SUSE-SU-2025:20413-1: important: Security update for the Linux Kernel

SLE-UPDATES null at suse.de
Tue Jun 17 20:32:52 UTC 2025



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:20413-1  
Release Date: 2025-06-16T14:12:16Z  
Rating: important  
References:

  * bsc#1215199
  * bsc#1220112
  * bsc#1223096
  * bsc#1226498
  * bsc#1228557
  * bsc#1228854
  * bsc#1229491
  * bsc#1230581
  * bsc#1231016
  * bsc#1232504
  * bsc#1232649
  * bsc#1232882
  * bsc#1233192
  * bsc#1234154
  * bsc#1235149
  * bsc#1235728
  * bsc#1235968
  * bsc#1236142
  * bsc#1236208
  * bsc#1237312
  * bsc#1238212
  * bsc#1238473
  * bsc#1238774
  * bsc#1238992
  * bsc#1239691
  * bsc#1239925
  * bsc#1240180
  * bsc#1240593
  * bsc#1240723
  * bsc#1240823
  * bsc#1240866
  * bsc#1240966
  * bsc#1241148
  * bsc#1241282
  * bsc#1241305
  * bsc#1241340
  * bsc#1241351
  * bsc#1241376
  * bsc#1241448
  * bsc#1241457
  * bsc#1241492
  * bsc#1241519
  * bsc#1241525
  * bsc#1241533
  * bsc#1241538
  * bsc#1241576
  * bsc#1241590
  * bsc#1241595
  * bsc#1241596
  * bsc#1241597
  * bsc#1241617
  * bsc#1241625
  * bsc#1241627
  * bsc#1241635
  * bsc#1241638
  * bsc#1241644
  * bsc#1241654
  * bsc#1241657
  * bsc#1242012
  * bsc#1242035
  * bsc#1242044
  * bsc#1242086
  * bsc#1242163
  * bsc#1242203
  * bsc#1242343
  * bsc#1242414
  * bsc#1242417
  * bsc#1242501
  * bsc#1242502
  * bsc#1242504
  * bsc#1242506
  * bsc#1242507
  * bsc#1242509
  * bsc#1242510
  * bsc#1242512
  * bsc#1242513
  * bsc#1242514
  * bsc#1242520
  * bsc#1242523
  * bsc#1242524
  * bsc#1242529
  * bsc#1242530
  * bsc#1242531
  * bsc#1242532
  * bsc#1242559
  * bsc#1242563
  * bsc#1242564
  * bsc#1242565
  * bsc#1242566
  * bsc#1242567
  * bsc#1242568
  * bsc#1242569
  * bsc#1242573
  * bsc#1242574
  * bsc#1242575
  * bsc#1242578
  * bsc#1242584
  * bsc#1242585
  * bsc#1242587
  * bsc#1242591
  * bsc#1242709
  * bsc#1242727
  * bsc#1242758
  * bsc#1242760
  * bsc#1242761
  * bsc#1242762
  * bsc#1242763
  * bsc#1242764
  * bsc#1242766
  * bsc#1242770
  * bsc#1242778
  * bsc#1242781
  * bsc#1242782
  * bsc#1242785
  * bsc#1242786
  * bsc#1242792
  * bsc#1242846
  * bsc#1242849
  * bsc#1242850
  * bsc#1242852
  * bsc#1242854
  * bsc#1242856
  * bsc#1242859
  * bsc#1242860
  * bsc#1242861
  * bsc#1242866
  * bsc#1242867
  * bsc#1242868
  * bsc#1242871
  * bsc#1242873
  * bsc#1242875
  * bsc#1242906
  * bsc#1242908
  * bsc#1242924
  * bsc#1242930
  * bsc#1242940
  * bsc#1242944
  * bsc#1242945
  * bsc#1242946
  * bsc#1242948
  * bsc#1242949
  * bsc#1242951
  * bsc#1242953
  * bsc#1242954
  * bsc#1242955
  * bsc#1242957
  * bsc#1242959
  * bsc#1242961
  * bsc#1242962
  * bsc#1242973
  * bsc#1242974
  * bsc#1242977
  * bsc#1242982
  * bsc#1242990
  * bsc#1242993
  * bsc#1243000
  * bsc#1243006
  * bsc#1243011
  * bsc#1243015
  * bsc#1243044
  * bsc#1243049
  * bsc#1243056
  * bsc#1243074
  * bsc#1243076
  * bsc#1243077
  * bsc#1243082
  * bsc#1243090
  * bsc#1243330
  * bsc#1243342
  * bsc#1243456
  * bsc#1243469
  * bsc#1243470
  * bsc#1243471
  * bsc#1243472
  * bsc#1243473
  * bsc#1243475
  * bsc#1243476
  * bsc#1243509
  * bsc#1243511
  * bsc#1243513
  * bsc#1243515
  * bsc#1243516
  * bsc#1243517
  * bsc#1243519
  * bsc#1243522
  * bsc#1243524
  * bsc#1243528
  * bsc#1243529
  * bsc#1243530
  * bsc#1243534
  * bsc#1243536
  * bsc#1243537
  * bsc#1243539
  * bsc#1243540
  * bsc#1243541
  * bsc#1243542
  * bsc#1243543
  * bsc#1243545
  * bsc#1243547
  * bsc#1243559
  * bsc#1243560
  * bsc#1243562
  * bsc#1243567
  * bsc#1243571
  * bsc#1243572
  * bsc#1243573
  * bsc#1243574
  * bsc#1243575
  * bsc#1243589
  * bsc#1243621
  * bsc#1243624
  * bsc#1243625
  * bsc#1243626
  * bsc#1243627
  * bsc#1243628
  * bsc#1243649
  * bsc#1243657
  * bsc#1243658
  * bsc#1243659
  * bsc#1243660
  * bsc#1243664
  * bsc#1243737
  * bsc#1243782
  * bsc#1243805
  * bsc#1243836
  * bsc#1243963
  * bsc#1244145
  * bsc#1244261
  * jsc#PED-10253

  
Cross-References:

  * CVE-2023-52888
  * CVE-2023-53146
  * CVE-2024-43869
  * CVE-2024-46713
  * CVE-2024-49568
  * CVE-2024-50106
  * CVE-2024-50223
  * CVE-2024-53135
  * CVE-2024-54458
  * CVE-2024-58098
  * CVE-2024-58099
  * CVE-2024-58100
  * CVE-2024-58237
  * CVE-2025-21629
  * CVE-2025-21648
  * CVE-2025-21702
  * CVE-2025-21787
  * CVE-2025-21814
  * CVE-2025-21868
  * CVE-2025-21919
  * CVE-2025-21938
  * CVE-2025-21997
  * CVE-2025-22005
  * CVE-2025-22021
  * CVE-2025-22030
  * CVE-2025-22056
  * CVE-2025-22057
  * CVE-2025-22063
  * CVE-2025-22066
  * CVE-2025-22070
  * CVE-2025-22089
  * CVE-2025-22095
  * CVE-2025-22103
  * CVE-2025-22113
  * CVE-2025-22119
  * CVE-2025-22124
  * CVE-2025-22125
  * CVE-2025-22126
  * CVE-2025-23140
  * CVE-2025-23141
  * CVE-2025-23142
  * CVE-2025-23144
  * CVE-2025-23146
  * CVE-2025-23147
  * CVE-2025-23148
  * CVE-2025-23149
  * CVE-2025-23150
  * CVE-2025-23151
  * CVE-2025-23155
  * CVE-2025-23156
  * CVE-2025-23157
  * CVE-2025-23158
  * CVE-2025-23159
  * CVE-2025-23160
  * CVE-2025-23161
  * CVE-2025-37738
  * CVE-2025-37740
  * CVE-2025-37741
  * CVE-2025-37742
  * CVE-2025-37743
  * CVE-2025-37747
  * CVE-2025-37748
  * CVE-2025-37749
  * CVE-2025-37750
  * CVE-2025-37752
  * CVE-2025-37754
  * CVE-2025-37755
  * CVE-2025-37758
  * CVE-2025-37765
  * CVE-2025-37766
  * CVE-2025-37767
  * CVE-2025-37768
  * CVE-2025-37769
  * CVE-2025-37770
  * CVE-2025-37771
  * CVE-2025-37772
  * CVE-2025-37773
  * CVE-2025-37780
  * CVE-2025-37781
  * CVE-2025-37782
  * CVE-2025-37787
  * CVE-2025-37788
  * CVE-2025-37789
  * CVE-2025-37790
  * CVE-2025-37792
  * CVE-2025-37793
  * CVE-2025-37794
  * CVE-2025-37796
  * CVE-2025-37797
  * CVE-2025-37798
  * CVE-2025-37800
  * CVE-2025-37801
  * CVE-2025-37803
  * CVE-2025-37804
  * CVE-2025-37805
  * CVE-2025-37809
  * CVE-2025-37810
  * CVE-2025-37812
  * CVE-2025-37815
  * CVE-2025-37819
  * CVE-2025-37820
  * CVE-2025-37823
  * CVE-2025-37824
  * CVE-2025-37829
  * CVE-2025-37830
  * CVE-2025-37831
  * CVE-2025-37833
  * CVE-2025-37836
  * CVE-2025-37839
  * CVE-2025-37840
  * CVE-2025-37841
  * CVE-2025-37842
  * CVE-2025-37844
  * CVE-2025-37849
  * CVE-2025-37850
  * CVE-2025-37851
  * CVE-2025-37852
  * CVE-2025-37853
  * CVE-2025-37854
  * CVE-2025-37858
  * CVE-2025-37862
  * CVE-2025-37865
  * CVE-2025-37867
  * CVE-2025-37870
  * CVE-2025-37871
  * CVE-2025-37873
  * CVE-2025-37874
  * CVE-2025-37875
  * CVE-2025-37879
  * CVE-2025-37881
  * CVE-2025-37886
  * CVE-2025-37887
  * CVE-2025-37889
  * CVE-2025-37890
  * CVE-2025-37891
  * CVE-2025-37892
  * CVE-2025-37897
  * CVE-2025-37900
  * CVE-2025-37901
  * CVE-2025-37903
  * CVE-2025-37905
  * CVE-2025-37911
  * CVE-2025-37912
  * CVE-2025-37913
  * CVE-2025-37914
  * CVE-2025-37915
  * CVE-2025-37917
  * CVE-2025-37918
  * CVE-2025-37925
  * CVE-2025-37928
  * CVE-2025-37929
  * CVE-2025-37930
  * CVE-2025-37931
  * CVE-2025-37932
  * CVE-2025-37933
  * CVE-2025-37936
  * CVE-2025-37937
  * CVE-2025-37943
  * CVE-2025-37944
  * CVE-2025-37948
  * CVE-2025-37949
  * CVE-2025-37951
  * CVE-2025-37953
  * CVE-2025-37954
  * CVE-2025-37957
  * CVE-2025-37958
  * CVE-2025-37959
  * CVE-2025-37960
  * CVE-2025-37963
  * CVE-2025-37967
  * CVE-2025-37968
  * CVE-2025-37969
  * CVE-2025-37970
  * CVE-2025-37972
  * CVE-2025-37974
  * CVE-2025-37978
  * CVE-2025-37979
  * CVE-2025-37980
  * CVE-2025-37982
  * CVE-2025-37983
  * CVE-2025-37985
  * CVE-2025-37986
  * CVE-2025-37987
  * CVE-2025-37989
  * CVE-2025-37990
  * CVE-2025-37998
  * CVE-2025-38104
  * CVE-2025-38152
  * CVE-2025-38240
  * CVE-2025-38637
  * CVE-2025-39735
  * CVE-2025-40014
  * CVE-2025-40325

  
CVSS scores:

