath11k_debugfs_fw_stats_request() (git-
fixes).
* wifi: ath11k: convert timeouts to secs_to_jiffies() (stable-fixes).
* wifi: ath11k: do not use static variables in
ath11k_debugfs_fw_stats_process() (git-fixes).
* wifi: ath11k: do not wait when there is no vdev started (git-fixes).
* wifi: ath11k: fix node corruption in ar->arvifs list (git-fixes).
* wifi: ath11k: fix ring-buffer corruption (git-fixes).
* wifi: ath11k: fix rx completion meta data corruption (git-fixes).
* wifi: ath11k: fix soc_dp_stats debugfs file permission (stable-fixes).
* wifi: ath11k: move some firmware stats related functions outside of debugfs
(git-fixes).
* wifi: ath11k: update channel list in worker when wait flag is set
(bsc#1243847).
* wifi: ath11k: validate ath11k_crypto_mode on top of
ath11k_core_qmi_firmware_ready (git-fixes).
* wifi: ath12k: ACPI CCA threshold support (bsc#1240998).
* wifi: ath12k: ACPI SAR support (bsc#1240998).
* wifi: ath12k: ACPI TAS support (bsc#1240998).
* wifi: ath12k: ACPI band edge channel power support (bsc#1240998).
* wifi: ath12k: Add MSDU length validation for TKIP MIC error (git-fixes).
* wifi: ath12k: Add additional checks for vif and sta iterators (bsc#1240998).
* wifi: ath12k: Add firmware coredump collection support (bsc#1240998).
* wifi: ath12k: Add htt_stats_dump file ops support (bsc#1240998).
* wifi: ath12k: Add lock to protect the hardware state (bsc#1240998).
* wifi: ath12k: Add missing htt_metadata flag in ath12k_dp_tx() (bsc#1240998).
* wifi: ath12k: Add support to enable debugfs_htt_stats (bsc#1240998).
* wifi: ath12k: Add support to parse requested stats_type (bsc#1240998).
* wifi: ath12k: Avoid -Wflex-array-member-not-at-end warnings (bsc#1240998).
* wifi: ath12k: Avoid napi_sync() before napi_enable() (stable-fixes).
* wifi: ath12k: Cache vdev configs before vdev create (bsc#1240998).
* wifi: ath12k: Dump additional Tx PDEV HTT stats (bsc#1240998).
* wifi: ath12k: Fetch regdb.bin file from board-2.bin (stable-fixes).
* wifi: ath12k: Fix WARN_ON during firmware crash in split-phy (bsc#1240998).
* wifi: ath12k: Fix WMI tag for EHT rate in peer assoc (git-fixes).
* wifi: ath12k: Fix buffer overflow in debugfs (bsc#1240998).
* wifi: ath12k: Fix devmem address prefix when logging (bsc#1240998).
* wifi: ath12k: Fix end offset bit definition in monitor ring descriptor
(stable-fixes).
* wifi: ath12k: Fix for out-of bound access error (bsc#1240998).
* wifi: ath12k: Fix invalid memory access while forming 802.11 header (git-
fixes).
* wifi: ath12k: Fix memory leak during vdev_id mismatch (git-fixes).
* wifi: ath12k: Fix pdev id sent to firmware for single phy devices
(bsc#1240998).
* wifi: ath12k: Fix the QoS control field offset to build QoS header (git-
fixes).
* wifi: ath12k: Handle error cases during extended skb allocation (git-fixes).
* wifi: ath12k: Improve BSS discovery with hidden SSID in 6 GHz band (stable-
fixes).
* wifi: ath12k: Introduce device index (bsc#1240998).
* wifi: ath12k: Modify add and remove chanctx ops for single wiphy support
(bsc#1240998).
* wifi: ath12k: Modify print_array_to_buf() to support arrays with 1-based
semantics (bsc#1240998).
* wifi: ath12k: Modify rts threshold mac op for single wiphy (bsc#1240998).
* wifi: ath12k: Modify set and get antenna mac ops for single wiphy
(bsc#1240998).
* wifi: ath12k: Optimize the lock contention of used list in Rx data path
(bsc#1240998).
* wifi: ath12k: Pass correct values of center freq1 and center freq2 for 160
MHz (stable-fixes).
* wifi: ath12k: Prevent sending WMI commands to firmware during firmware crash
(bsc#1240998).
* wifi: ath12k: Refactor Rxdma buffer replinish argument (bsc#1240998).
* wifi: ath12k: Refactor data path cmem init (bsc#1240998).
* wifi: ath12k: Refactor error handler of Rxdma replenish (bsc#1240998).
* wifi: ath12k: Refactor idle ring descriptor setup (bsc#1240998).
* wifi: ath12k: Refactor the hardware cookie conversion init (bsc#1240998).
* wifi: ath12k: Refactor the hardware recovery procedure (bsc#1240998).
* wifi: ath12k: Refactor the hardware state (bsc#1240998).
* wifi: ath12k: Remove unsupported tx monitor handling (bsc#1240998).
* wifi: ath12k: Remove unused ath12k_base from ath12k_hw (bsc#1240998).
* wifi: ath12k: Remove unused tcl_*_ring configuration (bsc#1240998).
* wifi: ath12k: Replace "chip" with "device" in hal Rx return buffer manager
(bsc#1240998).
* wifi: ath12k: Report proper tx completion status to mac80211 (stable-fixes).
* wifi: ath12k: Resolve multicast packet drop by populating key_cipher in
ath12k_install_key() (bsc#1240998).
* wifi: ath12k: Support BE OFDMA Pdev Rate Stats (bsc#1240998).
* wifi: ath12k: Support DMAC Reset Stats (bsc#1240998).
* wifi: ath12k: Support Pdev OBSS Stats (bsc#1240998).
* wifi: ath12k: Support Pdev Scheduled Algorithm Stats (bsc#1240998).
* wifi: ath12k: Support Ring and SFM stats (bsc#1240998).
* wifi: ath12k: Support Self-Generated Transmit stats (bsc#1240998).
* wifi: ath12k: Support TQM stats (bsc#1240998).
* wifi: ath12k: Support Transmit DE stats (bsc#1240998).
* wifi: ath12k: Support Transmit Scheduler stats (bsc#1240998).
* wifi: ath12k: Support pdev CCA Stats (bsc#1240998).
* wifi: ath12k: Support pdev Transmit Multi-user stats (bsc#1240998).
* wifi: ath12k: Support pdev error stats (bsc#1240998).
* wifi: ath12k: add 6 GHz params in peer assoc command (bsc#1240998).
* wifi: ath12k: add ATH12K_DBG_WOW log level (bsc#1240998).
* wifi: ath12k: add EMA beacon support (bsc#1240998).
* wifi: ath12k: add MBSSID beacon support (bsc#1240998).
* wifi: ath12k: add WoW net-detect functionality (bsc#1240998).
* wifi: ath12k: add basic WoW functionalities (bsc#1240998).
* wifi: ath12k: add channel 2 into 6 GHz channel list (bsc#1240998).
* wifi: ath12k: add hw_link_id in ath12k_pdev (bsc#1240998).
* wifi: ath12k: add missing lockdep_assert_wiphy() for ath12k_mac_op_
functions (bsc#1240998).
* wifi: ath12k: add multi device support for WBM idle ring buffer setup
(bsc#1240998).
* wifi: ath12k: add multiple radio support in a single MAC HW un/register
(bsc#1240998).
* wifi: ath12k: add panic handler (bsc#1240998).
* wifi: ath12k: add support to handle beacon miss for WCN7850 (bsc#1240998).
* wifi: ath12k: advertise driver capabilities for MBSSID and EMA
(bsc#1240998).
* wifi: ath12k: allocate dummy net_device dynamically (bsc#1240998).
* wifi: ath12k: ath12k_mac_op_set_key(): fix uninitialized symbol 'ret'
(bsc#1240998).
* wifi: ath12k: ath12k_mac_op_sta_state(): clean up update_wk cancellation
(bsc#1240998).
* wifi: ath12k: ath12k_mac_set_key(): remove exit label (bsc#1240998).
* wifi: ath12k: avoid double SW2HW_MACID conversion (bsc#1240998).
* wifi: ath12k: avoid duplicated vdev down (bsc#1240998).
* wifi: ath12k: avoid redundant code in Rx cookie conversion init
(bsc#1240998).
* wifi: ath12k: avoid stopping mac80211 queues in ath12k_core_restart()
(bsc#1240998).
* wifi: ath12k: avoid unnecessary MSDU drop in the Rx error process
(bsc#1240998).
