Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:01919-1
Release Date: 2025-06-12T06:29:09Z
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
  • CVE-2023-53034 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53034 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-27018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-27018 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
  • CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  • CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
  • CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
  • CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-35840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-43869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
  • CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  • CVE-2024-46763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-46763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-46865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-46865 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50083 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50083 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50162 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-50162 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50163 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-50163 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  • CVE-2024-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  • CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  • CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  • CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-57924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-57924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58001 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2024-58001 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-58070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58088 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58088 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58096 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2024-58097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-58097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-58097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
  • CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
  • CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21683 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-21683 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2025-21683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21696 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  • CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  • CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21812 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21812 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21833 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21867 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-21906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21926 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21930 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21936 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21941 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21943 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21943 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21950 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21956 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  • CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  • CVE-2025-21957 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21960 ( SUSE ): 0.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  • CVE-2025-21960 ( SUSE ): 0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N
  • CVE-2025-21961 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21961 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21962 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21962 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2025-21962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21963 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21964 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21966 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21968 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21968 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21980 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21981 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-21981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2025-21981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21985 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21991 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-21995 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-22001 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22001 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2025-22001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22004 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22004 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-22004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22015 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22016 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22017 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22018 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22020 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22020 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-22020 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2025-22025 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-22025 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2025-22027 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22027 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22027 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22029 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22029 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22033 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22036 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-22044 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22045 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22050 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22055 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22055 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-22058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • CVE-2025-22060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22062 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22065 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22065 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22080 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22086 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-22090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22097 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22097 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2025-22097 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-22102 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22102 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2025-22105 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22106 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22107 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  • CVE-2025-22108 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-22108 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  • CVE-2025-22109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22115 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22115 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-22116 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-22116 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  • CVE-2025-22121 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-22128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-22128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
  • CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
  • CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
  • CVE-2025-23129 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-23129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-23131 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-23131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-23133 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-23133 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2025-23136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-23136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-23136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37785 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37860 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-37860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
  • Confidential Computing Module 15-SP6
  • SUSE Linux Enterprise Server 15 SP6
  • SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 433 vulnerabilities, contains seven features and has 138 security fixes can now be installed.

Description:

The SUSE Linux Enterprise 15 SP6 Confidential Computing kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644).
  • CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching (bsc#1242006).
  • CVE-2024-35840: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (bsc#1224597).
  • CVE-2024-35910: tcp: properly terminate timers for kernel sockets (bsc#1224489).
  • CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858).
  • CVE-2024-43869: perf: Fix hang while freeing sigtrap event (bsc#1229491).
  • CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581).
  • CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769).
  • CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711).
  • CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712).
  • CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733).
  • CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow (bsc#1232812).
  • CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949).
  • CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912).
  • CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910).
  • CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389).
  • CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060).
  • CVE-2024-50162: bpf: selftests: send packet to devmap redirect XDP (bsc#1233075).
  • CVE-2024-50163: bpf: Make sure internal and UAPI bpf_redirect flags do not overlap (bsc#1233098).
  • CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192).
  • CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483).
  • CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).
  • CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074).
  • CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154).
  • CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157).
  • CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222).
  • CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894).
  • CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
  • CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895).
  • CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715).
  • CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992).
  • CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729).
  • CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524).
  • CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436).
  • CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455).
  • CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589).
  • CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591).
  • CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936).
  • CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621).
  • CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637).
  • CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973).
  • CVE-2024-57924: fs: relax assertions on failure to encode file handles (bsc#1236086).
  • CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333).
  • CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532).
  • CVE-2024-57979: kABI workaround for pps changes (bsc#1238521).
  • CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901).
  • CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076).
  • CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104).
  • CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990).
  • CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997).
  • CVE-2024-58068: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized (bsc#1238961).
  • CVE-2024-58070: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT (bsc#1238983).
  • CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970).
  • CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036).
  • CVE-2024-58088: bpf: Fix deadlock when freeing cgroup storage (bsc#1239510).
  • CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111).
  • CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142).
  • CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206).
  • CVE-2025-21683: bpf: Fix bpf_sk_select_reuseport() memory leak (bsc#1236704).
  • CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029).
  • CVE-2025-21696: mm: clear uffd-wp PTE/PMD state on mremap() (bsc#1237111).
  • CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164).
  • CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).
  • CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).
  • CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525).
  • CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528).
  • CVE-2025-21707: mptcp: consolidate suboption status (bsc#1238862).
  • CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889).
  • CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891).
  • CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860).
  • CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863).
  • CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877).
  • CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879).
  • CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874).
  • CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494).
  • CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506).
  • CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875).
  • CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496).
  • CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882).
  • CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack() (bsc#1238737).
  • CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738).
  • CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763).
  • CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775).
  • CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780).
  • CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897).
  • CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906).
  • CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754).
  • CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509).
  • CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels (bsc#1238714).
  • CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774).
  • CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753).
  • CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).
  • CVE-2025-21792: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt (bsc#1238745).
  • CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759).
  • CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739).
  • CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751).
  • CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746).
  • CVE-2025-21808: net: xdp: Disallow attaching device-bound programs in generic mode (bsc#1238742).
  • CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471).
  • CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473).
  • CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971).
  • CVE-2025-21833: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE (bsc#1239108).
  • CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066).
  • CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512).
  • CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479).
  • CVE-2025-21854: selftest/bpf: Add vsock test for sockmap rejecting unconnected (bsc#1239470).
  • CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486).
  • CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478).
  • CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483).
  • CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474).
  • CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475).
  • CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482).
  • CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481).
  • CVE-2025-21867: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() (bsc#1240181).
  • CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191).
  • CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183).
  • CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184).
  • CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168).
  • CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185).
  • CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189).
  • CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171).
  • CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176).
  • CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167).
  • CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173).
  • CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186).
  • CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581).
  • CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585).
  • CVE-2025-21904: caif_virtio: fix wrong pointer check in cfv_probe() (bsc#1240576).
  • CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587).
  • CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600).
  • CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591).
  • CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593).
  • CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639).
  • CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720).
  • CVE-2025-21925: llc: do not use skb_get() before dev_queue_xmit() (bsc#1240713).
  • CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712).
  • CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio (bsc#1240709).
  • CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742).
  • CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815).
  • CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816).
  • CVE-2025-21962: cifs: Fix integer overflow while processing closetimeo mount option (bsc#1240655).
  • CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount option (bsc#1240717).
  • CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount option (bsc#1240740).
  • CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784).
  • CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819).
  • CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813).
  • CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812).
  • CVE-2025-21980: sched: address a potential NULL pointer dereference in the GRED scheduler (bsc#1240809).
  • CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612).
  • CVE-2025-21985: drm/amd/display: Fix out-of-bound accesses (bsc#1240811).
  • CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (bsc#1240795).
  • CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797).
  • CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).
  • CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).
  • CVE-2025-22015: mm/migrate: fix shmem xarray update during migration (bsc#1240944).
  • CVE-2025-22016: dpll: fix xa_alloc_cyclic() error handling (bsc#1240934).
  • CVE-2025-22017: devlink: fix xa_alloc_cyclic() error handling (bsc#1240936).
  • CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266).
  • CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282).