  * CVE-2023-52888 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52888 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53146 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53146 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43869 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46713 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49568 ( SUSE ):  5.9
    CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49568 ( SUSE ):  6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50106 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50106 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50106 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50223 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50223 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53135 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53135 ( NVD ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2024-54458 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-54458 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-58098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58099 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58099 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58099 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58100 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58237 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21629 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21629 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21648 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21648 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21702 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21787 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21787 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21814 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21814 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21868 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21919 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21919 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21938 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21938 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21997 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21997 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21997 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22005 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22005 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22005 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22021 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-22021 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-22030 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22030 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22056 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22056 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22056 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22057 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22057 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22063 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22063 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22066 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22066 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22066 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22070 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22070 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22070 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22089 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22089 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-22095 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22103 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22103 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22113 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22113 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22119 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22119 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-22124 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22124 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22125 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22125 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22126 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22126 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23140 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23141 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23141 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23142 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23144 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23146 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23146 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23147 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23147 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23148 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23149 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23150 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23151 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23155 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23156 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23157 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23158 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23159 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23160 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23161 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23161 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37738 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37738 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37740 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37741 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37742 ( SUSE ):  1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
  * CVE-2025-37743 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37743 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37747 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37748 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37749 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-37750 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37752 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37754 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37755 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37758 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37765 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37766 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37767 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37768 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37769 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37770 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37771 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37771 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37772 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37773 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37780 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37780 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37781 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37782 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-37787 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37788 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37789 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37790 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37792 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37793 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37794 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37796 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37797 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37798 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37800 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37800 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37800 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37801 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37801 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37801 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37803 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37803 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37803 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-37804 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37804 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37805 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37805 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37809 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37810 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37810 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2025-37812 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37812 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37820 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37823 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37823 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37824 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37829 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37830 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37831 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37833 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37836 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37839 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37839 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37840 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37841 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37842 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37844 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37849 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-37850 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37851 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37851 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-37852 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37852 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37853 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37854 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37854 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37858 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37858 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2025-37862 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37862 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37865 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37867 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37870 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37870 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37871 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37873 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37874 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37875 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37879 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37879 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37881 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37881 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37889 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37890 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37891 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-37892 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37897 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37897 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37900 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37900 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37901 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37901 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37903 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37903 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-37905 ( SUSE ):  4.6
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37905 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37911 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37911 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-37912 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37912 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37913 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-37914 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-37915 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-37917 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37917 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37918 ( SUSE ):  7.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37918 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37925 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
  * CVE-2025-37925 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37928 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37928 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37929 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37929 ( SUSE ):  4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2025-37930 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37930 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-37931 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37931 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-37932 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37932 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-37933 ( SUSE ):  4.1
    CVSS:4.0/AV:P/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37933 ( SUSE ):  3.9 CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37936 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37937 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37943 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37944 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37948 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-37949 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37951 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37954 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37954 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-37957 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37959 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37960 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37963 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37963 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37967 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37968 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37970 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37972 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37974 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37978 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37979 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37980 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37983 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37983 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37985 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37986 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37987 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37989 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37990 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37998 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37998 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-38104 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38152 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38152 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38152 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38240 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38240 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38637 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38637 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39735 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39735 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39735 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-40014 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40014 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-40014 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40325 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40325 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Micro 6.0
  * SUSE Linux Micro Extras 6.0

  
  
An update that solves 193 vulnerabilities, contains one feature and has 35 fixes
can now be installed.

## Description:

The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive
various security bugfixes.

The following security bugs were fixed:

  * CVE-2023-52888: media: mediatek: vcodec: Only free buffer VA that is not
    NULL (bsc#1228557).
  * CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization
    (bsc#1230581).
  * CVE-2024-49568: net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when
    receiving proposal msg (bsc#1235728).
  * CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in
    (bsc#1233192).
  * CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode)
    behind CONFIG_BROKEN (bsc#1234154).
  * CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal
    (bsc#1238992).
  * CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to
    INT_MAX (bsc#1236142).
  * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0
    (bsc#1237312).
  * CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation
    (bsc#1238774).
  * CVE-2025-21814: ptp: Ensure info->enable callback is always set
    (bsc#1238473).
  * CVE-2025-21868: kABI workaround for adding an header (bsc#1240180).
  * CVE-2025-21919: sched/fair: Fix potential memory corruption in
    child_cfs_rq_on_list (bsc#1240593).
  * CVE-2025-21938: mptcp: fix 'scheduling while atomic' in
    mptcp_pm_nl_append_new_local_addr (bsc#1240723).
  * CVE-2025-21997: xsk: fix an integer overflow in xp_create_and_assign_umem()
    (bsc#1240823).
  * CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT
    (bsc#1241282).
  * CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in
    zswap_cpu_comp_dead() (bsc#1241376).
  * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion
    addition (bsc#1241525).
  * CVE-2025-22057: net: decrease cached dst counters in dst_release
    (bsc#1241533).
  * CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on
    IPv4 sockets (bsc#1241351).
  * CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305).
  * CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv
    (bsc#1241448).
  * CVE-2025-22113: ext4: define ext4_journal_destroy wrapper (bsc#1241617).
  * CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining
    after request_irq error (bsc#1242763).
  * CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513).
  * CVE-2025-23155: net: stmmac: Fix accessing freed irq affinity_hint
    (bsc#1242573).
  * CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the
    scp device in FW initialization (bsc#1242507).
  * CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846).
  * CVE-2025-37743: wifi: ath12k: Avoid memory leak while enabling statistics
    (bsc#1242163).
  * CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in
    mtk_iommu_device_group (bsc#1242523).
  * CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung
    (bsc#1242859).
  * CVE-2025-37750: smb: client: fix UAF in decryption with multichannel
    (bsc#1242510).
  * CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
  * CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error
    (bsc#1242506).
  * CVE-2025-37773: virtiofs: add filesystem context source name check
    (bsc#1242502).
  * CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786).
  * CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions
    which were never registered (bsc#1242585).
  * CVE-2025-37789: net: openvswitch: fix nested key length validation in the
    set() action (bsc#1242762).
  * CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509).
  * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling
    (bsc#1242417).
  * CVE-2025-37800: driver core: fix potential NULL pointer dereference in
    dev_uevent() (bsc#1242849).
  * CVE-2025-37801: spi: spi-imx: Add check for spi_imx_setupxfer()
    (bsc#1242850).
  * CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf
    creation (bsc#1242852).
  * CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854).
  * CVE-2025-37809: usb: typec: class: Unlocked on error in
    typec_register_partner() (bsc#1242856).
  * CVE-2025-37820: xen-netfront: handle NULL returned by
    xdp_convert_buff_to_frame() (bsc#1242866).
  * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
    (bsc#1242924).
  * CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self()
    (bsc#1242867).
  * CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()
    (bsc#1242875).
  * CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate()
    (bsc#1242860).
  * CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in
    apple_soc_cpufreq_get_rate() (bsc#1242861).
  * CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before
    entry reads (bsc#1242868).
  * CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path
    (bsc#1242951).
  * CVE-2025-37844: cifs: avoid NULL pointer dereference in dbg call
    (bsc#1242946).
  * CVE-2025-37862: HID: pidff: Fix null pointer dereference in
    pidff_find_fields (bsc#1242982).
  * CVE-2025-37865: net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST
    is unsupported (bsc#1242954).
  * CVE-2025-37870: drm/amd/display: prevent hang on link training fail
    (bsc#1243056).
  * CVE-2025-37874: net: ngbe: fix memory leak in ngbe_probe() error path
    (bsc#1242940).
  * CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write
    replies (bsc#1243077).
  * CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944).
  * CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result
    (bsc#1242962).
  * CVE-2025-37917: net: ethernet: mtk-star-emac: fix spinlock recursion issues
    on rx/tx poll (bsc#1243475).
  * CVE-2025-37933: octeon_ep: Fix host hang issue during device reboot
    (bsc#1243628).
  * CVE-2025-37936: perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with
    vCPU's value (bsc#1243537).
  * CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541).
  * CVE-2025-37954: smb: client: Avoid race in open_cached_dir with lease breaks
    (bsc#1243664).
  * CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception
    (bsc#1243513).
  * CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration
    entry (bsc#1243539).
  * CVE-2025-37960: memblock: Accept allocated memory before use in
    memblock_double_array() (bsc#1243519).
  * CVE-2025-37967: usb: typec: ucsi: displayport: Fix deadlock (bsc#1243572).
  * CVE-2025-37968: iio: light: opt3001: fix deadlock due to concurrent flag
    access (bsc#1243571).
  * CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error
    return (bsc#1243547).
  * CVE-2025-37987: pds_core: Prevent possible adminq overflow/stuck condition
    (bsc#1243542).
  * CVE-2025-37998: openvswitch: Fix unsafe attribute parsing in
    output_userspace() (bsc#1243836).
  * CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown
    (bsc#1241627).
  * CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions
    (bsc#1241657).

The following non-security bugs were fixed:

