SUSE-SU-2025:03634-1: important: Security update for the Linux Kernel

SLE-UPDATES null at suse.de
Fri Oct 17 16:36:06 UTC 2025



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:03634-1  
Release Date: 2025-10-17T14:32:55Z  
Rating: important  
References:

  * bsc#1012628
  * bsc#1194869
  * bsc#1213061
  * bsc#1213545
  * bsc#1213666
  * bsc#1214073
  * bsc#1214928
  * bsc#1214953
  * bsc#1215150
  * bsc#1215199
  * bsc#1215696
  * bsc#1216436
  * bsc#1216976
  * bsc#1218644
  * bsc#1220186
  * bsc#1220419
  * bsc#1221858
  * bsc#1222323
  * bsc#1229165
  * bsc#1230062
  * bsc#1230557
  * bsc#1230708
  * bsc#1233120
  * bsc#1234156
  * bsc#1236897
  * bsc#1237449
  * bsc#1237776
  * bsc#1240324
  * bsc#1240708
  * bsc#1240890
  * bsc#1241166
  * bsc#1241292
  * bsc#1241353
  * bsc#1241866
  * bsc#1242034
  * bsc#1242754
  * bsc#1242960
  * bsc#1243100
  * bsc#1243112
  * bsc#1244734
  * bsc#1244930
  * bsc#1245193
  * bsc#1245260
  * bsc#1245663
  * bsc#1245700
  * bsc#1245710
  * bsc#1245767
  * bsc#1245780
  * bsc#1245815
  * bsc#1245956
  * bsc#1245973
  * bsc#1245977
  * bsc#1246005
  * bsc#1246012
  * bsc#1246057
  * bsc#1246125
  * bsc#1246181
  * bsc#1246190
  * bsc#1246193
  * bsc#1246248
  * bsc#1246298
  * bsc#1246509
  * bsc#1246782
  * bsc#1247057
  * bsc#1247078
  * bsc#1247099
  * bsc#1247112
  * bsc#1247116
  * bsc#1247118
  * bsc#1247119
  * bsc#1247126
  * bsc#1247136
  * bsc#1247137
  * bsc#1247155
  * bsc#1247162
  * bsc#1247167
  * bsc#1247223
  * bsc#1247229
  * bsc#1247239
  * bsc#1247243
  * bsc#1247262
  * bsc#1247280
  * bsc#1247313
  * bsc#1247442
  * bsc#1247483
  * bsc#1247500
  * bsc#1247712
  * bsc#1247963
  * bsc#1247976
  * bsc#1248088
  * bsc#1248108
  * bsc#1248111
  * bsc#1248121
  * bsc#1248164
  * bsc#1248166
  * bsc#1248178
  * bsc#1248179
  * bsc#1248180
  * bsc#1248183
  * bsc#1248186
  * bsc#1248192
  * bsc#1248194
  * bsc#1248196
  * bsc#1248198
  * bsc#1248199
  * bsc#1248200
  * bsc#1248202
  * bsc#1248205
  * bsc#1248206
  * bsc#1248208
  * bsc#1248209
  * bsc#1248212
  * bsc#1248213
  * bsc#1248214
  * bsc#1248216
  * bsc#1248217
  * bsc#1248223
  * bsc#1248225
  * bsc#1248227
  * bsc#1248228
  * bsc#1248229
  * bsc#1248255
  * bsc#1248296
  * bsc#1248297
  * bsc#1248306
  * bsc#1248312
  * bsc#1248333
  * bsc#1248334
  * bsc#1248337
  * bsc#1248338
  * bsc#1248340
  * bsc#1248341
  * bsc#1248343
  * bsc#1248345
  * bsc#1248349
  * bsc#1248350
  * bsc#1248354
  * bsc#1248355
  * bsc#1248357
  * bsc#1248360
  * bsc#1248361
  * bsc#1248363
  * bsc#1248365
  * bsc#1248368
  * bsc#1248374
  * bsc#1248377
  * bsc#1248378
  * bsc#1248380
  * bsc#1248386
  * bsc#1248390
  * bsc#1248392
  * bsc#1248395
  * bsc#1248399
  * bsc#1248401
  * bsc#1248511
  * bsc#1248512
  * bsc#1248573
  * bsc#1248575
  * bsc#1248577
  * bsc#1248609
  * bsc#1248610
  * bsc#1248614
  * bsc#1248617
  * bsc#1248619
  * bsc#1248621
  * bsc#1248622
  * bsc#1248626
  * bsc#1248628
  * bsc#1248634
  * bsc#1248636
  * bsc#1248639
  * bsc#1248643
  * bsc#1248648
  * bsc#1248652
  * bsc#1248655
  * bsc#1248666
  * bsc#1248669
  * bsc#1248674
  * bsc#1248681
  * bsc#1248733
  * bsc#1248734
  * bsc#1248735
  * bsc#1248746
  * bsc#1248748
  * bsc#1248775
  * bsc#1248847
  * bsc#1249022
  * bsc#1249122
  * bsc#1249123
  * bsc#1249124
  * bsc#1249125
  * bsc#1249126
  * bsc#1249143
  * bsc#1249156
  * bsc#1249159
  * bsc#1249163
  * bsc#1249164
  * bsc#1249166
  * bsc#1249169
  * bsc#1249170
  * bsc#1249172
  * bsc#1249176
  * bsc#1249177
  * bsc#1249186
  * bsc#1249190
  * bsc#1249194
  * bsc#1249195
  * bsc#1249196
  * bsc#1249199
  * bsc#1249200
  * bsc#1249202
  * bsc#1249203
  * bsc#1249204
  * bsc#1249206
  * bsc#1249215
  * bsc#1249220
  * bsc#1249221
  * bsc#1249254
  * bsc#1249255
  * bsc#1249257
  * bsc#1249258
  * bsc#1249260
  * bsc#1249262
  * bsc#1249263
  * bsc#1249265
  * bsc#1249266
  * bsc#1249271
  * bsc#1249272
  * bsc#1249273
  * bsc#1249278
  * bsc#1249279
  * bsc#1249281
  * bsc#1249282
  * bsc#1249284
  * bsc#1249285
  * bsc#1249288
  * bsc#1249290
  * bsc#1249292
  * bsc#1249295
  * bsc#1249296
  * bsc#1249299
  * bsc#1249300
  * bsc#1249303
  * bsc#1249304
  * bsc#1249305
  * bsc#1249308
  * bsc#1249312
  * bsc#1249315
  * bsc#1249318
  * bsc#1249321
  * bsc#1249323
  * bsc#1249324
  * bsc#1249334
  * bsc#1249338
  * bsc#1249346
  * bsc#1249374
  * bsc#1249413
  * bsc#1249479
  * bsc#1249481
  * bsc#1249482
  * bsc#1249486
  * bsc#1249488
  * bsc#1249489
  * bsc#1249490
  * bsc#1249494
  * bsc#1249504
  * bsc#1249506
  * bsc#1249508
  * bsc#1249510
  * bsc#1249513
  * bsc#1249515
  * bsc#1249516
  * bsc#1249522
  * bsc#1249523
  * bsc#1249524
  * bsc#1249526
  * bsc#1249533
  * bsc#1249538
  * bsc#1249540
  * bsc#1249542
  * bsc#1249545
  * bsc#1249548
  * bsc#1249554
  * bsc#1249598
  * bsc#1249604
  * bsc#1249608
  * bsc#1249615
  * bsc#1249640
  * bsc#1249641
  * bsc#1249642
  * bsc#1249658
  * bsc#1249662
  * bsc#1249672
  * bsc#1249673
  * bsc#1249677
  * bsc#1249678
  * bsc#1249679
  * bsc#1249682
  * bsc#1249687
  * bsc#1249698
  * bsc#1249707
  * bsc#1249712
  * bsc#1249730
  * bsc#1249756
  * bsc#1249758
  * bsc#1249761
  * bsc#1249762
  * bsc#1249768
  * bsc#1249770
  * bsc#1249774
  * bsc#1249779
  * bsc#1249780
  * bsc#1249785
  * bsc#1249787
  * bsc#1249795
  * bsc#1249815
  * bsc#1249820
  * bsc#1249823
  * bsc#1249824
  * bsc#1249825
  * bsc#1249826
  * bsc#1249833
  * bsc#1249842
  * bsc#1249845
  * bsc#1249849
  * bsc#1249850
  * bsc#1249853
  * bsc#1249856
  * bsc#1249861
  * bsc#1249863
  * bsc#1249864
  * bsc#1249865
  * bsc#1249866
  * bsc#1249869
  * bsc#1249870
  * bsc#1249880
  * bsc#1249883
  * bsc#1249888
  * bsc#1249894
  * bsc#1249896
  * bsc#1249897
  * bsc#1249901
  * bsc#1249911
  * bsc#1249917
  * bsc#1249919
  * bsc#1249923
  * bsc#1249926
  * bsc#1249938
  * bsc#1249949
  * bsc#1249950
  * bsc#1249952
  * bsc#1249975
  * bsc#1249979
  * bsc#1249984
  * bsc#1249988
  * bsc#1249990
  * bsc#1249993
  * bsc#1249994
  * bsc#1249997
  * bsc#1250002
  * bsc#1250004
  * bsc#1250006
  * bsc#1250007
  * bsc#1250012
  * bsc#1250022
  * bsc#1250024
  * bsc#1250025
  * bsc#1250028
  * bsc#1250029
  * bsc#1250035
  * bsc#1250049
  * bsc#1250055
  * bsc#1250057
  * bsc#1250058
  * bsc#1250062
  * bsc#1250063
  * bsc#1250065
  * bsc#1250066
  * bsc#1250067
  * bsc#1250069
  * bsc#1250070
  * bsc#1250073
  * bsc#1250074
  * bsc#1250088
  * bsc#1250089
  * bsc#1250106
  * bsc#1250112
  * bsc#1250117
  * bsc#1250120
  * bsc#1250125
  * bsc#1250127
  * bsc#1250128
  * bsc#1250145
  * bsc#1250150
  * bsc#1250156
  * bsc#1250157
  * bsc#1250161
  * bsc#1250163
  * bsc#1250166
  * bsc#1250167
  * bsc#1250169
  * bsc#1250171
  * bsc#1250177
  * bsc#1250179
  * bsc#1250180
  * bsc#1250186
  * bsc#1250196
  * bsc#1250198
  * bsc#1250199
  * bsc#1250201
  * bsc#1250203
  * bsc#1250204
  * bsc#1250205
  * bsc#1250206
  * bsc#1250208
  * bsc#1250241
  * bsc#1250242
  * bsc#1250243
  * bsc#1250247
  * bsc#1250249
  * bsc#1250251
  * bsc#1250262
  * bsc#1250263
  * bsc#1250266
  * bsc#1250267
  * bsc#1250268
  * bsc#1250275
  * bsc#1250276
  * bsc#1250281
  * bsc#1250290
  * bsc#1250291
  * bsc#1250292
  * bsc#1250294
  * bsc#1250297
  * bsc#1250298
  * bsc#1250313
  * bsc#1250319
  * bsc#1250323
  * bsc#1250325
  * bsc#1250329
  * bsc#1250336
  * bsc#1250337
  * bsc#1250344
  * bsc#1250358
  * bsc#1250365
  * bsc#1250371
  * bsc#1250377
  * bsc#1250384
  * bsc#1250389
  * bsc#1250395
  * bsc#1250397
  * bsc#1250402
  * bsc#1250406
  * bsc#1250407
  * bsc#1250426
  * bsc#1250450
  * bsc#1250459
  * bsc#1250519
  * bsc#1250522
  * bsc#1250530
  * bsc#1250655
  * bsc#1250712
  * bsc#1250713
  * bsc#1250732
  * bsc#1250736
  * bsc#1250741
  * bsc#1250759
  * bsc#1250763
  * bsc#1250765
  * bsc#1250807
  * bsc#1250808
  * bsc#1250809
  * bsc#1250812
  * bsc#1250813
  * bsc#1250815
  * bsc#1250816
  * bsc#1250820
  * bsc#1250823
  * bsc#1250825
  * bsc#1250827
  * bsc#1250830
  * bsc#1250831
  * bsc#1250837
  * bsc#1250841
  * bsc#1250861
  * bsc#1250863
  * bsc#1250867
  * bsc#1250872
  * bsc#1250873
  * bsc#1250878
  * bsc#1250905
  * bsc#1250907
  * bsc#1250917
  * bsc#1250918
  * bsc#1250923
  * bsc#1250926
  * bsc#1250928
  * bsc#1250929
  * bsc#1250930
  * bsc#1250931
  * bsc#1250941
  * bsc#1250942
  * bsc#1250949
  * bsc#1250952
  * bsc#1250957
  * bsc#1250964
  * jsc#PED-13343
  * jsc#PED-13345

  
Cross-References:

  * CVE-2023-31248
  * CVE-2023-3772
  * CVE-2023-3867
  * CVE-2023-39197
  * CVE-2023-4130
  * CVE-2023-42753
  * CVE-2023-4515
  * CVE-2023-53147
  * CVE-2023-53148
  * CVE-2023-53150
  * CVE-2023-53151
  * CVE-2023-53152
  * CVE-2023-53165
  * CVE-2023-53167
  * CVE-2023-53170
  * CVE-2023-53174
  * CVE-2023-53175
  * CVE-2023-53177
  * CVE-2023-53179
  * CVE-2023-53180
  * CVE-2023-53181
  * CVE-2023-53183
  * CVE-2023-53184
  * CVE-2023-53185
  * CVE-2023-53187
  * CVE-2023-53189
  * CVE-2023-53192
  * CVE-2023-53195
  * CVE-2023-53196
  * CVE-2023-53201
  * CVE-2023-53204
  * CVE-2023-53205
  * CVE-2023-53206
  * CVE-2023-53207
  * CVE-2023-53208
  * CVE-2023-53209
  * CVE-2023-53210
  * CVE-2023-53215
  * CVE-2023-53217
  * CVE-2023-53220
  * CVE-2023-53221
  * CVE-2023-53222
  * CVE-2023-53226
  * CVE-2023-53230
  * CVE-2023-53231
  * CVE-2023-53235
  * CVE-2023-53238
  * CVE-2023-53243
  * CVE-2023-53245
  * CVE-2023-53247
  * CVE-2023-53248
  * CVE-2023-53249
  * CVE-2023-53251
  * CVE-2023-53252
  * CVE-2023-53255
  * CVE-2023-53257
  * CVE-2023-53258
  * CVE-2023-53260
  * CVE-2023-53261
  * CVE-2023-53263
  * CVE-2023-53264
  * CVE-2023-53272
  * CVE-2023-53274
  * CVE-2023-53275
  * CVE-2023-53280
  * CVE-2023-53286
  * CVE-2023-53287
  * CVE-2023-53288
  * CVE-2023-53291
  * CVE-2023-53292
  * CVE-2023-53303
  * CVE-2023-53304
  * CVE-2023-53305
  * CVE-2023-53309
  * CVE-2023-53311
  * CVE-2023-53312
  * CVE-2023-53313
  * CVE-2023-53314
  * CVE-2023-53316
  * CVE-2023-53319
  * CVE-2023-53321
  * CVE-2023-53322
  * CVE-2023-53323
  * CVE-2023-53324
  * CVE-2023-53325
  * CVE-2023-53328
  * CVE-2023-53331
  * CVE-2023-53333
  * CVE-2023-53336
  * CVE-2023-53338
  * CVE-2023-53339
  * CVE-2023-53342
  * CVE-2023-53343
  * CVE-2023-53350
  * CVE-2023-53352
  * CVE-2023-53354
  * CVE-2023-53356
  * CVE-2023-53357
  * CVE-2023-53360
  * CVE-2023-53362
  * CVE-2023-53364
  * CVE-2023-53365
  * CVE-2023-53367
  * CVE-2023-53368
  * CVE-2023-53369
  * CVE-2023-53370
  * CVE-2023-53371
  * CVE-2023-53374
  * CVE-2023-53377
  * CVE-2023-53379
  * CVE-2023-53380
  * CVE-2023-53384
  * CVE-2023-53385
  * CVE-2023-53386
  * CVE-2023-53391
  * CVE-2023-53394
  * CVE-2023-53395
  * CVE-2023-53397
  * CVE-2023-53401
  * CVE-2023-53420
  * CVE-2023-53421
  * CVE-2023-53424
  * CVE-2023-53425
  * CVE-2023-53426
  * CVE-2023-53428
  * CVE-2023-53429
  * CVE-2023-53432
  * CVE-2023-53436
  * CVE-2023-53438
  * CVE-2023-53441
  * CVE-2023-53442
  * CVE-2023-53444
  * CVE-2023-53446
  * CVE-2023-53447
  * CVE-2023-53448
  * CVE-2023-53451
  * CVE-2023-53454
  * CVE-2023-53456
  * CVE-2023-53457
  * CVE-2023-53461
  * CVE-2023-53462
  * CVE-2023-53463
  * CVE-2023-53465
  * CVE-2023-53472
  * CVE-2023-53479
  * CVE-2023-53480
  * CVE-2023-53485
  * CVE-2023-53487
  * CVE-2023-53488
  * CVE-2023-53490
  * CVE-2023-53491
  * CVE-2023-53492
  * CVE-2023-53493
  * CVE-2023-53495
  * CVE-2023-53496
  * CVE-2023-53500
  * CVE-2023-53501
  * CVE-2023-53504
  * CVE-2023-53505
  * CVE-2023-53507
  * CVE-2023-53508
  * CVE-2023-53510
  * CVE-2023-53515
  * CVE-2023-53516
  * CVE-2023-53518
  * CVE-2023-53519
  * CVE-2023-53520
  * CVE-2023-53523
  * CVE-2023-53526
  * CVE-2023-53527
  * CVE-2023-53528
  * CVE-2023-53530
  * CVE-2023-53531
  * CVE-2024-26584
  * CVE-2024-26661
  * CVE-2024-46733
  * CVE-2024-53125
  * CVE-2024-58090
  * CVE-2024-58238
  * CVE-2024-58239
  * CVE-2024-58240
  * CVE-2025-22022
  * CVE-2025-37885
  * CVE-2025-38006
  * CVE-2025-38075
  * CVE-2025-38103
  * CVE-2025-38119
  * CVE-2025-38125
  * CVE-2025-38146
  * CVE-2025-38160
  * CVE-2025-38184
  * CVE-2025-38185
  * CVE-2025-38190
  * CVE-2025-38201
  * CVE-2025-38205
  * CVE-2025-38208
  * CVE-2025-38234
  * CVE-2025-38245
  * CVE-2025-38251
  * CVE-2025-38255
  * CVE-2025-38263
  * CVE-2025-38351
  * CVE-2025-38360
  * CVE-2025-38402
  * CVE-2025-38408
  * CVE-2025-38418
  * CVE-2025-38419
  * CVE-2025-38439
  * CVE-2025-38441
  * CVE-2025-38444
  * CVE-2025-38445
  * CVE-2025-38456
  * CVE-2025-38458
  * CVE-2025-38459
  * CVE-2025-38464
  * CVE-2025-38465
  * CVE-2025-38466
  * CVE-2025-38472
  * CVE-2025-38488
  * CVE-2025-38490
  * CVE-2025-38491
  * CVE-2025-38499
  * CVE-2025-38500
  * CVE-2025-38503
  * CVE-2025-38506
  * CVE-2025-38510
  * CVE-2025-38512
  * CVE-2025-38513
  * CVE-2025-38514
  * CVE-2025-38515
  * CVE-2025-38516
  * CVE-2025-38520
  * CVE-2025-38524
  * CVE-2025-38526
  * CVE-2025-38527
  * CVE-2025-38528
  * CVE-2025-38529
  * CVE-2025-38530
  * CVE-2025-38531
  * CVE-2025-38533
  * CVE-2025-38535
  * CVE-2025-38537
  * CVE-2025-38538
  * CVE-2025-38540
  * CVE-2025-38541
  * CVE-2025-38543
  * CVE-2025-38544
  * CVE-2025-38546
  * CVE-2025-38548
  * CVE-2025-38550
  * CVE-2025-38553
  * CVE-2025-38555
  * CVE-2025-38556
  * CVE-2025-38560
  * CVE-2025-38563
  * CVE-2025-38565
  * CVE-2025-38566
  * CVE-2025-38568
  * CVE-2025-38571
  * CVE-2025-38572
  * CVE-2025-38574
  * CVE-2025-38576
  * CVE-2025-38581
  * CVE-2025-38582
  * CVE-2025-38583
  * CVE-2025-38584
  * CVE-2025-38585
  * CVE-2025-38587
  * CVE-2025-38588
  * CVE-2025-38590
  * CVE-2025-38591
  * CVE-2025-38593
  * CVE-2025-38595
  * CVE-2025-38597
  * CVE-2025-38601
  * CVE-2025-38602
  * CVE-2025-38604
  * CVE-2025-38605
  * CVE-2025-38608
  * CVE-2025-38609
  * CVE-2025-38610
  * CVE-2025-38612
  * CVE-2025-38614
  * CVE-2025-38616
  * CVE-2025-38617
  * CVE-2025-38618
  * CVE-2025-38621
  * CVE-2025-38622
  * CVE-2025-38623
  * CVE-2025-38624
  * CVE-2025-38630
  * CVE-2025-38632
  * CVE-2025-38634
  * CVE-2025-38635
  * CVE-2025-38639
  * CVE-2025-38640
  * CVE-2025-38643
  * CVE-2025-38644
  * CVE-2025-38645
  * CVE-2025-38646
  * CVE-2025-38650
  * CVE-2025-38656
  * CVE-2025-38659
  * CVE-2025-38660
  * CVE-2025-38663
  * CVE-2025-38664
  * CVE-2025-38665
  * CVE-2025-38668
  * CVE-2025-38670
  * CVE-2025-38671
  * CVE-2025-38676
  * CVE-2025-38678
  * CVE-2025-38679
  * CVE-2025-38680
  * CVE-2025-38681
  * CVE-2025-38683
  * CVE-2025-38684
  * CVE-2025-38685
  * CVE-2025-38687
  * CVE-2025-38691
  * CVE-2025-38692
  * CVE-2025-38693
  * CVE-2025-38694
  * CVE-2025-38695
  * CVE-2025-38697
  * CVE-2025-38698
  * CVE-2025-38701
  * CVE-2025-38702
  * CVE-2025-38705
  * CVE-2025-38706
  * CVE-2025-38709
  * CVE-2025-38712
  * CVE-2025-38713
  * CVE-2025-38714
  * CVE-2025-38715
  * CVE-2025-38721
  * CVE-2025-38722
  * CVE-2025-38724
  * CVE-2025-38725
  * CVE-2025-38727
  * CVE-2025-38729
  * CVE-2025-38730
  * CVE-2025-38732
  * CVE-2025-38734
  * CVE-2025-38735
  * CVE-2025-38736
  * CVE-2025-39675
  * CVE-2025-39677
  * CVE-2025-39678
  * CVE-2025-39679
  * CVE-2025-39681
  * CVE-2025-39682
  * CVE-2025-39684
  * CVE-2025-39685
  * CVE-2025-39686
  * CVE-2025-39691
  * CVE-2025-39693
  * CVE-2025-39694
  * CVE-2025-39701
  * CVE-2025-39703
  * CVE-2025-39705
  * CVE-2025-39706
  * CVE-2025-39709
  * CVE-2025-39710
  * CVE-2025-39713
  * CVE-2025-39714
  * CVE-2025-39718
  * CVE-2025-39719
  * CVE-2025-39721
  * CVE-2025-39724
  * CVE-2025-39726
  * CVE-2025-39730
  * CVE-2025-39732
  * CVE-2025-39738
  * CVE-2025-39739
  * CVE-2025-39742
  * CVE-2025-39743
  * CVE-2025-39744
  * CVE-2025-39746
  * CVE-2025-39749
  * CVE-2025-39750
  * CVE-2025-39751
  * CVE-2025-39754
  * CVE-2025-39757
  * CVE-2025-39758
  * CVE-2025-39759
  * CVE-2025-39760
  * CVE-2025-39761
  * CVE-2025-39763
  * CVE-2025-39764
  * CVE-2025-39766
  * CVE-2025-39770
  * CVE-2025-39772
  * CVE-2025-39773
  * CVE-2025-39782
  * CVE-2025-39783
  * CVE-2025-39787
  * CVE-2025-39790
  * CVE-2025-39797
  * CVE-2025-39798
  * CVE-2025-39800
  * CVE-2025-39801
  * CVE-2025-39806
  * CVE-2025-39808
  * CVE-2025-39810
  * CVE-2025-39823
  * CVE-2025-39824
  * CVE-2025-39825
  * CVE-2025-39826
  * CVE-2025-39827
  * CVE-2025-39828
  * CVE-2025-39832
  * CVE-2025-39833
  * CVE-2025-39835
  * CVE-2025-39838
  * CVE-2025-39839
  * CVE-2025-39842
  * CVE-2025-39844
  * CVE-2025-39845
  * CVE-2025-39846
  * CVE-2025-39847
  * CVE-2025-39848
  * CVE-2025-39849
  * CVE-2025-39850
  * CVE-2025-39853
  * CVE-2025-39854
  * CVE-2025-39857
  * CVE-2025-39860
  * CVE-2025-39861
  * CVE-2025-39863
  * CVE-2025-39864
  * CVE-2025-39865
  * CVE-2025-39869
  * CVE-2025-39870
  * CVE-2025-39871
  * CVE-2025-39873
  * CVE-2025-39882
  * CVE-2025-39885
  * CVE-2025-39889
  * CVE-2025-39891
  * CVE-2025-39907
  * CVE-2025-39920
  * CVE-2025-39923
  * CVE-2025-39925
  * CVE-2025-40300