* wifi: ath12k: change supports_suspend to true for WCN7850 (bsc#1240998).
* wifi: ath12k: cleanup unneeded labels (bsc#1240998).
* wifi: ath12k: configure MBSSID parameters in AP mode (bsc#1240998).
* wifi: ath12k: configure MBSSID params in vdev create/start (bsc#1240998).
* wifi: ath12k: convert struct ath12k_sta::update_wk to use struct wiphy_work
(bsc#1240998).
* wifi: ath12k: correct the capital word typo (bsc#1240998).
* wifi: ath12k: create a structure for WMI vdev up parameters (bsc#1240998).
* wifi: ath12k: debugfs: radar simulation support (bsc#1240998).
* wifi: ath12k: decrease MHI channel buffer length to 8KB (bsc#1240998).
* wifi: ath12k: delete NSS and TX power setting for monitor vdev
(bsc#1240998).
* wifi: ath12k: displace the Tx and Rx descriptor in cookie conversion table
(bsc#1240998).
* wifi: ath12k: do not dump SRNG statistics during resume (bsc#1240998).
* wifi: ath12k: do not process consecutive RDDM event (bsc#1240998).
* wifi: ath12k: do not use %pK in dmesg format strings (bsc#1240998).
* wifi: ath12k: dynamic VLAN support (bsc#1240998).
* wifi: ath12k: dynamically update peer puncturing bitmap for STA
(bsc#1240998).
* wifi: ath12k: enable WIPHY_FLAG_DISABLE_WEXT (bsc#1240998).
* wifi: ath12k: enable service flag for survey dump stats (bsc#1240998).
* wifi: ath12k: extend the link capable flag (bsc#1240998).
* wifi: ath12k: fetch correct radio based on vdev status (bsc#1240998).
* wifi: ath12k: fix A-MSDU indication in monitor mode (bsc#1240998).
* wifi: ath12k: fix ACPI warning when resume (bsc#1240998).
* wifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850 (git-fixes).
* wifi: ath12k: fix NULL pointer access in ath12k_mac_op_get_survey()
(bsc#1240998).
* wifi: ath12k: fix Smatch warnings on ath12k_core_suspend() (bsc#1240998).
* wifi: ath12k: fix a possible dead lock caused by ab->base_lock (stable-
fixes).
* wifi: ath12k: fix ack signal strength calculation (bsc#1240998).
* wifi: ath12k: fix ath12k_hal_tx_cmd_ext_desc_setup() info1 override (stable-
fixes).
* wifi: ath12k: fix build vs old compiler (bsc#1240998).
* wifi: ath12k: fix calling correct function for rx monitor mode
(bsc#1240998).
* wifi: ath12k: fix cleanup path after mhi init (git-fixes).
* wifi: ath12k: fix desc address calculation in wbm tx completion
(bsc#1240998).
* wifi: ath12k: fix driver initialization for WoW unsupported devices
(bsc#1240998).
* wifi: ath12k: fix failed to set mhi state error during reboot with hardware
grouping (stable-fixes).
* wifi: ath12k: fix flush failure in recovery scenarios (bsc#1240998).
* wifi: ath12k: fix hal_rx_buf_return_buf_manager documentation (bsc#1240998).
* wifi: ath12k: fix incorrect CE addresses (stable-fixes).
* wifi: ath12k: fix invalid access to memory (git-fixes).
* wifi: ath12k: fix key cache handling (bsc#1240998).
* wifi: ath12k: fix legacy peer association due to missing HT or 6 GHz
capabilities (bsc#1240998).
* wifi: ath12k: fix link capable flags (bsc#1240998).
* wifi: ath12k: fix link valid field initialization in the monitor Rx (stable-
fixes).
* wifi: ath12k: fix mac id extraction when MSDU spillover in rx error path
(bsc#1240998).
* wifi: ath12k: fix macro definition HAL_RX_MSDU_PKT_LENGTH_GET (stable-
fixes).
* wifi: ath12k: fix mbssid max interface advertisement (bsc#1240998).
* wifi: ath12k: fix missing endianness conversion in wmi_vdev_create_cmd()
(bsc#1240998).
* wifi: ath12k: fix misspelling of "dma" in num_rxmda_per_pdev (bsc#1240998).
* wifi: ath12k: fix node corruption in ar->arvifs list (git-fixes).
* wifi: ath12k: fix one more memcpy size error (bsc#1240998).
* wifi: ath12k: fix per pdev debugfs registration (bsc#1240998).
* wifi: ath12k: fix reusing outside iterator in ath12k_wow_vif_set_wakeups()
(bsc#1240998).
* wifi: ath12k: fix ring-buffer corruption (git-fixes).
* wifi: ath12k: fix skb_ext_desc leak in ath12k_dp_tx() error path
(bsc#1240998).
* wifi: ath12k: fix struct hal_rx_mpdu_start (bsc#1240998).
* wifi: ath12k: fix struct hal_rx_phyrx_rssi_legacy_info (bsc#1240998).
* wifi: ath12k: fix struct hal_rx_ppdu_end_user_stats (bsc#1240998).
* wifi: ath12k: fix struct hal_rx_ppdu_start (bsc#1240998).
* wifi: ath12k: fix survey dump collection in 6 GHz (bsc#1240998).
* wifi: ath12k: fix the ampdu id fetch in the HAL_RX_MPDU_START TLV (stable-
fixes).
* wifi: ath12k: fix the stack frame size warning in ath12k_mac_op_hw_scan
(bsc#1240998).
* wifi: ath12k: fix use-after-free in ath12k_dp_cc_cleanup() (bsc#1240998).
* wifi: ath12k: fix warning on DMA ring capabilities event (bsc#1240998).
* wifi: ath12k: flush all packets before suspend (bsc#1240998).
* wifi: ath12k: handle keepalive during WoWLAN suspend and resume
(bsc#1240998).
* wifi: ath12k: handle symlink cleanup for per pdev debugfs dentry
(bsc#1240998).
* wifi: ath12k: implement WoW enable and wakeup commands (bsc#1240998).
* wifi: ath12k: implement hardware data filter (bsc#1240998).
* wifi: ath12k: improve the rx descriptor error information (bsc#1240998).
* wifi: ath12k: initial debugfs support (bsc#1240998).
* wifi: ath12k: make read-only array svc_id static const (bsc#1240998).
* wifi: ath12k: modify ath12k mac start/stop ops for single wiphy
(bsc#1240998).
* wifi: ath12k: modify ath12k_get_arvif_iter() for MLO (bsc#1240998).
* wifi: ath12k: modify ath12k_mac_op_bss_info_changed() for MLO (bsc#1240998).
* wifi: ath12k: modify ath12k_mac_op_set_key() for MLO (bsc#1240998).
* wifi: ath12k: modify ath12k_mac_vif_chan() for MLO (bsc#1240998).
* wifi: ath12k: modify link arvif creation and removal for MLO (bsc#1240998).
* wifi: ath12k: modify regulatory support for single wiphy architecture
(bsc#1240998).
* wifi: ath12k: modify remain on channel for single wiphy (bsc#1240998).
* wifi: ath12k: move txbaddr/rxbaddr into struct ath12k_dp (bsc#1240998).
* wifi: ath12k: no need to handle pktlog during suspend/resume (bsc#1240998).
* wifi: ath12k: pass ath12k_link_vif instead of vif/ahvif (bsc#1240998).
* wifi: ath12k: prepare sta data structure for MLO handling (bsc#1240998).
* wifi: ath12k: prepare vif config caching for MLO (bsc#1240998).
* wifi: ath12k: prepare vif data structure for MLO handling (bsc#1240998).
* wifi: ath12k: read single_chip_mlo_support parameter from QMI PHY capability
(bsc#1240998).
* wifi: ath12k: rearrange IRQ enable/disable in reset path (bsc#1240998).
* wifi: ath12k: refactor SMPS configuration (bsc#1240998).
* wifi: ath12k: refactor arvif security parameter configuration (bsc#1240998).
* wifi: ath12k: refactor ath12k_hw_regs structure (stable-fixes).
* wifi: ath12k: refactor rx descriptor CMEM configuration (bsc#1240998).
* wifi: ath12k: remove MHI LOOPBACK channels (bsc#1240998).
* wifi: ath12k: remove duplicate definition of MAX_RADIOS (bsc#1240998).
* wifi: ath12k: remove duplicate definitions in wmi.h (bsc#1240998).
* wifi: ath12k: remove invalid peer create logic (bsc#1240998).
* wifi: ath12k: remove obsolete struct wmi_start_scan_arg (bsc#1240998).