  * ACPI: HED: Always initialize before evged (stable-fixes).
  * ACPI: OSI: Stop advertising support for "3.0 _SCP Extensions" (git-fixes).
  * ACPI: PNP: Add Intel OC Watchdog IDs to non-PNP device list (stable-fixes).
  * ACPI: PPTT: Fix processor subtable walk (git-fixes).
  * ACPICA: Utilities: Fix spelling mistake "Incremement" -> "Increment" (git-
    fixes).
  * ACPICA: exserial: do not forget to handle FFixedHW opregions for reading
    (git-fixes).
  * ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git-
    fixes).
  * ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx (stable-fixes).
  * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ASP10 (stable-fixes).
  * ALSA: hda/realtek: Enable PC beep passthrough for HP EliteBook 855 G7
    (stable-fixes).
  * ALSA: pcm: Fix race of buffer access at PCM OSS layer (stable-fixes).
  * ALSA: seq: Fix delivery of UMP events to group ports (git-fixes).
  * ALSA: seq: Improve data consistency at polling (stable-fixes).
  * ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes).
  * ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes).
  * ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes).
  * ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera
    (stable-fixes).
  * ASoC: Intel: avs: Fix deadlock when the failing IPC is SET_D0IX (git-fixes).
  * ASoC: Intel: avs: Verify content returned by parse_int_array() (git-fixes).
  * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013 (stable-
    fixes).
  * ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext
    (git-fixes).
  * ASoC: SOF: ipc4-pcm: Adjust pipeline_list->pipelines allocation type (git-
    fixes).
  * ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback
    direction (git-fixes).
  * ASoC: apple: mca: Constrain channels according to TDM mask (git-fixes).
  * ASoC: codecs: hda: Fix RPM usage count underflow (git-fixes).
  * ASoC: codecs: pcm3168a: Allow for 24-bit in provider mode (stable-fixes).
  * ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of()
    (stable-fixes).
  * ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect
    (stable-fixes).
  * ASoC: mediatek: mt8188: Add reference for dmic clocks (stable-fixes).
  * ASoC: mediatek: mt8188: Treat DMIC_GAINx_CUR as non-volatile (stable-fixes).
  * ASoC: meson: meson-card-utils: use of_property_present() for DT parsing
    (git-fixes).
  * ASoC: ops: Enforce platform maximum on initial value (stable-fixes).
  * ASoC: qcom: sdm845: Add error handling in sdm845_slim_snd_hw_params() (git-
    fixes).
  * ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup()
    (stable-fixes).
  * ASoC: rt722-sdca: Add some missing readable registers (stable-fixes).
  * ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot() (stable-
    fixes).
  * ASoC: sun4i-codec: support hp-det-gpios property (stable-fixes).
  * ASoC: tas2764: Add reg defaults for TAS2764_INT_CLK_CFG (stable-fixes).
  * ASoC: tas2764: Enable main IRQs (git-fixes).
  * ASoC: tas2764: Mark SW_RESET as volatile (stable-fixes).
  * ASoC: tas2764: Power up/down amp on mute ops (stable-fixes).
  * ASoC: tas2764: Reinit cache on part reset (git-fixes).
  * ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes).
  * Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes).
  * Bluetooth: L2CAP: Fix not responding with L2CAP_CR_LE_ENCRYPTION (git-
    fixes).
  * Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes).
  * Bluetooth: MGMT: iterate over mesh commands in mgmt_mesh_foreach() (git-
    fixes).
  * Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling
    (git-fixes).
  * Bluetooth: hci_qca: move the SoC type check to the right place (git-fixes).
  * Documentation/rtla: Fix duplicate text about timerlat tracer (git-fixes).
  * Documentation/rtla: Fix typo in common_timerlat_description.rst (git-fixes).
  * Documentation/rtla: Fix typo in rtla-timerlat.rst (git-fixes).
  * Documentation: fix typo in root= kernel parameter description (git-fixes).
  * Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges
    (git-fixes).
  * Drop AMDGPU patch that may cause regressions (bsc#1243782)
  * Fix write to cloned skb in ipv6_hop_ioam() (git-fixes).
  * HID: quirks: Add ADATA XPG alpha wireless mouse support (stable-fixes).
  * HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes).
  * HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes).
  * HID: usbkbd: Fix the bit shift number for LED_KANA (stable-fixes).
  * IB/cm: use rwlock for MAD agent lock (git-fixes)
  * Input: gpio-keys - fix possible concurrent access in gpio_keys_irq_timer()
    (git-fixes).
  * Input: ims-pcu - check record size in ims_pcu_flash_firmware() (git-fixes).
  * Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes).
  * Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable-
    fixes).
  * Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable-
    fixes).
  * Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5
    (stable-fixes).
  * Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes).
  * Input: synaptics-rmi - fix crash with unsupported versions of F34 (git-
    fixes).
  * Input: xpad - add more controllers (stable-fixes).
  * Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable-
    fixes).
  * Input: xpad - fix Share button on Xbox One controllers (stable-fixes).
  * KVM: SVM: Allocate IR data using atomic allocation (git-fixes).
  * KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes).
  * KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes).
  * KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes).
  * KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes).
  * KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes).
  * KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes).
  * KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git-
    fixes).
  * KVM: arm64: Mark some header functions as inline (git-fixes).
  * KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes).
  * KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes).
  * KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git-
    fixes).
  * KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes).
  * KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes).
  * KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git-
    fixes).
  * KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes).
  * KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation
    (git-fixes).
  * KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes).
  * KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation
    (git-fixes).
  * KVM: powerpc: Enable commented out BUILD_BUG_ON() assertion (bsc#1215199).
  * KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657).
  * KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658).
  * KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes).
  * KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses
    (git-fixes).
  * KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend
    notifier (git-fixes).
  * KVM: x86: Explicitly treat routing entry type changes as changes (git-
    fixes).
  * KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM
    (git-fixes).
  * KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes).
  * KVM: x86: Make x2APIC ID 100% readonly (git-fixes).
  * KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git-
    fixes).
  * KVM: x86: Remove the unreachable case for 0x80000022 leaf in
    __do_cpuid_func() (git-fixes).
  * KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found
    (git-fixes).
  * Move upstreamed patches into sorted section
  * Move upstreamed tpm patch into sorted section
  * NFS: Do not allow waiting for exiting tasks (git-fixes).
  * NFS: O_DIRECT writes must check and adjust the file length (git-fixes).
  * NFSD: Insulate nfsd4_encode_read_plus() from page boundaries in the encode
    buffer (git-fixes).
  * NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes).
  * NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes).
  * NFSv4: Check for delegation validity in nfs_start_delegation_return_locked()
    (git-fixes).
  * NFSv4: Do not trigger uneccessary scans for return-on-close delegations
    (git-fixes).
  * NFSv4: Treat ENETUNREACH errors as fatal for state recovery (git-fixes).
  * PCI/DPC: Initialize aer_err_info before using it (git-fixes).
  * PCI: Explicitly put devices into D0 when initializing (git-fixes).
  * PCI: Fix lock symmetry in pci_slot_unlock() (git-fixes).
  * PCI: Fix old_size lower bound in calculate_iosize() too (stable-fixes).
  * PCI: apple: Use gpiod_set_value_cansleep in probe flow (git-fixes).
  * PCI: brcmstb: Add a softdep to MIP MSI-X driver (stable-fixes).
  * PCI: brcmstb: Expand inbound window size up to 64GB (stable-fixes).
  * PCI: cadence-ep: Correct PBA offset in .set_msix() callback (git-fixes).
  * PCI: cadence: Fix runtime atomic count underflow (git-fixes).
  * PCI: dw-rockchip: Fix PHY function call sequence in
    rockchip_pcie_phy_deinit() (git-fixes).
  * PCI: dwc: ep: Ensure proper iteration over outbound map windows (stable-
    fixes).
  * PCI: vmd: Disable MSI remapping bypass under Xen (stable-fixes).
  * PM: sleep: Fix power.is_suspended cleanup for direct-complete devices (git-
    fixes).
  * PM: sleep: Print PM debug messages during hibernation (git-fixes).
  * PM: wakeup: Delete space in the end of string shown by pm_show_wakelocks()
    (git-fixes).
  * RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git-
    fixes)
  * RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device"
    problem (git-fixes)
  * RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes)
  * RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git-
    fixes)
  * RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git-
    fixes)
  * RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug
    (git-fixes)
  * RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes)
  * Refresh fixes for cBPF issue (bsc#1242778)
  * Revert "bus: ti-sysc: Probe for l4_wkup and l4_cfg interconnect devices
    first" (stable-fixes).
  * Revert "drm/amd: Keep display off while going into S4" (git-fixes).
  * Revert "drm/amd: Stop evicting resources on APUs in suspend" (stable-fixes).
  * Revert "drm/amdgpu: do not allow userspace to create a doorbell BO" (stable-
    fixes).
  * Revert "rndis_host: Flag RNDIS modems as WWAN devices" (git-fixes).
  * Revert "wifi: mt76: mt7996: fill txd by host driver" (stable-fixes).
  * SUNRPC: Do not allow waiting for exiting tasks (git-fixes).
  * SUNRPC: Prevent hang on NFS mount with xprtsec=[m]tls (git-fixes).
  * SUNRPC: rpc_clnt_set_transport() must not change the autobind setting (git-
    fixes).
  * SUNRPC: rpcbind should never reset the port to the value '0' (git-fixes).
  * Squashfs: check return result of sb_min_blocksize (git-fixes).
  * VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify
    (git-fixes).
  * Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes).
  * accel/qaic: Mask out SR-IOV PCI resources (stable-fixes).
  * acpi-cpufreq: Fix nominal_freq units to KHz in get_max_boost_ratio() (git-
    fixes).
  * add bug reference for an existing hv_netvsc change (bsc#1243737).
  * afs: Fix the server_list to unuse a displaced server rather than putting it
    (git-fixes).
  * afs: Make it possible to find the volumes that are using a server (git-
    fixes).
  * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes)
  * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git-
    fixes)
  * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes)
  * arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes)
  * arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes)
  * arm64: insn: Add support for encoding DSB (git-fixes)
  * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git-
    fixes)
  * arm64: proton-pack: Expose whether the branchy loop k value (git-fixes)
  * arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes)
  * arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes).
  * backlight: pm8941: Add NULL check in wled_configure() (git-fixes).
  * bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes).
  * bnxt_en: Fix coredump logic to free allocated buffer (git-fixes).
  * bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes).
  * bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes).
  * bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes).
  * bpf: Scrub packet on bpf_redirect_peer (git-fixes).
  * btrfs: adjust subpage bit start based on sectorsize (bsc#1241492).
  * btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342).
  * btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208).
  * btrfs: avoid monopolizing a core when activating a swap file (git-fixes).
  * btrfs: do not loop for nowait writes when checking for cross references
    (git-fixes).
  * btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes).
  * btrfs: fix discard worker infinite loop after disabling discard
    (bsc#1242012).
  * btrfs: fix non-empty delayed iputs list on unmount due to compressed write
    workers (git-fixes).
  * bus: fsl-mc: do not add a device-link for the UAPI used DPMCP device (git-
    fixes).
  * bus: fsl-mc: fix GET/SET_TAILDROP command ids (git-fixes).
  * bus: fsl-mc: fix double-free on mc_dev (git-fixes).
  * bus: mhi: host: Fix conflict between power_up and SYSERR (git-fixes).
  * can: bcm: add locking for bcm_op runtime updates (git-fixes).
  * can: bcm: add missing rcu read protection for procfs content (git-fixes).
  * can: c_can: Use of_property_present() to test existence of DT property
    (stable-fixes).
  * can: slcan: allow reception of short error messages (git-fixes).
  * check-for-config-changes: Fix flag name typo