  • CVE-2025-22029: exec: fix the racy usage of fs_struct->in_exec (bsc#1241378).
  • CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376).
  • CVE-2025-22036: exfat: fix random stack corruption after get_block (bsc#1241426).
  • CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433).
  • CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging (bsc#1241373).
  • CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).
  • CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525).
  • CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533).
  • CVE-2025-22058: udp: Fix memory accounting leak (bsc#1241332).
  • CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526).
  • CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351).
  • CVE-2025-22064: netfilter: nf_tables: do not unregister hook when table is dormant (bsc#1241413).
  • CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305).
  • CVE-2025-22080: fs/ntfs3: Prevent integer overflow in hdr_first_de() (bsc#1241416).
  • CVE-2025-22090: mm: (un)track_pfn_copy() fix + doc improvements (bsc#1241537).
  • CVE-2025-22102: Bluetooth: btnxpuart: Fix kernel panic during FW release (bsc#1241456).
  • CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448).
  • CVE-2025-22104: ibmvnic: Use kernel helpers for hex dumps (bsc#1241550).
  • CVE-2025-22105, CVE-2025-37860: Add missing bugzilla references (bsc#1241452 bsc#1241548).
  • CVE-2025-22107: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() (bsc#1241575).
  • CVE-2025-22109: ax25: Remove broken autobind (bsc#1241573).
  • CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241578).
  • CVE-2025-22121: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (bsc#1241593).
  • CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684).
  • CVE-2025-23133: wifi: ath11k: update channel list in reg notifier instead reg worker (bsc#1241451).
  • CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648).
  • CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763).
  • CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596).
  • CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513).
  • CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507).
  • CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523).
  • CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859).
  • CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510).
  • CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506).
  • CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502).
  • CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786).
  • CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).
  • CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585).
  • CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).
  • CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509).
  • CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).
  • CVE-2025-37798: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (bsc#1242414).
  • CVE-2025-37799: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (bsc#1242283).
  • CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852).
  • CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854).
  • CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856).
  • CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866).
  • CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
  • CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867).
  • CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875).
  • CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860).
  • CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861).
  • CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868).
  • CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951).
  • CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056).
  • CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077).
  • CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944).
  • CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962).
  • CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541).
  • CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513).
  • CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539).
  • CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519).
  • CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547).
  • CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627).
  • CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657).
  • CVE-2025-39728: clk: samsung: Fix UBSAN panic in samsung_clk_init() (bsc#1241626).

The following non-security bugs were fixed:

  • ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls (stable-fixes).
  • ACPI: EC: Set ec_no_wakeup for Lenovo Go S (stable-fixes).
  • ACPI: PPTT: Fix processor subtable walk (git-fixes).
  • ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530).
  • ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes).
  • ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable-fixes).
  • ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes).
  • ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git-fixes).
  • ALSA: hda/realtek - Enable speaker for HP platform (git-fixes).
  • ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes).
  • ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable-fixes).
  • ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes).
  • ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes).
  • ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes).
  • ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes).
  • ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes).
  • ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes).
  • ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes).
  • ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes).
  • ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes).
  • ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes).
  • ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes).
  • ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git-fixes).
  • ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git-fixes).
  • ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git-fixes).
  • ALSA: hda/realtek: Fix built-mic regression on other ASUS models (git-fixes).
  • ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes).
  • ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes).
  • ALSA: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes).
  • ALSA: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes).
  • ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes).
  • ALSA: hda/realtek: update ALC222 depop optimize (stable-fixes).
  • ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes).
  • ALSA: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes).
  • ALSA: hda: intel: Add Lenovo IdeaPad Z570 to probe denylist (stable-fixes).
  • ALSA: hda: intel: Fix Optimus when GPU has no sound (stable-fixes).
  • ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes).
  • ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git-fixes).
  • ALSA: seq: Avoid module auto-load handling at event delivery (stable-fixes).
  • ALSA: seq: Fix delivery of UMP events to group ports (git-fixes).
  • ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes).
  • ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes).
  • ALSA: ump: Fix buffer overflow at UMP SysEx message conversion (bsc#1242044).
  • ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes).
  • ALSA: usb-audio: Add retry on -EPROTO from usb_set_interface() (stable-fixes).
  • ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes).
  • ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera (stable-fixes).
  • ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset (stable-fixes).
  • ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git-fixes).
  • ALSA: usb-audio: Fix CME quirk for UF series keyboards (stable-fixes).
  • ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable-fixes).
  • ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes).
  • ALSA: usx2y: validate nrpacks module parameter on probe (git-fixes).
  • ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe() (git-fixes).
  • ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable-fixes).
  • ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes).
  • ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext (git-fixes).
  • ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback direction (git-fixes).
  • ASoC: SOF: topology: Use krealloc_array() to replace krealloc() (stable-fixes).
  • ASoC: Use of_property_read_bool() (stable-fixes).
  • ASoC: amd: Add DMI quirk for ACP6X mic support (stable-fixes).
  • ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes).
  • ASoC: amd: yc: update quirk data for new Lenovo model (stable-fixes).
  • ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable-fixes).
  • ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git-fixes).
  • ASoC: codecs:lpass-wsa-macro: Fix logic of enabling vi channels (git-fixes).
  • ASoC: codecs:lpass-wsa-macro: Fix vi feedback rate (git-fixes).
  • ASoC: cs35l41: check the return value from spi_setup() (git-fixes).
  • ASoC: es8328: fix route from DAC to output (git-fixes).
  • ASoC: fsl_audmix: register card device depends on 'dais' property (stable-fixes).
  • ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes).
  • ASoC: ops: Consistently treat platform_max as control value (git-fixes).
  • ASoC: qcom: Fix sc7280 lpass potential buffer overflow (git-fixes).
  • ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes).
  • ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes).
  • ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git-fixes).
  • ASoC: rt722-sdca: add missing readable registers (git-fixes).
  • ASoC: soc-core: Stop using of_property_read_bool() for non-boolean properties (stable-fixes).
  • ASoC: soc-pcm: Fix hw_params() and DAPM widget sequence (git-fixes).
  • ASoC: tas2764: Fix power control mask (stable-fixes).
  • ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes).
  • ASoC: tas2770: Fix volume scale (stable-fixes).
  • ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes).
  • ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes).
  • Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git-fixes).
  • Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes).
  • Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes).
  • Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes).
  • Bluetooth: Improve setsockopt() handling of malformed user input (git-fixes).
  • Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes).
  • Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes).
  • Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes).
  • Bluetooth: btrtl: Prevent potential NULL dereference (git-fixes).
  • Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue() (git-fixes).
  • Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling (git-fixes).
  • Bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes).
  • Bluetooth: hci_event: Fix enabling passive scanning (git-fixes).
  • Bluetooth: hci_event: Fix sending MGMT_EV_DEVICE_FOUND for invalid address (git-fixes).
  • Bluetooth: hci_uart: Fix another race during initialization (git-fixes).
  • Bluetooth: hci_uart: fix race during initialization (stable-fixes).
  • Bluetooth: l2cap: Check encryption key size on incoming connection (git-fixes).
  • Bluetooth: l2cap: Process valid commands in too long frame (stable-fixes).
  • Bluetooth: vhci: Avoid needless snprintf() calls (git-fixes).