* wifi: ath12k: remove redundant peer delete for WCN7850 (bsc#1240998).
* wifi: ath12k: remove unused variable monitor_flags (bsc#1240998).
* wifi: ath12k: remove unused variable monitor_present (bsc#1240998).
* wifi: ath12k: rename MBSSID fields in wmi_vdev_up_cmd (bsc#1240998).
* wifi: ath12k: restore ASPM for supported hardwares only (bsc#1240998).
* wifi: ath12k: scan statemachine changes for single wiphy (bsc#1240998).
* wifi: ath12k: set mlo_capable_flags based on QMI PHY capability
(bsc#1240998).
* wifi: ath12k: skip sending vdev down for channel switch (bsc#1240998).
* wifi: ath12k: support ARP and NS offload (bsc#1240998).
* wifi: ath12k: support GTK rekey offload (bsc#1240998).
* wifi: ath12k: support SMPS configuration for 6 GHz (bsc#1240998).
* wifi: ath12k: support get_survey mac op for single wiphy (bsc#1240998).
* wifi: ath12k: support suspend/resume (bsc#1240998).
* wifi: ath12k: switch to using wiphy_lock() and remove ar->conf_mutex
(bsc#1240998).
* wifi: ath12k: unregister per pdev debugfs (bsc#1240998).
* wifi: ath12k: update ath12k_mac_op_conf_tx() for MLO (bsc#1240998).
* wifi: ath12k: update ath12k_mac_op_update_vif_offload() for MLO
(bsc#1240998).
* wifi: ath12k: use 128 bytes aligned iova in transmit path for WCN7850
(bsc#1240998).
* wifi: ath12k: use correct MAX_RADIOS (bsc#1240998).
* wifi: ath12k: use tail MSDU to get MSDU information (bsc#1240998).
* wifi: ath12k: using msdu end descriptor to check for rx multicast packets
(stable-fixes).
* wifi: ath12k: vdev statemachine changes for single wiphy (bsc#1240998).
* wifi: ath9k: return by of_get_mac_address (stable-fixes).
* wifi: ath9k_htc: Abort software beacon handling if disabled (git-fixes).
* wifi: carl9170: do not ping device which has failed to load firmware (git-
fixes).
* wifi: cfg80211: allow IR in 20 MHz configurations (stable-fixes).
* wifi: iwlfiwi: mvm: Fix the rate reporting (git-fixes).
* wifi: iwlwifi: Add missing MODULE_FIRMWARE for Qu-c0-jf-b0 (stable-fixes).
* wifi: iwlwifi: add support for Killer on MTL (stable-fixes).
* wifi: iwlwifi: do not warn during reprobe (stable-fixes).
* wifi: iwlwifi: do not warn when if there is a FW error (stable-fixes).
* wifi: iwlwifi: fix debug actions order (stable-fixes).
* wifi: iwlwifi: fix the ECKV UEFI variable name (stable-fixes).
* wifi: iwlwifi: mark Br device not integrated (stable-fixes).
* wifi: iwlwifi: mvm: fix beacon CCK flag (stable-fixes).
* wifi: iwlwifi: mvm: fix setting the TK when associated (stable-fixes).
* wifi: iwlwifi: pcie: make sure to lock rxq->read (stable-fixes).
* wifi: iwlwifi: use correct IMR dump variable (stable-fixes).
* wifi: iwlwifi: w/a FW SMPS mode selection (stable-fixes).
* wifi: mac80211: VLAN traffic in multicast path (stable-fixes).
* wifi: mac80211: do not offer a mesh path if forwarding is disabled (stable-
fixes).
* wifi: mac80211: do not unconditionally call drv_mgd_complete_tx() (stable-
fixes).
* wifi: mac80211: fix beacon interval calculation overflow (git-fixes).
* wifi: mac80211: fix warning on disconnect during failed ML reconf (stable-
fixes).
* wifi: mac80211: remove misplaced drv_mgd_complete_tx() call (stable-fixes).
* wifi: mac80211: set ieee80211_prep_tx_info::link_id upon Auth Rx (stable-
fixes).
* wifi: mac80211: validate SCAN_FLAG_AP in scan request during MLO (stable-
fixes).
* wifi: mac80211_hwsim: Fix MLD address translation (stable-fixes).
* wifi: mac80211_hwsim: Prevent tsf from setting if beacon is disabled
(stable-fixes).
* wifi: mt76: mt76x2: Add support for LiteOn WN4516R,WN4519R (stable-fixes).
* wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init() (git-
fixes).
* wifi: mt76: mt7921: add 160 MHz AP for mt7922 device (stable-fixes).
* wifi: mt76: mt7925: ensure all MCU commands wait for response (git-fixes).
* wifi: mt76: mt7925: fix fails to enter low power mode in suspend state
(stable-fixes).
* wifi: mt76: mt7925: fix host interrupt register initialization (git-fixes).
* wifi: mt76: mt7925: introduce thermal protection (stable-fixes).
* wifi: mt76: mt7925: load the appropriate CLC data based on hardware type
(stable-fixes).
* wifi: mt76: mt7925: prevent multiple scan commands (git-fixes).
* wifi: mt76: mt7925: refine the sniffer commnad (git-fixes).
* wifi: mt76: mt7996: drop fragments with multicast or broadcast RA (stable-
fixes).
* wifi: mt76: mt7996: fix RX buffer size of MCU event (git-fixes).
* wifi: mt76: mt7996: revise TXS size (stable-fixes).
* wifi: mt76: mt7996: set EHT max ampdu length capability (git-fixes).
* wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2 (stable-
fixes).
* wifi: mwifiex: Fix HT40 bandwidth issue (stable-fixes).
* wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() (git-fixes).
* wifi: rtlwifi: disable ASPM for RTL8723BE with subsystem ID 11ad:1723 (git-
fixes).
* wifi: rtw88: Do not use static local variable in
rtw8822b_set_tx_power_index_by_rate (stable-fixes).
* wifi: rtw88: Fix __rtw_download_firmware() for RTL8814AU (stable-fixes).
* wifi: rtw88: Fix download_firmware_validate() for RTL8814AU (stable-fixes).
* wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31 (stable-fixes).
* wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU (stable-fixes).
* wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU (stable-fixes).
* wifi: rtw88: do not ignore hardware read error during DPK (git-fixes).
* wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (git-
fixes).
* wifi: rtw88: sdio: call rtw_sdio_indicate_tx_status unconditionally (git-
fixes).
* wifi: rtw88: sdio: map mgmt frames to queue TX_DESC_QSEL_MGMT (git-fixes).
* wifi: rtw88: usb: Reduce control message timeout to 500 ms (git-fixes).
* wifi: rtw89: 8922a: fix TX fail with wrong VCO setting (stable-fixes).
* wifi: rtw89: 8922a: fix incorrect STA-ID in EHT MU PPDU (stable-fixes).
* wifi: rtw89: add wiphy_lock() to work that isn't held wiphy_lock() yet
(stable-fixes).
* wifi: rtw89: call power_on ahead before selecting firmware (stable-fixes).
* wifi: rtw89: fw: get sb_sel_ver via get_unaligned_le32() (stable-fixes).
* wifi: rtw89: fw: propagate error code from rtw89_h2c_tx() (stable-fixes).
* wifi: rtw89: leave idle mode when setting WEP encryption for AP mode
(stable-fixes).
* wifi: rtw89: pci: enlarge retry times of RX tag to 1000 (git-fixes).
* wifi: rtw89: phy: add dummy C2H event handler for report of TAS power
(stable-fixes).
* wireless: purelifi: plfxlc: fix memory leak in plfxlc_usb_wreq_asyn()
(stable-fixes).
* workqueue: Initialize wq_isolated_cpumask in workqueue_init_early()
(bsc#1245101 jsc#PED-11934).
* x86/acpi: Fix LAPIC/x2APIC parsing order (git-fixes).
* x86/amd_nb, hwmon: (k10temp): Simplify amd_pci_dev_to_node_id()
(jsc#PED-13094).
* x86/amd_nb: Clean up early_is_amd_nb() (jsc#PED-13094).
* x86/amd_nb: Move SMN access code to a new amd_node driver (jsc#PED-13094).
* x86/amd_nb: Restrict init function to AMD-based systems (jsc#PED-13094).
* x86/amd_nb: Simplify function 4 search (jsc#PED-13094).
* x86/amd_nb: Simplify root device search (jsc#PED-13094).
* x86/amd_node: Add SMN offsets to exclusive region access (jsc#PED-13094).
* x86/amd_node: Add support for debugfs access to SMN registers
(jsc#PED-13094).