  * cifs: change tcon status when need_reconnect is set on it (git-fixes).
  * cifs: reduce warning log level for server not advertising interfaces (git-
    fixes).
  * crypto: algif_hash - fix double free in hash_accept (git-fixes).
  * crypto: lrw - Only add ecb if it is not already there (git-fixes).
  * crypto: lzo - Fix compression buffer overrun (stable-fixes).
  * crypto: marvell/cesa - Avoid empty transfer descriptor (git-fixes).
  * crypto: marvell/cesa - Do not chain submitted requests (git-fixes).
  * crypto: marvell/cesa - Handle zero-length skcipher requests (git-fixes).
  * crypto: octeontx2 - suppress auth failure screaming due to negative tests
    (stable-fixes).
  * crypto: qat - add shutdown handler to qat_420xx (git-fixes).
  * crypto: qat - add shutdown handler to qat_4xxx (git-fixes).
  * crypto: skcipher - Zap type in crypto_alloc_sync_skcipher (stable-fixes).
  * crypto: sun8i-ce - move fallback ahash_request to the end of the struct
    (git-fixes).
  * crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare()
    (git-fixes).
  * crypto: sun8i-ss - do not use sg_dma_len before calling DMA functions (git-
    fixes).
  * crypto: xts - Only add ecb if it is not already there (git-fixes).
  * devlink: fix port new reply cmd type (git-fixes).
  * dlm: mask sk_shutdown value (bsc#1228854).
  * dlm: use SHUT_RDWR for SCTP shutdown (bsc#1228854).
  * dm-integrity: fix a warning on invalid table line (git-fixes).
  * dma-buf: insert memory barrier before updating num_fences (git-fixes).
  * dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when
    interrupted" (git-fixes).
  * dmaengine: idxd: Add missing cleanup for early error out in
    idxd_setup_internals (git-fixes).
  * dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes).
  * dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call
    (git-fixes).
  * dmaengine: idxd: Fix ->poll() return value (git-fixes).
  * dmaengine: idxd: Fix allowing write() from different address spaces (git-
    fixes).
  * dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git-
    fixes).
  * dmaengine: idxd: cdev: Fix uninitialized use of sva in idxd_cdev_open
    (stable-fixes).
  * dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git-
    fixes).
  * dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe
    (git-fixes).
  * dmaengine: idxd: fix memory leak in error handling path of
    idxd_setup_engines (git-fixes).
  * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups
    (git-fixes).
  * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs
    (git-fixes).
  * dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status()
    (git-fixes).
  * dmaengine: mediatek: drop unused variable (git-fixes).
  * dmaengine: ti: Add NULL check in udma_probe() (git-fixes).
  * dmaengine: ti: k3-udma: Add missing locking (git-fixes).
  * dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure
    instead of a local copy (git-fixes).
  * drm/amd/display/dm: drop hw_support check in amdgpu_dm_i2c_xfer() (stable-
    fixes).
  * drm/amd/display: Add null pointer check for get_first_active_display() (git-
    fixes).
  * drm/amd/display: Avoid flooding unnecessary info messages (git-fixes).
  * drm/amd/display: Correct the reply value when AUX write incomplete (git-
    fixes).
  * drm/amd/display: Do not try AUX transactions on disconnected link (stable-
    fixes).
  * drm/amd/display: Fix incorrect DPCD configs while Replay/PSR switch (stable-
    fixes).
  * drm/amd/display: Fix the checking condition in dmub aux handling (stable-
    fixes).
  * drm/amd/display: Guard against setting dispclk low for dcn31x (stable-
    fixes).
  * drm/amd/display: Increase block_sequence array size (stable-fixes).
  * drm/amd/display: Initial psr_version with correct setting (stable-fixes).
  * drm/amd/display: Skip checking FRL_MODE bit for PCON BW determination
    (stable-fixes).
  * drm/amd/display: Update CR AUX RD interval interpretation (stable-fixes).
  * drm/amd/display: fix link_set_dpms_off multi-display MST corner case
    (stable-fixes).
  * drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes).
  * drm/amd/display: remove minimum Dispclk and apply oem panel timing (stable-
    fixes).
  * drm/amd/pp: Fix potential NULL pointer dereference in
    atomctrl_initialize_mc_reg_table (git-fixes).
  * drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes).
  * drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c
    (stable-fixes).
  * drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes).
  * drm/amdgpu: Set snoop bit for SDMA for MI series (stable-fixes).
  * drm/amdgpu: Update SRIOV video codec caps (stable-fixes).
  * drm/amdgpu: enlarge the VBIOS binary size limit (stable-fixes).
  * drm/amdgpu: fix pm notifier handling (git-fixes).
  * drm/amdgpu: reset psp->cmd to NULL after releasing the buffer (stable-
    fixes).
  * drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes).
  * drm/amdkfd: KFD release_work possible circular locking (stable-fixes).
  * drm/amdkfd: Set per-process flags only once cik/vi (stable-fixes).
  * drm/ast: Find VBIOS mode from regular display size (stable-fixes).
  * drm/ast: Fix comment on modeset lock (git-fixes).
  * drm/atomic: clarify the rules around drm_atomic_state->allow_modeset
    (stable-fixes).
  * drm/bridge: cdns-dsi: Check return value when getting default PHY config
    (git-fixes).
  * drm/bridge: cdns-dsi: Fix connecting to next bridge (git-fixes).
  * drm/bridge: cdns-dsi: Fix phy de-init and flag it so (git-fixes).
  * drm/bridge: cdns-dsi: Fix the clock variable for mode_valid() (git-fixes).
  * drm/bridge: cdns-dsi: Wait for Clk and Data Lanes to be ready (git-fixes).
  * drm/bridge: lt9611uxc: Fix an error handling path in lt9611uxc_probe() (git-
    fixes).
  * drm/edid: fixed the bug that hdr metadata was not reset (git-fixes).
  * drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1 (git-fixes).
  * drm/mediatek: Fix kobject put for component sub-drivers (git-fixes).
  * drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence (stable-
    fixes).
  * drm/mediatek: mtk_drm_drv: Fix kobject put for mtk_mutex device ptr (git-
    fixes).
  * drm/mediatek: mtk_drm_drv: Unbind secondary mmsys components on err (git-
    fixes).
  * drm/msm/gpu: Fix crash when throttling GPU immediately during boot (git-
    fixes).
  * drm/panel-edp: Add Starry 116KHD024006 (stable-fixes).
  * drm/panel: samsung-sofef00: Drop s6e3fc2x01 support (git-fixes).
  * drm/rockchip: vop2: Add uv swap for cluster window (stable-fixes).
  * drm/tegra: Assign plane type before registration (git-fixes).
  * drm/tegra: Fix a possible null pointer dereference (git-fixes).
  * drm/tegra: rgb: Fix the unbound reference count (git-fixes).
  * drm/udl: Unregister device before cleaning up on disconnect (git-fixes).
  * drm/v3d: Add clock handling (stable-fixes).
  * drm/v3d: Add job to pending list if the reset was skipped (stable-fixes).
  * drm/vc4: tests: Use return instead of assert (git-fixes).
  * drm/vkms: Adjust vkms_state->active_planes allocation type (git-fixes).
  * drm/vmwgfx: Add seqno waiter for sync_files (git-fixes).
  * drm: Add valid clones check (stable-fixes).
  * drm: bridge: adv7511: fill stream capabilities (stable-fixes).
  * drm: rcar-du: Fix memory leak in rcar_du_vsps_init() (git-fixes).
  * exfat: fix potential wrong error return from get_block (git-fixes).
  * fbcon: Use correct erase colour for clearing in fbcon (stable-fixes).
  * fbdev/efifb: Remove PM for parent device (bsc#1244261).
  * fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in
    fb_videomode_to_var (git-fixes).
  * fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var (git-
    fixes).
  * fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() (git-fixes).
  * fbdev: core: tileblit: Implement missing margin clearing for tileblit
    (stable-fixes).
  * fbdev: fsl-diu-fb: add missing device_remove_file() (stable-fixes).
  * firmware: arm_ffa: Reject higher major version as incompatible (stable-
    fixes).
  * firmware: arm_ffa: Set dma_mask for ffa devices (stable-fixes).
  * firmware: arm_scmi: Relax duplicate name constraint across protocol ids
    (stable-fixes).
  * firmware: psci: Fix refcount leak in psci_dt_init (git-fixes).
  * fpga: altera-cvp: Increase credit timeout (stable-fixes).
  * fs/nfs/read: fix double-unlock bug in nfs_return_empty_folio() (git-fixes).
  * gpio: pca953x: Simplify code with cleanup helpers (stable-fixes).
  * gpio: pca953x: Split pca953x_restore_context() and pca953x_save_context()
    (stable-fixes).
  * gpio: pca953x: fix IRQ storm on system wake up (git-fixes).
  * gpiolib: Revert "Do not WARN on gpiod_put() for optional GPIO" (stable-
    fixes).
  * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git-
    fixes).
  * hv_netvsc: Remove rmsg_pgcnt (git-fixes).
  * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git-
    fixes).
  * hwmon: (asus-ec-sensors) check sensor index in read_string() (git-fixes).
  * hwmon: (dell-smm) Increment the number of fans (stable-fixes).
  * hwmon: (gpio-fan) Add missing mutex locks (stable-fixes).
  * hwmon: (xgene-hwmon) use appropriate type for the latency value (stable-
    fixes).
  * i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git-
    fixes).
  * i2c: pxa: fix call balance of i2c->clk handling routines (stable-fixes).
  * i2c: qup: Vote for interconnect bandwidth to DRAM (stable-fixes).
  * i2c: tegra: check msg length in SMBUS block read (bsc#1242086)
  * i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work()
    (git-fixes).
  * i3c: master: svc: Fix missing STOP for master request (stable-fixes).
  * i3c: master: svc: Flush FIFO before sending Dynamic Address Assignment(DAA)
    (stable-fixes).
  * ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes).
  * idpf: fix offloads support for encapsulated packets (git-fixes).
  * idpf: fix potential memory leak on kcalloc() failure (git-fixes).
  * idpf: protect shutdown from reset (git-fixes).
  * ieee802154: ca8210: Use proper setters and getters for bitwise types
    (stable-fixes).
  * igc: fix lock order in igc_ptp_reset (git-fixes).
  * iio: accel: fxls8962af: Fix temperature scan element sign (git-fixes).
  * iio: adc: ad7124: Fix 3dB filter frequency reading (git-fixes).
  * iio: adc: ad7606_spi: fix reg write value mask (git-fixes).
  * iio: filter: admv8818: Support frequencies >= 2^32 (git-fixes).
  * iio: filter: admv8818: fix band 4, state 15 (git-fixes).
  * iio: filter: admv8818: fix integer overflow (git-fixes).
  * iio: filter: admv8818: fix range calculation (git-fixes).
  * iio: imu: inv_icm42600: Fix temperature calculation (git-fixes).
  * ima: process_measurement() needlessly takes inode_lock() on MAY_READ
    (stable-fixes).
  * inetpeer: remove create argument of inet_getpeer_v() (git-fixes).
  * inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes).
  * intel_th: avoid using deprecated page->mapping, index fields (stable-fixes).
  * iommu: Protect against overflow in iommu_pgsize() (git-fixes).
  * ip6mr: fix tables suspicious RCU usage (git-fixes).
  * ip_tunnel: annotate data-races around t->parms.link (git-fixes).
  * ipmr: fix incorrect parameter validation in the ip_mroute_getsockopt()
    function (git-fixes).
  * ipmr: fix tables suspicious RCU usage (git-fixes).
  * ipv4/route: avoid unused-but-set-variable warning (git-fixes).
  * ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes).
  * ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes).
  * ipv4: Convert ip_route_input() to dscp_t (git-fixes).
  * ipv4: Correct/silence an endian warning in __ip_do_redirect (git-fixes).
  * ipv4: Fix incorrect source address in Record Route option (git-fixes).
  * ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git-
    fixes).
  * ipv4: fix source address selection with route leak (git-fixes).
  * ipv4: give an IPv4 dev to blackhole_netdev (git-fixes).
  * ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes).
  * ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes). Both
    spellings are actually used
  * ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes).
  * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes).
  * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes).
  * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes).
  * ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes).
  * ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git-
    fixes).
  * ipv6: Align behavior across nexthops during path selection (git-fixes).
  * ipv6: Do not consider link down nexthops in path selection (git-fixes).
  * ipv6: Start path selection from the first nexthop (git-fixes).
  * ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS
    (git-fixes).
  * ipv6: save dontfrag in cork (git-fixes).
  * ipvs: Always clear ipvs_property flag in skb_scrub_packet() (git-fixes).
  * jffs2: check jffs2_prealloc_raw_node_refs() result in few other places (git-
    fixes).
  * jffs2: check that raw node were preallocated before writing summary (git-
    fixes).
  * jiffies: Cast to unsigned long in secs_to_jiffies() conversion
    (bsc#1242993).
  * jiffies: Define secs_to_jiffies() (bsc#1242993).
  * kABI workaround for hda_codec.beep_just_power_on flag (git-fixes).
  * kABI: ipv6: save dontfrag in cork (git-fixes).
  * leds: pwm-multicolor: Add check for fwnode_property_read_u32 (stable-fixes).
  * loop: Add sanity check for read/write_iter (git-fixes).
  * loop: aio inherit the ioprio of original request (git-fixes).
  * loop: do not require ->write_iter for writable files in loop_configure (git-
    fixes).
  * mailbox: use error ret code of of_parse_phandle_with_args() (stable-fixes).
  * md/raid1,raid10: do not ignore IO flags (git-fixes).