  • GHES: Fatal hardware error (GHES panic timeout) (bsc#1239615).
  • Documentation: qat: fix auto_reset attribute details (git-fixes).
  • Documentation: qat: fix auto_reset section (git-fixes).
  • Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (git-fixes).
  • Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes).
  • PCI: Drop PCI patch that caused a regression (bsc#1241123).
  • memory: Fix memory-hotplug regression (bsc#1237504).
  • net/ipv6: Fix write to cloned skb in ipv6_hop_ioam() (git-fixes).
  • HID: Enable playstation driver independently of sony driver (git-fixes).
  • HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes).
  • HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes).
  • HID: appleir: Fix potential NULL dereference at raw event handle (git-fixes).
  • HID: google: fix unused variable warning under !CONFIG_ACPI (git-fixes).
  • HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes).
  • HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable-fixes).
  • HID: hid-steam: Fix use-after-free when detaching device (git-fixes).
  • HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes).
  • HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes).
  • HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes).
  • HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git-fixes).
  • HID: intel-ish-hid: Send clock sync message immediately after reset (stable-fixes).
  • HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable-fixes).
  • HID: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes).
  • HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes).
  • HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes).
  • HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes).
  • IB/cm: use rwlock for MAD agent lock (git-fixes)
  • IB/mad: Check available slots before posting receive WRs (git-fixes)
  • IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes)
  • Input: ads7846 - fix gpiod allocation (git-fixes).
  • Input: cyttsp5 - ensure minimum reset pulse width (git-fixes).
  • Input: i8042 - add required quirks for missing old boardnames (stable-fixes).
  • Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes).
  • Input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes).
  • Input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes).
  • Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes).
  • Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes).
  • Input: iqs7222 - preserve system status register (git-fixes).
  • Input: mtk-pmic-keys - fix possible null pointer dereference (git-fixes).
  • Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git-fixes).
  • Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes).
  • Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable-fixes).
  • Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable-fixes).
  • Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 (stable-fixes).
  • Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes).
  • Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes).
  • Input: synaptics-rmi - fix crash with unsupported versions of F34 (git-fixes).
  • Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes).
  • Input: xpad - add multiple supported devices (stable-fixes).
  • Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable-fixes).
  • Input: xpad - add support for TECNO Pocket Go (stable-fixes).
  • Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes).
  • Input: xpad - fix Share button on Xbox One controllers (stable-fixes).
  • Input: xpad - fix two controller table values (git-fixes).
  • Input: xpad - rename QH controller to Legion Go S (stable-fixes).
  • KVM: SVM: Allocate IR data using atomic allocation (git-fixes).
  • KVM: SVM: Disable AVIC on SNP-enabled system without HvInUseWrAllowed feature (bsc#1235862).
  • KVM: SVM: Do not change target vCPU state on AP Creation VMGEXIT error (git-fixes).
  • KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes).
  • KVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest had an invalid VMSA (git-fixes).
  • KVM: SVM: Save host DR masks on CPUs with DebugSwap (jsc#PED-348).
  • KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes).
  • KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes).
  • KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes).
  • KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes).
  • KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes).
  • KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git-fixes).
  • KVM: arm64: Mark some header functions as inline (git-fixes).
  • KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes).
  • KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes).
  • KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git-fixes).
  • KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes).
  • KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes).
  • KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git-fixes).
  • KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes).
  • KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation (git-fixes).
  • KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes).
  • KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation (git-fixes).
  • KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657).
  • KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658).
  • KVM: x86/mmu: Check and free obsolete roots in kvm_mmu_reload() (git-fixes).
  • KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes).
  • KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (git-fixes).
  • KVM: x86: Check that the high 32bits are clear in kvm_arch_vcpu_ioctl_run() (git-fixes).
  • KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend notifier (git-fixes).
  • KVM: x86: Explicitly treat routing entry type changes as changes (git-fixes).
  • KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM (git-fixes).
  • KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes).
  • KVM: x86: Make x2APIC ID 100% readonly (git-fixes).
  • KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes).
  • KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git-fixes).
  • KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func() (git-fixes).
  • KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found (git-fixes).
  • KVM: x86: block KVM_CAP_SYNC_REGS if guest state is protected (git-fixes).
  • Move upstreamed ACPI patch into sorted section
  • Move upstreamed PCI and initramfs patches into sorted section
  • Move upstreamed nfsd and sunrpc patches into sorted section
  • Move upstreamed powerpc and SCSI patches into sorted section
  • Move upstreamed smb patch into sorted section Also move other out-of-tree patches into the proper section
  • Move upstreamed sound patch into sorted section
  • Move upstreamed tpm patch into sorted section
  • NFS: O_DIRECT writes must check and adjust the file length (git-fixes).
  • NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes).
  • NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes).
  • NFSv4: Do not trigger uneccessary scans for return-on-close delegations (git-fixes).
  • OPP: add index check to assert to avoid buffer overflow in _read_freq() (bsc#1238961)
  • PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes).
  • PCI/ASPM: Fix link state exit during switch upstream function removal (git-fixes).
  • PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853)
  • PCI/DOE: Support discovery version 2 (bsc#1237853)
  • PCI/MSI: Add an option to write MSIX ENTRY_DATA before any reads (git-fixes).
  • PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes).
  • PCI: Avoid reset when disabled via sysfs (git-fixes).
  • PCI: Fix BAR resizing when VF BARs are assigned (git-fixes).
  • PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes).
  • PCI: Fix reference leak in pci_register_host_bridge() (git-fixes).
  • PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes).
  • PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git-fixes).
  • PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes).
  • PCI: brcmstb: Fix potential premature regulator disabling (git-fixes).
  • PCI: brcmstb: Set generation limit before PCIe link up (git-fixes).
  • PCI: brcmstb: Use internal register to change link capability (git-fixes).
  • PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes).
  • PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes).
  • PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes).
  • PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes).
  • PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type (stable-fixes).
  • PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes).
  • PM: sleep: Adjust check before setting power.must_resume (git-fixes).
  • PM: sleep: Fix handling devices with direct_complete set on errors (git-fixes).
  • RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). Replace our patch with the upstream version.
  • RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes)
  • RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes)
  • RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes)
  • RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes)
  • RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git-fixes)
  • RDMA/cma: Fix workqueue crash in cma_netevent_work_handler (git-fixes)
  • RDMA/core: Do not expose hw_counters outside of init net namespace (git-fixes)
  • RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (git-fixes)
  • RDMA/core: Silence oversized kvmalloc() warning (git-fixes)
  • RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes)
  • RDMA/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes)
  • RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes)
  • RDMA/hns: Fix missing xa_destroy() (git-fixes)
  • RDMA/hns: Fix soft lockup during bt pages loop (git-fixes)
  • RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git-fixes)
  • RDMA/hns: Fix wrong maximum DMA segment size (git-fixes)
  • RDMA/hns: Fix wrong value of max_sge_rd (git-fixes)
  • RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes)
  • RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git-fixes)
  • RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes).
  • RDMA/mana_ib: Ensure variable err is initialized (git-fixes).
  • RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
  • RDMA/mlx5: Fix AH static rate parsing (git-fixes)
  • RDMA/mlx5: Fix MR cache initialization error flow (git-fixes)
  • RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes)
  • RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git-fixes)
  • RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes)
  • RDMA/mlx5: Fix cache entry update on dereg error (git-fixes)
  • RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes)
  • RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git-fixes)
  • RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes)
  • RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes)
  • RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes)
  • RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes)
  • RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug (git-fixes)
  • RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes)
  • RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes)
  • RDMA/usnic: Fix passing zero to PTR_ERR in usnic_ib_pci_probe() (git-fixes)
  • mm: Revert patch mm-various-give-up-if-pte_offset_map-_lock-fails.patch (bsc#1241051).
  • SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes).
  • SUNRPC: Prevent looping due to rpc_signal_task() races (git-fixes).
  • SUNRPC: convert RPC_TASK_* constants to enum (git-fixes).
  • Squashfs: check return result of sb_min_blocksize (git-fixes).
  • USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02) (stable-fixes).
  • USB: VLI disk crashes if LPM is used (stable-fixes).
  • USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe (stable-fixes).
  • USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes).
  • USB: serial: option: add Sierra Wireless EM9291 (stable-fixes).
  • USB: serial: option: add Telit Cinterion FE990B compositions (stable-fixes).
  • USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes).
  • USB: serial: option: match on interface class for Telit FN990B (stable-fixes).
  • USB: serial: simple: add OWON HDS200 series oscilloscope support (stable-fixes).
  • USB: storage: quirk for ADATA Portable HDD CH94 (stable-fixes).
  • USB: usbtmc: use interruptible sleep in usbtmc_read (git-fixes).
  • USB: wdm: add annotation (git-fixes).
  • USB: wdm: close race between wdm_open and wdm_wwan_port_stop (git-fixes).
  • USB: wdm: handle IO errors in wdm_wwan_port_start (git-fixes).
  • USB: wdm: wdm_wwan_port_tx_complete mutex in atomic context (git-fixes).
  • RDMA: Update patch RDMA-core-Don-t-expose-hw_counters-outside-of-init-n.patch (git-fixes bsc#1239925).
  • kABI: Update patch kABI-fix-for-RDMA-core-Don-t-expose-hw_counters-outs.patch (git-fixes bsc#1239925).
  • nvme: Update patch nvme-fixup-scan-failure-for-non-ANA-multipath-contro.patch (git-fixes bsc#1235149).
  • nvme: Update patch nvme-re-read-ANA-log-page-after-ns-scan-completes.patch (git-fixes bsc#1235149).
  • s390: Update patch s390-pci-Fix-SR-IOV-for-PFs-initially-in-standby.patch (git-fixes bsc#1236752 bsc#1238368).
  • Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes).
  • accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes).
  • accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes).
  • acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes).
  • add bug reference for an existing hv_netvsc change (bsc#1243737).
  • af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849).
  • af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435).
  • af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435).
  • af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334).
  • affs: do not write overlarge OFS data block size fields (git-fixes).
  • affs: generate OFS sequence numbers starting at 1 (git-fixes).
  • afs: Fix the server_list to unuse a displaced server rather than putting it (git-fixes).
  • afs: Make it possible to find the volumes that are using a server (git-fixes).
  • ahci: add PCI ID for Marvell 88SE9215 SATA Controller (stable-fixes).
  • amdgpu/pm/legacy: fix suspend/resume issues (git-fixes).
  • arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052)
  • arch_topology: init capacity_freq_ref to 0 (bsc#1238052)
  • arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052)
  • arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes)
  • arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052)
  • arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052)
  • arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052)
  • arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052)
  • arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes)
  • arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git-fixes)
  • arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes)
  • arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes)
  • arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git-fixes)
  • arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes)
  • arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes)
  • arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git-fixes)
  • arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git-fixes)
  • arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes)
  • arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes)
  • arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes)
  • arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes)
  • arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git-fixes)
  • arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git-fixes)
  • arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git-fixes)
  • arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git-fixes)
  • arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes)
  • arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git-fixes)
  • arm64: errata: Assume that unknown CPUs are vulnerable to Spectre (git-fixes)
  • arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes)
  • arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git-fixes)
  • arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes)
  • arm64: insn: Add support for encoding DSB (git-fixes)
  • arm64: mm: Correct the update of max_pfn (git-fixes)
  • arm64: mm: Populate vmemmap at the page level if not section aligned (git-fixes)
  • arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git-fixes)
  • arm64: proton-pack: Expose whether the branchy loop k value (git-fixes)
  • arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes)
  • arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes)
  • arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes).
  • asus-laptop: Fix an uninitialized variable (git-fixes).
  • ata: ahci: Add mask_port_map module parameter (git-fixes).
  • ata: libata-sata: Save all fields from sense data descriptor (git-fixes).
  • ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git-fixes).
  • ata: libata-scsi: Fix ata_mselect_control_ata_feature() return type (git-fixes).
  • ata: libata-scsi: Fix ata_msense_control_ata_feature() (git-fixes).
  • ata: libata-scsi: Improve CDL control (git-fixes).
  • ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes).
  • ata: libata: Fix NCQ Non-Data log not supported print (git-fixes).
  • ata: pata_parport: add custom version of wait_after_reset (git-fixes).
  • ata: pata_parport: fit3: implement IDE command set registers (git-fixes).
  • ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe() (git-fixes).
  • ata: pata_serverworks: Do not use the term blacklist (git-fixes).
  • ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes).
  • ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes).
  • ata: sata_sx4: Add error handling in pdc20621_i2c_read() (git-fixes).
  • auxdisplay: hd44780: Convert to platform remove callback returning void (stable-fixes).
  • auxdisplay: hd44780: Fix an API misuse in hd44780.c (git-fixes).
  • auxdisplay: panel: Fix an API misuse in panel.c (git-fixes).
  • backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes).
  • badblocks: Fix error shitf ops (git-fixes).
  • badblocks: fix merge issue when new badblocks align with pre+1 (git-fixes).
  • badblocks: fix missing bad blocks on retry in _badblocks_check() (git-fixes).
  • badblocks: fix the using of MAX_BADBLOCKS (git-fixes).
  • badblocks: return error directly when setting badblocks exceeds 512 (git-fixes).
  • badblocks: return error if any badblock set fails (git-fixes).
  • batman-adv: Ignore own maximum aggregation size during RX (git-fixes).
  • bitmap: introduce generic optimized bitmap_size() (git-fixes).
  • blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606).
  • blk-throttle: fix lower bps rate by throtl_trim_slice() (git-fixes).
  • block: change blk_mq_add_to_batch() third argument type to bool (git-fixes).
  • block: cleanup and fix batch completion adding conditions (git-fixes).
  • block: do not revert iter for -EIOCBQUEUED (git-fixes).
  • block: fix 'kmem_cache of name 'bio-108' already exists' (git-fixes).
  • block: fix conversion of GPT partition name to 7-bit (git-fixes).
  • block: fix resource leak in blk_register_queue() error path (git-fixes).
  • block: integrity: Do not call set_page_dirty_lock() (git-fixes).
  • block: make sure ->nr_integrity_segments is cloned in blk_rq_prep_clone (git-fixes).
  • bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git-fixes).
  • bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes).
  • bnxt_en: Fix coredump logic to free allocated buffer (git-fixes).
  • bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes).
  • bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes).
  • bnxt_en: Linearize TX SKB if the fragments exceed the max (git-fixes).
  • bnxt_en: Mask the bd_cnt field in the TX BD properly (git-fixes).
  • bpf: Add missed var_off setting in coerce_subreg_to_size_sx() (git-fixes).
  • bpf: Add missed var_off setting in set_sext32_default_val() (git-fixes).
  • bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes).
  • bpf: Check size for BTF-based ctx access of pointer members (git-fixes).
  • bpf: Fix a verifier verbose message (git-fixes).
  • bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes).
  • bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes).
  • bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git-fixes).
  • bpf: Scrub packet on bpf_redirect_peer (git-fixes).
  • bpf: Use -Wno-error in certain tests when building with GCC (git-fixes).
  • bpf: add find_containing_subprog() utility function (bsc#1241590).
  • bpf: avoid holding freeze_mutex during mmap operation (git-fixes).
  • bpf: check changes_pkt_data property for extension programs (bsc#1241590).
  • bpf: consider that tail calls invalidate packet pointers (bsc#1241590).
  • bpf: fix null dereference when computing changes_pkt_data of prog w/o subprogs (bsc#1241590).
  • bpf: fix potential error return (git-fixes).
  • bpf: prevent r10 register from being marked as precise (git-fixes).
  • bpf: refactor bpf_helper_changes_pkt_data to use helper number (bsc#1241590).
  • bpf: track changes_pkt_data property for global functions (bsc#1241590).
  • bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes).
  • broadcom: fix supported flag check in periodic output function (git-fixes).
  • btrfs: add and use helper to verify the calling task has locked the inode (bsc#1241204).
  • btrfs: adjust subpage bit start based on sectorsize (bsc#1241492).
  • btrfs: always fallback to buffered write if the inode requires checksum (bsc#1242831 bsc#1242710).
  • btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342).
  • btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208).
  • btrfs: avoid monopolizing a core when activating a swap file (git-fixes).
  • btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605).
  • btrfs: do not loop for nowait writes when checking for cross references (git-fixes).
  • btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045).
  • btrfs: drop the backref cache during relocation if we commit (bsc#1239605).
  • btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes).
  • btrfs: fix discard worker infinite loop after disabling discard (bsc#1242012).
  • btrfs: fix hole expansion when writing at an offset beyond EOF (bsc#1241151).
  • btrfs: fix missing snapshot drew unlock when root is dead during swap activation (bsc#1241204).
  • btrfs: fix non-empty delayed iputs list on unmount due to compressed write workers (git-fixes).
  • btrfs: fix race with memory mapped writes when activating swap file (bsc#1241204).
  • btrfs: fix swap file activation failure due to extents that used to be shared (bsc#1241204).
  • btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045).
  • btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045).
  • btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045).
  • bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes).
  • bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes).
  • bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes).
  • bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes).
  • bus: simple-pm-bus: fix forced runtime PM use (git-fixes).
  • can: bcm: add locking for bcm_op runtime updates (git-fixes).
  • can: bcm: add missing rcu read protection for procfs content (git-fixes).
  • can: flexcan: disable transceiver during system PM (git-fixes).
  • can: flexcan: only change CAN state when link up in system PM (git-fixes).
  • can: gw: fix RCU/BH usage in cgw_create_job() (git-fixes).
  • can: mcan: m_can_class_unregister(): fix order of unregistration calls (git-fixes).
  • can: mcp251xfd: fix TDC setting for low data bit rates (git-fixes).
  • can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls (git-fixes).
  • can: rcar_canfd: Fix page entries in the AFL list (git-fixes).
  • can: slcan: allow reception of short error messages (git-fixes).
  • can: ucan: fix out of bound read in strscpy() source (git-fixes).
  • cdc_ether|r8152: ThinkPad Hybrid USB-C/A Dock quirk (stable-fixes).
  • cdx: Fix possible UAF error in driver_override_show() (git-fixes).
  • char: misc: deallocate static minor in error path (git-fixes).
  • char: misc: register chrdev region with all possible minors (git-fixes).
  • check-for-config-changes: Fix flag name typo
  • cifs: Fix integer overflow while processing actimeo mount option (git-fixes).
  • cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes).
  • cifs: Remove intermediate object of failed create reparse call (git-fixes).
  • cifs: commands that are retried should have replay flag set (bsc#1231432).
  • cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432).
  • cifs: helper function to check replayable error codes (bsc#1231432).
  • cifs: new mount option called retrans (bsc#1231432).
  • cifs: open_cached_dir should not rely on primary channel (bsc#1231432).
  • cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes).
  • cifs: reduce warning log level for server not advertising interfaces (git-fixes).
  • cifs: update desired access while requesting for directory lease (git-fixes).
  • cifs: update the same create_guid on replay (git-fixes).
  • clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes).
  • coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes).
  • counter: fix privdata alignment (git-fixes).
  • counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes).
  • counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes).
  • cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856)
  • cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707).
  • cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856)
  • cpufreq/cppc: Move and rename (bsc#1237856)
  • cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052)
  • cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052)
  • cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052)
  • cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856)
  • cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856)
  • cpumask: add cpumask_weight_andnot() (bsc#1239015).
  • cpumask: define cleanup function for cpumasks (bsc#1239015).
  • crypto: algif_hash - fix double free in hash_accept (git-fixes).
  • crypto: atmel-sha204a - Set hwrng quality to lowest possible (git-fixes).
  • crypto: caam/qi - Fix drv_ctx refcount bug (git-fixes).
  • crypto: ccp - Add support for PCI device 0x1134 (stable-fixes).
  • crypto: ccp - Fix check for the primary ASP device (git-fixes).
  • crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes).
  • crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes).
  • crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes).
  • crypto: hisilicon/sec2 - fix for sec spec check (git-fixes).
  • crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416).
  • crypto: iaa - Change desc->priv to 0 (jsc#PED-12416).
  • crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416).
  • crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416).
  • crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416).
  • crypto: iaa - Remove header table code (jsc#PED-12416).
  • crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416).
  • crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() (jsc#PED-12416).
  • crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416).
  • crypto: iaa - Test the correct request flag (git-fixes).
  • crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416).
  • crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416).
  • crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416).
  • crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416).
  • crypto: iaa - remove unneeded semicolon (jsc#PED-12416).
  • crypto: nx - Fix uninitialised hv_nxc on error (git-fixes).
  • crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416).
  • crypto: qat - Constify struct pm_status_row (jsc#PED-12416).
  • crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416).
  • crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416).
  • crypto: qat - Fix typo "accelaration" (jsc#PED-12416).
  • crypto: qat - Fix typo (jsc#PED-12416).
  • crypto: qat - Remove trailing space after \n newline (jsc#PED-12416).
  • crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416).
  • crypto: qat - add admin msgs for telemetry (jsc#PED-12416).
  • crypto: qat - add auto reset on error (jsc#PED-12416).
  • crypto: qat - add bank save and restore flows (jsc#PED-12416).
  • crypto: qat - add fatal error notification (jsc#PED-12416).
  • crypto: qat - add fatal error notify method (jsc#PED-12416).
  • crypto: qat - add heartbeat error simulator (jsc#PED-12416).