  
CVSS scores:

  * CVE-2023-31248 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-31248 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3772 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-3772 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-3772 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-39197 ( SUSE ):  4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
  * CVE-2023-39197 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-4130 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-4130 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-42753 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-42753 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-42753 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-4515 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-4515 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53147 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53148 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53150 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53150 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53151 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53151 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53152 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53165 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53165 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
  * CVE-2023-53167 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53170 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53174 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53174 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53175 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53177 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53179 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53180 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53181 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53183 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53183 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53184 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53185 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53187 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53189 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53192 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53195 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53195 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53196 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53196 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53201 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53204 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53205 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53206 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53207 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53208 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53209 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53209 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53210 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53215 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53215 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-53217 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53220 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53220 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-53221 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53222 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53222 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53226 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53230 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53230 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53231 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53235 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53238 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53243 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53243 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-53245 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53245 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53247 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53247 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53248 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53249 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53249 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53251 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53251 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53252 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53252 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53255 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53255 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53257 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53257 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53258 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53260 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53260 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53261 ( SUSE ):  4.6
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53261 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53263 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53263 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53264 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53264 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53272 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53272 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-53274 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53274 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2023-53275 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53280 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53280 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-53286 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53286 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53287 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53288 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53288 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53291 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53292 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53292 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53303 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53304 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53305 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53309 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53309 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53311 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53311 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53312 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53312 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53313 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53314 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53314 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53316 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53316 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53319 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53319 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53321 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53321 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53322 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53322 ( SUSE ):  6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53323 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53323 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53324 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53324 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53325 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53328 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53331 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53333 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53336 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53336 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53338 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53338 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53339 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53339 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53342 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53343 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53350 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53352 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53354 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53356 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53357 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53360 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53362 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53364 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53365 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53367 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53368 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53369 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53370 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53371 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53374 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53377 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53379 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53380 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53384 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53385 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53385 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53386 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53391 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53394 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53394 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53395 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53395 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53397 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53401 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53420 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53421 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53424 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53425 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53425 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53426 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53428 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53429 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53432 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-53436 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53438 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53438 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-53441 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53442 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53442 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53444 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53446 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53447 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53448 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53451 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53451 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53454 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53454 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-53456 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53456 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-53457 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53457 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53461 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53461 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53462 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53462 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-53463 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53465 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53472 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53479 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53480 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53480 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53485 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53485 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-53487 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53488 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53490 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53491 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53491 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-53492 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53493 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53495 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53496 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53500 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53501 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53504 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53505 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53505 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53507 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53507 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53508 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53508 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53510 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53510 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-53515 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53515 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53516 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53516 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-53518 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53518 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53519 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53519 ( SUSE ):  4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-53520 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53520 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53523 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53523 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53526 ( SUSE ):  0.0
    CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53526 ( SUSE ):  0.0 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-53527 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53527 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53528 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53528 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53530 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53530 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53531 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53531 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26584 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26584 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26661 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26661 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46733 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46733 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53125 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53125 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58090 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58090 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58238 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58238 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58239 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58239 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-58240 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-58240 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-22022 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22022 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-37885 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38006 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38006 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38075 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38075 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38103 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38103 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-38119 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38119 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38125 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38125 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38146 ( SUSE ):  7.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38146 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38160 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38160 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38184 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38184 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38185 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38185 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38190 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38190 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38201 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38201 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38205 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38205 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38208 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38208 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38234 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38234 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38245 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38245 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38251 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38251 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38255 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38255 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38263 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38263 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38351 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38351 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38360 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38360 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38402 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38402 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38408 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38408 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-38418 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38418 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38419 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38419 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38439 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38439 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-38441 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38441 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38444 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38444 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38445 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38445 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38456 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38456 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38458 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38458 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38459 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38459 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38464 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38464 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-38465 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38465 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38466 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
  * CVE-2025-38472 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38472 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38488 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38488 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38490 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38490 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38491 ( SUSE ):  2.3
    CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38491 ( SUSE ):  5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  * CVE-2025-38499 ( SUSE ):  6.2
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H
  * CVE-2025-38499 ( SUSE ):  8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
  * CVE-2025-38500 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38500 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38500 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38503 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38503 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38506 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38506 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-38510 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38510 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38512 ( SUSE ):  6.9
    CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-38512 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-38513 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38513 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38514 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38514 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38515 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38515 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38516 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38516 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38520 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38520 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38524 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38524 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38526 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38526 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38527 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38527 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38528 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38528 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-38529 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38529 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-38530 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38530 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-38531 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38531 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38533 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38533 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38535 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38535 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38537 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38537 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38538 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38538 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38540 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38540 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38541 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38541 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38543 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38543 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38544 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38544 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38546 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38546 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38548 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38548 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38550 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38550 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38553 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38553 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38555 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38555 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38556 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38556 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-38560 ( SUSE ):  5.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
  * CVE-2025-38560 ( SUSE ):  7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
  * CVE-2025-38563 ( SUSE ):  7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
  * CVE-2025-38565 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38565 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-38566 ( SUSE ):  9.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38566 ( SUSE ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38568 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38568 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38571 ( SUSE ):  9.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38571 ( SUSE ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38572 ( SUSE ):  9.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38572 ( SUSE ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38574 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38574 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-38576 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38576 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38581 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38581 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38582 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38582 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38583 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38583 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38584 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38584 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-38585 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38585 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38587 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38587 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38588 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38588 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38590 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38590 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38591 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38591 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2025-38593 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38593 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38595 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38595 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38597 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38597 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38601 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38601 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38602 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38602 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38604 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38604 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-38605 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38605 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38608 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38608 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-38609 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38609 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38610 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38610 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38612 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38612 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38614 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38614 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38616 ( SUSE ):  7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-38617 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38617 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38618 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38618 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38621 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38621 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38622 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38622 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38623 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38623 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-38624 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38624 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38630 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38630 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38632 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38632 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38634 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38634 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38635 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38635 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38639 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38639 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-38640 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38640 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38643 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38643 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38644 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38644 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38645 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38645 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38646 ( SUSE ):  6.0
    CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38646 ( SUSE ):  5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38650 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38656 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38656 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38659 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38659 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-38660 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38663 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38664 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38664 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38665 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38668 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38668 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38670 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38671 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38676 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38676 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38678 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-38679 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38679 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38680 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38680 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38681 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38681 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38683 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38684 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38685 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38685 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38687 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38691 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38691 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38692 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38692 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38693 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38694 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38694 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38695 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38697 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38697 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38698 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38698 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38701 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38701 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38702 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38702 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-38705 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38705 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38706 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38706 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38709 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38709 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38712 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38712 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38713 ( SUSE ):  5.4
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38713 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
  * CVE-2025-38714 ( SUSE ):  5.4
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38714 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
  * CVE-2025-38715 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38715 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38721 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38722 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38724 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38725 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38727 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38729 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38730 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38732 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38732 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-38734 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38735 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38736 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39675 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39675 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39677 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39678 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39679 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39679 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39681 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39682 ( SUSE ):  7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-39684 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39685 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39686 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39691 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-39693 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39693 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39694 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39701 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39703 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39705 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39705 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39706 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39709 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39710 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39713 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39714 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39718 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39719 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39721 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39724 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39726 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39730 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39732 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39738 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-39738 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2025-39739 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-39739 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-39742 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39742 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39743 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39743 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39744 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39744 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39746 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39746 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-39749 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39749 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39750 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39751 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-39751 ( SUSE ):  4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2025-39754 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39757 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39758 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39759 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N
  * CVE-2025-39759 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39760 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-39761 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39761 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39763 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39764 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39770 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39772 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39773 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39782 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39782 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39783 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39787 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-39787 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2025-39790 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39790 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39797 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39797 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39798 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-39798 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-39800 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39800 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39801 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-39801 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-39806 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39808 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39823 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39824 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39825 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39825 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2025-39826 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39826 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39827 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39827 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39828 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-39828 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-39832 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39833 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39835 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39838 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39838 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-39839 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39842 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39844 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39845 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39846 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39847 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39848 ( SUSE ):  6.9
    CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39848 ( SUSE ):  5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39849 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39850 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39854 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39860 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39861 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39865 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39869 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39870 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39871 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39873 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39882 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39885 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39889 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39889 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39891 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-39891 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2025-39907 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39920 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39920 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39923 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39923 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-39925 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39925 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40300 ( SUSE ):  8.2
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
  * CVE-2025-40300 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

  
Affected Products:

  * openSUSE Leap 15.6
  * Public Cloud Module 15-SP6
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6

  
  
An update that solves 445 vulnerabilities, contains two features and has 61
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2023-53261: coresight: Fix memory leak in acpi_buffer->pointer
    (bsc#1249770).
  * CVE-2024-46733: btrfs: fix qgroup reserve leaks in cow_file_range
    (bsc#1230708).
  * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def
    (bsc#1234156).
  * CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are
    disabled (bsc#1240324).
  * CVE-2025-22022: usb: xhci: Apply the link chain quirk on NEC isoc endpoints
    (bsc#1241292).
  * CVE-2025-37885: KVM: x86: Reset IRTE to host control if _new_ route isn't
    postable (bsc#1242960).
  * CVE-2025-38006: net: mctp: Do not access ifa_index when missing
    (bsc#1244930).
  * CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection
    (bsc#1244734).
  * CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in
    usbhid_parse() (bsc#1245663).
  * CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler
    (bsc#1245700).
  * CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before
    configuring EST (bsc#1245710).
  * CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse
    (bsc#1245767).
  * CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()
    (bsc#1245780).
  * CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of
    ethernet bearer (bsc#1245956).
  * CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send()
    (bsc#1246012).
  * CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails
    (bsc#1245973).
  * CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to
    INT_MAX (bsc#1245977).
  * CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy
    pitch to 1 (bsc#1246005).
  * CVE-2025-38208: smb: client: add NULL check in automount_fullpath
    (bsc#1245815).
  * CVE-2025-38234: sched/rt: Fix race in push_rt_task (bsc#1246057).
  * CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in
    atm_dev_deregister() (bsc#1246193).
  * CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181).
  * CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248).
  * CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB
    flush (bsc#1246782).
  * CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO
    guarantees (bsc#1247078).
  * CVE-2025-38402: idpf: return 0 size for RSS key if not supported
    (bsc#1247262).
  * CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly
    (bsc#1247126).
  * CVE-2025-38418: remoteproc: core: Release rproc->clean_table after
    rproc_attach() fails (bsc#1247137).
  * CVE-2025-38419: remoteproc: core: Cleanup acquired resources when
    rproc_handle_resources() fails in rproc_attach() (bsc#1247136).
  * CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
    (bsc#1247155).
  * CVE-2025-38441: netfilter: flowtable: account for Ethernet header in
    nf_flow_pppoe_proto() (bsc#1247167).
  * CVE-2025-38444: raid10: cleanup memleak at raid10_make_request
    (bsc#1247162).
  * CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape
    (bsc#1247229).
  * CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in
    ipmi_create_user() (bsc#1247099).
  * CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
    (bsc#1247116).
  * CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push()
    (bsc#1247119).
  * CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112).
  * CVE-2025-38466: perf: Revert to requiring CAP_SYS_ADMIN for uprobes
    (bsc#1247442).
  * CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of
    uninitialised entry (bsc#1247313).
  * CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using
    async crypto (bsc#1247239).
  * CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page()
    (bsc#1247243).
  * CVE-2025-38491: mptcp: make fallback action and fallback decision atomic
    (bsc#1247280).
  * CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN
    in the right userns (bsc#1247976).
  * CVE-2025-38500: xfrm: interface: fix use-after-free after changing
    collect_md xfrm interface (bsc#1248088).
  * CVE-2025-38506: KVM: Allow CPU to reschedule while setting per-page memory
    attributes (bsc#1248186).
  * CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog
    struct (bsc#1248202).
  * CVE-2025-38520: drm/amdkfd: Do not call mmput from MMU notifier callback
    (bsc#1248217).
  * CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194).
  * CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192).
  * CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break
    (bsc#1248199).
  * CVE-2025-38528: bpf: Reject %p% format string in bprintf-like helpers
    (bsc#1248198).
  * CVE-2025-38531: iio: common: st_sensors: Fix use of uninitialize device
    structs (bsc#1248205).
  * CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200).
  * CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225).
  * CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
  * CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits
    (bsc#1248296).
  * CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation
    (bsc#1248312).
  * CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit()
    (bsc#1248365).
  * CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343).
  * CVE-2025-38585: staging: media: atomisp: Fix stack buffer overflow in
    gmin_get_var_int() (bsc#1248355).
  * CVE-2025-38590: net/mlx5e: Remove skb secpath if xfrm state is not found
    (bsc#1248360).
  * CVE-2025-38591: bpf: Reject narrower access to pointer ctx fields
    (bsc#1248363).
  * CVE-2025-38593: kABI workaround for bluetooth discovery_state change
    (bsc#1248357).
  * CVE-2025-38595: xen: fix UAF in dmabuf_exp_from_pages() (bsc#1248380).
  * CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane
    for a video-port (bsc#1248378).
  * CVE-2025-38605: wifi: ath12k: Pass ab pointer directly to
    ath12k_dp_tx_get_encap_type() (bsc#1248334).
  * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
    in ktls (bsc#1248338).
  * CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392).
  * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP
    (bsc#1248512).
  * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY
    (bsc#1248511).
  * CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619).
  * CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery
    (bsc#1248610).
  * CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null-
    terminated (bsc#1248674).
  * CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622).
  * CVE-2025-38643: wifi: cfg80211: Add missing lock in
    cfg80211_check_and_end_cac() (bsc#1248681).
  * CVE-2025-38645: net/mlx5: Check device memory pointer before usage
    (bsc#1248626).
  * CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
  * CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated
    string (bsc#1248634).
  * CVE-2025-38664: ice: Fix a null pointer dereference in
    ice_copy_and_init_pkg() (bsc#1248628).
  * CVE-2025-38668: regulator: core: fix NULL dereference on unbind due to stale
    coupling data (bsc#1248647).
  * CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline
    (bsc#1248775).
  * CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates
    (bsc#1249126).
  * CVE-2025-38679: media: venus: Fix OOB read due to missing payload bound
    check (bsc#1249202).
  * CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused
    classes (bsc#1249156).
  * CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr
    (bsc#1249258).
  * CVE-2025-38705: drm/amd/pm: fix null pointer access (bsc#1249334).
  * CVE-2025-38709: loop: Avoid updating block size under exclusive owner
    (bsc#1249199).
  * CVE-2025-38721: netfilter: ctnetlink: fix refcount leak on table dump
    (bsc#1249176).
  * CVE-2025-38722: habanalabs: fix UAF in export_dmabuf() (bsc#1249163).
  * CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172).
  * CVE-2025-38732: netfilter: nf_reject: do not leak dst refcount for loopback
    packets (bsc#1249262).
  * CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out()
    (bsc#1249324).
  * CVE-2025-38735: gve: prevent ethtool ops after shutdown (bsc#1249288).
  * CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal
    (bsc#1249300).
  * CVE-2025-39678: platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-
    NULL (bsc#1249290).
  * CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init
    helper (bsc#1249303).
  * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list
    (bsc#1249284).
  * CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper
    (bsc#1249374).
  * CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag
    (bsc#1249315).
  * CVE-2025-39705: drm/amd/display: fix a Null pointer dereference
    vulnerability (bsc#1249295).
  * CVE-2025-39718: vsock/virtio: Validate length in packet header before
    skb_put() (bsc#1249305).
  * CVE-2025-39738: btrfs: do not allow relocation of partially dropped
    subvolumes (bsc#1249540).
  * CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work
    (bsc#1249494).
  * CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable
    (bsc#1249516).
  * CVE-2025-39749: rcu: Protect ->defer_qs_iw_pending from data race
    (bsc#1249533).
  * CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration
    (bsc#1249524).
  * CVE-2025-39764: netfilter: ctnetlink: remove refcounting in expectation
    dumpers (bsc#1249513).
  * CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past
    buffer_limit (bsc#1249510).
  * CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with
    only IPV6_CSUM (bsc#1249508).
  * CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired()
    (bsc#1249504).
  * CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint()
    (bsc#1249526).
  * CVE-2025-39787: soc: qcom: mdt_loader: Deal with zero e_shentsize
    (bsc#1249545).
  * CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608).
  * CVE-2025-39810: bnxt_en: Fix memory corruption when FW resources change
    during ifdown (bsc#1249975).
  * CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from
    guest (bsc#1250002).
  * CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2)
    (bsc#1250179).
  * CVE-2025-39828: kABI workaround for struct atmdev_ops extension
    (bsc#1250205).
  * CVE-2025-39832: net/mlx5: Fix lockdep assertion on sync reset unload event
    (bsc#1249901).
  * CVE-2025-39835: xfs: do not propagate ENODATA disk errors into xattr code
    (bsc#1250025).
  * CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion
    (bsc#1250365).
  * CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown
    (bsc#1250267).
  * CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292).
  * CVE-2025-39850: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop
    objects (bsc#1250276).
  * CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty
    (bsc#1250275).
  * CVE-2025-39854: ice: fix NULL access of tx->in_use in ice_ll_ts_intr
    (bsc#1250297).
  * CVE-2025-39857: net/smc: fix one NULL pointer dereference in
    smc_ib_is_sg_need_sync() (bsc#1250251).
  * CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put
    (bsc#1250294).
  * CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call
    (bsc#1250407).
  * CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT
    (bsc#1247483).