  * md/raid10: fix missing discard IO accounting (git-fixes).
  * md/raid10: wait barrier before returning discard request with REQ_NOWAIT
    (git-fixes).
  * md/raid1: Add check for missing source disk in process_checks() (git-fixes).
  * md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes).
  * md/raid5: implement pers->bitmap_sector() (git-fixes).
  * md: add a new callback pers->bitmap_sector() (git-fixes).
  * md: ensure resync is prioritized over recovery (git-fixes).
  * md: fix mddev uaf while iterating all_mddevs list (git-fixes).
  * md: preserve KABI in struct md_personality v2 (git-fixes).
  * media: adv7180: Disable test-pattern control on adv7180 (stable-fixes).
  * media: c8sectpfe: Call of_node_put(i2c_bus) only once in c8sectpfe_probe()
    (stable-fixes).
  * media: ccs-pll: Check for too high VT PLL multiplier in dual PLL case (git-
    fixes).
  * media: ccs-pll: Correct the upper limit of maximum op_pre_pll_clk_div (git-
    fixes).
  * media: ccs-pll: Start OP pre-PLL multiplier search from correct value (git-
    fixes).
  * media: ccs-pll: Start VT pre-PLL multiplier search from correct value (git-
    fixes).
  * media: cx231xx: set device_caps for 417 (stable-fixes).
  * media: cxusb: no longer judge rbuf when the write fails (git-fixes).
  * media: davinci: vpif: Fix memory leak in probe error path (git-fixes).
  * media: gspca: Add error handling for stv06xx_read_sensor() (git-fixes).
  * media: i2c: imx219: Correct the minimum vblanking value (stable-fixes).
  * media: imx-jpeg: Cleanup after an allocation error (git-fixes).
  * media: imx-jpeg: Drop the first error frames (git-fixes).
  * media: imx-jpeg: Move mxc_jpeg_free_slot_data() ahead (git-fixes).
  * media: imx-jpeg: Reset slot data pointers when freed (git-fixes).
  * media: nxp: imx8-isi: better handle the m2m usage_count (git-fixes).
  * media: omap3isp: use sgtable-based scatterlist wrappers (git-fixes).
  * media: ov5675: suppress probe deferral errors (git-fixes).
  * media: ov8856: suppress probe deferral errors (git-fixes).
  * media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is
    available (stable-fixes).
  * media: rkvdec: Fix frame size enumeration (git-fixes).
  * media: tc358746: improve calculation of the D-PHY timing registers (stable-
    fixes).
  * media: test-drivers: vivid: do not call schedule in loop (stable-fixes).
  * media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map (stable-fixes).
  * media: uvcvideo: Fix deferred probing error (git-fixes).
  * media: uvcvideo: Handle uvc menu translation inside uvc_get_le_value
    (stable-fixes).
  * media: uvcvideo: Return the number of processed controls (git-fixes).
  * media: v4l2-dev: fix error handling in __video_register_device() (git-
    fixes).
  * media: v4l: Memset argument to 0 before calling get_mbus_config pad op
    (stable-fixes).
  * media: venus: Fix probe error handling (git-fixes).
  * media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes).
  * media: videobuf2: use sgtable-based scatterlist wrappers (git-fixes).
  * media: vidtv: Terminating the subsequent process of initialization failure
    (git-fixes).
  * media: vivid: Change the siize of the composing (git-fixes).
  * mfd: exynos-lpass: Avoid calling exynos_lpass_disable() twice in
    exynos_lpass_remove() (git-fixes).
  * mfd: stmpe-spi: Correct the name used in MODULE_DEVICE_TABLE (git-fixes).
  * mfd: tps65219: Remove TPS65219_REG_TI_DEV_ID check (stable-fixes).
  * mmc: dw_mmc: add exynos7870 DW MMC support (stable-fixes).
  * mmc: host: Wait for Vdd to settle on card power off (stable-fixes).
  * mmc: sdhci: Disable SD card clock before changing parameters (stable-fixes).
  * mtd: nand: ecc-mxic: Fix use of uninitialized variable ret (git-fixes).
  * mtd: nand: sunxi: Add randomizer configuration before randomizer enable
    (git-fixes).
  * mtd: phram: Add the kernel lock down check (bsc#1232649).
  * mtd: rawnand: sunxi: Add randomizer configuration in
    sunxi_nfc_hw_ecc_write_chunk (git-fixes).
  * neighbour: Do not let neigh_forced_gc() disable preemption for long (git-
    fixes).
  * neighbour: delete redundant judgment statements (git-fixes).
  * net/handshake: Fix handshake_req_destroy_test1 (git-fixes).
  * net/handshake: Fix memory leak in __sock_create() and sock_alloc_file()
    (git-fixes).
  * net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes).
  * net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git-
    fixes).
  * net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged
    (git-fixes).
  * net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes).
  * net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes).
  * net/mlx5e: Disable MACsec offload for uplink representor profile (git-
    fixes).
  * net/neighbor: clear error in case strict check is not set (git-fixes).
  * net: Add non-RCU dev_getbyhwaddr() helper (git-fixes).
  * net: Clear old fragment checksum value in napi_reuse_skb (git-fixes).
  * net: Handle napi_schedule() calls from non-interrupt (git-fixes).
  * net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes).
  * net: Implement missing getsockopt(SO_TIMESTAMPING_NEW) (git-fixes).
  * net: Remove acked SYN flag from packet in the transmit queue correctly (git-
    fixes).
  * net: add rcu safety to rtnl_prop_list_size() (git-fixes).
  * net: do not dump stack on queue timeout (git-fixes).
  * net: fix udp gso skb_segment after pull from frag_list (git-fixes).
  * net: give more chances to rcu in netdev_wait_allrefs_any() (git-fixes).
  * net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes).
  * net: ipv4: fix a memleak in ip_setup_cork (git-fixes).
  * net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes).
  * net: linkwatch: use system_unbound_wq (git-fixes).
  * net: loopback: Avoid sending IP packets without an Ethernet header (git-
    fixes).
  * net: page_pool: fix warning code (git-fixes).
  * net: phy: clear phydev->devlink when the link is deleted (git-fixes).
  * net: phy: fix up const issues in to_mdio_device() and to_phy_device() (git-
    fixes).
  * net: phy: mscc: Fix memory leak when using one step timestamping (git-
    fixes).
  * net: phy: mscc: Stop clearing the the UDPv4 checksum for L2 frames (git-
    fixes).
  * net: qede: Initialize qede_ll_ops with designated initializer (git-fixes).
  * net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes).
  * net: sched: cls_u32: Fix allocation size in u32_init() (git-fixes).
  * net: sched: consistently use rcu_replace_pointer() in taprio_change() (git-
    fixes).
  * net: sched: em_text: fix possible memory leak in em_text_destroy() (git-
    fixes).
  * net: sched: fix erspan_opt settings in cls_flower (git-fixes).
  * net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes).
  * net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension
    (git-fixes).
  * net: usb: aqc111: debug info before sanitation (git-fixes).
  * net: usb: aqc111: fix error handling of usbnet read calls (git-fixes).
  * net: wwan: t7xx: Fix napi rx poll issue (git-fixes).
  * net_sched: sch_sfq: use a temporary work area for validating configuration
    (bsc#1232504)
  * netdev-genl: Hold rcu_read_lock in napi_get (git-fixes).
  * netdev-genl: avoid empty messages in queue dump (git-fixes).
  * netdev: fix repeated netlink messages in queue dump (git-fixes).
  * netlink: annotate data-races around sk->sk_err (git-fixes).
  * netpoll: Ensure clean state on setup failures (git-fixes).
  * netpoll: Use rcu_access_pointer() in __netpoll_setup (git-fixes).
  * netpoll: hold rcu read lock in __netpoll_send_skb() (git-fixes).
  * nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes).
  * nfsd: Initialize ssc before laundromat_work to prevent NULL dereference
    (git-fixes).
  * nfsd: add list_head nf_gc to struct nfsd_file (git-fixes).
  * nfsd: validate the nfsd_serv pointer before calling svc_wake_up (git-fixes).
  * nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes).
  * nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git-
    fixes).
  * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes
    bsc#1223096).
  * nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148).
  * nvme-pci: fix queue unquiesce check on slot_reset (git-fixes).
  * nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes).
  * nvme-tcp: fix premature queue removal and I/O failover (git-fixes).
  * nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes).
  * nvme: Add 'partial_nid' quirk (bsc#1241148).
  * nvme: Add warning when a partiually unique NID is detected (bsc#1241148).
  * nvme: fixup scan failure for non-ANA multipath controllers (git-fixes).
  * nvme: multipath: fix return value of nvme_available_path (git-fixes).
  * nvme: re-read ANA log page after ns scan completes (git-fixes).
  * nvme: requeue namespace scan on missed AENs (git-fixes).
  * nvme: unblock ctrl state transition for firmware update (git-fixes).
  * nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes).
  * nvmet-fc: inline nvmet_fc_free_hostport (git-fixes).
  * nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes).
  * nvmet-fc: take tgtport reference only once (git-fixes).
  * nvmet-fc: update tgtport ref per assoc (git-fixes).
  * nvmet-fcloop: Remove remote port from list when unlinking (git-fixes).
  * nvmet-fcloop: add ref counting to lport (git-fixes).
  * nvmet-fcloop: replace kref with refcount (git-fixes).
  * nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes).
  * objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963).
  * ocfs2: fix the issue with discontiguous allocation in the global_bitmap
    (git-fixes).
  * octeontx2-pf: qos: fix VF root node parent queue index (git-fixes).
  * orangefs: Do not truncate file size (git-fixes).
  * pNFS/flexfiles: Report ENETDOWN as a connection error (git-fixes).
  * padata: do not leak refcount in reorder_work (git-fixes).
  * page_pool: Fix use-after-free in page_pool_recycle_in_ring (git-fixes).
  * phy: Fix error handling in tegra_xusb_port_init (git-fixes).
  * phy: core: do not require set_mode() callback for phy_get_mode() to work
    (stable-fixes).
  * phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug (git-fixes).
  * phy: renesas: rcar-gen3-usb2: Add support to initialize the bus (stable-
    fixes).
  * phy: renesas: rcar-gen3-usb2: Assert PLL reset on PHY power off (git-fixes).
  * phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes).
  * phy: renesas: rcar-gen3-usb2: Lock around hardware registers and driver data
    (git-fixes).
  * phy: renesas: rcar-gen3-usb2: Move IRQ request in probe (stable-fixes).
  * phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes).
  * phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git-
    fixes).
  * phy: tegra: xusb: remove a stray unlock (git-fixes).
  * pinctrl-tegra: Restore SFSEL bit when freeing pins (stable-fixes).
  * pinctrl: armada-37xx: set GPIO output value before setting direction (git-
    fixes).
  * pinctrl: armada-37xx: use correct OUTPUT_VAL register for GPIOs > 31 (git-
    fixes).
  * pinctrl: at91: Fix possible out-of-boundary access (git-fixes).
  * pinctrl: bcm281xx: Use "unsigned int" instead of bare "unsigned" (stable-
    fixes).
  * pinctrl: devicetree: do not goto err when probing hogs in pinctrl_dt_to_map
    (stable-fixes).
  * pinctrl: meson: define the pull up/down resistor value as 60 kOhm (stable-
    fixes).
  * pinctrl: tegra: Fix off by one in tegra_pinctrl_get_group() (git-fixes).
  * platform/x86: dell-wmi-sysman: Avoid buffer overflow in
    current_password_store() (git-fixes).
  * platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (git-fixes).
  * platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (stable-fixes).
  * platform/x86: thinkpad_acpi: Ignore battery threshold change event
    notification (stable-fixes).
  * platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (git-fixes).
  * platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (stable-fixes).
  * power: reset: at91-reset: Optimize at91_reset() (git-fixes).
  * powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes).
  * powerpc/pseries/iommu: create DDW for devices with DMA mask less than
    64-bits (bsc#1239691 bsc#1243044 ltc#212555).
  * powerpc/pseries/msi: Avoid reading PCI device registers in reduced power
    states (bsc#1215199).
  * pstore: Change kmsg_bytes storage size to u32 (git-fixes).
  * qibfs: fix _another_ leak (git-fixes)
  * rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes)
  * rcu/tasks: Handle new PF_IDLE semantics (git-fixes)
  * rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes)
  * rcu: Introduce rcu_cpu_online() (git-fixes)
  * regulator: ad5398: Add device tree support (stable-fixes).
  * regulator: max14577: Add error check for max14577_read_reg() (git-fixes).
  * regulator: max20086: Change enable gpio to optional (git-fixes).
  * regulator: max20086: Fix MAX200086 chip id (git-fixes).
  * regulator: max20086: fix invalid memory access (git-fixes).
  * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN
  * rtc: Fix offset calculation for .start_secs < 0 (git-fixes).
  * rtc: at91rm9200: drop unused module alias (git-fixes).
  * rtc: cpcap: drop unused module alias (git-fixes).
  * rtc: da9063: drop unused module alias (git-fixes).
  * rtc: ds1307: stop disabling alarms on probe (stable-fixes).
  * rtc: jz4740: drop unused module alias (git-fixes).
  * rtc: pm8xxx: drop unused module alias (git-fixes).
  * rtc: rv3032: fix EERD location (stable-fixes).
  * rtc: s3c: drop unused module alias (git-fixes).
  * rtc: sh: assign correct interrupts with DT (git-fixes).
  * rtc: stm32: drop unused module alias (git-fixes).
  * s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805).
  * s390/pci: Allow re-add of a reserved but not yet removed device