  • crypto: qat - add interface for live migration (jsc#PED-12416).
  • crypto: qat - add support for 420xx devices (jsc#PED-12416).
  • crypto: qat - add support for device telemetry (jsc#PED-12416).
  • crypto: qat - add support for ring pair level telemetry (jsc#PED-12416).
  • crypto: qat - adf_get_etr_base() helper (jsc#PED-12416).
  • crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416).
  • crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416).
  • crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416).
  • crypto: qat - disable arbitration before reset (jsc#PED-12416).
  • crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416).
  • crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416).
  • crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416).
  • crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416).
  • crypto: qat - fix comment structure (jsc#PED-12416).
  • crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416).
  • crypto: qat - fix recovery flow for VFs (jsc#PED-12416).
  • crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416).
  • crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416).
  • crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416).
  • crypto: qat - implement interface for live migration (jsc#PED-12416).
  • crypto: qat - improve aer error reset handling (jsc#PED-12416).
  • crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416).
  • crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416).
  • crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416).
  • crypto: qat - limit heartbeat notifications (jsc#PED-12416).
  • crypto: qat - make adf_ctl_class constant (jsc#PED-12416).
  • crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416).
  • crypto: qat - move PFVF compat checker to a function (jsc#PED-12416).
  • crypto: qat - move fw config related structures (jsc#PED-12416).
  • crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416).
  • crypto: qat - re-enable sriov after pf reset (jsc#PED-12416).
  • crypto: qat - relocate CSR access code (jsc#PED-12416).
  • crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416).
  • crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416).
  • crypto: qat - remove access to parity register for QAT GEN4 (git-fixes).
  • crypto: qat - remove unnecessary description from comment (jsc#PED-12416).
  • crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416).
  • crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416).
  • crypto: qat - set parity error mask for qat_420xx (git-fixes).
  • crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416).
  • crypto: qat - update PFVF protocol for recovery (jsc#PED-12416).
  • crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416).
  • crypto: qat - validate slices count returned by FW (jsc#PED-12416).
  • crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416).
  • cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path (git-fixes).
  • devlink: fix port new reply cmd type (git-fixes).
  • dlm: prevent NPD when writing a positive value to event_done (git-fixes).
  • dm array: fix cursor index when skipping across block boundaries (git-fixes).
  • dm array: fix unreleased btree blocks on closing a faulty array cursor (git-fixes).
  • dm init: Handle minors larger than 255 (git-fixes).
  • dm integrity: fix out-of-range warning (git-fixes).
  • dm persistent data: fix memory allocation failure (git-fixes).
  • dm resume: do not return EINVAL when signalled (git-fixes).
  • dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes).
  • dm thin: Add missing destroy_work_on_stack() (git-fixes).
  • dm-bufio: do not schedule in atomic context (git-fixes).
  • dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes).
  • dm-crypt: track tag_offset in convert_context (git-fixes).
  • dm-delay: fix hung task introduced by kthread mode (git-fixes).
  • dm-delay: fix max_delay calculations (git-fixes).
  • dm-delay: fix workqueue delay_timer race (git-fixes).
  • dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes).
  • dm-ebs: fix prefetch-vs-suspend race (git-fixes).
  • dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git-fixes).
  • dm-integrity: align the outgoing bio in integrity_recheck (git-fixes).
  • dm-integrity: fix a race condition when accessing recalc_sector (git-fixes).
  • dm-integrity: fix a warning on invalid table line (git-fixes).
  • dm-integrity: set ti->error on memory allocation failure (git-fixes).
  • dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes).
  • dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes).
  • dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes).
  • dm-verity: fix prefetch-vs-suspend race (git-fixes).
  • dm: Fix typo in error message (git-fixes).
  • dm: add missing unlock on in dm_keyslot_evict() (git-fixes).
  • dm: always update the array size in realloc_argv on success (git-fixes).
  • dm: fix copying after src array boundaries (git-fixes).
  • dma-buf: insert memory barrier before updating num_fences (git-fixes).
  • dma: kmsan: export kmsan_handle_dma() for modules (git-fixes).
  • dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when interrupted" (git-fixes).
  • dmaengine: dmatest: Fix dmatest waiting less when interrupted (stable-fixes).
  • dmaengine: idxd: Add missing cleanup for early error out in idxd_setup_internals (git-fixes).
  • dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes).
  • dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call (git-fixes).
  • dmaengine: idxd: Fix ->poll() return value (git-fixes).
  • dmaengine: idxd: Fix allowing write() from different address spaces (git-fixes).
  • dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git-fixes).
  • dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git-fixes).
  • dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe (git-fixes).
  • dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines (git-fixes).
  • dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups (git-fixes).
  • dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs (git-fixes).
  • dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() (git-fixes).
  • dmaengine: mediatek: drop unused variable (git-fixes).
  • dmaengine: ti: k3-udma: Add missing locking (git-fixes).
  • dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy (git-fixes).
  • driver core: Remove needless return in void API device_remove_group() (git-fixes).
  • drivers: base: devres: Allow to release group on device release (stable-fixes).
  • drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes).
  • drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes).
  • drm/amd/display: Add scoped mutexes for amdgpu_dm_dhcp (stable-fixes).
  • drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable-fixes).
  • drm/amd/display: Avoid flooding unnecessary info messages (git-fixes).
  • drm/amd/display: Copy AUX read reply data whenever length > 0 (git-fixes).
  • drm/amd/display: Correct the reply value when AUX write incomplete (git-fixes).
  • drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes).
  • drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable-fixes).
  • drm/amd/display: Fix HPD after gpu reset (stable-fixes).
  • drm/amd/display: Fix gpu reset in multidisplay config (git-fixes).
  • drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes).
  • drm/amd/display: Fix slab-use-after-free in hdcp (git-fixes).
  • drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes).
  • drm/amd/display: Fix the checking condition in dmub aux handling (stable-fixes).
  • drm/amd/display: Fix wrong handling for AUX_DEFER case (git-fixes).
  • drm/amd/display: Force full update in gpu reset (stable-fixes).
  • drm/amd/display: Remove incorrect checking in dmub aux handler (git-fixes).
  • drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes).
  • drm/amd/display: Shift DMUB AUX reply command if necessary (git-fixes).
  • drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes).
  • drm/amd/display: add workaround flag to link to force FFE preset (stable-fixes).
  • drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes).
  • drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes).
  • drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes).
  • drm/amd/pm/smu11: Prevent division by zero (git-fixes).
  • drm/amd/pm: Prevent division by zero (git-fixes).
  • drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes).
  • drm/amd: Handle being compiled without SI or CIK support better (stable-fixes).
  • drm/amd: Keep display off while going into S4 (stable-fixes).
  • drm/amdgpu/dma_buf: fix page_link check (git-fixes).
  • drm/amdgpu/gfx11: fix num_mec (git-fixes).
  • drm/amdgpu/hdp5.2: use memcfg register to post the write for HDP flush (git-fixes).
  • drm/amdgpu/umsch: declare umsch firmware (git-fixes).
  • drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes).
  • drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable-fixes).
  • drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes).
  • drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes).
  • drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes).
  • drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes).
  • drm/amdgpu: fix pm notifier handling (git-fixes).
  • drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create() (stable-fixes).
  • drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes).
  • drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes).
  • drm/amdkfd: Fix mode1 reset crash issue (stable-fixes).
  • drm/amdkfd: Fix pqm_destroy_queue race with GPU reset (stable-fixes).
  • drm/amdkfd: clamp queue size to minimum (stable-fixes).
  • drm/amdkfd: debugfs hang_hws skip GPU with MES (stable-fixes).
  • drm/atomic: Filter out redundant DPMS calls (stable-fixes).
  • drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes).
  • drm/bridge: it6505: fix HDCP V match check is not performed correctly (git-fixes).
  • drm/bridge: panel: forbid initializing a panel with unknown connector type (stable-fixes).
  • drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes).
  • drm/dp_mst: Add a helper to queue a topology probe (stable-fixes).
  • drm/dp_mst: Factor out function to queue a topology probe work (stable-fixes).
  • drm/dp_mst: Fix drm RAD print (git-fixes).
  • drm/dp_mst: Fix locking when skipping CSN before topology probing (git-fixes).
  • drm/edid: fixed the bug that hdr metadata was not reset (git-fixes).
  • drm/fdinfo: Protect against driver unbind (git-fixes).
  • drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git-fixes).
  • drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git-fixes).
  • drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes).
  • drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes).
  • drm/i915/dg2: wait for HuC load completion before running selftests (stable-fixes).
  • drm/i915/dp: Fix error handling during 128b/132b link training (stable-fixes).
  • drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes).
  • drm/i915/gvt: fix unterminated-string-initialization warning (stable-fixes).
  • drm/i915/huc: Fix fence not released on early probe errors (git-fixes).
  • drm/i915/pxp: fix undefined reference to `intel_pxp_gsccs_is_ready_for_sessions' (git-fixes).
  • drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes).
  • drm/i915/xelpg: Extend driver code of Xe_LPG to Xe_LPG+ (stable-fixes).
  • drm/i915: Disable RPG during live selftest (git-fixes).
  • drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes).
  • drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git-fixes).
  • drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes).
  • drm/mediatek: mtk_dpi: Explicitly manage TVD clock in power on/off (stable-fixes).
  • drm/mediatek: mtk_dpi: Move the input_2p_en bit to platform data (stable-fixes).
  • drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes).
  • drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git-fixes).
  • drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes).
  • drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes).
  • drm/msm/dpu: do not use active in atomic_check() (git-fixes).
  • drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git-fixes).
  • drm/msm/dsi: Use existing per-interface slice count in DSC timing (git-fixes).
  • drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes).
  • drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes).
  • drm/nouveau: Do not override forced connector status (stable-fixes).
  • drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() (git-fixes).
  • drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes).
  • drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes).
  • drm/panel: simple: Update timings for AUO G101EVN010 (git-fixes).
  • drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes).
  • drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable-fixes).
  • drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git-fixes).
  • drm/repaper: fix integer overflows in repeat functions (git-fixes).
  • drm/sched: Fix fence reference count leak (git-fixes).
  • drm/sched: Fix preprocessor guard (git-fixes).
  • drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes).
  • drm/ssd130x: ensure ssd132x pitch is correct (git-fixes).
  • drm/ssd130x: fix ssd132x encoding (git-fixes).
  • drm/sti: remove duplicate object names (git-fixes).
  • drm/tests: Add helper to create mock crtc (stable-fixes).
  • drm/tests: Add helper to create mock plane (stable-fixes).
  • drm/tests: Build KMS helpers when DRM_KUNIT_TEST_HELPERS is enabled (git-fixes).
  • drm/tests: cmdline: Fix drm_display_mode memory leak (git-fixes).
  • drm/tests: helpers: Add atomic helpers (stable-fixes).
  • drm/tests: helpers: Add helper for drm_display_mode_from_cea_vic() (stable-fixes).
  • drm/tests: helpers: Create kunit helper to destroy a drm_display_mode (stable-fixes).
  • drm/tests: helpers: Fix compiler warning (git-fixes).
  • drm/tests: modes: Fix drm_display_mode memory leak (git-fixes).
  • drm/tests: probe-helper: Fix drm_display_mode memory leak (git-fixes).
  • drm/v3d: Add job to pending list if the reset was skipped (stable-fixes).
  • drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes).
  • drm/vkms: Fix use after free and double free on init error (git-fixes).
  • drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes).
  • drm: Select DRM_KMS_HELPER from DRM_DEBUG_DP_MST_TOPOLOGY_REFS (git-fixes).
  • drm: allow encoder mode_set even when connectors change for crtc (stable-fixes).
  • drm: panel-orientation-quirks: Add new quirk for GPD Win 2 (stable-fixes).
  • drm: panel-orientation-quirks: Add quirk for AYA NEO Slide (stable-fixes).
  • drm: panel-orientation-quirks: Add quirk for OneXPlayer Mini (Intel) (stable-fixes).
  • drm: panel-orientation-quirks: Add quirks for AYA NEO Flip DS and KB (stable-fixes).
  • drm: panel-orientation-quirks: Add support for AYANEO 2S (stable-fixes).
  • drm: xlnx: zynqmp: Fix max dma segment size (git-fixes).
  • dummycon: fix default rows/cols (git-fixes).
  • e1000e: change k1 configuration on MTP and later platforms (git-fixes).
  • eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes).
  • efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349).
  • eth: bnxt: fix missing ring index trim on error path (git-fixes).
  • ethtool: Fix context creation with no parameters (git-fixes).
  • ethtool: Fix set RXNFC command with symmetric RSS hash (git-fixes).
  • ethtool: Fix wrong mod state in case of verbose and no_mask bitset (git-fixes).
  • ethtool: do not propagate EOPNOTSUPP from dumps (git-fixes).
  • ethtool: fix setting key and resetting indir at once (git-fixes).
  • ethtool: netlink: Add missing ethnl_ops_begin/complete (git-fixes).
  • ethtool: netlink: do not return SQI value if link is down (git-fixes).
  • ethtool: plca: fix plca enable data type while parsing the value (git-fixes).
  • ethtool: rss: echo the context number back (git-fixes).
  • exfat: do not fallback to buffered write (git-fixes).
  • exfat: do not zero the extended part (bsc#1237356).
  • exfat: drop ->i_size_ondisk (git-fixes).
  • exfat: fix appending discontinuous clusters to empty file (bsc#1237356).
  • exfat: fix potential wrong error return from get_block (git-fixes).
  • exfat: fix soft lockup in exfat_clear_bitmap (git-fixes).
  • exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes).
  • exfat: fix timing of synchronizing bitmap and inode (bsc#1237356).
  • exfat: short-circuit zero-byte writes in exfat_file_write_iter (git-fixes).
  • ext4: add missing brelse() for bh2 in ext4_dx_add_entry() (bsc#1242342).
  • ext4: correct encrypted dentry name hash when not casefolded (bsc#1242540).
  • ext4: do not over-report free space or inodes in statvfs (bsc#1242345).
  • ext4: do not treat fhandle lookup of ea_inode as FS corruption (bsc#1242347).