The following non-security bugs were fixed:

  * 9p/xen: fix init sequence (git-fixes).
  * ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes).
  * ACPI: APEI: send SIGBUS to current task if synchronous memory error not
    recovered (stable-fixes).
  * ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes).
  * ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message (git-
    fixes).
  * ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT (git-fixes).
  * ACPI: debug: fix signedness issues in read/write helpers (git-fixes).
  * ACPI: pfr_update: Fix the driver update version check (git-fixes).
  * ACPI: processor: fix acpi_object initialization (stable-fixes).
  * ACPI: processor: idle: Fix memory leak when register cpuidle device failed
    (git-fixes).
  * ACPI: processor: perflib: Move problematic pr->performance check (git-
    fixes).
  * ACPI: property: Fix buffer properties extraction for subnodes (git-fixes).
  * ACPICA: Fix largest possible resource descriptor index (git-fixes).
  * ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not
    supported (stable-fixes).
  * ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes).
  * ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable-
    fixes).
  * ALSA: hda/realtek - Add new HP ZBook laptop with micmute led fixup (stable-
    fixes).
  * ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes).
  * ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks
    (stable-fixes).
  * ALSA: hda/realtek: Add support for HP Agusta using CS35L41 HDA (stable-
    fixes).
  * ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook
    830 G6 (stable-fixes).
  * ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again
    (git-fixes).
  * ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes).
  * ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes).
  * ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes).
  * ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx (stable-fixes).
  * ALSA: hda: Disable jack polling at shutdown (stable-fixes).
  * ALSA: hda: Handle the jack polling always via a work (stable-fixes).
  * ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git-
    fixes).
  * ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable-
    fixes).
  * ALSA: lx_core: use int type to store negative error codes (git-fixes).
  * ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable-
    fixes).
  * ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes).
  * ALSA: usb-audio: Add DSD support for Comtrue USB Audio device (stable-
    fixes).
  * ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 (stable-fixes).
  * ALSA: usb-audio: Add mute TLV for playback volumes on more devices (stable-
    fixes).
  * ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable-
    fixes).
  * ALSA: usb-audio: Avoid multiple assignments in mixer_quirks (stable-fixes).
  * ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable-
    fixes).
  * ALSA: usb-audio: Convert comma to semicolon (git-fixes).
  * ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks (stable-
    fixes).
  * ALSA: usb-audio: Fix block comments in mixer_quirks (stable-fixes).
  * ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes).
  * ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes).
  * ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks (stable-fixes).
  * ALSA: usb-audio: Simplify NULL comparison in mixer_quirks (stable-fixes).
  * ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git-
    fixes).
  * ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes).
  * ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes).
  * ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (git-fixes).
  * ALSA: usb-audio: move mixer_quirks' min_mute into common quirk (stable-
    fixes).
  * ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes).
  * ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping (git-fixes).
  * ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (git-fixes).
  * ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (git-fixes).
  * ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes).
  * ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message
    (git-fixes).
  * ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes).
  * ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes).
  * ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes).
  * ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes).
  * ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes).
  * ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable-
    fixes).
  * ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable-
    fixes).
  * ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes).
  * ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface
    (git-fixes).
  * ASoC: qcom: audioreach: fix potential null pointer dereference (git-fixes).
  * ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph
    failed (git-fixes).
  * ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git-
    fixes).
  * ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was
    successed (stable-fixes).
  * ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data() (git-fixes).
  * ASoC: wm8940: Correct PLL rate rounding (git-fixes).
  * ASoC: wm8940: Correct typo in control name (git-fixes).
  * ASoC: wm8974: Correct PLL rate rounding (git-fixes).
  * Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes).
  * Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes).
  * Bluetooth: ISO: do not leak skb in ISO_CONT RX (git-fixes).
  * Bluetooth: MGMT: Fix not exposing debug UUID on
    MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes).
  * Bluetooth: MGMT: Fix possible UAFs (git-fixes).
  * Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano
    (stable-fixes).
  * Bluetooth: compute LE flow credits based on recvbuf space (git-fixes).
  * Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git-
    fixes).
  * Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git-
    fixes).
  * Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (git-fixes).
  * Bluetooth: hci_event: Mark connection as closed during suspend disconnect
    (git-fixes).
  * Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git-
    fixes).
  * Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes).
  * Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable-
    fixes).
  * Bluetooth: hci_sync: Avoid adding default advertising on startup (stable-
    fixes).
  * Bluetooth: hci_sync: Fix hci_resume_advertising_sync (git-fixes).
  * Bluetooth: hci_sync: fix set_local_name race condition (git-fixes).
  * Bluetooth: qca: fix invalid device address check (git-fixes).
  * Bluetooth: qca: fix wcn3991 device address check (git-fixes).
  * Bluetooth: vhci: Prevent use-after-free by removing debugfs files early
    (git-fixes).
  * CONFIG & no reference -> OK temporarily, must be resolved eventually
  * Correct typos of References tags in some patches
  * Do not self obsolete older kernel variants
  * Drivers: hv: Always select CONFIG_SYSFB for Hyper-V guests (git-fixes).
  * Drivers: hv: Select CONFIG_SYSFB only if EFI is enabled (git-fixes).
  * EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (git-
    fixes).
  * HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes).
  * HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version()
    (stable-fixes).
  * HID: input: rename hidinput_set_battery_charge_status() (stable-fixes).
  * HID: input: report battery status changes immediately (git-fixes).
  * HID: intel-ish-ipc: Remove redundant ready check after timeout function
    (git-fixes).
  * HID: mcp2221: Do not set bus speed on every transfer (stable-fixes).
  * HID: mcp2221: Handle reads greater than 60 bytes (stable-fixes).
  * HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git-
    fixes).
  * HID: quirks: add support for Legion Go dual dinput modes (stable-fixes).
  * HID: wacom: Add a new Art Pen 2 (stable-fixes).
  * IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes)
  * IB/sa: Fix sa_local_svc_timeout_ms read race (git-fixes)
  * Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table
    (stable-fixes).
  * Input: iqs7222 - avoid enabling unused interrupts (stable-fixes).
  * KVM: SVM: Clear current_vmcb during vCPU free for all _possible_ CPUs (git-
    fixes).
  * KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest
    (git-fixes).
  * KVM: SVM: Sync TPR from LAPIC into VMCB::V_TPR even if AVIC is active (git-
    fixes).
  * KVM: VMX: Extract checking of guest's DEBUGCTL into helper (git-fixes).
  * KVM: VMX: Flush shadow VMCS on emergency reboot (git-fixes).
  * KVM: VMX: Handle KVM-induced preemption timer exits in fastpath for L2 (git-
    fixes).
  * KVM: VMX: Handle forced exit due to preemption timer in fastpath (git-
    fixes).
  * KVM: VMX: Re-enter guest in fastpath for "spurious" preemption timer exits
    (git-fixes).
  * KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes).
  * KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes
    bsc#1250336).
  * KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table
    (git-fixes).
  * KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting MP_STATE
    (git-fixes).
  * KVM: x86: Fully defer to vendor code to decide how to force immediate exit
    (git-fixes).
  * KVM: x86: Move handling of is_guest_mode() into fastpath exit handlers (git-
    fixes).
  * KVM: x86: Plumb "force_immediate_exit" into kvm_entry() tracepoint (git-
    fixes).
  * KVM: x86: avoid underflow when scaling TSC frequency (git-fixes).
  * Limit patch filenames to 100 characters (bsc#1249604).
  * Move pesign-obs-integration requirement from kernel-syms to kernel devel
    subpackage (bsc#1248108).
  * NFSv4.1: fix backchannel max_resp_sz verification check (git-fixes).
  * NFSv4/flexfiles: Fix layout merge mirror check (git-fixes).
  * NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes).
  * NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git-
    fixes).
  * NFSv4: Do not clear capabilities that won't be reset (git-fixes).
  * PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git-
    fixes).
  * PCI/AER: Fix missing uevent on recovery when a reset is requested (git-
    fixes).
  * PCI/ERR: Fix uevent on failure to recover (git-fixes).
  * PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (git-
    fixes).
  * PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes).
  * PCI/sysfs: Ensure devices are powered for config reads (git-fixes).
  * PCI: Add ACS quirk for Loongson PCIe (git-fixes).
  * PCI: Extend isolated function probing to LoongArch (git-fixes).
  * PCI: Support Immediate Readiness on devices without PM capabilities (git-
    fixes).
  * PCI: apple: Fix missing OF node reference in apple_pcie_setup_port (git-
    fixes).
  * PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features
    (git-fixes).
  * PCI: imx6: Delay link start until configfs 'start' written (git-fixes).
  * PCI: imx6: Remove apps_reset toggling from
    imx_pcie_{assert/deassert}_core_reset (git-fixes).
  * PCI: keystone: Use devm_request_irq() to free "ks-pcie-error-irq" on exit
    (git-fixes).
  * PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199).
  * PCI: pnv_php: Work around switches with broken presence detection
    (bsc#1215199).
  * PCI: rcar-host: Drop PMSR spinlock (git-fixes).
  * PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git-
    fixes).
  * PCI: rockchip: Use standard PCIe definitions (git-fixes).
  * PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq() (git-fixes).
  * PCI: tegra194: Fix duplicate PLL disable in pex_ep_event_pex_rst_assert()
    (git-fixes).
  * PCI: tegra194: Handle errors in BPMP response (git-fixes).
  * PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock (git-
    fixes).
  * PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation
    (git-fixes).
  * PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store()
    (stable-fixes).
  * PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()
    (git-fixes).
  * PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable-
    fixes).
  * PM: sleep: console: Fix the black screen issue (stable-fixes).
  * PM: sleep: core: Clear power.must_resume in noirq suspend error path (git-
    fixes).
  * RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034).
  * RAS/AMD/FMPM: Get masked address (bsc#1242034).
  * RAS/AMD/FMPM: Use atl internal.h for INVALID_SPA (bsc#1242034).
  * RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes)
  * RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes)
  * RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes)
  * RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes)
  * RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes)
  * RDMA/core: Resolve MAC of next-hop device without ARP support (git-fixes)
  * RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes)
  * RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes)
  * RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes)
  * RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count (git-fixes)
  * RDMA/mlx5: Fix vport loopback forcing for MPV device (git-fixes)
  * RDMA/rxe: Fix race in do_task() when draining (git-fixes)
  * RDMA/siw: Always report immediate post SQ errors (git-fixes)
  * RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes)
  * Refresh patches.suse/kernel-add-product-identifying-information-to-kernel-
    build.patch. (bsc#1249186)
  * Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes).
  * Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes).
  * Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes).
  * SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes).
  * Squashfs: add additional inode sanity checking (git-fixes).
  * Squashfs: fix uninit-value in squashfs_get_parent (git-fixes).
  * Squashfs: reject negative file sizes in squashfs_read_inode() (git-fixes).
  * USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes).
  * USB: serial: option: add Foxconn T99W709 (stable-fixes).
  * USB: serial: option: add Telit Cinterion FN990A w/audio compositions
    (stable-fixes).
  * USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions
    (stable-fixes).
  * USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera
    (stable-fixes).
  * USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles
    (stable-fixes).
  * afs: Fix potential null pointer dereference in afs_put_server (git-fixes).
  * aoe: defer rexmit timer downdev work to workqueue (git-fixes).
  * arch/powerpc: Remove .interp section in vmlinux (bsc#1215199).
  * arm64/cpufeatures/kvm: Add ARMv8.9 FEAT_ECBHB bits in ID_AA64MMFR1 (git-
    fixes)
  * arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes)
  * arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes)
  * arm64: Add support for HIP09 Spectre-BHB mitigation (git-fixes)
  * arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes)
  * arm64: Handle KCOV __init vs inline mismatches (git-fixes)
  * arm64: Mark kernel as tainted on SAE and SError panic (git-fixes)
  * arm64: Restrict pagetable teardown to avoid false warning (git-fixes)
  * arm64: dts: apple: Add ethernet0 alias for J375 template (git-fixes)
  * arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map (git-fixes)
  * arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes)
  * arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes)
  * arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes)
  * arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes)
  * arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git-
    fixes)
  * arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git-
    fixes)
  * arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git-
    fixes)
  * arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git-
    fixes)
  * arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git-
    fixes)
  * arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes)
  * arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes)
  * arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git-
    fixes)
  * arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes)
  * arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes)
  * arm64: dts: imx8mp: Correct thermal sensor index (git-fixes)
  * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git-
    fixes)
  * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes)
  * arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes)
  * arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes)
  * arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git-
    fixes)
  * arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399
    Puma with Haikou (git-fixes).
  * arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes)
  * arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git-
    fixes)
  * arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes)
  * arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git-
    fixes)
  * arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes)
  * arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes)
  * arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes)
  * ata: libata-scsi: Fix CDL control (git-fixes).
  * ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes).
  * batman-adv: fix OOB read/write in network-coding decode (git-fixes).
  * block: fix kobject leak in blk_unregister_queue (git-fixes).
  * block: mtip32xx: Fix usage of dma_map_sg() (git-fixes).
  * bpf, bpftool: Fix incorrect disasm pc (git-fixes).
  * bpf: Adjust free target to avoid global starvation of LRU map (git-fixes).
  * bpf: Fix iter/task tid filtering (git-fixes).
  * bpf: Fix link info netfilter flags to populate defrag flag (git-fixes).
  * bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes).
  * bpf: Properly test iter/task tid filtering (git-fixes).
  * bpf: bpftool: Setting error code in do_loader() (git-fixes).
  * bpf: fix kfunc btf caching for modules (git-fixes).
  * bpf: handle implicit declaration of function gettid in bpf_iter.c
  * bpf: skip non exist keys in generic_map_lookup_batch (git-fixes).
  * bpf: use kvzmalloc to allocate BPF verifier environment (git-fixes).
  * bpftool: Fix JSON writer resource leak in version command (git-fixes).
  * bpftool: Fix memory leak in dump_xx_nlmsg on realloc failure (git-fixes).
  * bpftool: Fix readlink usage in get_fd_type (git-fixes).
  * bpftool: Mount bpffs when pinmaps path not under the bpffs (git-fixes).
  * bpftool: fix potential NULL pointer dereferencing in prog_dump() (git-
    fixes).
  * btrfs: abort transaction during log replay if walk_log_tree() failed (git-
    fixes).
  * btrfs: abort transaction on unexpected eb generation at btrfs_copy_root()
    (git-fixes).
  * btrfs: add cancellation points to trim loops (git-fixes).
  * btrfs: always abort transaction on failure to add block group to free space
    tree (git-fixes).
  * btrfs: always update fstrim_range on failure in FITRIM ioctl (git-fixes).
  * btrfs: avoid load/store tearing races when checking if an inode was logged
    (git-fixes).
  * btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling
    (git-fixes).
  * btrfs: correctly escape subvol in btrfs_show_options() (git-fixes).
  * btrfs: fix adding block group to a reclaim list and the unused list during
    reclaim (git-fixes).
  * btrfs: fix bitmap leak when loading free space cache on duplicate entry
    (git-fixes).
  * btrfs: fix data overwriting bug during buffered write when block size <
    page size (git-fixes).
  * btrfs: fix data race when accessing the inode's disk_i_size at
    btrfs_drop_extents() (git-fixes).
  * btrfs: fix invalid extref key setup when replaying dentry (git-fixes).
  * btrfs: fix race between logging inode and checking if it was logged before
    (git-fixes).
  * btrfs: fix race between setting last_dir_index_offset and inode logging
    (git-fixes).
  * btrfs: fix the length of reserved qgroup to free (bsc#1240708)
  * btrfs: make found_logical_ret parameter mandatory for function
    queue_scrub_stripe() (git-fixes).
  * btrfs: move transaction aborts to the error site in
    add_block_group_free_space() (git-fixes).
  * btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git-
    fixes).
  * btrfs: retry block group reclaim without infinite loop (git-fixes).
  * btrfs: return accurate error code on open failure in open_fs_devices()
    (bsc#1233120)
  * btrfs: run delayed iputs when flushing delalloc (git-fixes).
  * btrfs: scrub: avoid unnecessary csum tree search preparing stripes (git-
    fixes).
  * btrfs: scrub: avoid unnecessary extent tree search preparing stripes (git-
    fixes).
  * btrfs: scrub: fix grouping of read IO (git-fixes).
  * btrfs: scrub: remove scrub_ctx::csum_list member (git-fixes).
  * btrfs: split remaining space to discard in chunks (git-fixes).
  * btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes).
  * btrfs: update target inode's ctime on unlink (git-fixes).
  * btrfs: use SECTOR_SHIFT to convert physical offset to LBA (git-fixes).
  * build_bug.h: Add KABI assert (bsc#1249186).
  * bus: fsl-mc: Check return value of platform_get_resource() (git-fixes).
  * bus: mhi: host: Do not use uninitialized 'dev' pointer in
    mhi_init_irq_setup() (git-fixes).
  * can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow (git-
    fixes).
  * can: hi311x: populate ndo_change_mtu() to prevent buffer overflow (git-
    fixes).
  * can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes).
  * can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get()
    fails (git-fixes).
  * can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when
    j1939_local_ecu_get() failed (git-fixes).
  * can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (git-
    fixes).
  * can: peak_usb: fix shift-out-of-bounds issue (git-fixes).
  * can: rcar_can: rcar_can_resume(): fix s2ram with PSCI (stable-fixes).
  * can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow (git-
    fixes).
  * can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB
    (git-fixes).
  * cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes).
  * cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes).
  * ceph: fix possible integer overflow in ceph_zero_objects() (git-fixes).
  * ceph: validate snapdirname option length when mounting (git-fixes).
  * cgroup/cpuset: Use static_branch_enable_cpuslocked() on
    cpusets_insane_config_key (bsc#1241166).
  * cgroup/rstat: Optimize cgroup_rstat_updated_list() (bsc#1247963).
  * cgroup/rstat: Reduce cpu_lock hold time in cgroup_rstat_flush_locked()
    (bsc#1247963).
  * cgroup: llist: avoid memory tears for llist_node (bsc#1247963).
  * cgroup: make css_rstat_updated nmi safe (bsc#1247963).
  * cgroup: remove cgroup_rstat_flush_atomic() (bsc#1247963).
  * cgroup: remove per-cpu per-subsystem locks (bsc#1247963).
  * cgroup: support to enable nmi-safe css_rstat_updated (bsc#1247963).
  * char: misc: Fix improper and inaccurate error code returned by misc_init()
    (stable-fixes).
  * comedi: Fix use of uninitialized memory in do_insn_ioctl() and
    do_insnlist_ioctl() (git-fixes).
  * comedi: Make insn_rw_emulate_bits() do insn->n samples (git-fixes).
  * comedi: fix race between polling and detaching (git-fixes).
  * comedi: pcl726: Prevent invalid irq number (git-fixes).
  * compiler-clang.h: define **SANITIZE_*** macros only when undefined (stable-
    fixes).
  * compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes).
  * cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes).
  * cpufreq: Exit governor when failed to start old governor (stable-fixes).
  * cpufreq: Init policy->rwsem before it may be possibly used (git-fixes).
  * cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes).
  * cpufreq: Initialize cpufreq-based invariance before subsys (git-fixes).
  * cpufreq: Use the fixed and coherent frequency for scaling capacity (stable-
    fixes).
  * cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes).
  * cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git-
    fixes).
  * cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git-
    fixes).
  * cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes).
  * cpufreq: scpi: compare kHz instead of Hz (git-fixes).
  * cpufreq: tegra186: Share policy per cluster (stable-fixes).
  * cpupower: Fix a bug where the -t option of the set subcommand was not
    working (stable-fixes).
  * crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes).
  * crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes).
  * crypto: atmel - Fix dma_unmap_sg() direction (git-fixes).
  * crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes).
  * crypto: hisilicon/qm - check whether the input function and PF are on the
    same device (git-fixes).
  * crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs (git-fixes).
  * crypto: jitter - fix intermediary handling (stable-fixes).
  * crypto: keembay - Add missing check after sg_nents_for_len() (git-fixes).
  * crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes).
  * crypto: qat - add shutdown handler to qat_c3xxx (git-fixes).
  * crypto: qat - add shutdown handler to qat_c62x (git-fixes).
  * crypto: qat - add shutdown handler to qat_dh895xcc (git-fixes).
  * crypto: qat - lower priority for skcipher and aead algorithms (stable-
    fixes).
  * dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes).
  * dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation (git-fixes).
  * dmaengine: dw: dmamux: Fix device reference leak in
    rzn1_dmamux_route_allocate (git-fixes).
  * dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes).
  * dmaengine: idxd: Fix refcount underflow on module unload (git-fixes).
  * dmaengine: idxd: Remove improper idxd_free (git-fixes).
  * dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() (git-
    fixes).
  * dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git-
    fixes).
  * dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git-
    fixes).
  * docs: admin-guide: update to current minimum pipe size default (git-fixes).
  * drivers/base/node: fix double free in register_one_node() (git-fixes).
  * drivers/base/node: handle error properly in register_one_node() (git-fixes).
  * drivers/base/node: optimize memory block registration to reduce boot time
    (bsc#1241866).
  * drivers/base/node: remove register_mem_block_under_node_early()
    (bsc#1241866).
  * drivers/base/node: remove register_memory_blocks_under_node() function call
    from register_one_node (bsc#1241866).
  * drivers/base/node: rename __register_one_node() to register_one_node()
    (bsc#1241866).
  * drivers/base/node: rename register_memory_blocks_under_node() and remove
    context argument (bsc#1241866).
  * drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes).
  * drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()
    (git-fixes).
  * drm/amd/display: Add primary plane to commits for correct VRR handling
    (stable-fixes).
  * drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes).
  * drm/amd/display: Avoid a NULL pointer dereference (stable-fixes).
  * drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported
    (stable-fixes).
  * drm/amd/display: Avoid trying AUX transactions on disconnected ports
    (stable-fixes).
  * drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121).
  * drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes).
  * drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes).
  * drm/amd/display: Fill display clock and vblank time in
    dce110_fill_display_configs (stable-fixes).
  * drm/amd/display: Find first CRTC and its line time in
    dce110_fill_display_configs (stable-fixes).
  * drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes).
  * drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes).
  * drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git-
    fixes).
  * drm/amd/display: Only finalize atomic_obj if it was initialized (stable-
    fixes).
  * drm/amd/display: Remove redundant semicolons (git-fixes).
  * drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes).
  * drm/amd/display: use udelay rather than fsleep (git-fixes).
  * drm/amd/pm: Adjust si_upload_smc_data register programming (v3) (git-fixes).
  * drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2) (git-fixes).
  * drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3)
    (git-fixes).
  * drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes).
  * drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes).
  * drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3) (git-fixes).
  * drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual
    (stable-fixes).
  * drm/amd: Restore cached power limit during resume (stable-fixes).
  * drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable-
    fixes).
  * drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time
    (stable-fixes).
  * drm/amdgpu: Avoid extra evict-restore process (stable-fixes).
  * drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes).
  * drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes).
  * drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes).
  * drm/amdgpu: fix incorrect vm flags to map bo (git-fixes).
  * drm/amdgpu: fix task hang from failed job submission during process kill
    (git-fixes).
  * drm/amdgpu: remove the redeclaration of variable i (git-fixes).
  * drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes).
  * drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes).
  * drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl() (git-fixes).
  * drm/ast: Use msleep instead of mdelay for edid read (bsc#1250530).
  * drm/bridge: it6505: select REGMAP_I2C (git-fixes).
  * drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes).
  * drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121).
  * drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS
    (stable-fixes).
  * drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to
    TRAINING_PATTERN_SET (bsc#1248121).
  * drm/edid: Add support for quirks visible to DRM core and drivers
    (bsc#1248121).
  * drm/edid: Define the quirks in an enum list (bsc#1248121).
  * drm/gma500: Fix null dereference in hdmi teardown (git-fixes).
  * drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes).
  * drm/i915/backlight: Return immediately when scale() finds invalid parameters
    (stable-fixes).
  * drm/i915/power: fix size for for_each_set_bit() in abox iteration (git-
    fixes).
  * drm/mediatek: Fix device/node reference count leaks in
    mtk_drm_get_all_drm_priv (git-fixes).
  * drm/mediatek: fix potential OF node use-after-free (git-fixes).
  * drm/msm/dpu: fix incorrect type for ret (git-fixes).
  * drm/msm/kms: move snapshot init earlier in KMS init (git-fixes).
  * drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes).
  * drm/msm: use trylock for debugfs (stable-fixes).
  * drm/nouveau/disp: Always accept linear modifier (git-fixes).
  * drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes).
  * drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes).
  * drm/nouveau: fix typos in comments (git-fixes).
  * drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes).
  * drm/nouveau: remove unused memory target test (git-fixes).
  * drm/panel: novatek-nt35560: Fix invalid return value (git-fixes).
  * drm/radeon/r600_cs: clean up of dead code in r600_cs (git-fixes).
  * drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes).
  * drm/ttm: Respect the shrinker core free target (stable-fixes).
  * drm/ttm: Should to return the evict error (stable-fixes).
  * drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git-
    fixes).
  * drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git-
    fixes).
  * erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git-
    fixes).
  * et131x: Add missing check after DMA map (stable-fixes).
  * exfat: add cluster chain loop check for dir (git-fixes).
  * ext4: remove writable userspace mappings before truncating page cache
    (bsc#1247223).
  * fbcon: Fix OOB access in font allocation (git-fixes).
  * fbcon: fix integer overflow in fbcon_do_set_font (git-fixes).
  * fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes).
  * fbdev: fix potential buffer overflow in do_register_framebuffer() (stable-
    fixes).
  * firewire: core: fix overlooked update of subsystem ABI version (git-fixes).
  * firmware: meson_sm: fix device leak at probe (git-fixes).
  * flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read
    (git-fixes).
  * fs/mnt_idmapping.c: Return -EINVAL when no map is written (bsc#1233120)
  * fs/nfs/io: make nfs_start_io_*() killable (git-fixes).
  * fs/orangefs: use snprintf() instead of sprintf() (git-fixes).
  * gpio: mlxbf3: use platform_get_irq_optional() (git-fixes).
  * gpio: tps65912: check the return value of regmap_update_bits() (stable-
    fixes).
  * gpio: wcd934x: check the return value of regmap_update_bits() (stable-
    fixes).
  * hfs: fix not erasing deleted b-tree node issue (git-fixes).
  * hfs: fix slab-out-of-bounds in hfs_bnode_read() (git-fixes).
  * hfsplus: do not use BUG_ON() in hfsplus_create_attributes_file() (git-
    fixes).
  * hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() (git-fixes).
  * hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (git-fixes).
  * hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111).
  * hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent IPv6
    addrconf (git-fixes).
  * hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal
    state (stable-fixes).
  * hwmon: (mlxreg-fan) Separate methods of fan setting coming from different
    subsystems (git-fixes).
  * hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes).
  * hwrng: ks-sa - fix division by zero in ks_sa_rng_init (git-fixes).
  * hwrng: nomadik - add ARM_AMBA dependency (git-fixes).
  * hypfs_create_cpu_files(): add missing check for hypfs_mkdir() failure (git-
    fixes bsc#1249122).
  * i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes).
  * i2c: designware: Add disabling clocks when probe fails (git-fixes).
  * i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes).
  * i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD (git-fixes).
  * i2c: riic: Allow setting frequencies lower than 50KHz (git-fixes).
  * i2c: tegra: Use internal reset when reset property is not available
    (bsc#1249143)
  * i3c: Fix default I2C adapter timeout value (git-fixes).
  * i3c: do not fail if GETHDRCAP is unsupported (stable-fixes).
  * i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes).
  * i3c: master: svc: Recycle unused IBI slot (git-fixes).
  * ice, irdma: fix an off by one in error handling code (bsc#1247712).
  * ice, irdma: move interrupts code to irdma (bsc#1247712).
  * ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712).
  * ice: count combined queues using Rx/Tx count (bsc#1247712).
  * ice: devlink PF MSI-X max and min parameter (bsc#1247712).
  * ice: enable_rdma devlink param (bsc#1247712).
  * ice: get rid of num_lan_msix field (bsc#1247712).
  * ice: init flow director before RDMA (bsc#1247712).
  * ice: remove splitting MSI-X between features (bsc#1247712).
  * ice: simplify VF MSI-X managing (bsc#1247712).
  * ice: treat dyn_allowed only as suggestion (bsc#1247712).
  * iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable-
    fixes).
  * iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes).
  * iio: consumers: Fix offset handling in iio_convert_raw_to_processed() (git-
    fixes).
  * iio: dac: ad5360: use int type to store negative error codes (git-fixes).
  * iio: dac: ad5421: use int type to store negative error codes (git-fixes).
  * iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE (git-fixes).
  * iio: frequency: adf4350: Fix prescaler usage (git-fixes).
  * iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in resume
    (git-fixes).
  * iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to
    aligned_s64 (stable-fixes).
  * iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes).
  * iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes).
  * iio: proximity: isl29501: fix buffered read on big-endian systems (git-
    fixes).
  * iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes).
  * iio: xilinx-ams: Unmask interrupts after updating alarms (git-fixes).
  * integrity/platform_certs: Allow loading of keys in the static key management
    mode (jsc#PED-13345 jsc#PED-13343).
  * iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() (git-
    fixes).
  * iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes).
  * ipmi: Fix strcpy source and destination the same (stable-fixes).
  * ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable-
    fixes).
  * irdma: free iwdev->rf after removing MSI-X (bsc#1247712).
  * isolcpus: add missing hunk back (bsc#1236897 bsc#1249206).
  * jfs: Regular file corruption check (git-fixes).
  * jfs: truncate good inode pages when hard link is 0 (git-fixes).
  * jfs: upper bound check of tree index in dbAllocAG (git-fixes).
  * kABI fix after vsock/virtio: fix `rx_bytes` accounting for stream sockets
    (git-fixes).
  * kABI fix for "netfilter: nf_tables: Audit log rule reset" (git-fixes).
  * kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access
    probe" (bsc#1248121).
  * kABI workaround for RCU tasks exit tracking (bsc#1246298).
  * kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git-
    fixes).
  * kABI: adjust new field on ip_ct_sctp struct (git-fixes).
  * kABI: arm64: ftrace: Restore init_module behavior (git-fixes).
  * kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes).
  * kABI: make nft_trans_gc_catchall() public again (git-fixes).
  * kABI: netfilter flowtable move gc operation to bottom (git-fixes).
  * kabi: Restore layout of parallel_data (bsc1248343).
  * kabi: add struct cgroup_extra (bsc#1247963).
  * kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963).
  * kbuild/modpost: Continue processing all unresolved symbols when KLP_SYM_RELA
    is found (bsc#1218644, bsc#1250655).
  * kernel-binary: Another installation ordering fix (bsc#1241353).
  * kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522).
  * kernel-subpackage-build: Decompress ghost file when compressed version
    exists (bsc#1249346)
  * kselftest/arm64: Fix check for setting new VLs in sve-ptrace (git-fixes).
  * leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes).
  * loop: use kiocb helpers to fix lockdep warning (git-fixes).
  * mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes).
  * mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes).
  * maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs (git-fixes).
  * md/md-cluster: handle REMOVE message earlier (bsc#1247057).
  * md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes).
  * md: allow removing faulty rdev during resync (git-fixes).
  * md: make rdev_addable usable for rcu mode (git-fixes).
  * media: b2c2: Fix use-after-free causing by irq_check_work in
    flexcop_pci_remove (git-fixes).
  * media: cx18: Add missing check after DMA map (git-fixes).
  * media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()
    (stable-fixes).
  * media: dvb-frontends: w7090p: fix null-ptr-deref in
    w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes).
  * media: i2c: mt9v111: fix incorrect type for ret (git-fixes).
  * media: lirc: Fix error handling in lirc_register() (git-fixes).
  * media: pci: ivtv: Add missing check after DMA map (git-fixes).
  * media: rc: fix races with imon_disconnect() (git-fixes).
  * media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes).
  * media: st-delta: avoid excessive stack usage (git-fixes).
  * media: tc358743: Check I2C succeeded during probe (stable-fixes).
  * media: tc358743: Increase FIFO trigger level to 374 (stable-fixes).
  * media: tc358743: Return an appropriate colorspace from tc358743_set_fmt
    (stable-fixes).
  * media: usb: hdpvr: disable zero-length read messages (stable-fixes).
  * media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes).
  * media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID (git-
    fixes).
  * media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control
    (stable-fixes).
  * media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()
    (git-fixes).
  * media: zoran: Remove zoran_fh structure (git-fixes).
  * mei: bus: Check for still connected devices in mei_cl_bus_dev_release()
    (stable-fixes).
  * memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe (git-
    fixes).
  * memstick: Fix deadlock by moving removing flag earlier (git-fixes).
  * mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes).
  * mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data()
    (git-fixes).
  * misc: genwqe: Fix incorrect cmd field being reported in error (git-fixes).
  * mm/hwpoison: do not send SIGBUS to processes with recovered clean pages
    (git-fixes).
  * mm/memory-failure: fix infinite UCE for VM_PFNMAP pfn (git-fixes).
  * mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes)
  * mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes).
  * mm: move page table sync declarations to linux/pgtable.h (git-fixes).
  * mmc: core: Use GFP_NOIO in ACMD22 (git-fixes).
  * mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes).
  * mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes).
  * mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes).
  * mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable-
    fixes).
  * mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency
    (git-fixes).
  * most: core: Drop device reference after usage in get_channel() (git-fixes).
  * mptcp: fallback when MPTCP opts are dropped after 1st data (git-fixes).
  * mptcp: reset when MPTCP opts are dropped after join (git-fixes).
  * mtd: nand: raw: atmel: Fix comment in timings preparation (stable-fixes).
  * mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes).
  * mtd: rawnand: omap2: fix device leak on probe failure (git-fixes).
  * mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git-
    fixes).
  * mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes).
  * net: hv_netvsc: fix loss of early receive events from host during channel
    open (git-fixes).
  * net: nfc: nci: Add parameter validation for packet data (git-fixes).
  * net: phy: fix phy_uses_state_machine() (git-fixes).
  * net: phy: micrel: Add ksz9131_resume() (stable-fixes).
  * net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes).
  * net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer
    (git-fixes).
  * net: rose: convert 'use' field to refcount_t (git-fixes).
  * net: rose: fix a typo in rose_clear_routes() (git-fixes).
  * net: rose: include node references in rose_neigh refcount (git-fixes).
  * net: rose: split remove and free operations in rose_remove_neigh() (stable-
    fixes).
  * net: thunderbolt: Enable end-to-end flow control also in transmit (stable-
    fixes).
  * net: thunderbolt: Fix the parameter passing of
    tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes).
  * net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (git-
    fixes).
  * net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization
    (git-fixes).
  * net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes).
  * net: usb: cdc-ncm: check for filtering capability (git-fixes).
  * net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git-
    fixes).
  * netfilter: conntrack: fix extension size table (git-fixes).
  * netfilter: flowtable: GC pushes back packets to classic path (git-fixes).
  * netfilter: handle the connecting collision properly in
    nf_conntrack_proto_sctp (git-fixes).
  * netfilter: nat: fix ipv6 nat redirect with mapped and scoped addresses (git-
    fixes).
  * netfilter: nf_conntrack_bridge: initialize err to 0 (git-fixes).
  * netfilter: nf_tables: A better name for nft_obj_filter (git-fixes).
  * netfilter: nf_tables: Audit log rule reset (git-fixes).
  * netfilter: nf_tables: Carry reset boolean in nft_obj_dump_ctx (git-fixes).
  * netfilter: nf_tables: Carry s_idx in nft_obj_dump_ctx (git-fixes).
  * netfilter: nf_tables: Deduplicate nft_register_obj audit logs (git-fixes).
  * netfilter: nf_tables: Drop pointless memset in nf_tables_dump_obj (git-
    fixes).
  * netfilter: nf_tables: Drop pointless memset when dumping rules (git-fixes).
  * netfilter: nf_tables: Fix entries val in rule reset audit log (git-fixes).
  * netfilter: nf_tables: Introduce nf_tables_getrule_single() (git-fixes).
  * netfilter: nf_tables: Open-code audit log call in nf_tables_getrule() (git-
    fixes).
  * netfilter: nf_tables: Unbreak audit log reset (git-fixes).
  * netfilter: nf_tables: Unconditionally allocate nft_obj_filter (git-fixes).
  * netfilter: nf_tables: audit log object reset once per table (git-fixes).
  * netfilter: nf_tables: bogus ENOENT when destroying element which does not
    exist (git-fixes).
  * netfilter: nf_tables: disallow element removal on anonymous sets (git-
    fixes).
  * netfilter: nf_tables: do not remove elements if set backend implements
    .abort (git-fixes).
  * netfilter: nf_tables: nft_obj_filter fits into cb->ctx (git-fixes).
  * netfilter: nf_tables: remove catchall element in GC sync path (git-fixes).
  * netfilter: nf_tables: revert do not remove elements if set backend
    implements .abort (git-fixes).
  * netfilter: nf_tables: split async and sync catchall in two functions (git-
    fixes).
  * netfilter: nfnetlink_log: silence bogus compiler warning (git-fixes).
  * netfilter: nft_payload: fix wrong mac header matching (git-fixes).
  * netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-
    fixes).
  * netfilter: nft_set_pipapo: call nft_trans_gc_queue_sync() in catchall GC
    (git-fixes).
  * netfilter: nft_set_pipapo: stop GC iteration if GC transaction allocation
    fails (git-fixes).
  * netfilter: nft_set_rbtree: prefer sync gc to async worker (git-fixes).
  * netfilter: nft_set_rbtree: rename gc deactivate+erase function (git-fixes).
  * netfilter: xt_recent: fix (increase) ipv6 literal buffer length (git-fixes).
  * nilfs2: fix CFI failure when accessing /sys/fs/nilfs2/features/* (git-
    fixes).
  * nouveau: fix disabling the nonstall irq due to storm code (git-fixes).
  * nvme-fc: use lock accessing port_state and rport state (bsc#1245193
    bsc#1247500).
  * nvme-pci: try function level reset on init failure (git-fixes).
  * nvmet-fc: avoid scheduling association deletion twice (bsc#1245193
    bsc#1247500).
  * nvmet-fc: move lsop put work to nvmet_fc_ls_req_op (bsc#1245193
    bsc#1247500).
  * nvmet-fcloop: call done callback even when remote port is gone (bsc#1245193
    bsc#1247500).
  * orangefs: Remove unused type in macro fill_default_sys_attrs (git-fixes).
  * pNFS: Fix disk addr range check in block/scsi layout (git-fixes).
  * pNFS: Fix stripe mapping in block/scsi layout (git-fixes).
  * pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes).
  * pNFS: Handle RPC size limit for layoutcommits (git-fixes).
  * pcmcia: Add error handling for add_interval() in do_validate_mem() (git-
    fixes).
  * pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region() (git-
    fixes).
  * pcmcia: omap: Add missing check for platform_get_resource (git-fixes).
  * phy: mscc: Fix parsing of unicast frames (git-fixes).
  * phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable-
    fixes).
  * phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568 (git-fixes).
  * phy: tegra: xusb: fix device and OF node leak at probe (git-fixes).
  * phy: ti-pipe3: fix device leak at unbind (git-fixes).
  * pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes).
  * pinctrl: equilibrium: Remove redundant semicolons (git-fixes).
  * pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes).
  * pinctrl: renesas: Use int type to store negative error codes (git-fixes).
  * pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes).
  * pinctrl: stm32: Manage irq affinity settings (stable-fixes).
  * platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable-
    fixes).
  * platform/mellanox: mlxbf-pmc: Remove newline char from event name input
    (git-fixes).
  * platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes).
  * platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks
    list (stable-fixes).
  * platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable-
    fixes).
  * platform/x86: dell-wmi-sysman: Fix class device unregistration (git-fixes).
  * platform/x86: think-lmi: Fix class device unregistration (git-fixes).
  * platform/x86: thinkpad_acpi: Handle KCOV __init vs inline mismatches (git-
    fixes).
  * pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop()
    (stable-fixes).
  * power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery
    (git-fixes).
  * power: supply: bq27xxx: restrict no-battery detection to bq27000 (git-
    fixes).
  * power: supply: cw2015: Fix a alignment coding style issue (git-fixes).
  * power: supply: max77976_charger: fix constant current reporting (git-fixes).
  * power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes).
  * powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199).
  * powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199).
  * powerpc/eeh: Rely on dev->link_active_reporting (bsc#1215199).
  * powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199).
  * powerpc/pseries: Correct secvar format representation for static key
    management (jsc#PED-13345 jsc#PED-13343).
  * powerpc/secvar: Expose secvars relevant to the key management mode
    (jsc#PED-13345 jsc#PED-13343).
  * powerpc: do not build ppc_save_regs.o always (bsc#1215199).
  * pptp: fix pptp_xmit() error path (git-fixes).
  * pwm: berlin: Fix wrong register in suspend/resume (git-fixes).
  * pwm: mediatek: Fix duty and period setting (git-fixes).
  * pwm: mediatek: Handle hardware enable and clock enable separately (stable-
    fixes).
  * pwm: tiehrpwm: Fix corner case in clock divisor calculation (git-fixes).
  * pwm: tiehrpwm: Make code comment in .free() more useful (git-fixes).
  * rcu-tasks: Add data to eliminate RCU-tasks/do_exit() (bsc#1246298)
  * rcu-tasks: Eliminate deadlocks involving do_exit() and RCU (bsc#1246298)
  * rcu-tasks: Initialize callback lists at rcu_init() time (bsc#1246298)
  * rcu-tasks: Initialize data to eliminate RCU-tasks/do_exit() (bsc#1246298)
  * rcu-tasks: Maintain lists to eliminate RCU-tasks/do_exit() (bsc#1246298)
  * rcu-tasks: Maintain real-time response in (bsc#1246298)
  * rcu/exp: Fix RCU expedited parallel grace period kworker (git-fixes)
  * rcu/exp: Handle RCU expedited grace period kworker allocation (git-fixes)
  * rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes)
  * regmap: Remove superfluous check for !config in __regmap_init() (git-fixes).
  * regulator: scmi: Use int type to store negative error codes (git-fixes).
  * regulator: sy7636a: fix lifecycle of power good gpio (git-fixes).
  * reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes).
  * rpm: Configure KABI checkingness macro (bsc#1249186)
  * rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186)
  * rpm: Link arch-symbols script from scripts directory.
  * rpm: Link guards script from scripts directory.
  * rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes).
  * rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable-
    fixes).
  * s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes
    bsc#1249481).
  * s390/hypfs: Avoid unnecessary ioctl registration in debugfs (git-fixes
    bsc#1248733 LTC#214881).
  * s390/hypfs: Enable limited access during lockdown (git-fixes bsc#1248733
    LTC#214881).
  * s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1248735).
  * s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249482).
  * s390/pci: Allow automatic recovery with minimal driver support (git-fixes
    bsc#1248734 LTC#214880).
  * s390/sclp: Fix SCCB present check (git-fixes bsc#1249123).
  * s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249124).
  * s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249125).
  * s390/vfio-ap: Fix no AP queue sharing allowed message written to kernel log
    (git-fixes bsc#1249488).
  * samples/bpf: Fix compilation errors with cf-protection option (git-fixes).
  * sched/deadline: Collect sched_dl_entity initialization (git-fixes)
  * sched/fair: Remove unused parameter from sched_asym() (git-fixes)
  * sched/fair: Take the scheduling domain into account in (git-fixes)
  * sched/isolation: Fix boot crash when maxcpus < first (git-fixes)
  * sched/numa, mm: do not try to migrate memory to memoryless (git-fixes)
  * scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes).
  * scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes).
  * scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes).
  * scsi: fc: Avoid -Wflex-array-member-not-at-end warnings (bsc#1250519).
  * scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes).
  * scsi: isci: Fix dma_unmap_sg() nents value (git-fixes).
  * scsi: lpfc: Abort outstanding ELS WQEs regardless of if rmmod is in progress
    (bsc#1250519).
  * scsi: lpfc: Check return status of lpfc_reset_flush_io_context during
    TGT_RESET (bsc#1250519).
  * scsi: lpfc: Clean up allocated queues when queue setup mbox commands fail
    (bsc#1250519).
  * scsi: lpfc: Copyright updates for 14.4.0.11 patches (bsc#1250519).
  * scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted (bsc#1250519).
  * scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point
    topology (bsc#1250519).
  * scsi: lpfc: Fix buffer free/clear order in deferred receive path
    (bsc#1250519).
  * scsi: lpfc: Fix wrong function reference in a comment (bsc#1250519).
  * scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in
    lpfc_cleanup (bsc#1250519).
  * scsi: lpfc: Remove redundant assignment to avoid memory leak (bsc#1250519).
  * scsi: lpfc: Remove unused member variables in struct lpfc_hba and lpfc_vport
    (bsc#1250519).
  * scsi: lpfc: Update lpfc version to 14.4.0.11 (bsc#1250519).
  * scsi: lpfc: Use int type to store negative error codes (bsc#1250519).
  * scsi: lpfc: use min() to improve code (bsc#1250519).
  * scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes).
  * scsi: mpi3mr: Fix race between config read submit and interrupt completion
    (git-fixes).
  * scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git-
    fixes).
  * scsi: mpt3sas: Fix a fw_event memory leak (git-fixes).
  * scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes).
  * scsi: qla2xxx: Avoid stack frame size warning in qla_dfs (git-fixes).
  * scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES()
    (git-fixes).
  * scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp()
    (git-fixes).
  * scsi: qla2xxx: Remove firmware URL (git-fixes).
  * scsi: qla2xxx: Use secs_to_jiffies() instead of msecs_to_jiffies() (git-
    fixes).
  * scsi: qla2xxx: edif: Fix incorrect sign of error code (git-fixes).
  * scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes).
  * seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too fast
    (git-fixes).
  * selftests/bpf: Add asserts for netfilter link info (git-fixes).
  * selftests/bpf: Add cmp_map_pointer_with_const test (git-fixes).
  * selftests/bpf: Add test cases with CONST_PTR_TO_MAP null checks (git-fixes).
  * selftests/bpf: adapt one more case in test_lru_map to the new target_free
    (git-fixes).
  * selftests/bpf: fexit_sleep: Fix stack allocation for arm64 (git-fixes).
  * selftests/cpufreq: Fix cpufreq basic read and update testcases
    (bsc#1250344).
  * selftests/tracing: Fix false failure of subsystem event test (git-fixes).
  * selftests: Fix errno checking in syscall_user_dispatch test (git-fixes).
  * selftests: bpf: test batch lookup on array of maps with holes (git-fixes).
  * selftests: rtnetlink.sh: remove esp4_offload after test (git-fixes).
  * serial: 8250: fix panic due to PSLVERR (git-fixes).
  * serial: max310x: Add error checking in probe() (git-fixes).
  * serial: sc16is7xx: fix bug in flow control levels init (git-fixes).
  * slab: Decouple slab_debug and no_hash_pointers (bsc#1249022).
  * soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes).
  * soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS (git-fixes).
  * soundwire: amd: serialize amd manager resume sequence during pm_prepare
    (stable-fixes).
  * spi: bcm2835: Remove redundant semicolons (git-fixes).
  * spi: cadence-quadspi: Flush posted register writes before DAC access (git-
    fixes).
  * spi: cadence-quadspi: Flush posted register writes before INDAC access (git-
    fixes).
  * spi: mtk-snfi: Remove redundant semicolons (git-fixes).
  * spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes).
  * spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git-
    fixes).
  * spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes).
  * squashfs: fix memory leak in squashfs_fill_super (git-fixes).
  * struct cdc_ncm_ctx: hide new member filtering_supported (git-fixes).
  * struct ci_hdrc: new member has_short_pkt_limit to end (git-fixes).
  * struct l2cap_chan: shift new member rx_avail to end (git-fixes).
  * sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes).
  * supported.conf: mark hyperv_drm as external
  * thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required
    (stable-fixes).
  * thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes).
  * thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes).
  * thunderbolt: Compare HMAC values in constant time (git-fixes).
  * tty: hvc_console: Call hvc_kick in hvc_write unconditionally (bsc#1230062).
  * tty: n_gsm: Do not block input queue by waiting MSC (git-fixes).
  * ublk: sanity check add_dev input for underflow (git-fixes).
  * ublk: use vmalloc for ublk_device's __queues (git-fixes).
  * uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes).
  * usb: chipidea: add CI_HDRC_HAS_SHORT_PKT_LIMIT flag (git-fixes).
  * usb: core: Add 0x prefix to quirks debug output (stable-fixes).
  * usb: core: config: Prevent OOB read in SS endpoint companion parsing
    (stable-fixes).
  * usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE
    test (git-fixes).
  * usb: core: usb_submit_urb: downgrade type check (stable-fixes).
  * usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git-
    fixes).
  * usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable-
    fixes).
  * usb: dwc3: core: Fix system suspend on TI AM62 platforms (git-fixes).
  * usb: dwc3: fix fault at system suspend if device was already runtime
    suspended (git-fixes).
  * usb: dwc3: imx8mp: fix device leak at unbind (git-fixes).
  * usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes).
  * usb: dwc3: qcom: Do not leave BCR asserted (git-fixes).
  * usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup (git-
    fixes).
  * usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls (git-
    fixes).
  * usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive
    (stable-fixes).
  * usb: renesas-xhci: Fix External ROM access timeouts (git-fixes).
  * usb: storage: realtek_cr: Use correct byte order for bcs->Residue (git-
    fixes).
  * usb: typec: fusb302: cache PD RX state (git-fixes).
  * usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable-
    fixes).
  * usb: typec: maxim_contaminant: disable low power mode when reading
    comparator values (git-fixes).
  * usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is
    clean (git-fixes).
  * usb: typec: tcpci: use GENMASK() for TCPC_ROLE_CTRL_CC[12] (git-fixes).
  * usb: typec: tcpm/tcpci_maxim: fix non-contaminant CC handling (git-fixes).
  * usb: typec: tcpm/tcpci_maxim: use GENMASK() for TCPC_VENDOR_CC_CTRL2
    register (git-fixes).
  * usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default
    (stable-fixes).
  * usb: xhci: Avoid showing errors during surprise removal (stable-fixes).
  * usb: xhci: Avoid showing warnings for dying controller (stable-fixes).
  * usb: xhci: Fix invalid pointer dereference in Etron workaround (git-fixes).
  * usb: xhci: Fix slot_id resource race conflict (git-fixes).
  * usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command
    (stable-fixes).
  * usb: xhci: print xhci->xhc_state when queue_command failed (stable-fixes).
  * use uniform permission checks for all mount propagation changes (git-fixes).
  * vfs: Add a sysctl for automated deletion of dentry (bsc#1240890).
  * vhost-scsi: Fix log flooding with target does not exist errors (git-fixes).
  * vhost-scsi: Return queue full for page alloc failures during copy (git-
    fixes).
  * vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() (git-
    fixes).
  * vhost/vsock: Avoid allocating arbitrarily-sized SKBs (git-fixes).
  * vhost: fail early when __vhost_add_used() fails (git-fixes).
  * vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page
    (git-fixes).
  * vsock/virtio: fix `rx_bytes` accounting for stream sockets (git-fixes).
  * vsock: Allow retrying on connect() failure (git-fixes).
  * vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also `transport_local`
    (git-fixes).
  * vsock: avoid timeout during connect() if the socket is closing (git-fixes).
  * watchdog: dw_wdt: Fix default timeout (stable-fixes).
  * watchdog: iTCO_wdt: Report error if timeout configuration fails (stable-
    fixes).
  * watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the watchdog
    (git-fixes).
  * watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race
    condition (stable-fixes).
  * wifi: ath10k: avoid unnecessary wait for service ready message (git-fixes).
  * wifi: ath11k: HAL SRNG: do not deinitialize and re-initialize again (git-
    fixes).
  * wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() (git-fixes).
  * wifi: ath11k: fix group data packet drops during rekey (git-fixes).
  * wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952).
  * wifi: ath12k: Add memset and update default rate value in wmi tx completion
    (stable-fixes).
  * wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes).
  * wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable-
    fixes).
  * wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0
    (stable-fixes).
  * wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work
    (git-fixes).
  * wifi: cfg80211: Fix interface type validation (stable-fixes).
  * wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes).
  * wifi: cfg80211: reject HTC bit for management frames (stable-fixes).
  * wifi: cfg80211: remove cfg80211_inform_single_bss_frame_data() (git-fixes).
  * wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git-
    fixes).
  * wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes).
  * wifi: iwlegacy: Check rate_idx range after addition (stable-fixes).
  * wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable-
    fixes).
  * wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable-
    fixes).
  * wifi: iwlwifi: mvm: fix scan request validation (stable-fixes).
  * wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes).
  * wifi: iwlwifi: uefi: check DSM item validity (git-fixes).
  * wifi: libertas: cap SSID len in lbs_associate() (git-fixes).
  * wifi: mac80211: do not complete management TX on SAE commit (stable-fixes).
  * wifi: mac80211: fix Rx packet handling when pubsta information is not
    available (git-fixes).
  * wifi: mac80211: fix incorrect type for ret (stable-fixes).
  * wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes).
  * wifi: mac80211: increase scan_ies_len for S1G (stable-fixes).
  * wifi: mac80211: update radar_required in channel context after channel
    switch (stable-fixes).
  * wifi: mt76: fix potential memory leak in mt76_wmac_probe() (git-fixes).
  * wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes).
  * wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git-
    fixes).
  * wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes).
  * wifi: mwifiex: send world regulatory domain to driver (git-fixes).
  * wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc()
    (stable-fixes).
  * wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()`
    (stable-fixes).
  * wifi: rtw89: Disable deep power saving for USB/SDIO (stable-fixes).
  * wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes).
  * wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable-
    fixes).
  * wifi: rtw89: avoid circular locking dependency in ser_state_run() (git-
    fixes).
  * wifi: virt_wifi: Fix page fault on connect (stable-fixes).
  * wifi: wilc1000: avoid buffer overflow in WID string configuration (stable-
    fixes).
  * wireless: purelifi: plfxlc: fix memory leak in plfxlc_usb_wreq_asyn() (git-
    fixes).
  * writeback: Avoid contention on wb->list_lock when switching inodes
    (bsc#1237776).
  * writeback: Avoid contention on wb->list_lock when switching inodes (kABI
    fixup) (bsc#1237776).
  * writeback: Avoid excessively long inode switching times (bsc#1237776).
  * writeback: Avoid softlockup when switching many inodes (bsc#1237776).
  * x86/CPU/AMD: WARN when setting EFER.AUTOIBRS if and only if the WRMSR fails
    (git-fixes).
  * x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes).
  * x86/amd_nb: Restrict init function to AMD-based systems (git-fixes).
  * x86/cpu: Add model number for Intel Clearwater Forest processor (git-fixes).
  * x86/fpu: Delay instruction pointer fixup until after warning (git-fixes).
  * x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes).
  * x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings()
    (git-fixes).
  * x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes).
  * xen/gntdev: remove struct gntdev_copy_batch from stack (git-fixes).
  * xen/netfront: Fix TX response spurious interrupts (git-fixes).
  * xen: Add support for XenServer 6.1 platform device (git-fixes).
  * xenbus: Allow PVH dom0 a non-local xenstore (git-fixes).
  * xfs: rearrange code in xfs_inode_item_precommit (bsc#1237449).
  * xfs: rework datasync tracking and execution (bsc#1237449).
  * xhci: Fix control transfer error on Etron xHCI host (git-fixes).
  * xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes).
  * xhci: fix memory leak regression when freeing xhci vdev devices depth first
    (git-fixes).
  * xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.6  
    zypper in -t patch SUSE-2025-3634=1 openSUSE-SLE-15.6-2025-3634=1