* x86/amd_node: Remove dependency on AMD_NB (jsc#PED-13094).
* x86/amd_node: Update __amd_smn_rw() error paths (jsc#PED-13094).
* x86/amd_node: Use defines for SMN register offsets (jsc#PED-13094).
* x86/fred/signal: Prevent immediate repeat of single step trap on return from
SIGTRAP handler (git-fixes).
* x86/idle: Remove MFENCEs for X86_BUG_CLFLUSH_MONITOR in
mwait_idle_with_hints() and prefer_mwait_c1_over_halt() (git-fixes).
* x86/kaslr: Reduce KASLR entropy on most x86 systems (git-fixes).
* x86/mce/amd: Remove shared threshold bank plumbing (jsc#PED-13094).
* x86/microcode/AMD: Add get_patch_level() (git-fixes).
* x86/microcode/AMD: Do not return error when microcode update is not
necessary (git-fixes).
* x86/microcode/AMD: Get rid of the _load_microcode_amd() forward declaration
(git-fixes).
* x86/microcode/AMD: Have __apply_microcode_amd() return bool (git-fixes).
* x86/microcode/AMD: Make __verify_patch_size() return bool (git-fixes).
* x86/microcode/AMD: Merge early_apply_microcode() into its single callsite
(git-fixes).
* x86/microcode/AMD: Remove ugly linebreak in __verify_patch_section()
signature (git-fixes).
* x86/microcode/AMD: Return bool from find_blobs_in_containers() (git-fixes).
* x86/microcode: Consolidate the loader enablement checking (git-fixes).
* x86/mm/init: Handle the special case of device private pages in add_pages(),
to not increase max_pfn and trigger dma_addressing_limited() bounce buffers
(git-fixes).
* x86/platform/amd: Move the <asm/amd_hsmp.h> header to <asm/amd/hsmp.h>
(jsc#PED-13094).
* x86/sev: Add SVSM vTPM probe/send_command functions (bsc#1241191).
* x86/sev: Provide guest VMPL level to userspace (bsc#1241191).
* x86/sev: Register tpm-svsm platform device (bsc#1241191).
* x86/xen: fix balloon target initialization for PVH dom0 (git-fixes).
* x86: Start moving AMD node functionality out of AMD_NB (jsc#PED-13094).
* xen/arm: call uaccess_ttbr0_enable for dm_op hypercall (git-fixes)
* xen/x86: fix initial memory balloon target (git-fixes).
* xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive
(git-fixes).
* xsk: always clear DMA mapping information when unmapping the pool (git-
fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Real Time Module 15-SP7
zypper in -t patch SUSE-SLE-Module-RT-15-SP7-2025-2333=1
* SUSE Linux Enterprise Live Patching 15-SP7
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-2333=1
## Package List:
* SUSE Real Time Module 15-SP7 (x86_64)
* kernel-rt-devel-debuginfo-6.4.0-150700.7.8.1
* dlm-kmp-rt-debuginfo-6.4.0-150700.7.8.1
* kernel-syms-rt-6.4.0-150700.7.8.1
* ocfs2-kmp-rt-6.4.0-150700.7.8.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150700.7.8.1
* kernel-rt-devel-6.4.0-150700.7.8.1
* gfs2-kmp-rt-6.4.0-150700.7.8.1
* gfs2-kmp-rt-debuginfo-6.4.0-150700.7.8.1
* cluster-md-kmp-rt-6.4.0-150700.7.8.1
* kernel-rt-debugsource-6.4.0-150700.7.8.1
* kernel-rt-debuginfo-6.4.0-150700.7.8.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150700.7.8.1
* dlm-kmp-rt-6.4.0-150700.7.8.1
* SUSE Real Time Module 15-SP7 (noarch)
* kernel-devel-rt-6.4.0-150700.7.8.1
* kernel-source-rt-6.4.0-150700.7.8.1
* SUSE Real Time Module 15-SP7 (nosrc x86_64)
* kernel-rt-6.4.0-150700.7.8.1
* SUSE Linux Enterprise Live Patching 15-SP7 (x86_64)
* kernel-livepatch-6_4_0-150700_7_8-rt-debuginfo-1-150700.1.5.1
* kernel-livepatch-6_4_0-150700_7_8-rt-1-150700.1.5.1
* kernel-livepatch-SLE15-SP7-RT_Update_2-debugsource-1-150700.1.5.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52888.html
* https://www.suse.com/security/cve/CVE-2023-53146.html
* https://www.suse.com/security/cve/CVE-2024-26762.html
* https://www.suse.com/security/cve/CVE-2024-26831.html
* https://www.suse.com/security/cve/CVE-2024-41085.html
* https://www.suse.com/security/cve/CVE-2024-43869.html
* https://www.suse.com/security/cve/CVE-2024-49568.html
* https://www.suse.com/security/cve/CVE-2024-50034.html
* https://www.suse.com/security/cve/CVE-2024-50106.html
* https://www.suse.com/security/cve/CVE-2024-50293.html
* https://www.suse.com/security/cve/CVE-2024-56541.html
* https://www.suse.com/security/cve/CVE-2024-56613.html
* https://www.suse.com/security/cve/CVE-2024-56699.html
* https://www.suse.com/security/cve/CVE-2024-57982.html
* https://www.suse.com/security/cve/CVE-2024-57987.html
* https://www.suse.com/security/cve/CVE-2024-57988.html
* https://www.suse.com/security/cve/CVE-2024-57995.html
* https://www.suse.com/security/cve/CVE-2024-58004.html
* https://www.suse.com/security/cve/CVE-2024-58015.html
* https://www.suse.com/security/cve/CVE-2024-58053.html
* https://www.suse.com/security/cve/CVE-2024-58062.html
* https://www.suse.com/security/cve/CVE-2024-58077.html
* https://www.suse.com/security/cve/CVE-2024-58098.html
* https://www.suse.com/security/cve/CVE-2024-58099.html
* https://www.suse.com/security/cve/CVE-2024-58100.html
* https://www.suse.com/security/cve/CVE-2024-58237.html
* https://www.suse.com/security/cve/CVE-2025-21629.html
* https://www.suse.com/security/cve/CVE-2025-21658.html
* https://www.suse.com/security/cve/CVE-2025-21713.html
* https://www.suse.com/security/cve/CVE-2025-21720.html
* https://www.suse.com/security/cve/CVE-2025-21770.html
* https://www.suse.com/security/cve/CVE-2025-21805.html
* https://www.suse.com/security/cve/CVE-2025-21824.html
* https://www.suse.com/security/cve/CVE-2025-21842.html
* https://www.suse.com/security/cve/CVE-2025-21849.html
* https://www.suse.com/security/cve/CVE-2025-21868.html
* https://www.suse.com/security/cve/CVE-2025-21880.html
* https://www.suse.com/security/cve/CVE-2025-21898.html
* https://www.suse.com/security/cve/CVE-2025-21899.html
* https://www.suse.com/security/cve/CVE-2025-21901.html
* https://www.suse.com/security/cve/CVE-2025-21911.html
* https://www.suse.com/security/cve/CVE-2025-21920.html
* https://www.suse.com/security/cve/CVE-2025-21938.html
* https://www.suse.com/security/cve/CVE-2025-21939.html
* https://www.suse.com/security/cve/CVE-2025-21940.html
* https://www.suse.com/security/cve/CVE-2025-21959.html
* https://www.suse.com/security/cve/CVE-2025-21987.html
* https://www.suse.com/security/cve/CVE-2025-21997.html
* https://www.suse.com/security/cve/CVE-2025-22005.html
* https://www.suse.com/security/cve/CVE-2025-22023.html
* https://www.suse.com/security/cve/CVE-2025-22035.html
* https://www.suse.com/security/cve/CVE-2025-22066.html
* https://www.suse.com/security/cve/CVE-2025-22083.html
* https://www.suse.com/security/cve/CVE-2025-22089.html
* https://www.suse.com/security/cve/CVE-2025-22095.html
* https://www.suse.com/security/cve/CVE-2025-22111.html
* https://www.suse.com/security/cve/CVE-2025-22113.html
* https://www.suse.com/security/cve/CVE-2025-22119.html