    (bsc#1244145).
  * s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child
    VFs (git-fixes bsc#1244145).
  * s390/pci: Fix potential double remove of hotplug slot (bsc#1244145).
  * s390/pci: Prevent self deletion in disable_slot() (bsc#1244145).
  * s390/pci: Remove redundant bus removal and disable from
    zpci_release_device() (bsc#1244145).
  * s390/pci: Serialize device addition and removal (bsc#1244145).
  * s390/pci: introduce lock to synchronize state of zpci_dev's (jsc#PED-10253
    bsc#1244145).
  * s390/pci: remove hotplug slot when releasing the device (bsc#1244145).
  * s390/pci: rename lock member in struct zpci_dev (jsc#PED-10253 bsc#1244145).
  * scsi: Improve CDL control (git-fixes).
  * scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes).
  * scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git-
    fixes).
  * scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk
    (bsc#1242993).
  * scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993).
  * scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993).
  * scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993).
  * scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands
    (bsc#1242993).
  * scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993).
  * scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset
    (bsc#1242993).
  * scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI
    retry (bsc#1242993).
  * scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset
    (bsc#1242993).
  * scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993).
  * scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966).
  * scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993).
  * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes).
  * scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes).
  * scsi: qla2xxx: Fix typos in a comment (bsc#1243090).
  * scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090).
  * scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090).
  * scsi: qla2xxx: Remove unused module parameters (bsc#1243090).
  * scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090).
  * scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090).
  * scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090).
  * scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090).
  * scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090).
  * scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090).
  * scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090).
  * selftests/bpf: Fix bpf_nf selftest failure (git-fixes).
  * selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test
    (bsc#1242203).
  * selftests/mm: restore default nr_hugepages value during cleanup in
    hugetlb_reparenting_test.sh (git-fixes).
  * selftests/net: have `gro.sh -t` return a correct exit code (stable-fixes).
  * selftests/seccomp: fix syscall_restart test for arm compat (git-fixes).
  * serial: Fix potential null-ptr-deref in mlb_usio_probe() (git-fixes).
  * serial: sh-sci: Save and restore more registers (git-fixes).
  * serial: sh-sci: Update the suspend/resume support (stable-fixes).
  * smb3: fix Open files on server counter going negative (git-fixes).
  * smb: client: Use str_yes_no() helper function (git-fixes).
  * smb: client: allow more DFS referrals to be cached (git-fixes).
  * smb: client: avoid unnecessary reconnects when refreshing referrals (git-
    fixes).
  * smb: client: change return value in open_cached_dir_by_dentry() if !cfids
    (git-fixes).
  * smb: client: do not retry DFS targets on server shutdown (git-fixes).
  * smb: client: do not trust DFSREF_STORAGE_SERVER bit (git-fixes).
  * smb: client: do not try following DFS links in cifs_tree_connect() (git-
    fixes).
  * smb: client: fix DFS interlink failover (git-fixes).
  * smb: client: fix DFS mount against old servers with NTLMSSP (git-fixes).
  * smb: client: fix hang in wait_for_response() for negproto (bsc#1242709).
  * smb: client: fix potential race in cifs_put_tcon() (git-fixes).
  * smb: client: fix return value of parse_dfs_referrals() (git-fixes).
  * smb: client: get rid of @nlsc param in cifs_tree_connect() (git-fixes).
  * smb: client: get rid of TCP_Server_Info::refpath_lock (git-fixes).
  * smb: client: get rid of kstrdup() in get_ses_refpath() (git-fixes).
  * smb: client: improve purging of cached referrals (git-fixes).
  * smb: client: introduce av_for_each_entry() helper (git-fixes).
  * smb: client: optimize referral walk on failed link targets (git-fixes).
  * smb: client: parse DNS domain name from domain= option (git-fixes).
  * smb: client: parse av pair type 4 in CHALLENGE_MESSAGE (git-fixes).
  * smb: client: provide dns_resolve_{unc,name} helpers (git-fixes).
  * smb: client: refresh referral without acquiring refpath_lock (git-fixes).
  * smb: client: remove unnecessary checks in open_cached_dir() (git-fixes).
  * soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop() (git-fixes).
  * soc: aspeed: lpc: Fix impossible judgment condition (git-fixes).
  * soc: qcom: smp2p: Fix fallback to qcom,ipc parse (git-fixes).
  * soc: ti: k3-socinfo: Do not use syscon helper to build regmap (stable-
    fixes).
  * soundwire: amd: change the soundwire wake enable/disable sequence (stable-
    fixes).
  * spi-rockchip: Fix register out of bounds access (stable-fixes).
  * spi: bcm63xx-hsspi: fix shared reset (git-fixes).
  * spi: bcm63xx-spi: fix shared reset (git-fixes).
  * spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes).
  * spi: sh-msiof: Fix maximum DMA transfer size (git-fixes).
  * spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes).
  * spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes).
  * spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes).
  * spi: spi-sun4i: fix early activation (stable-fixes).
  * spi: tegra114: Use value to check for invalid delays (git-fixes).
  * spi: tegra210-quad: Fix X1_X2_X4 encoding and support x4 transfers (git-
    fixes).
  * spi: tegra210-quad: modify chip select (CS) deactivation (git-fixes).
  * spi: tegra210-quad: remove redundant error handling code (git-fixes).
  * spi: zynqmp-gqspi: Always acknowledge interrupts (stable-fixes).
  * staging: iio: ad5933: Correct settling cycles encoding per datasheet (git-
    fixes).
  * tcp/dccp: allow a connection when sk_max_ack_backlog is zero (git-fixes).
  * tcp/dccp: bypass empty buckets in inet_twsk_purge() (git-fixes).
  * tcp/dccp: complete lockless accesses to sk->sk_max_ack_backlog (git-fixes).
  * tcp: bring back NUMA dispersion in inet_ehash_locks_alloc() (git-fixes).
  * tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes).
  * tcp_cubic: fix incorrect HyStart round start detection (git-fixes).
  * tcp_metrics: optimize tcp_metrics_flush_all() (git-fixes).
  * thermal/drivers/qoriq: Power down TMU on system suspend (stable-fixes).
  * thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git-
    fixes).
  * thunderbolt: Do not add non-active NVM if NVM upgrade is disabled for
    retimer (stable-fixes).
  * thunderbolt: Fix a logic error in wake on connect (git-fixes).
  * udp: annotate data-races around up->pending (git-fixes).
  * udp: fix incorrect parameter validation in the udp_lib_getsockopt() function
    (git-fixes).
  * udp: fix receiving fraglist GSO packets (git-fixes).
  * udp: preserve the connected status if only UDP cmsg (git-fixes).
  * usb: Flush altsetting 0 endpoints before reinitializating them after reset
    (git-fixes).
  * usb: cdnsp: Fix issue with detecting USB 3.2 speed (git-fixes).
  * usb: cdnsp: Fix issue with detecting command completion event (git-fixes).
  * usb: renesas_usbhs: Reorder clock handling and power management in probe
    (git-fixes).
  * usb: typec: class: Invalidate USB device pointers on partner unregistration
    (git-fixes).
  * usb: typec: tcpm/tcpci_maxim: Fix bounds check in process_rx() (git-fixes).
  * usb: usbtmc: Fix read_stb function and get_stb ioctl (git-fixes).
  * usb: usbtmc: Fix timeout value in get_stb (git-fixes).
  * usb: xhci: Do not change the status of stalled TDs on failed Stop EP
    (stable-fixes).
  * vgacon: Add check for vc_origin address range in vgacon_scroll() (git-
    fixes).
  * vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git-
    fixes).
  * virtio_console: fix missing byte order handling for cols and rows (git-
    fixes).
  * vt: remove VT_RESIZE and VT_RESIZEX from vt_compat_ioctl() (git-fixes).
  * watchdog: exar: Shorten identity name to fit correctly (git-fixes).
  * wifi: ath11k: fix node corruption in ar->arvifs list (git-fixes).
  * wifi: ath11k: fix ring-buffer corruption (git-fixes).
  * wifi: ath11k: fix rx completion meta data corruption (git-fixes).
  * wifi: ath12k: Add MSDU length validation for TKIP MIC error (git-fixes).
  * wifi: ath12k: Avoid napi_sync() before napi_enable() (stable-fixes).
  * wifi: ath12k: Fix WMI tag for EHT rate in peer assoc (git-fixes).
  * wifi: ath12k: Fix end offset bit definition in monitor ring descriptor
    (stable-fixes).
  * wifi: ath12k: Fix invalid memory access while forming 802.11 header (git-
    fixes).
  * wifi: ath12k: Fix memory leak during vdev_id mismatch (git-fixes).
  * wifi: ath12k: Fix the QoS control field offset to build QoS header (git-
    fixes).
  * wifi: ath12k: Improve BSS discovery with hidden SSID in 6 GHz band (stable-
    fixes).
  * wifi: ath12k: Report proper tx completion status to mac80211 (stable-fixes).
  * wifi: ath12k: fix ath12k_hal_tx_cmd_ext_desc_setup() info1 override (stable-
    fixes).
  * wifi: ath12k: fix cleanup path after mhi init (git-fixes).
  * wifi: ath12k: fix invalid access to memory (git-fixes).
  * wifi: ath12k: fix node corruption in ar->arvifs list (git-fixes).
  * wifi: ath12k: fix ring-buffer corruption (git-fixes).
  * wifi: ath9k: return by of_get_mac_address (stable-fixes).
  * wifi: ath9k_htc: Abort software beacon handling if disabled (git-fixes).
  * wifi: iwlfiwi: mvm: Fix the rate reporting (git-fixes).
  * wifi: iwlwifi: add support for Killer on MTL (stable-fixes).
  * wifi: iwlwifi: fix debug actions order (stable-fixes).
  * wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request
    (git-fixes).
  * wifi: mac80211: do not unconditionally call drv_mgd_complete_tx() (stable-
    fixes).
  * wifi: mac80211: remove misplaced drv_mgd_complete_tx() call (stable-fixes).
  * wifi: mt76: disable napi on driver removal (git-fixes).
  * wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init() (git-
    fixes).
  * wifi: mt76: mt7925: ensure all MCU commands wait for response (git-fixes).
  * wifi: mt76: mt7925: fix host interrupt register initialization (git-fixes).
  * wifi: mt76: mt7925: prevent multiple scan commands (git-fixes).
  * wifi: mt76: mt7925: refine the sniffer commnad (git-fixes).
  * wifi: mt76: mt7996: fix RX buffer size of MCU event (git-fixes).
  * wifi: mt76: mt7996: revise TXS size (stable-fixes).
  * wifi: mt76: mt7996: set EHT max ampdu length capability (git-fixes).
  * wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2 (stable-
    fixes).
  * wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() (git-fixes).
  * wifi: rtlwifi: disable ASPM for RTL8723BE with subsystem ID 11ad:1723 (git-
    fixes).
  * wifi: rtw88: Do not use static local variable in
    rtw8822b_set_tx_power_index_by_rate (stable-fixes).
  * wifi: rtw88: Fix __rtw_download_firmware() for RTL8814AU (stable-fixes).
  * wifi: rtw88: Fix download_firmware_validate() for RTL8814AU (stable-fixes).
  * wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31 (stable-fixes).
  * wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU (stable-fixes).
  * wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU (stable-fixes).
  * wifi: rtw88: do not ignore hardware read error during DPK (git-fixes).
  * wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (git-
    fixes).
  * wifi: rtw88: sdio: call rtw_sdio_indicate_tx_status unconditionally (git-
    fixes).
  * wifi: rtw88: sdio: map mgmt frames to queue TX_DESC_QSEL_MGMT (git-fixes).
  * wifi: rtw88: usb: Reduce control message timeout to 500 ms (git-fixes).
  * wifi: rtw89: add wiphy_lock() to work that isn't held wiphy_lock() yet
    (stable-fixes).
  * wifi: rtw89: fw: propagate error code from rtw89_h2c_tx() (stable-fixes).
  * wifi: rtw89: pci: enlarge retry times of RX tag to 1000 (git-fixes).
  * x86/idle: Remove MFENCEs for X86_BUG_CLFLUSH_MONITOR in
    mwait_idle_with_hints() and prefer_mwait_c1_over_halt() (git-fixes).
  * x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes).
  * x86/microcode/AMD: Do not return error when microcode update is not
    necessary (git-fixes).
  * x86/microcode/AMD: Have __apply_microcode_amd() return bool (git-fixes).
  * x86/microcode/AMD: Make __verify_patch_size() return bool (git-fixes).
  * x86/microcode/AMD: Return bool from find_blobs_in_containers() (git-fixes).
  * x86/xen: move xen_reserve_extra_memory() (git-fixes).
  * xen/mcelog: Add __nonstring annotations for unterminated strings (git-
    fixes).
  * xen: Change xen-acpi-processor dom0 dependency (git-fixes).
  * xenfs/xensyms: respect hypervisor's "next" indication (git-fixes).
  * xhci: Add helper to set an interrupters interrupt moderation interval (git-
    fixes).
  * xhci: split free interrupter into separate remove and free parts (git-
    fixes).
  * xsk: Add truesize to skb_add_rx_frag() (git-fixes).
  * xsk: Do not assume metadata is always requested in TX completion (git-
    fixes).
  * xsk: always clear DMA mapping information when unmapping the pool (git-
    fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Micro 6.0  
    zypper in -t patch SUSE-SLE-Micro-6.0-kernel-42=1