  * Public Cloud Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-3634=1

## Package List:

  * openSUSE Leap 15.6 (noarch)
    * kernel-source-azure-6.4.0-150600.8.52.1
    * kernel-devel-azure-6.4.0-150600.8.52.1
  * openSUSE Leap 15.6 (aarch64 x86_64)
    * ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.52.1
    * gfs2-kmp-azure-debuginfo-6.4.0-150600.8.52.1
    * kernel-azure-extra-debuginfo-6.4.0-150600.8.52.1
    * kselftests-kmp-azure-6.4.0-150600.8.52.1
    * kernel-azure-optional-debuginfo-6.4.0-150600.8.52.1
    * kernel-azure-debugsource-6.4.0-150600.8.52.1
    * kernel-azure-optional-6.4.0-150600.8.52.1
    * dlm-kmp-azure-debuginfo-6.4.0-150600.8.52.1
    * kernel-azure-extra-6.4.0-150600.8.52.1
    * cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.52.1
    * dlm-kmp-azure-6.4.0-150600.8.52.1
    * cluster-md-kmp-azure-6.4.0-150600.8.52.1
    * kernel-azure-devel-6.4.0-150600.8.52.1
    * kernel-azure-debuginfo-6.4.0-150600.8.52.1
    * reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.52.1
    * ocfs2-kmp-azure-6.4.0-150600.8.52.1
    * kselftests-kmp-azure-debuginfo-6.4.0-150600.8.52.1
    * kernel-syms-azure-6.4.0-150600.8.52.1
    * gfs2-kmp-azure-6.4.0-150600.8.52.1
    * kernel-azure-devel-debuginfo-6.4.0-150600.8.52.1
    * reiserfs-kmp-azure-6.4.0-150600.8.52.1
  * openSUSE Leap 15.6 (aarch64 nosrc x86_64)
    * kernel-azure-6.4.0-150600.8.52.1
  * openSUSE Leap 15.6 (x86_64)
    * kernel-azure-vdso-debuginfo-6.4.0-150600.8.52.1
    * kernel-azure-vdso-6.4.0-150600.8.52.1
  * Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
    * kernel-azure-6.4.0-150600.8.52.1
  * Public Cloud Module 15-SP6 (aarch64 x86_64)
    * kernel-azure-devel-6.4.0-150600.8.52.1
    * kernel-syms-azure-6.4.0-150600.8.52.1
    * kernel-azure-debuginfo-6.4.0-150600.8.52.1
    * kernel-azure-devel-debuginfo-6.4.0-150600.8.52.1
    * kernel-azure-debugsource-6.4.0-150600.8.52.1
  * Public Cloud Module 15-SP6 (noarch)
    * kernel-source-azure-6.4.0-150600.8.52.1
    * kernel-devel-azure-6.4.0-150600.8.52.1