* https://www.suse.com/security/cve/CVE-2025-22120.html
* https://www.suse.com/security/cve/CVE-2025-22124.html
* https://www.suse.com/security/cve/CVE-2025-23141.html
* https://www.suse.com/security/cve/CVE-2025-23142.html
* https://www.suse.com/security/cve/CVE-2025-23144.html
* https://www.suse.com/security/cve/CVE-2025-23146.html
* https://www.suse.com/security/cve/CVE-2025-23147.html
* https://www.suse.com/security/cve/CVE-2025-23148.html
* https://www.suse.com/security/cve/CVE-2025-23149.html
* https://www.suse.com/security/cve/CVE-2025-23151.html
* https://www.suse.com/security/cve/CVE-2025-23155.html
* https://www.suse.com/security/cve/CVE-2025-23156.html
* https://www.suse.com/security/cve/CVE-2025-23157.html
* https://www.suse.com/security/cve/CVE-2025-23158.html
* https://www.suse.com/security/cve/CVE-2025-23159.html
* https://www.suse.com/security/cve/CVE-2025-23161.html
* https://www.suse.com/security/cve/CVE-2025-23162.html
* https://www.suse.com/security/cve/CVE-2025-37738.html
* https://www.suse.com/security/cve/CVE-2025-37740.html
* https://www.suse.com/security/cve/CVE-2025-37741.html
* https://www.suse.com/security/cve/CVE-2025-37742.html
* https://www.suse.com/security/cve/CVE-2025-37743.html
* https://www.suse.com/security/cve/CVE-2025-37747.html
* https://www.suse.com/security/cve/CVE-2025-37752.html
* https://www.suse.com/security/cve/CVE-2025-37754.html
* https://www.suse.com/security/cve/CVE-2025-37756.html
* https://www.suse.com/security/cve/CVE-2025-37757.html
* https://www.suse.com/security/cve/CVE-2025-37758.html
* https://www.suse.com/security/cve/CVE-2025-37761.html
* https://www.suse.com/security/cve/CVE-2025-37763.html
* https://www.suse.com/security/cve/CVE-2025-37764.html
* https://www.suse.com/security/cve/CVE-2025-37765.html
* https://www.suse.com/security/cve/CVE-2025-37766.html
* https://www.suse.com/security/cve/CVE-2025-37767.html
* https://www.suse.com/security/cve/CVE-2025-37768.html
* https://www.suse.com/security/cve/CVE-2025-37769.html
* https://www.suse.com/security/cve/CVE-2025-37770.html
* https://www.suse.com/security/cve/CVE-2025-37771.html
* https://www.suse.com/security/cve/CVE-2025-37772.html
* https://www.suse.com/security/cve/CVE-2025-37781.html
* https://www.suse.com/security/cve/CVE-2025-37782.html
* https://www.suse.com/security/cve/CVE-2025-37786.html
* https://www.suse.com/security/cve/CVE-2025-37788.html
* https://www.suse.com/security/cve/CVE-2025-37791.html
* https://www.suse.com/security/cve/CVE-2025-37792.html
* https://www.suse.com/security/cve/CVE-2025-37793.html
* https://www.suse.com/security/cve/CVE-2025-37794.html
* https://www.suse.com/security/cve/CVE-2025-37796.html
* https://www.suse.com/security/cve/CVE-2025-37798.html
* https://www.suse.com/security/cve/CVE-2025-37800.html
* https://www.suse.com/security/cve/CVE-2025-37801.html
* https://www.suse.com/security/cve/CVE-2025-37805.html
* https://www.suse.com/security/cve/CVE-2025-37810.html
* https://www.suse.com/security/cve/CVE-2025-37811.html
* https://www.suse.com/security/cve/CVE-2025-37812.html
* https://www.suse.com/security/cve/CVE-2025-37813.html
* https://www.suse.com/security/cve/CVE-2025-37814.html
* https://www.suse.com/security/cve/CVE-2025-37815.html
* https://www.suse.com/security/cve/CVE-2025-37816.html
* https://www.suse.com/security/cve/CVE-2025-37819.html
* https://www.suse.com/security/cve/CVE-2025-37836.html
* https://www.suse.com/security/cve/CVE-2025-37837.html
* https://www.suse.com/security/cve/CVE-2025-37839.html
* https://www.suse.com/security/cve/CVE-2025-37840.html
* https://www.suse.com/security/cve/CVE-2025-37841.html
* https://www.suse.com/security/cve/CVE-2025-37844.html
* https://www.suse.com/security/cve/CVE-2025-37847.html
* https://www.suse.com/security/cve/CVE-2025-37848.html
* https://www.suse.com/security/cve/CVE-2025-37849.html
* https://www.suse.com/security/cve/CVE-2025-37850.html
* https://www.suse.com/security/cve/CVE-2025-37851.html
* https://www.suse.com/security/cve/CVE-2025-37852.html
* https://www.suse.com/security/cve/CVE-2025-37853.html
* https://www.suse.com/security/cve/CVE-2025-37854.html
* https://www.suse.com/security/cve/CVE-2025-37858.html
* https://www.suse.com/security/cve/CVE-2025-37859.html
* https://www.suse.com/security/cve/CVE-2025-37861.html
* https://www.suse.com/security/cve/CVE-2025-37862.html
* https://www.suse.com/security/cve/CVE-2025-37865.html
* https://www.suse.com/security/cve/CVE-2025-37867.html
* https://www.suse.com/security/cve/CVE-2025-37868.html
* https://www.suse.com/security/cve/CVE-2025-37869.html
* https://www.suse.com/security/cve/CVE-2025-37871.html
* https://www.suse.com/security/cve/CVE-2025-37873.html
* https://www.suse.com/security/cve/CVE-2025-37874.html
* https://www.suse.com/security/cve/CVE-2025-37875.html
* https://www.suse.com/security/cve/CVE-2025-37881.html
* https://www.suse.com/security/cve/CVE-2025-37884.html
* https://www.suse.com/security/cve/CVE-2025-37888.html
* https://www.suse.com/security/cve/CVE-2025-37889.html
* https://www.suse.com/security/cve/CVE-2025-37890.html
* https://www.suse.com/security/cve/CVE-2025-37891.html
* https://www.suse.com/security/cve/CVE-2025-37892.html
* https://www.suse.com/security/cve/CVE-2025-37897.html
* https://www.suse.com/security/cve/CVE-2025-37900.html
* https://www.suse.com/security/cve/CVE-2025-37901.html
* https://www.suse.com/security/cve/CVE-2025-37903.html
* https://www.suse.com/security/cve/CVE-2025-37905.html
* https://www.suse.com/security/cve/CVE-2025-37909.html
* https://www.suse.com/security/cve/CVE-2025-37911.html
* https://www.suse.com/security/cve/CVE-2025-37912.html
* https://www.suse.com/security/cve/CVE-2025-37913.html
* https://www.suse.com/security/cve/CVE-2025-37914.html
* https://www.suse.com/security/cve/CVE-2025-37915.html
* https://www.suse.com/security/cve/CVE-2025-37917.html
* https://www.suse.com/security/cve/CVE-2025-37918.html
* https://www.suse.com/security/cve/CVE-2025-37921.html
* https://www.suse.com/security/cve/CVE-2025-37923.html
* https://www.suse.com/security/cve/CVE-2025-37925.html
* https://www.suse.com/security/cve/CVE-2025-37927.html
* https://www.suse.com/security/cve/CVE-2025-37928.html
* https://www.suse.com/security/cve/CVE-2025-37929.html
* https://www.suse.com/security/cve/CVE-2025-37930.html
* https://www.suse.com/security/cve/CVE-2025-37931.html
* https://www.suse.com/security/cve/CVE-2025-37932.html
* https://www.suse.com/security/cve/CVE-2025-37933.html
* https://www.suse.com/security/cve/CVE-2025-37934.html
* https://www.suse.com/security/cve/CVE-2025-37936.html
* https://www.suse.com/security/cve/CVE-2025-37937.html