  * SUSE Linux Micro Extras 6.0  
    zypper in -t patch SUSE-SLE-Micro-6.0-kernel-42=1

## Package List:

  * SUSE Linux Micro 6.0 (noarch)
    * kernel-source-rt-6.4.0-33.1
    * kernel-devel-rt-6.4.0-33.1
  * SUSE Linux Micro 6.0 (nosrc x86_64)
    * kernel-rt-6.4.0-33.1
  * SUSE Linux Micro 6.0 (x86_64)
    * kernel-rt-livepatch-6.4.0-33.1
    * kernel-rt-debuginfo-6.4.0-33.1
    * kernel-rt-debugsource-6.4.0-33.1
  * SUSE Linux Micro Extras 6.0 (nosrc)
    * kernel-rt-6.4.0-33.1
  * SUSE Linux Micro Extras 6.0 (x86_64)
    * kernel-rt-devel-6.4.0-33.1
    * kernel-rt-devel-debuginfo-6.4.0-33.1
    * kernel-rt-debugsource-6.4.0-33.1

## References:

  * https://www.suse.com/security/cve/CVE-2023-52888.html
  * https://www.suse.com/security/cve/CVE-2023-53146.html
  * https://www.suse.com/security/cve/CVE-2024-43869.html
  * https://www.suse.com/security/cve/CVE-2024-46713.html
  * https://www.suse.com/security/cve/CVE-2024-49568.html
  * https://www.suse.com/security/cve/CVE-2024-50106.html
  * https://www.suse.com/security/cve/CVE-2024-50223.html
  * https://www.suse.com/security/cve/CVE-2024-53135.html
  * https://www.suse.com/security/cve/CVE-2024-54458.html
  * https://www.suse.com/security/cve/CVE-2024-58098.html
  * https://www.suse.com/security/cve/CVE-2024-58099.html
  * https://www.suse.com/security/cve/CVE-2024-58100.html
  * https://www.suse.com/security/cve/CVE-2024-58237.html
  * https://www.suse.com/security/cve/CVE-2025-21629.html
  * https://www.suse.com/security/cve/CVE-2025-21648.html
  * https://www.suse.com/security/cve/CVE-2025-21702.html
  * https://www.suse.com/security/cve/CVE-2025-21787.html
  * https://www.suse.com/security/cve/CVE-2025-21814.html
  * https://www.suse.com/security/cve/CVE-2025-21868.html
  * https://www.suse.com/security/cve/CVE-2025-21919.html
  * https://www.suse.com/security/cve/CVE-2025-21938.html
  * https://www.suse.com/security/cve/CVE-2025-21997.html
  * https://www.suse.com/security/cve/CVE-2025-22005.html
  * https://www.suse.com/security/cve/CVE-2025-22021.html
  * https://www.suse.com/security/cve/CVE-2025-22030.html
  * https://www.suse.com/security/cve/CVE-2025-22056.html
  * https://www.suse.com/security/cve/CVE-2025-22057.html
  * https://www.suse.com/security/cve/CVE-2025-22063.html
  * https://www.suse.com/security/cve/CVE-2025-22066.html
  * https://www.suse.com/security/cve/CVE-2025-22070.html
  * https://www.suse.com/security/cve/CVE-2025-22089.html
  * https://www.suse.com/security/cve/CVE-2025-22095.html
  * https://www.suse.com/security/cve/CVE-2025-22103.html
  * https://www.suse.com/security/cve/CVE-2025-22113.html
  * https://www.suse.com/security/cve/CVE-2025-22119.html
  * https://www.suse.com/security/cve/CVE-2025-22124.html
  * https://www.suse.com/security/cve/CVE-2025-22125.html
  * https://www.suse.com/security/cve/CVE-2025-22126.html
  * https://www.suse.com/security/cve/CVE-2025-23140.html
  * https://www.suse.com/security/cve/CVE-2025-23141.html
  * https://www.suse.com/security/cve/CVE-2025-23142.html
  * https://www.suse.com/security/cve/CVE-2025-23144.html
  * https://www.suse.com/security/cve/CVE-2025-23146.html
  * https://www.suse.com/security/cve/CVE-2025-23147.html
  * https://www.suse.com/security/cve/CVE-2025-23148.html
  * https://www.suse.com/security/cve/CVE-2025-23149.html
  * https://www.suse.com/security/cve/CVE-2025-23150.html
  * https://www.suse.com/security/cve/CVE-2025-23151.html
  * https://www.suse.com/security/cve/CVE-2025-23155.html
  * https://www.suse.com/security/cve/CVE-2025-23156.html
  * https://www.suse.com/security/cve/CVE-2025-23157.html
  * https://www.suse.com/security/cve/CVE-2025-23158.html
  * https://www.suse.com/security/cve/CVE-2025-23159.html
  * https://www.suse.com/security/cve/CVE-2025-23160.html
  * https://www.suse.com/security/cve/CVE-2025-23161.html
  * https://www.suse.com/security/cve/CVE-2025-37738.html
  * https://www.suse.com/security/cve/CVE-2025-37740.html
  * https://www.suse.com/security/cve/CVE-2025-37741.html
  * https://www.suse.com/security/cve/CVE-2025-37742.html
  * https://www.suse.com/security/cve/CVE-2025-37743.html
  * https://www.suse.com/security/cve/CVE-2025-37747.html
  * https://www.suse.com/security/cve/CVE-2025-37748.html
  * https://www.suse.com/security/cve/CVE-2025-37749.html
  * https://www.suse.com/security/cve/CVE-2025-37750.html
  * https://www.suse.com/security/cve/CVE-2025-37752.html
  * https://www.suse.com/security/cve/CVE-2025-37754.html
  * https://www.suse.com/security/cve/CVE-2025-37755.html
  * https://www.suse.com/security/cve/CVE-2025-37758.html
  * https://www.suse.com/security/cve/CVE-2025-37765.html
  * https://www.suse.com/security/cve/CVE-2025-37766.html
  * https://www.suse.com/security/cve/CVE-2025-37767.html
  * https://www.suse.com/security/cve/CVE-2025-37768.html
  * https://www.suse.com/security/cve/CVE-2025-37769.html
  * https://www.suse.com/security/cve/CVE-2025-37770.html
  * https://www.suse.com/security/cve/CVE-2025-37771.html
  * https://www.suse.com/security/cve/CVE-2025-37772.html
  * https://www.suse.com/security/cve/CVE-2025-37773.html
  * https://www.suse.com/security/cve/CVE-2025-37780.html
  * https://www.suse.com/security/cve/CVE-2025-37781.html
  * https://www.suse.com/security/cve/CVE-2025-37782.html
  * https://www.suse.com/security/cve/CVE-2025-37787.html
  * https://www.suse.com/security/cve/CVE-2025-37788.html
  * https://www.suse.com/security/cve/CVE-2025-37789.html
  * https://www.suse.com/security/cve/CVE-2025-37790.html
  * https://www.suse.com/security/cve/CVE-2025-37792.html
  * https://www.suse.com/security/cve/CVE-2025-37793.html
  * https://www.suse.com/security/cve/CVE-2025-37794.html
  * https://www.suse.com/security/cve/CVE-2025-37796.html
  * https://www.suse.com/security/cve/CVE-2025-37797.html
  * https://www.suse.com/security/cve/CVE-2025-37798.html
  * https://www.suse.com/security/cve/CVE-2025-37800.html
  * https://www.suse.com/security/cve/CVE-2025-37801.html
  * https://www.suse.com/security/cve/CVE-2025-37803.html
  * https://www.suse.com/security/cve/CVE-2025-37804.html
  * https://www.suse.com/security/cve/CVE-2025-37805.html
  * https://www.suse.com/security/cve/CVE-2025-37809.html
  * https://www.suse.com/security/cve/CVE-2025-37810.html
  * https://www.suse.com/security/cve/CVE-2025-37812.html
  * https://www.suse.com/security/cve/CVE-2025-37815.html
  * https://www.suse.com/security/cve/CVE-2025-37819.html
  * https://www.suse.com/security/cve/CVE-2025-37820.html
  * https://www.suse.com/security/cve/CVE-2025-37823.html
  * https://www.suse.com/security/cve/CVE-2025-37824.html
  * https://www.suse.com/security/cve/CVE-2025-37829.html
  * https://www.suse.com/security/cve/CVE-2025-37830.html
  * https://www.suse.com/security/cve/CVE-2025-37831.html
  * https://www.suse.com/security/cve/CVE-2025-37833.html
  * https://www.suse.com/security/cve/CVE-2025-37836.html
  * https://www.suse.com/security/cve/CVE-2025-37839.html
  * https://www.suse.com/security/cve/CVE-2025-37840.html
  * https://www.suse.com/security/cve/CVE-2025-37841.html
  * https://www.suse.com/security/cve/CVE-2025-37842.html
  * https://www.suse.com/security/cve/CVE-2025-37844.html
  * https://www.suse.com/security/cve/CVE-2025-37849.html
  * https://www.suse.com/security/cve/CVE-2025-37850.html
  * https://www.suse.com/security/cve/CVE-2025-37851.html
  * https://www.suse.com/security/cve/CVE-2025-37852.html
  * https://www.suse.com/security/cve/CVE-2025-37853.html
  * https://www.suse.com/security/cve/CVE-2025-37854.html
  * https://www.suse.com/security/cve/CVE-2025-37858.html
  * https://www.suse.com/security/cve/CVE-2025-37862.html
  * https://www.suse.com/security/cve/CVE-2025-37865.html
  * https://www.suse.com/security/cve/CVE-2025-37867.html
  * https://www.suse.com/security/cve/CVE-2025-37870.html
  * https://www.suse.com/security/cve/CVE-2025-37871.html
  * https://www.suse.com/security/cve/CVE-2025-37873.html
  * https://www.suse.com/security/cve/CVE-2025-37874.html
  * https://www.suse.com/security/cve/CVE-2025-37875.html
  * https://www.suse.com/security/cve/CVE-2025-37879.html
  * https://www.suse.com/security/cve/CVE-2025-37881.html
  * https://www.suse.com/security/cve/CVE-2025-37886.html
  * https://www.suse.com/security/cve/CVE-2025-37887.html
  * https://www.suse.com/security/cve/CVE-2025-37889.html
  * https://www.suse.com/security/cve/CVE-2025-37890.html
  * https://www.suse.com/security/cve/CVE-2025-37891.html
  * https://www.suse.com/security/cve/CVE-2025-37892.html
  * https://www.suse.com/security/cve/CVE-2025-37897.html
  * https://www.suse.com/security/cve/CVE-2025-37900.html
  * https://www.suse.com/security/cve/CVE-2025-37901.html
  * https://www.suse.com/security/cve/CVE-2025-37903.html
  * https://www.suse.com/security/cve/CVE-2025-37905.html
  * https://www.suse.com/security/cve/CVE-2025-37911.html
  * https://www.suse.com/security/cve/CVE-2025-37912.html
  * https://www.suse.com/security/cve/CVE-2025-37913.html
  * https://www.suse.com/security/cve/CVE-2025-37914.html
  * https://www.suse.com/security/cve/CVE-2025-37915.html
  * https://www.suse.com/security/cve/CVE-2025-37917.html
  * https://www.suse.com/security/cve/CVE-2025-37918.html
  * https://www.suse.com/security/cve/CVE-2025-37925.html
  * https://www.suse.com/security/cve/CVE-2025-37928.html
  * https://www.suse.com/security/cve/CVE-2025-37929.html
  * https://www.suse.com/security/cve/CVE-2025-37930.html
  * https://www.suse.com/security/cve/CVE-2025-37931.html
  * https://www.suse.com/security/cve/CVE-2025-37932.html
  * https://www.suse.com/security/cve/CVE-2025-37933.html
  * https://www.suse.com/security/cve/CVE-2025-37936.html
  * https://www.suse.com/security/cve/CVE-2025-37937.html
  * https://www.suse.com/security/cve/CVE-2025-37943.html
  * https://www.suse.com/security/cve/CVE-2025-37944.html
  * https://www.suse.com/security/cve/CVE-2025-37948.html
  * https://www.suse.com/security/cve/CVE-2025-37949.html
  * https://www.suse.com/security/cve/CVE-2025-37951.html
  * https://www.suse.com/security/cve/CVE-2025-37953.html
  * https://www.suse.com/security/cve/CVE-2025-37954.html
  * https://www.suse.com/security/cve/CVE-2025-37957.html
  * https://www.suse.com/security/cve/CVE-2025-37958.html
  * https://www.suse.com/security/cve/CVE-2025-37959.html
  * https://www.suse.com/security/cve/CVE-2025-37960.html
  * https://www.suse.com/security/cve/CVE-2025-37963.html
  * https://www.suse.com/security/cve/CVE-2025-37967.html
  * https://www.suse.com/security/cve/CVE-2025-37968.html
  * https://www.suse.com/security/cve/CVE-2025-37969.html
  * https://www.suse.com/security/cve/CVE-2025-37970.html
  * https://www.suse.com/security/cve/CVE-2025-37972.html
  * https://www.suse.com/security/cve/CVE-2025-37974.html
  * https://www.suse.com/security/cve/CVE-2025-37978.html
  * https://www.suse.com/security/cve/CVE-2025-37979.html
  * https://www.suse.com/security/cve/CVE-2025-37980.html
  * https://www.suse.com/security/cve/CVE-2025-37982.html
  * https://www.suse.com/security/cve/CVE-2025-37983.html
  * https://www.suse.com/security/cve/CVE-2025-37985.html
  * https://www.suse.com/security/cve/CVE-2025-37986.html
  * https://www.suse.com/security/cve/CVE-2025-37987.html
  * https://www.suse.com/security/cve/CVE-2025-37989.html
  * https://www.suse.com/security/cve/CVE-2025-37990.html
  * https://www.suse.com/security/cve/CVE-2025-37998.html
  * https://www.suse.com/security/cve/CVE-2025-38104.html
  * https://www.suse.com/security/cve/CVE-2025-38152.html
  * https://www.suse.com/security/cve/CVE-2025-38240.html
  * https://www.suse.com/security/cve/CVE-2025-38637.html
  * https://www.suse.com/security/cve/CVE-2025-39735.html
  * https://www.suse.com/security/cve/CVE-2025-40014.html
  * https://www.suse.com/security/cve/CVE-2025-40325.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1215199
  * https://bugzilla.suse.com/show_bug.cgi?id=1220112
  * https://bugzilla.suse.com/show_bug.cgi?id=1223096
  * https://bugzilla.suse.com/show_bug.cgi?id=1226498
  * https://bugzilla.suse.com/show_bug.cgi?id=1228557
  * https://bugzilla.suse.com/show_bug.cgi?id=1228854