## References:

  * https://www.suse.com/security/cve/CVE-2023-31248.html
  * https://www.suse.com/security/cve/CVE-2023-3772.html
  * https://www.suse.com/security/cve/CVE-2023-3867.html
  * https://www.suse.com/security/cve/CVE-2023-39197.html
  * https://www.suse.com/security/cve/CVE-2023-4130.html
  * https://www.suse.com/security/cve/CVE-2023-42753.html
  * https://www.suse.com/security/cve/CVE-2023-4515.html
  * https://www.suse.com/security/cve/CVE-2023-53147.html
  * https://www.suse.com/security/cve/CVE-2023-53148.html
  * https://www.suse.com/security/cve/CVE-2023-53150.html
  * https://www.suse.com/security/cve/CVE-2023-53151.html
  * https://www.suse.com/security/cve/CVE-2023-53152.html
  * https://www.suse.com/security/cve/CVE-2023-53165.html
  * https://www.suse.com/security/cve/CVE-2023-53167.html
  * https://www.suse.com/security/cve/CVE-2023-53170.html
  * https://www.suse.com/security/cve/CVE-2023-53174.html
  * https://www.suse.com/security/cve/CVE-2023-53175.html
  * https://www.suse.com/security/cve/CVE-2023-53177.html
  * https://www.suse.com/security/cve/CVE-2023-53179.html
  * https://www.suse.com/security/cve/CVE-2023-53180.html
  * https://www.suse.com/security/cve/CVE-2023-53181.html
  * https://www.suse.com/security/cve/CVE-2023-53183.html
  * https://www.suse.com/security/cve/CVE-2023-53184.html
  * https://www.suse.com/security/cve/CVE-2023-53185.html
  * https://www.suse.com/security/cve/CVE-2023-53187.html
  * https://www.suse.com/security/cve/CVE-2023-53189.html
  * https://www.suse.com/security/cve/CVE-2023-53192.html
  * https://www.suse.com/security/cve/CVE-2023-53195.html
  * https://www.suse.com/security/cve/CVE-2023-53196.html
  * https://www.suse.com/security/cve/CVE-2023-53201.html
  * https://www.suse.com/security/cve/CVE-2023-53204.html
  * https://www.suse.com/security/cve/CVE-2023-53205.html
  * https://www.suse.com/security/cve/CVE-2023-53206.html
  * https://www.suse.com/security/cve/CVE-2023-53207.html
  * https://www.suse.com/security/cve/CVE-2023-53208.html
  * https://www.suse.com/security/cve/CVE-2023-53209.html
  * https://www.suse.com/security/cve/CVE-2023-53210.html
  * https://www.suse.com/security/cve/CVE-2023-53215.html
  * https://www.suse.com/security/cve/CVE-2023-53217.html
  * https://www.suse.com/security/cve/CVE-2023-53220.html
  * https://www.suse.com/security/cve/CVE-2023-53221.html
  * https://www.suse.com/security/cve/CVE-2023-53222.html
  * https://www.suse.com/security/cve/CVE-2023-53226.html
  * https://www.suse.com/security/cve/CVE-2023-53230.html
  * https://www.suse.com/security/cve/CVE-2023-53231.html
  * https://www.suse.com/security/cve/CVE-2023-53235.html
  * https://www.suse.com/security/cve/CVE-2023-53238.html
  * https://www.suse.com/security/cve/CVE-2023-53243.html
  * https://www.suse.com/security/cve/CVE-2023-53245.html
  * https://www.suse.com/security/cve/CVE-2023-53247.html
  * https://www.suse.com/security/cve/CVE-2023-53248.html
  * https://www.suse.com/security/cve/CVE-2023-53249.html
  * https://www.suse.com/security/cve/CVE-2023-53251.html
  * https://www.suse.com/security/cve/CVE-2023-53252.html
  * https://www.suse.com/security/cve/CVE-2023-53255.html
  * https://www.suse.com/security/cve/CVE-2023-53257.html
  * https://www.suse.com/security/cve/CVE-2023-53258.html
  * https://www.suse.com/security/cve/CVE-2023-53260.html
  * https://www.suse.com/security/cve/CVE-2023-53261.html
  * https://www.suse.com/security/cve/CVE-2023-53263.html
  * https://www.suse.com/security/cve/CVE-2023-53264.html
  * https://www.suse.com/security/cve/CVE-2023-53272.html
  * https://www.suse.com/security/cve/CVE-2023-53274.html
  * https://www.suse.com/security/cve/CVE-2023-53275.html
  * https://www.suse.com/security/cve/CVE-2023-53280.html
  * https://www.suse.com/security/cve/CVE-2023-53286.html
  * https://www.suse.com/security/cve/CVE-2023-53287.html
  * https://www.suse.com/security/cve/CVE-2023-53288.html
  * https://www.suse.com/security/cve/CVE-2023-53291.html
  * https://www.suse.com/security/cve/CVE-2023-53292.html
  * https://www.suse.com/security/cve/CVE-2023-53303.html
  * https://www.suse.com/security/cve/CVE-2023-53304.html
  * https://www.suse.com/security/cve/CVE-2023-53305.html
  * https://www.suse.com/security/cve/CVE-2023-53309.html
  * https://www.suse.com/security/cve/CVE-2023-53311.html
  * https://www.suse.com/security/cve/CVE-2023-53312.html
  * https://www.suse.com/security/cve/CVE-2023-53313.html
  * https://www.suse.com/security/cve/CVE-2023-53314.html
  * https://www.suse.com/security/cve/CVE-2023-53316.html
  * https://www.suse.com/security/cve/CVE-2023-53319.html
  * https://www.suse.com/security/cve/CVE-2023-53321.html
  * https://www.suse.com/security/cve/CVE-2023-53322.html
  * https://www.suse.com/security/cve/CVE-2023-53323.html
  * https://www.suse.com/security/cve/CVE-2023-53324.html
  * https://www.suse.com/security/cve/CVE-2023-53325.html
  * https://www.suse.com/security/cve/CVE-2023-53328.html
  * https://www.suse.com/security/cve/CVE-2023-53331.html
  * https://www.suse.com/security/cve/CVE-2023-53333.html
  * https://www.suse.com/security/cve/CVE-2023-53336.html
  * https://www.suse.com/security/cve/CVE-2023-53338.html
  * https://www.suse.com/security/cve/CVE-2023-53339.html
  * https://www.suse.com/security/cve/CVE-2023-53342.html
  * https://www.suse.com/security/cve/CVE-2023-53343.html
  * https://www.suse.com/security/cve/CVE-2023-53350.html
  * https://www.suse.com/security/cve/CVE-2023-53352.html
  * https://www.suse.com/security/cve/CVE-2023-53354.html
  * https://www.suse.com/security/cve/CVE-2023-53356.html
  * https://www.suse.com/security/cve/CVE-2023-53357.html
  * https://www.suse.com/security/cve/CVE-2023-53360.html
  * https://www.suse.com/security/cve/CVE-2023-53362.html
  * https://www.suse.com/security/cve/CVE-2023-53364.html
  * https://www.suse.com/security/cve/CVE-2023-53365.html
  * https://www.suse.com/security/cve/CVE-2023-53367.html
  * https://www.suse.com/security/cve/CVE-2023-53368.html
  * https://www.suse.com/security/cve/CVE-2023-53369.html
  * https://www.suse.com/security/cve/CVE-2023-53370.html
  * https://www.suse.com/security/cve/CVE-2023-53371.html
  * https://www.suse.com/security/cve/CVE-2023-53374.html
  * https://www.suse.com/security/cve/CVE-2023-53377.html
  * https://www.suse.com/security/cve/CVE-2023-53379.html
  * https://www.suse.com/security/cve/CVE-2023-53380.html
  * https://www.suse.com/security/cve/CVE-2023-53384.html
  * https://www.suse.com/security/cve/CVE-2023-53385.html
  * https://www.suse.com/security/cve/CVE-2023-53386.html
  * https://www.suse.com/security/cve/CVE-2023-53391.html
  * https://www.suse.com/security/cve/CVE-2023-53394.html
  * https://www.suse.com/security/cve/CVE-2023-53395.html
  * https://www.suse.com/security/cve/CVE-2023-53397.html
  * https://www.suse.com/security/cve/CVE-2023-53401.html
  * https://www.suse.com/security/cve/CVE-2023-53420.html
  * https://www.suse.com/security/cve/CVE-2023-53421.html
  * https://www.suse.com/security/cve/CVE-2023-53424.html
  * https://www.suse.com/security/cve/CVE-2023-53425.html
  * https://www.suse.com/security/cve/CVE-2023-53426.html
  * https://www.suse.com/security/cve/CVE-2023-53428.html
  * https://www.suse.com/security/cve/CVE-2023-53429.html
  * https://www.suse.com/security/cve/CVE-2023-53432.html
  * https://www.suse.com/security/cve/CVE-2023-53436.html
  * https://www.suse.com/security/cve/CVE-2023-53438.html
  * https://www.suse.com/security/cve/CVE-2023-53441.html
  * https://www.suse.com/security/cve/CVE-2023-53442.html
  * https://www.suse.com/security/cve/CVE-2023-53444.html
  * https://www.suse.com/security/cve/CVE-2023-53446.html
  * https://www.suse.com/security/cve/CVE-2023-53447.html
  * https://www.suse.com/security/cve/CVE-2023-53448.html
  * https://www.suse.com/security/cve/CVE-2023-53451.html
  * https://www.suse.com/security/cve/CVE-2023-53454.html
  * https://www.suse.com/security/cve/CVE-2023-53456.html
  * https://www.suse.com/security/cve/CVE-2023-53457.html
  * https://www.suse.com/security/cve/CVE-2023-53461.html
  * https://www.suse.com/security/cve/CVE-2023-53462.html
  * https://www.suse.com/security/cve/CVE-2023-53463.html
  * https://www.suse.com/security/cve/CVE-2023-53465.html
  * https://www.suse.com/security/cve/CVE-2023-53472.html
  * https://www.suse.com/security/cve/CVE-2023-53479.html
  * https://www.suse.com/security/cve/CVE-2023-53480.html
  * https://www.suse.com/security/cve/CVE-2023-53485.html
  * https://www.suse.com/security/cve/CVE-2023-53487.html
  * https://www.suse.com/security/cve/CVE-2023-53488.html
  * https://www.suse.com/security/cve/CVE-2023-53490.html
  * https://www.suse.com/security/cve/CVE-2023-53491.html
  * https://www.suse.com/security/cve/CVE-2023-53492.html
  * https://www.suse.com/security/cve/CVE-2023-53493.html
  * https://www.suse.com/security/cve/CVE-2023-53495.html
  * https://www.suse.com/security/cve/CVE-2023-53496.html
  * https://www.suse.com/security/cve/CVE-2023-53500.html
  * https://www.suse.com/security/cve/CVE-2023-53501.html
  * https://www.suse.com/security/cve/CVE-2023-53504.html
  * https://www.suse.com/security/cve/CVE-2023-53505.html
  * https://www.suse.com/security/cve/CVE-2023-53507.html
  * https://www.suse.com/security/cve/CVE-2023-53508.html
  * https://www.suse.com/security/cve/CVE-2023-53510.html
  * https://www.suse.com/security/cve/CVE-2023-53515.html
  * https://www.suse.com/security/cve/CVE-2023-53516.html
  * https://www.suse.com/security/cve/CVE-2023-53518.html
  * https://www.suse.com/security/cve/CVE-2023-53519.html
  * https://www.suse.com/security/cve/CVE-2023-53520.html
  * https://www.suse.com/security/cve/CVE-2023-53523.html
  * https://www.suse.com/security/cve/CVE-2023-53526.html
  * https://www.suse.com/security/cve/CVE-2023-53527.html
  * https://www.suse.com/security/cve/CVE-2023-53528.html
  * https://www.suse.com/security/cve/CVE-2023-53530.html
  * https://www.suse.com/security/cve/CVE-2023-53531.html
  * https://www.suse.com/security/cve/CVE-2024-26584.html
  * https://www.suse.com/security/cve/CVE-2024-26661.html
  * https://www.suse.com/security/cve/CVE-2024-46733.html
  * https://www.suse.com/security/cve/CVE-2024-53125.html
  * https://www.suse.com/security/cve/CVE-2024-58090.html
  * https://www.suse.com/security/cve/CVE-2024-58238.html
  * https://www.suse.com/security/cve/CVE-2024-58239.html
  * https://www.suse.com/security/cve/CVE-2024-58240.html
  * https://www.suse.com/security/cve/CVE-2025-22022.html
  * https://www.suse.com/security/cve/CVE-2025-37885.html
  * https://www.suse.com/security/cve/CVE-2025-38006.html
  * https://www.suse.com/security/cve/CVE-2025-38075.html
  * https://www.suse.com/security/cve/CVE-2025-38103.html
  * https://www.suse.com/security/cve/CVE-2025-38119.html
  * https://www.suse.com/security/cve/CVE-2025-38125.html
  * https://www.suse.com/security/cve/CVE-2025-38146.html
  * https://www.suse.com/security/cve/CVE-2025-38160.html
  * https://www.suse.com/security/cve/CVE-2025-38184.html
  * https://www.suse.com/security/cve/CVE-2025-38185.html
  * https://www.suse.com/security/cve/CVE-2025-38190.html
  * https://www.suse.com/security/cve/CVE-2025-38201.html
  * https://www.suse.com/security/cve/CVE-2025-38205.html
  * https://www.suse.com/security/cve/CVE-2025-38208.html
  * https://www.suse.com/security/cve/CVE-2025-38234.html
  * https://www.suse.com/security/cve/CVE-2025-38245.html
  * https://www.suse.com/security/cve/CVE-2025-38251.html
  * https://www.suse.com/security/cve/CVE-2025-38255.html
  * https://www.suse.com/security/cve/CVE-2025-38263.html
  * https://www.suse.com/security/cve/CVE-2025-38351.html
  * https://www.suse.com/security/cve/CVE-2025-38360.html
  * https://www.suse.com/security/cve/CVE-2025-38402.html
  * https://www.suse.com/security/cve/CVE-2025-38408.html
  * https://www.suse.com/security/cve/CVE-2025-38418.html
  * https://www.suse.com/security/cve/CVE-2025-38419.html
  * https://www.suse.com/security/cve/CVE-2025-38439.html
  * https://www.suse.com/security/cve/CVE-2025-38441.html
  * https://www.suse.com/security/cve/CVE-2025-38444.html
  * https://www.suse.com/security/cve/CVE-2025-38445.html
  * https://www.suse.com/security/cve/CVE-2025-38456.html
  * https://www.suse.com/security/cve/CVE-2025-38458.html
  * https://www.suse.com/security/cve/CVE-2025-38459.html
  * https://www.suse.com/security/cve/CVE-2025-38464.html
  * https://www.suse.com/security/cve/CVE-2025-38465.html
  * https://www.suse.com/security/cve/CVE-2025-38466.html
  * https://www.suse.com/security/cve/CVE-2025-38472.html
  * https://www.suse.com/security/cve/CVE-2025-38488.html
  * https://www.suse.com/security/cve/CVE-2025-38490.html
  * https://www.suse.com/security/cve/CVE-2025-38491.html
  * https://www.suse.com/security/cve/CVE-2025-38499.html
  * https://www.suse.com/security/cve/CVE-2025-38500.html
  * https://www.suse.com/security/cve/CVE-2025-38503.html
  * https://www.suse.com/security/cve/CVE-2025-38506.html
  * https://www.suse.com/security/cve/CVE-2025-38510.html
  * https://www.suse.com/security/cve/CVE-2025-38512.html
  * https://www.suse.com/security/cve/CVE-2025-38513.html
  * https://www.suse.com/security/cve/CVE-2025-38514.html
  * https://www.suse.com/security/cve/CVE-2025-38515.html
  * https://www.suse.com/security/cve/CVE-2025-38516.html
  * https://www.suse.com/security/cve/CVE-2025-38520.html
  * https://www.suse.com/security/cve/CVE-2025-38524.html
  * https://www.suse.com/security/cve/CVE-2025-38526.html
  * https://www.suse.com/security/cve/CVE-2025-38527.html
  * https://www.suse.com/security/cve/CVE-2025-38528.html
  * https://www.suse.com/security/cve/CVE-2025-38529.html
  * https://www.suse.com/security/cve/CVE-2025-38530.html
  * https://www.suse.com/security/cve/CVE-2025-38531.html
  * https://www.suse.com/security/cve/CVE-2025-38533.html
  * https://www.suse.com/security/cve/CVE-2025-38535.html
  * https://www.suse.com/security/cve/CVE-2025-38537.html
  * https://www.suse.com/security/cve/CVE-2025-38538.html
  * https://www.suse.com/security/cve/CVE-2025-38540.html
  * https://www.suse.com/security/cve/CVE-2025-38541.html
  * https://www.suse.com/security/cve/CVE-2025-38543.html
  * https://www.suse.com/security/cve/CVE-2025-38544.html
  * https://www.suse.com/security/cve/CVE-2025-38546.html
  * https://www.suse.com/security/cve/CVE-2025-38548.html
  * https://www.suse.com/security/cve/CVE-2025-38550.html
  * https://www.suse.com/security/cve/CVE-2025-38553.html
  * https://www.suse.com/security/cve/CVE-2025-38555.html
  * https://www.suse.com/security/cve/CVE-2025-38556.html
  * https://www.suse.com/security/cve/CVE-2025-38560.html
  * https://www.suse.com/security/cve/CVE-2025-38563.html
  * https://www.suse.com/security/cve/CVE-2025-38565.html
  * https://www.suse.com/security/cve/CVE-2025-38566.html
  * https://www.suse.com/security/cve/CVE-2025-38568.html
  * https://www.suse.com/security/cve/CVE-2025-38571.html
  * https://www.suse.com/security/cve/CVE-2025-38572.html
  * https://www.suse.com/security/cve/CVE-2025-38574.html
  * https://www.suse.com/security/cve/CVE-2025-38576.html
  * https://www.suse.com/security/cve/CVE-2025-38581.html
  * https://www.suse.com/security/cve/CVE-2025-38582.html
  * https://www.suse.com/security/cve/CVE-2025-38583.html
  * https://www.suse.com/security/cve/CVE-2025-38584.html
  * https://www.suse.com/security/cve/CVE-2025-38585.html
  * https://www.suse.com/security/cve/CVE-2025-38587.html
  * https://www.suse.com/security/cve/CVE-2025-38588.html
  * https://www.suse.com/security/cve/CVE-2025-38590.html
  * https://www.suse.com/security/cve/CVE-2025-38591.html
  * https://www.suse.com/security/cve/CVE-2025-38593.html
  * https://www.suse.com/security/cve/CVE-2025-38595.html
  * https://www.suse.com/security/cve/CVE-2025-38597.html
  * https://www.suse.com/security/cve/CVE-2025-38601.html
  * https://www.suse.com/security/cve/CVE-2025-38602.html
  * https://www.suse.com/security/cve/CVE-2025-38604.html
  * https://www.suse.com/security/cve/CVE-2025-38605.html
  * https://www.suse.com/security/cve/CVE-2025-38608.html
  * https://www.suse.com/security/cve/CVE-2025-38609.html
  * https://www.suse.com/security/cve/CVE-2025-38610.html
  * https://www.suse.com/security/cve/CVE-2025-38612.html
  * https://www.suse.com/security/cve/CVE-2025-38614.html
  * https://www.suse.com/security/cve/CVE-2025-38616.html
  * https://www.suse.com/security/cve/CVE-2025-38617.html
  * https://www.suse.com/security/cve/CVE-2025-38618.html
  * https://www.suse.com/security/cve/CVE-2025-38621.html
  * https://www.suse.com/security/cve/CVE-2025-38622.html
  * https://www.suse.com/security/cve/CVE-2025-38623.html
  * https://www.suse.com/security/cve/CVE-2025-38624.html
  * https://www.suse.com/security/cve/CVE-2025-38630.html
  * https://www.suse.com/security/cve/CVE-2025-38632.html
  * https://www.suse.com/security/cve/CVE-2025-38634.html
  * https://www.suse.com/security/cve/CVE-2025-38635.html
  * https://www.suse.com/security/cve/CVE-2025-38639.html
  * https://www.suse.com/security/cve/CVE-2025-38640.html
  * https://www.suse.com/security/cve/CVE-2025-38643.html
  * https://www.suse.com/security/cve/CVE-2025-38644.html
  * https://www.suse.com/security/cve/CVE-2025-38645.html
  * https://www.suse.com/security/cve/CVE-2025-38646.html
  * https://www.suse.com/security/cve/CVE-2025-38650.html
  * https://www.suse.com/security/cve/CVE-2025-38656.html
  * https://www.suse.com/security/cve/CVE-2025-38659.html
  * https://www.suse.com/security/cve/CVE-2025-38660.html
  * https://www.suse.com/security/cve/CVE-2025-38663.html
  * https://www.suse.com/security/cve/CVE-2025-38664.html
  * https://www.suse.com/security/cve/CVE-2025-38665.html