* https://www.suse.com/security/cve/CVE-2025-37938.html
* https://www.suse.com/security/cve/CVE-2025-37943.html
* https://www.suse.com/security/cve/CVE-2025-37944.html
* https://www.suse.com/security/cve/CVE-2025-37945.html
* https://www.suse.com/security/cve/CVE-2025-37946.html
* https://www.suse.com/security/cve/CVE-2025-37948.html
* https://www.suse.com/security/cve/CVE-2025-37951.html
* https://www.suse.com/security/cve/CVE-2025-37953.html
* https://www.suse.com/security/cve/CVE-2025-37954.html
* https://www.suse.com/security/cve/CVE-2025-37959.html
* https://www.suse.com/security/cve/CVE-2025-37961.html
* https://www.suse.com/security/cve/CVE-2025-37963.html
* https://www.suse.com/security/cve/CVE-2025-37965.html
* https://www.suse.com/security/cve/CVE-2025-37967.html
* https://www.suse.com/security/cve/CVE-2025-37968.html
* https://www.suse.com/security/cve/CVE-2025-37969.html
* https://www.suse.com/security/cve/CVE-2025-37970.html
* https://www.suse.com/security/cve/CVE-2025-37972.html
* https://www.suse.com/security/cve/CVE-2025-37973.html
* https://www.suse.com/security/cve/CVE-2025-37978.html
* https://www.suse.com/security/cve/CVE-2025-37979.html
* https://www.suse.com/security/cve/CVE-2025-37980.html
* https://www.suse.com/security/cve/CVE-2025-37981.html
* https://www.suse.com/security/cve/CVE-2025-37982.html
* https://www.suse.com/security/cve/CVE-2025-37983.html
* https://www.suse.com/security/cve/CVE-2025-37985.html
* https://www.suse.com/security/cve/CVE-2025-37986.html
* https://www.suse.com/security/cve/CVE-2025-37987.html
* https://www.suse.com/security/cve/CVE-2025-37989.html
* https://www.suse.com/security/cve/CVE-2025-37990.html
* https://www.suse.com/security/cve/CVE-2025-37992.html
* https://www.suse.com/security/cve/CVE-2025-37994.html
* https://www.suse.com/security/cve/CVE-2025-37995.html
* https://www.suse.com/security/cve/CVE-2025-37997.html
* https://www.suse.com/security/cve/CVE-2025-37998.html
* https://www.suse.com/security/cve/CVE-2025-38000.html
* https://www.suse.com/security/cve/CVE-2025-38001.html
* https://www.suse.com/security/cve/CVE-2025-38003.html
* https://www.suse.com/security/cve/CVE-2025-38004.html
* https://www.suse.com/security/cve/CVE-2025-38005.html
* https://www.suse.com/security/cve/CVE-2025-38007.html
* https://www.suse.com/security/cve/CVE-2025-38009.html
* https://www.suse.com/security/cve/CVE-2025-38010.html
* https://www.suse.com/security/cve/CVE-2025-38011.html
* https://www.suse.com/security/cve/CVE-2025-38013.html
* https://www.suse.com/security/cve/CVE-2025-38014.html
* https://www.suse.com/security/cve/CVE-2025-38015.html
* https://www.suse.com/security/cve/CVE-2025-38018.html
* https://www.suse.com/security/cve/CVE-2025-38020.html
* https://www.suse.com/security/cve/CVE-2025-38022.html
* https://www.suse.com/security/cve/CVE-2025-38023.html
* https://www.suse.com/security/cve/CVE-2025-38024.html
* https://www.suse.com/security/cve/CVE-2025-38027.html
* https://www.suse.com/security/cve/CVE-2025-38031.html
* https://www.suse.com/security/cve/CVE-2025-38040.html
* https://www.suse.com/security/cve/CVE-2025-38043.html
* https://www.suse.com/security/cve/CVE-2025-38044.html
* https://www.suse.com/security/cve/CVE-2025-38045.html
* https://www.suse.com/security/cve/CVE-2025-38053.html
* https://www.suse.com/security/cve/CVE-2025-38055.html
* https://www.suse.com/security/cve/CVE-2025-38057.html
* https://www.suse.com/security/cve/CVE-2025-38059.html
* https://www.suse.com/security/cve/CVE-2025-38060.html
* https://www.suse.com/security/cve/CVE-2025-38065.html
* https://www.suse.com/security/cve/CVE-2025-38068.html
* https://www.suse.com/security/cve/CVE-2025-38072.html
* https://www.suse.com/security/cve/CVE-2025-38077.html
* https://www.suse.com/security/cve/CVE-2025-38078.html
* https://www.suse.com/security/cve/CVE-2025-38079.html
* https://www.suse.com/security/cve/CVE-2025-38080.html
* https://www.suse.com/security/cve/CVE-2025-38081.html
* https://www.suse.com/security/cve/CVE-2025-38083.html
* https://www.suse.com/security/cve/CVE-2025-38104.html
* https://www.suse.com/security/cve/CVE-2025-38240.html
* https://www.suse.com/security/cve/CVE-2025-39735.html
* https://www.suse.com/security/cve/CVE-2025-40014.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1210025
* https://bugzilla.suse.com/show_bug.cgi?id=1211226
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1218184
* https://bugzilla.suse.com/show_bug.cgi?id=1220112
* https://bugzilla.suse.com/show_bug.cgi?id=1223008
* https://bugzilla.suse.com/show_bug.cgi?id=1226498
* https://bugzilla.suse.com/show_bug.cgi?id=1228478
* https://bugzilla.suse.com/show_bug.cgi?id=1228557
* https://bugzilla.suse.com/show_bug.cgi?id=1228854
* https://bugzilla.suse.com/show_bug.cgi?id=1229491
* https://bugzilla.suse.com/show_bug.cgi?id=1230337
* https://bugzilla.suse.com/show_bug.cgi?id=1231913
* https://bugzilla.suse.com/show_bug.cgi?id=1232504
* https://bugzilla.suse.com/show_bug.cgi?id=1232882
* https://bugzilla.suse.com/show_bug.cgi?id=1233482
* https://bugzilla.suse.com/show_bug.cgi?id=1235064
* https://bugzilla.suse.com/show_bug.cgi?id=1235490
* https://bugzilla.suse.com/show_bug.cgi?id=1235728
* https://bugzilla.suse.com/show_bug.cgi?id=1235968
* https://bugzilla.suse.com/show_bug.cgi?id=1236208
* https://bugzilla.suse.com/show_bug.cgi?id=1237200
* https://bugzilla.suse.com/show_bug.cgi?id=1237312
* https://bugzilla.suse.com/show_bug.cgi?id=1237887
* https://bugzilla.suse.com/show_bug.cgi?id=1237895
* https://bugzilla.suse.com/show_bug.cgi?id=1237905
* https://bugzilla.suse.com/show_bug.cgi?id=1237910
* https://bugzilla.suse.com/show_bug.cgi?id=1237913
* https://bugzilla.suse.com/show_bug.cgi?id=1238212
* https://bugzilla.suse.com/show_bug.cgi?id=1238478
* https://bugzilla.suse.com/show_bug.cgi?id=1238495
* https://bugzilla.suse.com/show_bug.cgi?id=1238508
* https://bugzilla.suse.com/show_bug.cgi?id=1238741
* https://bugzilla.suse.com/show_bug.cgi?id=1238859
* https://bugzilla.suse.com/show_bug.cgi?id=1238965
* https://bugzilla.suse.com/show_bug.cgi?id=1238982
* https://bugzilla.suse.com/show_bug.cgi?id=1238995
* https://bugzilla.suse.com/show_bug.cgi?id=1239063
* https://bugzilla.suse.com/show_bug.cgi?id=1239090
* https://bugzilla.suse.com/show_bug.cgi?id=1239485
* https://bugzilla.suse.com/show_bug.cgi?id=1239925
* https://bugzilla.suse.com/show_bug.cgi?id=1240170
* https://bugzilla.suse.com/show_bug.cgi?id=1240180
* https://bugzilla.suse.com/show_bug.cgi?id=1240577
* https://bugzilla.suse.com/show_bug.cgi?id=1240579
* https://bugzilla.suse.com/show_bug.cgi?id=1240589
* https://bugzilla.suse.com/show_bug.cgi?id=1240610
* https://bugzilla.suse.com/show_bug.cgi?id=1240650