  * https://bugzilla.suse.com/show_bug.cgi?id=1229491
  * https://bugzilla.suse.com/show_bug.cgi?id=1230581
  * https://bugzilla.suse.com/show_bug.cgi?id=1231016
  * https://bugzilla.suse.com/show_bug.cgi?id=1232504
  * https://bugzilla.suse.com/show_bug.cgi?id=1232649
  * https://bugzilla.suse.com/show_bug.cgi?id=1232882
  * https://bugzilla.suse.com/show_bug.cgi?id=1233192
  * https://bugzilla.suse.com/show_bug.cgi?id=1234154
  * https://bugzilla.suse.com/show_bug.cgi?id=1235149
  * https://bugzilla.suse.com/show_bug.cgi?id=1235728
  * https://bugzilla.suse.com/show_bug.cgi?id=1235968
  * https://bugzilla.suse.com/show_bug.cgi?id=1236142
  * https://bugzilla.suse.com/show_bug.cgi?id=1236208
  * https://bugzilla.suse.com/show_bug.cgi?id=1237312
  * https://bugzilla.suse.com/show_bug.cgi?id=1238212
  * https://bugzilla.suse.com/show_bug.cgi?id=1238473
  * https://bugzilla.suse.com/show_bug.cgi?id=1238774
  * https://bugzilla.suse.com/show_bug.cgi?id=1238992
  * https://bugzilla.suse.com/show_bug.cgi?id=1239691
  * https://bugzilla.suse.com/show_bug.cgi?id=1239925
  * https://bugzilla.suse.com/show_bug.cgi?id=1240180
  * https://bugzilla.suse.com/show_bug.cgi?id=1240593
  * https://bugzilla.suse.com/show_bug.cgi?id=1240723
  * https://bugzilla.suse.com/show_bug.cgi?id=1240823
  * https://bugzilla.suse.com/show_bug.cgi?id=1240866
  * https://bugzilla.suse.com/show_bug.cgi?id=1240966
  * https://bugzilla.suse.com/show_bug.cgi?id=1241148
  * https://bugzilla.suse.com/show_bug.cgi?id=1241282
  * https://bugzilla.suse.com/show_bug.cgi?id=1241305
  * https://bugzilla.suse.com/show_bug.cgi?id=1241340
  * https://bugzilla.suse.com/show_bug.cgi?id=1241351
  * https://bugzilla.suse.com/show_bug.cgi?id=1241376
  * https://bugzilla.suse.com/show_bug.cgi?id=1241448
  * https://bugzilla.suse.com/show_bug.cgi?id=1241457
  * https://bugzilla.suse.com/show_bug.cgi?id=1241492
  * https://bugzilla.suse.com/show_bug.cgi?id=1241519
  * https://bugzilla.suse.com/show_bug.cgi?id=1241525
  * https://bugzilla.suse.com/show_bug.cgi?id=1241533
  * https://bugzilla.suse.com/show_bug.cgi?id=1241538
  * https://bugzilla.suse.com/show_bug.cgi?id=1241576
  * https://bugzilla.suse.com/show_bug.cgi?id=1241590
  * https://bugzilla.suse.com/show_bug.cgi?id=1241595
  * https://bugzilla.suse.com/show_bug.cgi?id=1241596
  * https://bugzilla.suse.com/show_bug.cgi?id=1241597
  * https://bugzilla.suse.com/show_bug.cgi?id=1241617
  * https://bugzilla.suse.com/show_bug.cgi?id=1241625
  * https://bugzilla.suse.com/show_bug.cgi?id=1241627
  * https://bugzilla.suse.com/show_bug.cgi?id=1241635
  * https://bugzilla.suse.com/show_bug.cgi?id=1241638
  * https://bugzilla.suse.com/show_bug.cgi?id=1241644
  * https://bugzilla.suse.com/show_bug.cgi?id=1241654
  * https://bugzilla.suse.com/show_bug.cgi?id=1241657
  * https://bugzilla.suse.com/show_bug.cgi?id=1242012
  * https://bugzilla.suse.com/show_bug.cgi?id=1242035
  * https://bugzilla.suse.com/show_bug.cgi?id=1242044
  * https://bugzilla.suse.com/show_bug.cgi?id=1242086
  * https://bugzilla.suse.com/show_bug.cgi?id=1242163
  * https://bugzilla.suse.com/show_bug.cgi?id=1242203
  * https://bugzilla.suse.com/show_bug.cgi?id=1242343
  * https://bugzilla.suse.com/show_bug.cgi?id=1242414
  * https://bugzilla.suse.com/show_bug.cgi?id=1242417
  * https://bugzilla.suse.com/show_bug.cgi?id=1242501
  * https://bugzilla.suse.com/show_bug.cgi?id=1242502
  * https://bugzilla.suse.com/show_bug.cgi?id=1242504
  * https://bugzilla.suse.com/show_bug.cgi?id=1242506
  * https://bugzilla.suse.com/show_bug.cgi?id=1242507
  * https://bugzilla.suse.com/show_bug.cgi?id=1242509
  * https://bugzilla.suse.com/show_bug.cgi?id=1242510
  * https://bugzilla.suse.com/show_bug.cgi?id=1242512
  * https://bugzilla.suse.com/show_bug.cgi?id=1242513
  * https://bugzilla.suse.com/show_bug.cgi?id=1242514
  * https://bugzilla.suse.com/show_bug.cgi?id=1242520
  * https://bugzilla.suse.com/show_bug.cgi?id=1242523
  * https://bugzilla.suse.com/show_bug.cgi?id=1242524
  * https://bugzilla.suse.com/show_bug.cgi?id=1242529
  * https://bugzilla.suse.com/show_bug.cgi?id=1242530
  * https://bugzilla.suse.com/show_bug.cgi?id=1242531
  * https://bugzilla.suse.com/show_bug.cgi?id=1242532
  * https://bugzilla.suse.com/show_bug.cgi?id=1242559
  * https://bugzilla.suse.com/show_bug.cgi?id=1242563
  * https://bugzilla.suse.com/show_bug.cgi?id=1242564
  * https://bugzilla.suse.com/show_bug.cgi?id=1242565
  * https://bugzilla.suse.com/show_bug.cgi?id=1242566
  * https://bugzilla.suse.com/show_bug.cgi?id=1242567
  * https://bugzilla.suse.com/show_bug.cgi?id=1242568
  * https://bugzilla.suse.com/show_bug.cgi?id=1242569
  * https://bugzilla.suse.com/show_bug.cgi?id=1242573
  * https://bugzilla.suse.com/show_bug.cgi?id=1242574
  * https://bugzilla.suse.com/show_bug.cgi?id=1242575
  * https://bugzilla.suse.com/show_bug.cgi?id=1242578
  * https://bugzilla.suse.com/show_bug.cgi?id=1242584
  * https://bugzilla.suse.com/show_bug.cgi?id=1242585
  * https://bugzilla.suse.com/show_bug.cgi?id=1242587
  * https://bugzilla.suse.com/show_bug.cgi?id=1242591
  * https://bugzilla.suse.com/show_bug.cgi?id=1242709
  * https://bugzilla.suse.com/show_bug.cgi?id=1242727
  * https://bugzilla.suse.com/show_bug.cgi?id=1242758
  * https://bugzilla.suse.com/show_bug.cgi?id=1242760
  * https://bugzilla.suse.com/show_bug.cgi?id=1242761
  * https://bugzilla.suse.com/show_bug.cgi?id=1242762
  * https://bugzilla.suse.com/show_bug.cgi?id=1242763
  * https://bugzilla.suse.com/show_bug.cgi?id=1242764
  * https://bugzilla.suse.com/show_bug.cgi?id=1242766
  * https://bugzilla.suse.com/show_bug.cgi?id=1242770
  * https://bugzilla.suse.com/show_bug.cgi?id=1242778
  * https://bugzilla.suse.com/show_bug.cgi?id=1242781
  * https://bugzilla.suse.com/show_bug.cgi?id=1242782
  * https://bugzilla.suse.com/show_bug.cgi?id=1242785
  * https://bugzilla.suse.com/show_bug.cgi?id=1242786
  * https://bugzilla.suse.com/show_bug.cgi?id=1242792
  * https://bugzilla.suse.com/show_bug.cgi?id=1242846
  * https://bugzilla.suse.com/show_bug.cgi?id=1242849
  * https://bugzilla.suse.com/show_bug.cgi?id=1242850
  * https://bugzilla.suse.com/show_bug.cgi?id=1242852
  * https://bugzilla.suse.com/show_bug.cgi?id=1242854
  * https://bugzilla.suse.com/show_bug.cgi?id=1242856
  * https://bugzilla.suse.com/show_bug.cgi?id=1242859
  * https://bugzilla.suse.com/show_bug.cgi?id=1242860
  * https://bugzilla.suse.com/show_bug.cgi?id=1242861
  * https://bugzilla.suse.com/show_bug.cgi?id=1242866
  * https://bugzilla.suse.com/show_bug.cgi?id=1242867
  * https://bugzilla.suse.com/show_bug.cgi?id=1242868
  * https://bugzilla.suse.com/show_bug.cgi?id=1242871
  * https://bugzilla.suse.com/show_bug.cgi?id=1242873
  * https://bugzilla.suse.com/show_bug.cgi?id=1242875
  * https://bugzilla.suse.com/show_bug.cgi?id=1242906
  * https://bugzilla.suse.com/show_bug.cgi?id=1242908
  * https://bugzilla.suse.com/show_bug.cgi?id=1242924
  * https://bugzilla.suse.com/show_bug.cgi?id=1242930
  * https://bugzilla.suse.com/show_bug.cgi?id=1242940
  * https://bugzilla.suse.com/show_bug.cgi?id=1242944
  * https://bugzilla.suse.com/show_bug.cgi?id=1242945
  * https://bugzilla.suse.com/show_bug.cgi?id=1242946
  * https://bugzilla.suse.com/show_bug.cgi?id=1242948
  * https://bugzilla.suse.com/show_bug.cgi?id=1242949
  * https://bugzilla.suse.com/show_bug.cgi?id=1242951
  * https://bugzilla.suse.com/show_bug.cgi?id=1242953
  * https://bugzilla.suse.com/show_bug.cgi?id=1242954
  * https://bugzilla.suse.com/show_bug.cgi?id=1242955
  * https://bugzilla.suse.com/show_bug.cgi?id=1242957
  * https://bugzilla.suse.com/show_bug.cgi?id=1242959
  * https://bugzilla.suse.com/show_bug.cgi?id=1242961
  * https://bugzilla.suse.com/show_bug.cgi?id=1242962
  * https://bugzilla.suse.com/show_bug.cgi?id=1242973
  * https://bugzilla.suse.com/show_bug.cgi?id=1242974
  * https://bugzilla.suse.com/show_bug.cgi?id=1242977
  * https://bugzilla.suse.com/show_bug.cgi?id=1242982
  * https://bugzilla.suse.com/show_bug.cgi?id=1242990
  * https://bugzilla.suse.com/show_bug.cgi?id=1242993
  * https://bugzilla.suse.com/show_bug.cgi?id=1243000
  * https://bugzilla.suse.com/show_bug.cgi?id=1243006
  * https://bugzilla.suse.com/show_bug.cgi?id=1243011
  * https://bugzilla.suse.com/show_bug.cgi?id=1243015
  * https://bugzilla.suse.com/show_bug.cgi?id=1243044
  * https://bugzilla.suse.com/show_bug.cgi?id=1243049
  * https://bugzilla.suse.com/show_bug.cgi?id=1243056
  * https://bugzilla.suse.com/show_bug.cgi?id=1243074
  * https://bugzilla.suse.com/show_bug.cgi?id=1243076
  * https://bugzilla.suse.com/show_bug.cgi?id=1243077
  * https://bugzilla.suse.com/show_bug.cgi?id=1243082
  * https://bugzilla.suse.com/show_bug.cgi?id=1243090
  * https://bugzilla.suse.com/show_bug.cgi?id=1243330
  * https://bugzilla.suse.com/show_bug.cgi?id=1243342
  * https://bugzilla.suse.com/show_bug.cgi?id=1243456
  * https://bugzilla.suse.com/show_bug.cgi?id=1243469
  * https://bugzilla.suse.com/show_bug.cgi?id=1243470
  * https://bugzilla.suse.com/show_bug.cgi?id=1243471
  * https://bugzilla.suse.com/show_bug.cgi?id=1243472
  * https://bugzilla.suse.com/show_bug.cgi?id=1243473
  * https://bugzilla.suse.com/show_bug.cgi?id=1243475
  * https://bugzilla.suse.com/show_bug.cgi?id=1243476
  * https://bugzilla.suse.com/show_bug.cgi?id=1243509
  * https://bugzilla.suse.com/show_bug.cgi?id=1243511
  * https://bugzilla.suse.com/show_bug.cgi?id=1243513
  * https://bugzilla.suse.com/show_bug.cgi?id=1243515
  * https://bugzilla.suse.com/show_bug.cgi?id=1243516
  * https://bugzilla.suse.com/show_bug.cgi?id=1243517
  * https://bugzilla.suse.com/show_bug.cgi?id=1243519
  * https://bugzilla.suse.com/show_bug.cgi?id=1243522
  * https://bugzilla.suse.com/show_bug.cgi?id=1243524
  * https://bugzilla.suse.com/show_bug.cgi?id=1243528
  * https://bugzilla.suse.com/show_bug.cgi?id=1243529
  * https://bugzilla.suse.com/show_bug.cgi?id=1243530
  * https://bugzilla.suse.com/show_bug.cgi?id=1243534
  * https://bugzilla.suse.com/show_bug.cgi?id=1243536
  * https://bugzilla.suse.com/show_bug.cgi?id=1243537
  * https://bugzilla.suse.com/show_bug.cgi?id=1243539
  * https://bugzilla.suse.com/show_bug.cgi?id=1243540
  * https://bugzilla.suse.com/show_bug.cgi?id=1243541
  * https://bugzilla.suse.com/show_bug.cgi?id=1243542
  * https://bugzilla.suse.com/show_bug.cgi?id=1243543
  * https://bugzilla.suse.com/show_bug.cgi?id=1243545
  * https://bugzilla.suse.com/show_bug.cgi?id=1243547
  * https://bugzilla.suse.com/show_bug.cgi?id=1243559
  * https://bugzilla.suse.com/show_bug.cgi?id=1243560
  * https://bugzilla.suse.com/show_bug.cgi?id=1243562
  * https://bugzilla.suse.com/show_bug.cgi?id=1243567
  * https://bugzilla.suse.com/show_bug.cgi?id=1243571
  * https://bugzilla.suse.com/show_bug.cgi?id=1243572
  * https://bugzilla.suse.com/show_bug.cgi?id=1243573
  * https://bugzilla.suse.com/show_bug.cgi?id=1243574
  * https://bugzilla.suse.com/show_bug.cgi?id=1243575
  * https://bugzilla.suse.com/show_bug.cgi?id=1243589
  * https://bugzilla.suse.com/show_bug.cgi?id=1243621
  * https://bugzilla.suse.com/show_bug.cgi?id=1243624
  * https://bugzilla.suse.com/show_bug.cgi?id=1243625
  * https://bugzilla.suse.com/show_bug.cgi?id=1243626
  * https://bugzilla.suse.com/show_bug.cgi?id=1243627
  * https://bugzilla.suse.com/show_bug.cgi?id=1243628
  * https://bugzilla.suse.com/show_bug.cgi?id=1243649
  * https://bugzilla.suse.com/show_bug.cgi?id=1243657
  * https://bugzilla.suse.com/show_bug.cgi?id=1243658
  * https://bugzilla.suse.com/show_bug.cgi?id=1243659
  * https://bugzilla.suse.com/show_bug.cgi?id=1243660
  * https://bugzilla.suse.com/show_bug.cgi?id=1243664
  * https://bugzilla.suse.com/show_bug.cgi?id=1243737
  * https://bugzilla.suse.com/show_bug.cgi?id=1243782
  * https://bugzilla.suse.com/show_bug.cgi?id=1243805
  * https://bugzilla.suse.com/show_bug.cgi?id=1243836
  * https://bugzilla.suse.com/show_bug.cgi?id=1243963
  * https://bugzilla.suse.com/show_bug.cgi?id=1244145
  * https://bugzilla.suse.com/show_bug.cgi?id=1244261
  * https://jira.suse.com/browse/PED-10253

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250617/1eb302c1/attachment.htm>


More information about the sle-updates mailing list