  * https://www.suse.com/security/cve/CVE-2025-38668.html
  * https://www.suse.com/security/cve/CVE-2025-38670.html
  * https://www.suse.com/security/cve/CVE-2025-38671.html
  * https://www.suse.com/security/cve/CVE-2025-38676.html
  * https://www.suse.com/security/cve/CVE-2025-38678.html
  * https://www.suse.com/security/cve/CVE-2025-38679.html
  * https://www.suse.com/security/cve/CVE-2025-38680.html
  * https://www.suse.com/security/cve/CVE-2025-38681.html
  * https://www.suse.com/security/cve/CVE-2025-38683.html
  * https://www.suse.com/security/cve/CVE-2025-38684.html
  * https://www.suse.com/security/cve/CVE-2025-38685.html
  * https://www.suse.com/security/cve/CVE-2025-38687.html
  * https://www.suse.com/security/cve/CVE-2025-38691.html
  * https://www.suse.com/security/cve/CVE-2025-38692.html
  * https://www.suse.com/security/cve/CVE-2025-38693.html
  * https://www.suse.com/security/cve/CVE-2025-38694.html
  * https://www.suse.com/security/cve/CVE-2025-38695.html
  * https://www.suse.com/security/cve/CVE-2025-38697.html
  * https://www.suse.com/security/cve/CVE-2025-38698.html
  * https://www.suse.com/security/cve/CVE-2025-38701.html
  * https://www.suse.com/security/cve/CVE-2025-38702.html
  * https://www.suse.com/security/cve/CVE-2025-38705.html
  * https://www.suse.com/security/cve/CVE-2025-38706.html
  * https://www.suse.com/security/cve/CVE-2025-38709.html
  * https://www.suse.com/security/cve/CVE-2025-38712.html
  * https://www.suse.com/security/cve/CVE-2025-38713.html
  * https://www.suse.com/security/cve/CVE-2025-38714.html
  * https://www.suse.com/security/cve/CVE-2025-38715.html
  * https://www.suse.com/security/cve/CVE-2025-38721.html
  * https://www.suse.com/security/cve/CVE-2025-38722.html
  * https://www.suse.com/security/cve/CVE-2025-38724.html
  * https://www.suse.com/security/cve/CVE-2025-38725.html
  * https://www.suse.com/security/cve/CVE-2025-38727.html
  * https://www.suse.com/security/cve/CVE-2025-38729.html
  * https://www.suse.com/security/cve/CVE-2025-38730.html
  * https://www.suse.com/security/cve/CVE-2025-38732.html
  * https://www.suse.com/security/cve/CVE-2025-38734.html
  * https://www.suse.com/security/cve/CVE-2025-38735.html
  * https://www.suse.com/security/cve/CVE-2025-38736.html
  * https://www.suse.com/security/cve/CVE-2025-39675.html
  * https://www.suse.com/security/cve/CVE-2025-39677.html
  * https://www.suse.com/security/cve/CVE-2025-39678.html
  * https://www.suse.com/security/cve/CVE-2025-39679.html
  * https://www.suse.com/security/cve/CVE-2025-39681.html
  * https://www.suse.com/security/cve/CVE-2025-39682.html
  * https://www.suse.com/security/cve/CVE-2025-39684.html
  * https://www.suse.com/security/cve/CVE-2025-39685.html
  * https://www.suse.com/security/cve/CVE-2025-39686.html
  * https://www.suse.com/security/cve/CVE-2025-39691.html
  * https://www.suse.com/security/cve/CVE-2025-39693.html
  * https://www.suse.com/security/cve/CVE-2025-39694.html
  * https://www.suse.com/security/cve/CVE-2025-39701.html
  * https://www.suse.com/security/cve/CVE-2025-39703.html
  * https://www.suse.com/security/cve/CVE-2025-39705.html
  * https://www.suse.com/security/cve/CVE-2025-39706.html
  * https://www.suse.com/security/cve/CVE-2025-39709.html
  * https://www.suse.com/security/cve/CVE-2025-39710.html
  * https://www.suse.com/security/cve/CVE-2025-39713.html
  * https://www.suse.com/security/cve/CVE-2025-39714.html
  * https://www.suse.com/security/cve/CVE-2025-39718.html
  * https://www.suse.com/security/cve/CVE-2025-39719.html
  * https://www.suse.com/security/cve/CVE-2025-39721.html
  * https://www.suse.com/security/cve/CVE-2025-39724.html
  * https://www.suse.com/security/cve/CVE-2025-39726.html
  * https://www.suse.com/security/cve/CVE-2025-39730.html
  * https://www.suse.com/security/cve/CVE-2025-39732.html
  * https://www.suse.com/security/cve/CVE-2025-39738.html
  * https://www.suse.com/security/cve/CVE-2025-39739.html
  * https://www.suse.com/security/cve/CVE-2025-39742.html
  * https://www.suse.com/security/cve/CVE-2025-39743.html
  * https://www.suse.com/security/cve/CVE-2025-39744.html
  * https://www.suse.com/security/cve/CVE-2025-39746.html
  * https://www.suse.com/security/cve/CVE-2025-39749.html
  * https://www.suse.com/security/cve/CVE-2025-39750.html
  * https://www.suse.com/security/cve/CVE-2025-39751.html
  * https://www.suse.com/security/cve/CVE-2025-39754.html
  * https://www.suse.com/security/cve/CVE-2025-39757.html
  * https://www.suse.com/security/cve/CVE-2025-39758.html
  * https://www.suse.com/security/cve/CVE-2025-39759.html
  * https://www.suse.com/security/cve/CVE-2025-39760.html
  * https://www.suse.com/security/cve/CVE-2025-39761.html
  * https://www.suse.com/security/cve/CVE-2025-39763.html
  * https://www.suse.com/security/cve/CVE-2025-39764.html
  * https://www.suse.com/security/cve/CVE-2025-39766.html
  * https://www.suse.com/security/cve/CVE-2025-39770.html
  * https://www.suse.com/security/cve/CVE-2025-39772.html
  * https://www.suse.com/security/cve/CVE-2025-39773.html
  * https://www.suse.com/security/cve/CVE-2025-39782.html
  * https://www.suse.com/security/cve/CVE-2025-39783.html
  * https://www.suse.com/security/cve/CVE-2025-39787.html
  * https://www.suse.com/security/cve/CVE-2025-39790.html
  * https://www.suse.com/security/cve/CVE-2025-39797.html
  * https://www.suse.com/security/cve/CVE-2025-39798.html
  * https://www.suse.com/security/cve/CVE-2025-39800.html
  * https://www.suse.com/security/cve/CVE-2025-39801.html
  * https://www.suse.com/security/cve/CVE-2025-39806.html
  * https://www.suse.com/security/cve/CVE-2025-39808.html
  * https://www.suse.com/security/cve/CVE-2025-39810.html
  * https://www.suse.com/security/cve/CVE-2025-39823.html
  * https://www.suse.com/security/cve/CVE-2025-39824.html
  * https://www.suse.com/security/cve/CVE-2025-39825.html
  * https://www.suse.com/security/cve/CVE-2025-39826.html
  * https://www.suse.com/security/cve/CVE-2025-39827.html
  * https://www.suse.com/security/cve/CVE-2025-39828.html
  * https://www.suse.com/security/cve/CVE-2025-39832.html
  * https://www.suse.com/security/cve/CVE-2025-39833.html
  * https://www.suse.com/security/cve/CVE-2025-39835.html
  * https://www.suse.com/security/cve/CVE-2025-39838.html
  * https://www.suse.com/security/cve/CVE-2025-39839.html
  * https://www.suse.com/security/cve/CVE-2025-39842.html
  * https://www.suse.com/security/cve/CVE-2025-39844.html
  * https://www.suse.com/security/cve/CVE-2025-39845.html
  * https://www.suse.com/security/cve/CVE-2025-39846.html
  * https://www.suse.com/security/cve/CVE-2025-39847.html
  * https://www.suse.com/security/cve/CVE-2025-39848.html
  * https://www.suse.com/security/cve/CVE-2025-39849.html
  * https://www.suse.com/security/cve/CVE-2025-39850.html
  * https://www.suse.com/security/cve/CVE-2025-39853.html
  * https://www.suse.com/security/cve/CVE-2025-39854.html
  * https://www.suse.com/security/cve/CVE-2025-39857.html
  * https://www.suse.com/security/cve/CVE-2025-39860.html
  * https://www.suse.com/security/cve/CVE-2025-39861.html
  * https://www.suse.com/security/cve/CVE-2025-39863.html
  * https://www.suse.com/security/cve/CVE-2025-39864.html
  * https://www.suse.com/security/cve/CVE-2025-39865.html
  * https://www.suse.com/security/cve/CVE-2025-39869.html
  * https://www.suse.com/security/cve/CVE-2025-39870.html
  * https://www.suse.com/security/cve/CVE-2025-39871.html
  * https://www.suse.com/security/cve/CVE-2025-39873.html
  * https://www.suse.com/security/cve/CVE-2025-39882.html
  * https://www.suse.com/security/cve/CVE-2025-39885.html
  * https://www.suse.com/security/cve/CVE-2025-39889.html
  * https://www.suse.com/security/cve/CVE-2025-39891.html
  * https://www.suse.com/security/cve/CVE-2025-39907.html
  * https://www.suse.com/security/cve/CVE-2025-39920.html
  * https://www.suse.com/security/cve/CVE-2025-39923.html
  * https://www.suse.com/security/cve/CVE-2025-39925.html
  * https://www.suse.com/security/cve/CVE-2025-40300.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1012628
  * https://bugzilla.suse.com/show_bug.cgi?id=1194869
  * https://bugzilla.suse.com/show_bug.cgi?id=1213061
  * https://bugzilla.suse.com/show_bug.cgi?id=1213545
  * https://bugzilla.suse.com/show_bug.cgi?id=1213666
  * https://bugzilla.suse.com/show_bug.cgi?id=1214073
  * https://bugzilla.suse.com/show_bug.cgi?id=1214928
  * https://bugzilla.suse.com/show_bug.cgi?id=1214953
  * https://bugzilla.suse.com/show_bug.cgi?id=1215150
  * https://bugzilla.suse.com/show_bug.cgi?id=1215199
  * https://bugzilla.suse.com/show_bug.cgi?id=1215696
  * https://bugzilla.suse.com/show_bug.cgi?id=1216436
  * https://bugzilla.suse.com/show_bug.cgi?id=1216976
  * https://bugzilla.suse.com/show_bug.cgi?id=1218644
  * https://bugzilla.suse.com/show_bug.cgi?id=1220186
  * https://bugzilla.suse.com/show_bug.cgi?id=1220419
  * https://bugzilla.suse.com/show_bug.cgi?id=1221858
  * https://bugzilla.suse.com/show_bug.cgi?id=1222323
  * https://bugzilla.suse.com/show_bug.cgi?id=1229165
  * https://bugzilla.suse.com/show_bug.cgi?id=1230062
  * https://bugzilla.suse.com/show_bug.cgi?id=1230557
  * https://bugzilla.suse.com/show_bug.cgi?id=1230708
  * https://bugzilla.suse.com/show_bug.cgi?id=1233120
  * https://bugzilla.suse.com/show_bug.cgi?id=1234156
  * https://bugzilla.suse.com/show_bug.cgi?id=1236897
  * https://bugzilla.suse.com/show_bug.cgi?id=1237449
  * https://bugzilla.suse.com/show_bug.cgi?id=1237776
  * https://bugzilla.suse.com/show_bug.cgi?id=1240324
  * https://bugzilla.suse.com/show_bug.cgi?id=1240708
  * https://bugzilla.suse.com/show_bug.cgi?id=1240890
  * https://bugzilla.suse.com/show_bug.cgi?id=1241166
  * https://bugzilla.suse.com/show_bug.cgi?id=1241292
  * https://bugzilla.suse.com/show_bug.cgi?id=1241353
  * https://bugzilla.suse.com/show_bug.cgi?id=1241866
  * https://bugzilla.suse.com/show_bug.cgi?id=1242034
  * https://bugzilla.suse.com/show_bug.cgi?id=1242754
  * https://bugzilla.suse.com/show_bug.cgi?id=1242960
  * https://bugzilla.suse.com/show_bug.cgi?id=1243100
  * https://bugzilla.suse.com/show_bug.cgi?id=1243112
  * https://bugzilla.suse.com/show_bug.cgi?id=1244734
  * https://bugzilla.suse.com/show_bug.cgi?id=1244930
  * https://bugzilla.suse.com/show_bug.cgi?id=1245193
  * https://bugzilla.suse.com/show_bug.cgi?id=1245260
  * https://bugzilla.suse.com/show_bug.cgi?id=1245663
  * https://bugzilla.suse.com/show_bug.cgi?id=1245700
  * https://bugzilla.suse.com/show_bug.cgi?id=1245710
  * https://bugzilla.suse.com/show_bug.cgi?id=1245767
  * https://bugzilla.suse.com/show_bug.cgi?id=1245780
  * https://bugzilla.suse.com/show_bug.cgi?id=1245815
  * https://bugzilla.suse.com/show_bug.cgi?id=1245956
  * https://bugzilla.suse.com/show_bug.cgi?id=1245973
  * https://bugzilla.suse.com/show_bug.cgi?id=1245977
  * https://bugzilla.suse.com/show_bug.cgi?id=1246005
  * https://bugzilla.suse.com/show_bug.cgi?id=1246012
  * https://bugzilla.suse.com/show_bug.cgi?id=1246057
  * https://bugzilla.suse.com/show_bug.cgi?id=1246125
  * https://bugzilla.suse.com/show_bug.cgi?id=1246181
  * https://bugzilla.suse.com/show_bug.cgi?id=1246190
  * https://bugzilla.suse.com/show_bug.cgi?id=1246193
  * https://bugzilla.suse.com/show_bug.cgi?id=1246248
  * https://bugzilla.suse.com/show_bug.cgi?id=1246298
  * https://bugzilla.suse.com/show_bug.cgi?id=1246509
  * https://bugzilla.suse.com/show_bug.cgi?id=1246782
  * https://bugzilla.suse.com/show_bug.cgi?id=1247057
  * https://bugzilla.suse.com/show_bug.cgi?id=1247078
  * https://bugzilla.suse.com/show_bug.cgi?id=1247099
  * https://bugzilla.suse.com/show_bug.cgi?id=1247112
  * https://bugzilla.suse.com/show_bug.cgi?id=1247116
  * https://bugzilla.suse.com/show_bug.cgi?id=1247118
  * https://bugzilla.suse.com/show_bug.cgi?id=1247119
  * https://bugzilla.suse.com/show_bug.cgi?id=1247126
  * https://bugzilla.suse.com/show_bug.cgi?id=1247136
  * https://bugzilla.suse.com/show_bug.cgi?id=1247137
  * https://bugzilla.suse.com/show_bug.cgi?id=1247155
  * https://bugzilla.suse.com/show_bug.cgi?id=1247162
  * https://bugzilla.suse.com/show_bug.cgi?id=1247167
  * https://bugzilla.suse.com/show_bug.cgi?id=1247223
  * https://bugzilla.suse.com/show_bug.cgi?id=1247229
  * https://bugzilla.suse.com/show_bug.cgi?id=1247239
  * https://bugzilla.suse.com/show_bug.cgi?id=1247243
  * https://bugzilla.suse.com/show_bug.cgi?id=1247262
  * https://bugzilla.suse.com/show_bug.cgi?id=1247280
  * https://bugzilla.suse.com/show_bug.cgi?id=1247313
  * https://bugzilla.suse.com/show_bug.cgi?id=1247442
  * https://bugzilla.suse.com/show_bug.cgi?id=1247483
  * https://bugzilla.suse.com/show_bug.cgi?id=1247500
  * https://bugzilla.suse.com/show_bug.cgi?id=1247712
  * https://bugzilla.suse.com/show_bug.cgi?id=1247963
  * https://bugzilla.suse.com/show_bug.cgi?id=1247976
  * https://bugzilla.suse.com/show_bug.cgi?id=1248088
  * https://bugzilla.suse.com/show_bug.cgi?id=1248108
  * https://bugzilla.suse.com/show_bug.cgi?id=1248111
  * https://bugzilla.suse.com/show_bug.cgi?id=1248121
  * https://bugzilla.suse.com/show_bug.cgi?id=1248164
  * https://bugzilla.suse.com/show_bug.cgi?id=1248166
  * https://bugzilla.suse.com/show_bug.cgi?id=1248178
  * https://bugzilla.suse.com/show_bug.cgi?id=1248179
  * https://bugzilla.suse.com/show_bug.cgi?id=1248180
  * https://bugzilla.suse.com/show_bug.cgi?id=1248183
  * https://bugzilla.suse.com/show_bug.cgi?id=1248186
  * https://bugzilla.suse.com/show_bug.cgi?id=1248192
  * https://bugzilla.suse.com/show_bug.cgi?id=1248194
  * https://bugzilla.suse.com/show_bug.cgi?id=1248196
  * https://bugzilla.suse.com/show_bug.cgi?id=1248198
  * https://bugzilla.suse.com/show_bug.cgi?id=1248199
  * https://bugzilla.suse.com/show_bug.cgi?id=1248200
  * https://bugzilla.suse.com/show_bug.cgi?id=1248202
  * https://bugzilla.suse.com/show_bug.cgi?id=1248205
  * https://bugzilla.suse.com/show_bug.cgi?id=1248206
  * https://bugzilla.suse.com/show_bug.cgi?id=1248208
  * https://bugzilla.suse.com/show_bug.cgi?id=1248209
  * https://bugzilla.suse.com/show_bug.cgi?id=1248212
  * https://bugzilla.suse.com/show_bug.cgi?id=1248213
  * https://bugzilla.suse.com/show_bug.cgi?id=1248214
  * https://bugzilla.suse.com/show_bug.cgi?id=1248216
  * https://bugzilla.suse.com/show_bug.cgi?id=1248217
  * https://bugzilla.suse.com/show_bug.cgi?id=1248223
  * https://bugzilla.suse.com/show_bug.cgi?id=1248225
  * https://bugzilla.suse.com/show_bug.cgi?id=1248227
  * https://bugzilla.suse.com/show_bug.cgi?id=1248228
  * https://bugzilla.suse.com/show_bug.cgi?id=1248229
  * https://bugzilla.suse.com/show_bug.cgi?id=1248255
  * https://bugzilla.suse.com/show_bug.cgi?id=1248296
  * https://bugzilla.suse.com/show_bug.cgi?id=1248297
  * https://bugzilla.suse.com/show_bug.cgi?id=1248306
  * https://bugzilla.suse.com/show_bug.cgi?id=1248312
  * https://bugzilla.suse.com/show_bug.cgi?id=1248333
  * https://bugzilla.suse.com/show_bug.cgi?id=1248334
  * https://bugzilla.suse.com/show_bug.cgi?id=1248337
  * https://bugzilla.suse.com/show_bug.cgi?id=1248338
  * https://bugzilla.suse.com/show_bug.cgi?id=1248340
  * https://bugzilla.suse.com/show_bug.cgi?id=1248341
  * https://bugzilla.suse.com/show_bug.cgi?id=1248343
  * https://bugzilla.suse.com/show_bug.cgi?id=1248345
  * https://bugzilla.suse.com/show_bug.cgi?id=1248349
  * https://bugzilla.suse.com/show_bug.cgi?id=1248350
  * https://bugzilla.suse.com/show_bug.cgi?id=1248354
  * https://bugzilla.suse.com/show_bug.cgi?id=1248355
  * https://bugzilla.suse.com/show_bug.cgi?id=1248357
  * https://bugzilla.suse.com/show_bug.cgi?id=1248360
  * https://bugzilla.suse.com/show_bug.cgi?id=1248361
  * https://bugzilla.suse.com/show_bug.cgi?id=1248363
  * https://bugzilla.suse.com/show_bug.cgi?id=1248365
  * https://bugzilla.suse.com/show_bug.cgi?id=1248368
  * https://bugzilla.suse.com/show_bug.cgi?id=1248374
  * https://bugzilla.suse.com/show_bug.cgi?id=1248377
  * https://bugzilla.suse.com/show_bug.cgi?id=1248378
  * https://bugzilla.suse.com/show_bug.cgi?id=1248380
  * https://bugzilla.suse.com/show_bug.cgi?id=1248386
  * https://bugzilla.suse.com/show_bug.cgi?id=1248390
  * https://bugzilla.suse.com/show_bug.cgi?id=1248392
  * https://bugzilla.suse.com/show_bug.cgi?id=1248395
  * https://bugzilla.suse.com/show_bug.cgi?id=1248399
  * https://bugzilla.suse.com/show_bug.cgi?id=1248401
  * https://bugzilla.suse.com/show_bug.cgi?id=1248511
  * https://bugzilla.suse.com/show_bug.cgi?id=1248512
  * https://bugzilla.suse.com/show_bug.cgi?id=1248573
  * https://bugzilla.suse.com/show_bug.cgi?id=1248575
  * https://bugzilla.suse.com/show_bug.cgi?id=1248577
  * https://bugzilla.suse.com/show_bug.cgi?id=1248609
  * https://bugzilla.suse.com/show_bug.cgi?id=1248610
  * https://bugzilla.suse.com/show_bug.cgi?id=1248614
  * https://bugzilla.suse.com/show_bug.cgi?id=1248617
  * https://bugzilla.suse.com/show_bug.cgi?id=1248619
  * https://bugzilla.suse.com/show_bug.cgi?id=1248621
  * https://bugzilla.suse.com/show_bug.cgi?id=1248622
  * https://bugzilla.suse.com/show_bug.cgi?id=1248626
  * https://bugzilla.suse.com/show_bug.cgi?id=1248628
  * https://bugzilla.suse.com/show_bug.cgi?id=1248634
  * https://bugzilla.suse.com/show_bug.cgi?id=1248636
  * https://bugzilla.suse.com/show_bug.cgi?id=1248639
  * https://bugzilla.suse.com/show_bug.cgi?id=1248643
  * https://bugzilla.suse.com/show_bug.cgi?id=1248648
  * https://bugzilla.suse.com/show_bug.cgi?id=1248652
  * https://bugzilla.suse.com/show_bug.cgi?id=1248655
  * https://bugzilla.suse.com/show_bug.cgi?id=1248666
  * https://bugzilla.suse.com/show_bug.cgi?id=1248669
  * https://bugzilla.suse.com/show_bug.cgi?id=1248674
  * https://bugzilla.suse.com/show_bug.cgi?id=1248681
  * https://bugzilla.suse.com/show_bug.cgi?id=1248733
  * https://bugzilla.suse.com/show_bug.cgi?id=1248734