* https://bugzilla.suse.com/show_bug.cgi?id=1240686
* https://bugzilla.suse.com/show_bug.cgi?id=1240696
* https://bugzilla.suse.com/show_bug.cgi?id=1240702
* https://bugzilla.suse.com/show_bug.cgi?id=1240710
* https://bugzilla.suse.com/show_bug.cgi?id=1240723
* https://bugzilla.suse.com/show_bug.cgi?id=1240798
* https://bugzilla.suse.com/show_bug.cgi?id=1240814
* https://bugzilla.suse.com/show_bug.cgi?id=1240823
* https://bugzilla.suse.com/show_bug.cgi?id=1240866
* https://bugzilla.suse.com/show_bug.cgi?id=1240998
* https://bugzilla.suse.com/show_bug.cgi?id=1241166
* https://bugzilla.suse.com/show_bug.cgi?id=1241191
* https://bugzilla.suse.com/show_bug.cgi?id=1241278
* https://bugzilla.suse.com/show_bug.cgi?id=1241298
* https://bugzilla.suse.com/show_bug.cgi?id=1241340
* https://bugzilla.suse.com/show_bug.cgi?id=1241388
* https://bugzilla.suse.com/show_bug.cgi?id=1241414
* https://bugzilla.suse.com/show_bug.cgi?id=1241457
* https://bugzilla.suse.com/show_bug.cgi?id=1241492
* https://bugzilla.suse.com/show_bug.cgi?id=1241519
* https://bugzilla.suse.com/show_bug.cgi?id=1241538
* https://bugzilla.suse.com/show_bug.cgi?id=1241544
* https://bugzilla.suse.com/show_bug.cgi?id=1241572
* https://bugzilla.suse.com/show_bug.cgi?id=1241576
* https://bugzilla.suse.com/show_bug.cgi?id=1241590
* https://bugzilla.suse.com/show_bug.cgi?id=1241592
* https://bugzilla.suse.com/show_bug.cgi?id=1241595
* https://bugzilla.suse.com/show_bug.cgi?id=1241617
* https://bugzilla.suse.com/show_bug.cgi?id=1241625
* https://bugzilla.suse.com/show_bug.cgi?id=1241635
* https://bugzilla.suse.com/show_bug.cgi?id=1241644
* https://bugzilla.suse.com/show_bug.cgi?id=1241654
* https://bugzilla.suse.com/show_bug.cgi?id=1241689
* https://bugzilla.suse.com/show_bug.cgi?id=1242035
* https://bugzilla.suse.com/show_bug.cgi?id=1242044
* https://bugzilla.suse.com/show_bug.cgi?id=1242086
* https://bugzilla.suse.com/show_bug.cgi?id=1242163
* https://bugzilla.suse.com/show_bug.cgi?id=1242343
* https://bugzilla.suse.com/show_bug.cgi?id=1242414
* https://bugzilla.suse.com/show_bug.cgi?id=1242501
* https://bugzilla.suse.com/show_bug.cgi?id=1242504
* https://bugzilla.suse.com/show_bug.cgi?id=1242508
* https://bugzilla.suse.com/show_bug.cgi?id=1242512
* https://bugzilla.suse.com/show_bug.cgi?id=1242514
* https://bugzilla.suse.com/show_bug.cgi?id=1242515
* https://bugzilla.suse.com/show_bug.cgi?id=1242520
* https://bugzilla.suse.com/show_bug.cgi?id=1242521
* https://bugzilla.suse.com/show_bug.cgi?id=1242524
* https://bugzilla.suse.com/show_bug.cgi?id=1242529
* https://bugzilla.suse.com/show_bug.cgi?id=1242530
* https://bugzilla.suse.com/show_bug.cgi?id=1242531
* https://bugzilla.suse.com/show_bug.cgi?id=1242532
* https://bugzilla.suse.com/show_bug.cgi?id=1242556
* https://bugzilla.suse.com/show_bug.cgi?id=1242559
* https://bugzilla.suse.com/show_bug.cgi?id=1242563
* https://bugzilla.suse.com/show_bug.cgi?id=1242564
* https://bugzilla.suse.com/show_bug.cgi?id=1242565
* https://bugzilla.suse.com/show_bug.cgi?id=1242566
* https://bugzilla.suse.com/show_bug.cgi?id=1242567
* https://bugzilla.suse.com/show_bug.cgi?id=1242568
* https://bugzilla.suse.com/show_bug.cgi?id=1242569
* https://bugzilla.suse.com/show_bug.cgi?id=1242573
* https://bugzilla.suse.com/show_bug.cgi?id=1242574
* https://bugzilla.suse.com/show_bug.cgi?id=1242575
* https://bugzilla.suse.com/show_bug.cgi?id=1242577
* https://bugzilla.suse.com/show_bug.cgi?id=1242578
* https://bugzilla.suse.com/show_bug.cgi?id=1242584
* https://bugzilla.suse.com/show_bug.cgi?id=1242587
* https://bugzilla.suse.com/show_bug.cgi?id=1242591
* https://bugzilla.suse.com/show_bug.cgi?id=1242709
* https://bugzilla.suse.com/show_bug.cgi?id=1242724
* https://bugzilla.suse.com/show_bug.cgi?id=1242725
* https://bugzilla.suse.com/show_bug.cgi?id=1242727
* https://bugzilla.suse.com/show_bug.cgi?id=1242729
* https://bugzilla.suse.com/show_bug.cgi?id=1242758
* https://bugzilla.suse.com/show_bug.cgi?id=1242760
* https://bugzilla.suse.com/show_bug.cgi?id=1242761
* https://bugzilla.suse.com/show_bug.cgi?id=1242764
* https://bugzilla.suse.com/show_bug.cgi?id=1242766
* https://bugzilla.suse.com/show_bug.cgi?id=1242770
* https://bugzilla.suse.com/show_bug.cgi?id=1242781
* https://bugzilla.suse.com/show_bug.cgi?id=1242782
* https://bugzilla.suse.com/show_bug.cgi?id=1242785
* https://bugzilla.suse.com/show_bug.cgi?id=1242792
* https://bugzilla.suse.com/show_bug.cgi?id=1242834
* https://bugzilla.suse.com/show_bug.cgi?id=1242846
* https://bugzilla.suse.com/show_bug.cgi?id=1242849
* https://bugzilla.suse.com/show_bug.cgi?id=1242850
* https://bugzilla.suse.com/show_bug.cgi?id=1242863
* https://bugzilla.suse.com/show_bug.cgi?id=1242865
* https://bugzilla.suse.com/show_bug.cgi?id=1242871
* https://bugzilla.suse.com/show_bug.cgi?id=1242873
* https://bugzilla.suse.com/show_bug.cgi?id=1242906
* https://bugzilla.suse.com/show_bug.cgi?id=1242907
* https://bugzilla.suse.com/show_bug.cgi?id=1242908
* https://bugzilla.suse.com/show_bug.cgi?id=1242909
* https://bugzilla.suse.com/show_bug.cgi?id=1242930
* https://bugzilla.suse.com/show_bug.cgi?id=1242940
* https://bugzilla.suse.com/show_bug.cgi?id=1242943
* https://bugzilla.suse.com/show_bug.cgi?id=1242945
* https://bugzilla.suse.com/show_bug.cgi?id=1242946
* https://bugzilla.suse.com/show_bug.cgi?id=1242947
* https://bugzilla.suse.com/show_bug.cgi?id=1242948
* https://bugzilla.suse.com/show_bug.cgi?id=1242949
* https://bugzilla.suse.com/show_bug.cgi?id=1242952
* https://bugzilla.suse.com/show_bug.cgi?id=1242953
* https://bugzilla.suse.com/show_bug.cgi?id=1242954
* https://bugzilla.suse.com/show_bug.cgi?id=1242955
* https://bugzilla.suse.com/show_bug.cgi?id=1242957
* https://bugzilla.suse.com/show_bug.cgi?id=1242959
* https://bugzilla.suse.com/show_bug.cgi?id=1242961
* https://bugzilla.suse.com/show_bug.cgi?id=1242964
* https://bugzilla.suse.com/show_bug.cgi?id=1242966
* https://bugzilla.suse.com/show_bug.cgi?id=1242967
* https://bugzilla.suse.com/show_bug.cgi?id=1242973
* https://bugzilla.suse.com/show_bug.cgi?id=1242974
* https://bugzilla.suse.com/show_bug.cgi?id=1242977
* https://bugzilla.suse.com/show_bug.cgi?id=1242982
* https://bugzilla.suse.com/show_bug.cgi?id=1242990
* https://bugzilla.suse.com/show_bug.cgi?id=1243000
* https://bugzilla.suse.com/show_bug.cgi?id=1243006
* https://bugzilla.suse.com/show_bug.cgi?id=1243011
* https://bugzilla.suse.com/show_bug.cgi?id=1243015
* https://bugzilla.suse.com/show_bug.cgi?id=1243049
* https://bugzilla.suse.com/show_bug.cgi?id=1243051
* https://bugzilla.suse.com/show_bug.cgi?id=1243055
* https://bugzilla.suse.com/show_bug.cgi?id=1243060
* https://bugzilla.suse.com/show_bug.cgi?id=1243074
* https://bugzilla.suse.com/show_bug.cgi?id=1243076
* https://bugzilla.suse.com/show_bug.cgi?id=1243082
* https://bugzilla.suse.com/show_bug.cgi?id=1243330
* https://bugzilla.suse.com/show_bug.cgi?id=1243342
* https://bugzilla.suse.com/show_bug.cgi?id=1243456
* https://bugzilla.suse.com/show_bug.cgi?id=1243467
* https://bugzilla.suse.com/show_bug.cgi?id=1243469
* https://bugzilla.suse.com/show_bug.cgi?id=1243470
* https://bugzilla.suse.com/show_bug.cgi?id=1243471
* https://bugzilla.suse.com/show_bug.cgi?id=1243472
* https://bugzilla.suse.com/show_bug.cgi?id=1243473
* https://bugzilla.suse.com/show_bug.cgi?id=1243475
* https://bugzilla.suse.com/show_bug.cgi?id=1243476
* https://bugzilla.suse.com/show_bug.cgi?id=1243480
* https://bugzilla.suse.com/show_bug.cgi?id=1243506
* https://bugzilla.suse.com/show_bug.cgi?id=1243509
* https://bugzilla.suse.com/show_bug.cgi?id=1243511
* https://bugzilla.suse.com/show_bug.cgi?id=1243514
* https://bugzilla.suse.com/show_bug.cgi?id=1243515
* https://bugzilla.suse.com/show_bug.cgi?id=1243516
* https://bugzilla.suse.com/show_bug.cgi?id=1243517
* https://bugzilla.suse.com/show_bug.cgi?id=1243522
* https://bugzilla.suse.com/show_bug.cgi?id=1243523
* https://bugzilla.suse.com/show_bug.cgi?id=1243524
* https://bugzilla.suse.com/show_bug.cgi?id=1243528
* https://bugzilla.suse.com/show_bug.cgi?id=1243529
* https://bugzilla.suse.com/show_bug.cgi?id=1243530
* https://bugzilla.suse.com/show_bug.cgi?id=1243534
* https://bugzilla.suse.com/show_bug.cgi?id=1243536
* https://bugzilla.suse.com/show_bug.cgi?id=1243537
* https://bugzilla.suse.com/show_bug.cgi?id=1243538
* https://bugzilla.suse.com/show_bug.cgi?id=1243540
* https://bugzilla.suse.com/show_bug.cgi?id=1243542
* https://bugzilla.suse.com/show_bug.cgi?id=1243543
* https://bugzilla.suse.com/show_bug.cgi?id=1243544
* https://bugzilla.suse.com/show_bug.cgi?id=1243545
* https://bugzilla.suse.com/show_bug.cgi?id=1243548
* https://bugzilla.suse.com/show_bug.cgi?id=1243551
* https://bugzilla.suse.com/show_bug.cgi?id=1243559
* https://bugzilla.suse.com/show_bug.cgi?id=1243560
* https://bugzilla.suse.com/show_bug.cgi?id=1243562
* https://bugzilla.suse.com/show_bug.cgi?id=1243567
* https://bugzilla.suse.com/show_bug.cgi?id=1243571
* https://bugzilla.suse.com/show_bug.cgi?id=1243572
* https://bugzilla.suse.com/show_bug.cgi?id=1243573
* https://bugzilla.suse.com/show_bug.cgi?id=1243574
* https://bugzilla.suse.com/show_bug.cgi?id=1243575
* https://bugzilla.suse.com/show_bug.cgi?id=1243589
* https://bugzilla.suse.com/show_bug.cgi?id=1243620
* https://bugzilla.suse.com/show_bug.cgi?id=1243621
* https://bugzilla.suse.com/show_bug.cgi?id=1243624
* https://bugzilla.suse.com/show_bug.cgi?id=1243625
* https://bugzilla.suse.com/show_bug.cgi?id=1243626
* https://bugzilla.suse.com/show_bug.cgi?id=1243627
* https://bugzilla.suse.com/show_bug.cgi?id=1243628
* https://bugzilla.suse.com/show_bug.cgi?id=1243649
* https://bugzilla.suse.com/show_bug.cgi?id=1243659
* https://bugzilla.suse.com/show_bug.cgi?id=1243660
* https://bugzilla.suse.com/show_bug.cgi?id=1243664
* https://bugzilla.suse.com/show_bug.cgi?id=1243698
* https://bugzilla.suse.com/show_bug.cgi?id=1243774
* https://bugzilla.suse.com/show_bug.cgi?id=1243782
* https://bugzilla.suse.com/show_bug.cgi?id=1243823
* https://bugzilla.suse.com/show_bug.cgi?id=1243827
* https://bugzilla.suse.com/show_bug.cgi?id=1243832
* https://bugzilla.suse.com/show_bug.cgi?id=1243836
* https://bugzilla.suse.com/show_bug.cgi?id=1243847
* https://bugzilla.suse.com/show_bug.cgi?id=1244100
* https://bugzilla.suse.com/show_bug.cgi?id=1244145
* https://bugzilla.suse.com/show_bug.cgi?id=1244172
* https://bugzilla.suse.com/show_bug.cgi?id=1244174
* https://bugzilla.suse.com/show_bug.cgi?id=1244176
* https://bugzilla.suse.com/show_bug.cgi?id=1244229
* https://bugzilla.suse.com/show_bug.cgi?id=1244234
* https://bugzilla.suse.com/show_bug.cgi?id=1244241
* https://bugzilla.suse.com/show_bug.cgi?id=1244261
* https://bugzilla.suse.com/show_bug.cgi?id=1244274
* https://bugzilla.suse.com/show_bug.cgi?id=1244275
* https://bugzilla.suse.com/show_bug.cgi?id=1244277
* https://bugzilla.suse.com/show_bug.cgi?id=1244309
* https://bugzilla.suse.com/show_bug.cgi?id=1244313
* https://bugzilla.suse.com/show_bug.cgi?id=1244337
* https://bugzilla.suse.com/show_bug.cgi?id=1244626
* https://bugzilla.suse.com/show_bug.cgi?id=1244725
* https://bugzilla.suse.com/show_bug.cgi?id=1244727
* https://bugzilla.suse.com/show_bug.cgi?id=1244729
* https://bugzilla.suse.com/show_bug.cgi?id=1244731
* https://bugzilla.suse.com/show_bug.cgi?id=1244732
* https://bugzilla.suse.com/show_bug.cgi?id=1244736
* https://bugzilla.suse.com/show_bug.cgi?id=1244737
* https://bugzilla.suse.com/show_bug.cgi?id=1244738
* https://bugzilla.suse.com/show_bug.cgi?id=1244739
* https://bugzilla.suse.com/show_bug.cgi?id=1244743
* https://bugzilla.suse.com/show_bug.cgi?id=1244746
* https://bugzilla.suse.com/show_bug.cgi?id=1244747
* https://bugzilla.suse.com/show_bug.cgi?id=1244759
* https://bugzilla.suse.com/show_bug.cgi?id=1244789
* https://bugzilla.suse.com/show_bug.cgi?id=1244862
* https://bugzilla.suse.com/show_bug.cgi?id=1244906
* https://bugzilla.suse.com/show_bug.cgi?id=1244938
* https://bugzilla.suse.com/show_bug.cgi?id=1244995
* https://bugzilla.suse.com/show_bug.cgi?id=1244996
* https://bugzilla.suse.com/show_bug.cgi?id=1244999
* https://bugzilla.suse.com/show_bug.cgi?id=1245001
* https://bugzilla.suse.com/show_bug.cgi?id=1245003
* https://bugzilla.suse.com/show_bug.cgi?id=1245004
* https://bugzilla.suse.com/show_bug.cgi?id=1245025
* https://bugzilla.suse.com/show_bug.cgi?id=1245042
* https://bugzilla.suse.com/show_bug.cgi?id=1245046
* https://bugzilla.suse.com/show_bug.cgi?id=1245078
* https://bugzilla.suse.com/show_bug.cgi?id=1245081
* https://bugzilla.suse.com/show_bug.cgi?id=1245082
* https://bugzilla.suse.com/show_bug.cgi?id=1245083
* https://bugzilla.suse.com/show_bug.cgi?id=1245101
* https://bugzilla.suse.com/show_bug.cgi?id=1245155
* https://bugzilla.suse.com/show_bug.cgi?id=1245183
* https://bugzilla.suse.com/show_bug.cgi?id=1245193
* https://bugzilla.suse.com/show_bug.cgi?id=1245210
* https://bugzilla.suse.com/show_bug.cgi?id=1245217
* https://bugzilla.suse.com/show_bug.cgi?id=1245225
* https://bugzilla.suse.com/show_bug.cgi?id=1245226
* https://bugzilla.suse.com/show_bug.cgi?id=1245228
* https://bugzilla.suse.com/show_bug.cgi?id=1245431
* https://bugzilla.suse.com/show_bug.cgi?id=1245455
* https://jira.suse.com/browse/PED-12551
* https://jira.suse.com/browse/PED-13019
* https://jira.suse.com/browse/PED-13094
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250716/b481761d/attachment.htm>
More information about the sle-updates
mailing list