  * https://bugzilla.suse.com/show_bug.cgi?id=1248735
  * https://bugzilla.suse.com/show_bug.cgi?id=1248746
  * https://bugzilla.suse.com/show_bug.cgi?id=1248748
  * https://bugzilla.suse.com/show_bug.cgi?id=1248775
  * https://bugzilla.suse.com/show_bug.cgi?id=1248847
  * https://bugzilla.suse.com/show_bug.cgi?id=1249022
  * https://bugzilla.suse.com/show_bug.cgi?id=1249122
  * https://bugzilla.suse.com/show_bug.cgi?id=1249123
  * https://bugzilla.suse.com/show_bug.cgi?id=1249124
  * https://bugzilla.suse.com/show_bug.cgi?id=1249125
  * https://bugzilla.suse.com/show_bug.cgi?id=1249126
  * https://bugzilla.suse.com/show_bug.cgi?id=1249143
  * https://bugzilla.suse.com/show_bug.cgi?id=1249156
  * https://bugzilla.suse.com/show_bug.cgi?id=1249159
  * https://bugzilla.suse.com/show_bug.cgi?id=1249163
  * https://bugzilla.suse.com/show_bug.cgi?id=1249164
  * https://bugzilla.suse.com/show_bug.cgi?id=1249166
  * https://bugzilla.suse.com/show_bug.cgi?id=1249169
  * https://bugzilla.suse.com/show_bug.cgi?id=1249170
  * https://bugzilla.suse.com/show_bug.cgi?id=1249172
  * https://bugzilla.suse.com/show_bug.cgi?id=1249176
  * https://bugzilla.suse.com/show_bug.cgi?id=1249177
  * https://bugzilla.suse.com/show_bug.cgi?id=1249186
  * https://bugzilla.suse.com/show_bug.cgi?id=1249190
  * https://bugzilla.suse.com/show_bug.cgi?id=1249194
  * https://bugzilla.suse.com/show_bug.cgi?id=1249195
  * https://bugzilla.suse.com/show_bug.cgi?id=1249196
  * https://bugzilla.suse.com/show_bug.cgi?id=1249199
  * https://bugzilla.suse.com/show_bug.cgi?id=1249200
  * https://bugzilla.suse.com/show_bug.cgi?id=1249202
  * https://bugzilla.suse.com/show_bug.cgi?id=1249203
  * https://bugzilla.suse.com/show_bug.cgi?id=1249204
  * https://bugzilla.suse.com/show_bug.cgi?id=1249206
  * https://bugzilla.suse.com/show_bug.cgi?id=1249215
  * https://bugzilla.suse.com/show_bug.cgi?id=1249220
  * https://bugzilla.suse.com/show_bug.cgi?id=1249221
  * https://bugzilla.suse.com/show_bug.cgi?id=1249254
  * https://bugzilla.suse.com/show_bug.cgi?id=1249255
  * https://bugzilla.suse.com/show_bug.cgi?id=1249257
  * https://bugzilla.suse.com/show_bug.cgi?id=1249258
  * https://bugzilla.suse.com/show_bug.cgi?id=1249260
  * https://bugzilla.suse.com/show_bug.cgi?id=1249262
  * https://bugzilla.suse.com/show_bug.cgi?id=1249263
  * https://bugzilla.suse.com/show_bug.cgi?id=1249265
  * https://bugzilla.suse.com/show_bug.cgi?id=1249266
  * https://bugzilla.suse.com/show_bug.cgi?id=1249271
  * https://bugzilla.suse.com/show_bug.cgi?id=1249272
  * https://bugzilla.suse.com/show_bug.cgi?id=1249273
  * https://bugzilla.suse.com/show_bug.cgi?id=1249278
  * https://bugzilla.suse.com/show_bug.cgi?id=1249279
  * https://bugzilla.suse.com/show_bug.cgi?id=1249281
  * https://bugzilla.suse.com/show_bug.cgi?id=1249282
  * https://bugzilla.suse.com/show_bug.cgi?id=1249284
  * https://bugzilla.suse.com/show_bug.cgi?id=1249285
  * https://bugzilla.suse.com/show_bug.cgi?id=1249288
  * https://bugzilla.suse.com/show_bug.cgi?id=1249290
  * https://bugzilla.suse.com/show_bug.cgi?id=1249292
  * https://bugzilla.suse.com/show_bug.cgi?id=1249295
  * https://bugzilla.suse.com/show_bug.cgi?id=1249296
  * https://bugzilla.suse.com/show_bug.cgi?id=1249299
  * https://bugzilla.suse.com/show_bug.cgi?id=1249300
  * https://bugzilla.suse.com/show_bug.cgi?id=1249303
  * https://bugzilla.suse.com/show_bug.cgi?id=1249304
  * https://bugzilla.suse.com/show_bug.cgi?id=1249305
  * https://bugzilla.suse.com/show_bug.cgi?id=1249308
  * https://bugzilla.suse.com/show_bug.cgi?id=1249312
  * https://bugzilla.suse.com/show_bug.cgi?id=1249315
  * https://bugzilla.suse.com/show_bug.cgi?id=1249318
  * https://bugzilla.suse.com/show_bug.cgi?id=1249321
  * https://bugzilla.suse.com/show_bug.cgi?id=1249323
  * https://bugzilla.suse.com/show_bug.cgi?id=1249324
  * https://bugzilla.suse.com/show_bug.cgi?id=1249334
  * https://bugzilla.suse.com/show_bug.cgi?id=1249338
  * https://bugzilla.suse.com/show_bug.cgi?id=1249346
  * https://bugzilla.suse.com/show_bug.cgi?id=1249374
  * https://bugzilla.suse.com/show_bug.cgi?id=1249413
  * https://bugzilla.suse.com/show_bug.cgi?id=1249479
  * https://bugzilla.suse.com/show_bug.cgi?id=1249481
  * https://bugzilla.suse.com/show_bug.cgi?id=1249482
  * https://bugzilla.suse.com/show_bug.cgi?id=1249486
  * https://bugzilla.suse.com/show_bug.cgi?id=1249488
  * https://bugzilla.suse.com/show_bug.cgi?id=1249489
  * https://bugzilla.suse.com/show_bug.cgi?id=1249490
  * https://bugzilla.suse.com/show_bug.cgi?id=1249494
  * https://bugzilla.suse.com/show_bug.cgi?id=1249504
  * https://bugzilla.suse.com/show_bug.cgi?id=1249506
  * https://bugzilla.suse.com/show_bug.cgi?id=1249508
  * https://bugzilla.suse.com/show_bug.cgi?id=1249510
  * https://bugzilla.suse.com/show_bug.cgi?id=1249513
  * https://bugzilla.suse.com/show_bug.cgi?id=1249515
  * https://bugzilla.suse.com/show_bug.cgi?id=1249516
  * https://bugzilla.suse.com/show_bug.cgi?id=1249522
  * https://bugzilla.suse.com/show_bug.cgi?id=1249523
  * https://bugzilla.suse.com/show_bug.cgi?id=1249524
  * https://bugzilla.suse.com/show_bug.cgi?id=1249526
  * https://bugzilla.suse.com/show_bug.cgi?id=1249533
  * https://bugzilla.suse.com/show_bug.cgi?id=1249538
  * https://bugzilla.suse.com/show_bug.cgi?id=1249540
  * https://bugzilla.suse.com/show_bug.cgi?id=1249542
  * https://bugzilla.suse.com/show_bug.cgi?id=1249545
  * https://bugzilla.suse.com/show_bug.cgi?id=1249548
  * https://bugzilla.suse.com/show_bug.cgi?id=1249554
  * https://bugzilla.suse.com/show_bug.cgi?id=1249598
  * https://bugzilla.suse.com/show_bug.cgi?id=1249604
  * https://bugzilla.suse.com/show_bug.cgi?id=1249608
  * https://bugzilla.suse.com/show_bug.cgi?id=1249615
  * https://bugzilla.suse.com/show_bug.cgi?id=1249640
  * https://bugzilla.suse.com/show_bug.cgi?id=1249641
  * https://bugzilla.suse.com/show_bug.cgi?id=1249642
  * https://bugzilla.suse.com/show_bug.cgi?id=1249658
  * https://bugzilla.suse.com/show_bug.cgi?id=1249662
  * https://bugzilla.suse.com/show_bug.cgi?id=1249672
  * https://bugzilla.suse.com/show_bug.cgi?id=1249673
  * https://bugzilla.suse.com/show_bug.cgi?id=1249677
  * https://bugzilla.suse.com/show_bug.cgi?id=1249678
  * https://bugzilla.suse.com/show_bug.cgi?id=1249679
  * https://bugzilla.suse.com/show_bug.cgi?id=1249682
  * https://bugzilla.suse.com/show_bug.cgi?id=1249687
  * https://bugzilla.suse.com/show_bug.cgi?id=1249698
  * https://bugzilla.suse.com/show_bug.cgi?id=1249707
  * https://bugzilla.suse.com/show_bug.cgi?id=1249712
  * https://bugzilla.suse.com/show_bug.cgi?id=1249730
  * https://bugzilla.suse.com/show_bug.cgi?id=1249756
  * https://bugzilla.suse.com/show_bug.cgi?id=1249758
  * https://bugzilla.suse.com/show_bug.cgi?id=1249761
  * https://bugzilla.suse.com/show_bug.cgi?id=1249762
  * https://bugzilla.suse.com/show_bug.cgi?id=1249768
  * https://bugzilla.suse.com/show_bug.cgi?id=1249770
  * https://bugzilla.suse.com/show_bug.cgi?id=1249774
  * https://bugzilla.suse.com/show_bug.cgi?id=1249779
  * https://bugzilla.suse.com/show_bug.cgi?id=1249780
  * https://bugzilla.suse.com/show_bug.cgi?id=1249785
  * https://bugzilla.suse.com/show_bug.cgi?id=1249787
  * https://bugzilla.suse.com/show_bug.cgi?id=1249795
  * https://bugzilla.suse.com/show_bug.cgi?id=1249815
  * https://bugzilla.suse.com/show_bug.cgi?id=1249820
  * https://bugzilla.suse.com/show_bug.cgi?id=1249823
  * https://bugzilla.suse.com/show_bug.cgi?id=1249824
  * https://bugzilla.suse.com/show_bug.cgi?id=1249825
  * https://bugzilla.suse.com/show_bug.cgi?id=1249826
  * https://bugzilla.suse.com/show_bug.cgi?id=1249833
  * https://bugzilla.suse.com/show_bug.cgi?id=1249842
  * https://bugzilla.suse.com/show_bug.cgi?id=1249845
  * https://bugzilla.suse.com/show_bug.cgi?id=1249849
  * https://bugzilla.suse.com/show_bug.cgi?id=1249850
  * https://bugzilla.suse.com/show_bug.cgi?id=1249853
  * https://bugzilla.suse.com/show_bug.cgi?id=1249856
  * https://bugzilla.suse.com/show_bug.cgi?id=1249861
  * https://bugzilla.suse.com/show_bug.cgi?id=1249863
  * https://bugzilla.suse.com/show_bug.cgi?id=1249864
  * https://bugzilla.suse.com/show_bug.cgi?id=1249865
  * https://bugzilla.suse.com/show_bug.cgi?id=1249866
  * https://bugzilla.suse.com/show_bug.cgi?id=1249869
  * https://bugzilla.suse.com/show_bug.cgi?id=1249870
  * https://bugzilla.suse.com/show_bug.cgi?id=1249880
  * https://bugzilla.suse.com/show_bug.cgi?id=1249883
  * https://bugzilla.suse.com/show_bug.cgi?id=1249888
  * https://bugzilla.suse.com/show_bug.cgi?id=1249894
  * https://bugzilla.suse.com/show_bug.cgi?id=1249896
  * https://bugzilla.suse.com/show_bug.cgi?id=1249897
  * https://bugzilla.suse.com/show_bug.cgi?id=1249901
  * https://bugzilla.suse.com/show_bug.cgi?id=1249911
  * https://bugzilla.suse.com/show_bug.cgi?id=1249917
  * https://bugzilla.suse.com/show_bug.cgi?id=1249919
  * https://bugzilla.suse.com/show_bug.cgi?id=1249923
  * https://bugzilla.suse.com/show_bug.cgi?id=1249926
  * https://bugzilla.suse.com/show_bug.cgi?id=1249938
  * https://bugzilla.suse.com/show_bug.cgi?id=1249949
  * https://bugzilla.suse.com/show_bug.cgi?id=1249950
  * https://bugzilla.suse.com/show_bug.cgi?id=1249952
  * https://bugzilla.suse.com/show_bug.cgi?id=1249975
  * https://bugzilla.suse.com/show_bug.cgi?id=1249979
  * https://bugzilla.suse.com/show_bug.cgi?id=1249984
  * https://bugzilla.suse.com/show_bug.cgi?id=1249988
  * https://bugzilla.suse.com/show_bug.cgi?id=1249990
  * https://bugzilla.suse.com/show_bug.cgi?id=1249993
  * https://bugzilla.suse.com/show_bug.cgi?id=1249994
  * https://bugzilla.suse.com/show_bug.cgi?id=1249997
  * https://bugzilla.suse.com/show_bug.cgi?id=1250002
  * https://bugzilla.suse.com/show_bug.cgi?id=1250004
  * https://bugzilla.suse.com/show_bug.cgi?id=1250006
  * https://bugzilla.suse.com/show_bug.cgi?id=1250007
  * https://bugzilla.suse.com/show_bug.cgi?id=1250012
  * https://bugzilla.suse.com/show_bug.cgi?id=1250022
  * https://bugzilla.suse.com/show_bug.cgi?id=1250024
  * https://bugzilla.suse.com/show_bug.cgi?id=1250025
  * https://bugzilla.suse.com/show_bug.cgi?id=1250028
  * https://bugzilla.suse.com/show_bug.cgi?id=1250029
  * https://bugzilla.suse.com/show_bug.cgi?id=1250035
  * https://bugzilla.suse.com/show_bug.cgi?id=1250049
  * https://bugzilla.suse.com/show_bug.cgi?id=1250055
  * https://bugzilla.suse.com/show_bug.cgi?id=1250057
  * https://bugzilla.suse.com/show_bug.cgi?id=1250058
  * https://bugzilla.suse.com/show_bug.cgi?id=1250062
  * https://bugzilla.suse.com/show_bug.cgi?id=1250063
  * https://bugzilla.suse.com/show_bug.cgi?id=1250065
  * https://bugzilla.suse.com/show_bug.cgi?id=1250066
  * https://bugzilla.suse.com/show_bug.cgi?id=1250067
  * https://bugzilla.suse.com/show_bug.cgi?id=1250069
  * https://bugzilla.suse.com/show_bug.cgi?id=1250070
  * https://bugzilla.suse.com/show_bug.cgi?id=1250073
  * https://bugzilla.suse.com/show_bug.cgi?id=1250074
  * https://bugzilla.suse.com/show_bug.cgi?id=1250088
  * https://bugzilla.suse.com/show_bug.cgi?id=1250089
  * https://bugzilla.suse.com/show_bug.cgi?id=1250106
  * https://bugzilla.suse.com/show_bug.cgi?id=1250112
  * https://bugzilla.suse.com/show_bug.cgi?id=1250117
  * https://bugzilla.suse.com/show_bug.cgi?id=1250120
  * https://bugzilla.suse.com/show_bug.cgi?id=1250125
  * https://bugzilla.suse.com/show_bug.cgi?id=1250127
  * https://bugzilla.suse.com/show_bug.cgi?id=1250128
  * https://bugzilla.suse.com/show_bug.cgi?id=1250145
  * https://bugzilla.suse.com/show_bug.cgi?id=1250150
  * https://bugzilla.suse.com/show_bug.cgi?id=1250156
  * https://bugzilla.suse.com/show_bug.cgi?id=1250157
  * https://bugzilla.suse.com/show_bug.cgi?id=1250161
  * https://bugzilla.suse.com/show_bug.cgi?id=1250163
  * https://bugzilla.suse.com/show_bug.cgi?id=1250166
  * https://bugzilla.suse.com/show_bug.cgi?id=1250167
  * https://bugzilla.suse.com/show_bug.cgi?id=1250169
  * https://bugzilla.suse.com/show_bug.cgi?id=1250171
  * https://bugzilla.suse.com/show_bug.cgi?id=1250177
  * https://bugzilla.suse.com/show_bug.cgi?id=1250179
  * https://bugzilla.suse.com/show_bug.cgi?id=1250180
  * https://bugzilla.suse.com/show_bug.cgi?id=1250186
  * https://bugzilla.suse.com/show_bug.cgi?id=1250196
  * https://bugzilla.suse.com/show_bug.cgi?id=1250198
  * https://bugzilla.suse.com/show_bug.cgi?id=1250199
  * https://bugzilla.suse.com/show_bug.cgi?id=1250201
  * https://bugzilla.suse.com/show_bug.cgi?id=1250203
  * https://bugzilla.suse.com/show_bug.cgi?id=1250204
  * https://bugzilla.suse.com/show_bug.cgi?id=1250205
  * https://bugzilla.suse.com/show_bug.cgi?id=1250206
  * https://bugzilla.suse.com/show_bug.cgi?id=1250208
  * https://bugzilla.suse.com/show_bug.cgi?id=1250241
  * https://bugzilla.suse.com/show_bug.cgi?id=1250242
  * https://bugzilla.suse.com/show_bug.cgi?id=1250243
  * https://bugzilla.suse.com/show_bug.cgi?id=1250247
  * https://bugzilla.suse.com/show_bug.cgi?id=1250249
  * https://bugzilla.suse.com/show_bug.cgi?id=1250251
  * https://bugzilla.suse.com/show_bug.cgi?id=1250262
  * https://bugzilla.suse.com/show_bug.cgi?id=1250263
  * https://bugzilla.suse.com/show_bug.cgi?id=1250266
  * https://bugzilla.suse.com/show_bug.cgi?id=1250267
  * https://bugzilla.suse.com/show_bug.cgi?id=1250268
  * https://bugzilla.suse.com/show_bug.cgi?id=1250275
  * https://bugzilla.suse.com/show_bug.cgi?id=1250276
  * https://bugzilla.suse.com/show_bug.cgi?id=1250281
  * https://bugzilla.suse.com/show_bug.cgi?id=1250290
  * https://bugzilla.suse.com/show_bug.cgi?id=1250291
  * https://bugzilla.suse.com/show_bug.cgi?id=1250292
  * https://bugzilla.suse.com/show_bug.cgi?id=1250294
  * https://bugzilla.suse.com/show_bug.cgi?id=1250297
  * https://bugzilla.suse.com/show_bug.cgi?id=1250298
  * https://bugzilla.suse.com/show_bug.cgi?id=1250313
  * https://bugzilla.suse.com/show_bug.cgi?id=1250319
  * https://bugzilla.suse.com/show_bug.cgi?id=1250323
  * https://bugzilla.suse.com/show_bug.cgi?id=1250325
  * https://bugzilla.suse.com/show_bug.cgi?id=1250329
  * https://bugzilla.suse.com/show_bug.cgi?id=1250336
  * https://bugzilla.suse.com/show_bug.cgi?id=1250337
  * https://bugzilla.suse.com/show_bug.cgi?id=1250344
  * https://bugzilla.suse.com/show_bug.cgi?id=1250358
  * https://bugzilla.suse.com/show_bug.cgi?id=1250365
  * https://bugzilla.suse.com/show_bug.cgi?id=1250371
  * https://bugzilla.suse.com/show_bug.cgi?id=1250377
  * https://bugzilla.suse.com/show_bug.cgi?id=1250384
  * https://bugzilla.suse.com/show_bug.cgi?id=1250389
  * https://bugzilla.suse.com/show_bug.cgi?id=1250395
  * https://bugzilla.suse.com/show_bug.cgi?id=1250397
  * https://bugzilla.suse.com/show_bug.cgi?id=1250402
  * https://bugzilla.suse.com/show_bug.cgi?id=1250406
  * https://bugzilla.suse.com/show_bug.cgi?id=1250407
  * https://bugzilla.suse.com/show_bug.cgi?id=1250426
  * https://bugzilla.suse.com/show_bug.cgi?id=1250450
  * https://bugzilla.suse.com/show_bug.cgi?id=1250459
  * https://bugzilla.suse.com/show_bug.cgi?id=1250519
  * https://bugzilla.suse.com/show_bug.cgi?id=1250522
  * https://bugzilla.suse.com/show_bug.cgi?id=1250530
  * https://bugzilla.suse.com/show_bug.cgi?id=1250655
  * https://bugzilla.suse.com/show_bug.cgi?id=1250712
  * https://bugzilla.suse.com/show_bug.cgi?id=1250713
  * https://bugzilla.suse.com/show_bug.cgi?id=1250732
  * https://bugzilla.suse.com/show_bug.cgi?id=1250736
  * https://bugzilla.suse.com/show_bug.cgi?id=1250741
  * https://bugzilla.suse.com/show_bug.cgi?id=1250759
  * https://bugzilla.suse.com/show_bug.cgi?id=1250763
  * https://bugzilla.suse.com/show_bug.cgi?id=1250765
  * https://bugzilla.suse.com/show_bug.cgi?id=1250807
  * https://bugzilla.suse.com/show_bug.cgi?id=1250808
  * https://bugzilla.suse.com/show_bug.cgi?id=1250809
  * https://bugzilla.suse.com/show_bug.cgi?id=1250812
  * https://bugzilla.suse.com/show_bug.cgi?id=1250813
  * https://bugzilla.suse.com/show_bug.cgi?id=1250815
  * https://bugzilla.suse.com/show_bug.cgi?id=1250816
  * https://bugzilla.suse.com/show_bug.cgi?id=1250820
  * https://bugzilla.suse.com/show_bug.cgi?id=1250823
  * https://bugzilla.suse.com/show_bug.cgi?id=1250825
  * https://bugzilla.suse.com/show_bug.cgi?id=1250827
  * https://bugzilla.suse.com/show_bug.cgi?id=1250830
  * https://bugzilla.suse.com/show_bug.cgi?id=1250831
  * https://bugzilla.suse.com/show_bug.cgi?id=1250837
  * https://bugzilla.suse.com/show_bug.cgi?id=1250841
  * https://bugzilla.suse.com/show_bug.cgi?id=1250861
  * https://bugzilla.suse.com/show_bug.cgi?id=1250863
  * https://bugzilla.suse.com/show_bug.cgi?id=1250867
  * https://bugzilla.suse.com/show_bug.cgi?id=1250872
  * https://bugzilla.suse.com/show_bug.cgi?id=1250873
  * https://bugzilla.suse.com/show_bug.cgi?id=1250878
  * https://bugzilla.suse.com/show_bug.cgi?id=1250905
  * https://bugzilla.suse.com/show_bug.cgi?id=1250907
  * https://bugzilla.suse.com/show_bug.cgi?id=1250917
  * https://bugzilla.suse.com/show_bug.cgi?id=1250918
  * https://bugzilla.suse.com/show_bug.cgi?id=1250923
  * https://bugzilla.suse.com/show_bug.cgi?id=1250926
  * https://bugzilla.suse.com/show_bug.cgi?id=1250928
  * https://bugzilla.suse.com/show_bug.cgi?id=1250929
  * https://bugzilla.suse.com/show_bug.cgi?id=1250930
  * https://bugzilla.suse.com/show_bug.cgi?id=1250931
  * https://bugzilla.suse.com/show_bug.cgi?id=1250941
  * https://bugzilla.suse.com/show_bug.cgi?id=1250942
  * https://bugzilla.suse.com/show_bug.cgi?id=1250949
  * https://bugzilla.suse.com/show_bug.cgi?id=1250952
  * https://bugzilla.suse.com/show_bug.cgi?id=1250957
  * https://bugzilla.suse.com/show_bug.cgi?id=1250964
  * https://jira.suse.com/browse/PED-13343
  * https://jira.suse.com/browse/PED-13345

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20251017/ef9fd1fc/attachment-0001.htm>


More information about the sle-updates mailing list