  • ext4: fix FS_IOC_GETFSMAP handling (bsc#1240557).
  • ext4: goto right label 'out_mmap_sem' in ext4_setattr() (bsc#1242556).
  • ext4: make block validity check resistent to sb bh corruption (bsc#1242348).
  • ext4: partial zero eof block on unaligned inode size extension (bsc#1242336).
  • ext4: protect ext4_release_dquot against freezing (bsc#1242335).
  • ext4: replace the traditional ternary conditional operator with with max()/min() (bsc#1242536).
  • ext4: treat end of range as exclusive in ext4_zero_range() (bsc#1242539).
  • ext4: unify the type of flexbg_size to unsigned int (bsc#1242538).
  • fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes).
  • fbdev: omapfb: Add 'plane' value check (stable-fixes).
  • fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
  • fbdev: sm501fb: Add some geometry checks (git-fixes).
  • firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes).
  • firmware: arm_ffa: Skip Rx buffer ownership release if not acquired (git-fixes).
  • firmware: arm_scmi: Balance device refcount when destroying devices (git-fixes).
  • firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes).
  • firmware: cs_dsp: Ensure cs_dsp_load_coeff returns 0 on success (git-fixes).
  • firmware: cs_dsp: Remove async regmap writes (git-fixes).
  • firmware: imx-scu: fix OF node leak in .probe() (git-fixes).
  • flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994).
  • fs/jfs: Prevent integer overflow in AG size calculation (git-fixes).
  • fs/jfs: cast inactags to s64 to prevent potential overflow (git-fixes).
  • fs/ntfs3: add prefix to bitmap_size() and use BITS_TO_U64() (bsc#1241250).
  • fs: better handle deep ancestor chains in is_subdir() (bsc#1242528).
  • fs: consistently deref the files table with rcu_dereference_raw() (bsc#1242535).
  • fs: do not allow non-init s_user_ns for filesystems without FS_USERNS_MOUNT (bsc#1242526).
  • fs: support relative paths with FSCONFIG_SET_STRING (git-fixes).
  • gpio: aggregator: protect driver attr handlers against module unload (git-fixes).
  • gpio: rcar: Fix missing of_node_put() call (git-fixes).
  • gpio: rcar: Use raw_spinlock to protect register access (stable-fixes).
  • gpio: tegra186: fix resource handling in ACPI probe path (git-fixes).
  • gpio: zynq: Fix wakeup source leaks on device unbind (stable-fixes).
  • gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git-fixes).
  • gup: make the stack expansion warning a bit more targeted (bsc#1238214).
  • gve: handle overflow when reporting TX consumed descriptors (git-fixes).
  • gve: set xdp redirect target only when it is available (git-fixes).
  • hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key (git-fixes).
  • hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git-fixes).
  • hv_netvsc: Remove rmsg_pgcnt (git-fixes).
  • hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git-fixes).
  • hwmon: (ad7314) Validate leading zero bits and return error (git-fixes).
  • hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable-fixes).
  • hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes).
  • hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes).
  • hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git-fixes).
  • i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes).
  • i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes).
  • i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git-fixes).
  • i2c: cros-ec-tunnel: defer probe if parent EC is not present (git-fixes).
  • i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git-fixes).
  • i2c: imx-lpi2c: Fix clock count when probe defers (git-fixes).
  • i2c: ls2x: Fix frequency division register access (git-fixes).
  • i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes).
  • i2c: omap: fix IRQ storms (git-fixes).
  • i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes).
  • i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes).
  • i3c: master: svc: Fix missing the IBI rules (git-fixes).
  • i3c: master: svc: Use readsb helper for reading MDB (git-fixes).
  • ice: Add check for devm_kzalloc() (git-fixes).
  • ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes).
  • ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518).
  • ice: fix reservation of resources for RDMA when disabled (git-fixes).
  • ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497).
  • ice: stop truncating queue ids when checking (git-fixes).
  • idpf: check error for register_netdev() on init (git-fixes).
  • idpf: fix adapter NULL pointer dereference on reboot (git-fixes).
  • idpf: fix offloads support for encapsulated packets (git-fixes).
  • idpf: fix potential memory leak on kcalloc() failure (git-fixes).
  • idpf: protect shutdown from reset (git-fixes).
  • igb: reject invalid external timestamp requests for 82580-based HW (git-fixes).
  • igc: add lock preventing multiple simultaneous PTM transactions (git-fixes).
  • igc: cleanup PTP module if probe fails (git-fixes).
  • igc: fix PTM cycle trigger logic (git-fixes).
  • igc: fix lock order in igc_ptp_reset (git-fixes).
  • igc: handle the IGC_PTP_ENABLED flag correctly (git-fixes).
  • igc: increase wait time before retrying PTM (git-fixes).
  • igc: move ktime snapshot into PTM retry loop (git-fixes).
  • iio: accel: adxl367: fix setting odr for activity time update (git-fixes).
  • iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes).
  • iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes).
  • iio: adc: ad4130: Fix comparison of channel setups (git-fixes).
  • iio: adc: ad7124: Fix comparison of channel configs (git-fixes).
  • iio: adc: ad7606: fix serial register access (git-fixes).
  • iio: adc: ad7768-1: Fix conversion result sign (git-fixes).
  • iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary return value check (stable-fixes).
  • iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes).
  • iio: adis16201: Correct inclinometer channel resolution (git-fixes).
  • iio: dac: ad3552r: clear reset status flag (git-fixes).
  • iio: filter: admv8818: Force initialization of SDO (git-fixes).
  • iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo (git-fixes).
  • iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo (git-fixes).
  • iio: temp: maxim-thermocouple: Fix potential lack of DMA safe buffer (git-fixes).
  • include/linux/mmzone.h: clean up watermark accessors (bsc#1239600).
  • include: net: add static inline dst_dev_overhead() to dst.h (git-fixes).
  • inetpeer: remove create argument of inet_getpeer_v() (git-fixes).
  • inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes).
  • init: add initramfs_internal.h (bsc#1232848).
  • initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521).
  • initramfs: allocate heap buffers together (bsc#1232848).
  • initramfs: fix hardlink hash leak without TRAILER (bsc#1232848).
  • intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes).
  • intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes).
  • intel_th: pci: Add Arrow Lake support (stable-fixes).
  • intel_th: pci: Add Panther Lake-H support (stable-fixes).
  • intel_th: pci: Add Panther Lake-P/U support (stable-fixes).
  • ioam6: improve checks on user data (git-fixes).
  • iommu/vt-d: Fix suspicious RCU usage (git-fixes).
  • iommu: Fix two issues in iommu_copy_struct_from_user() (git-fixes).
  • ipv4/route: avoid unused-but-set-variable warning (git-fixes).
  • ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes).
  • ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes).
  • ipv4: Fix incorrect source address in Record Route option (git-fixes).
  • ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git-fixes).
  • ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994).
  • ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr (git-fixes).
  • ipv4: fix source address selection with route leak (git-fixes).
  • ipv4: give an IPv4 dev to blackhole_netdev (git-fixes).
  • ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes).
  • ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes).
  • ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes).
  • ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes).
  • ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes).
  • ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes).
  • ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes).
  • ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git-fixes).
  • ipv4: use RCU protection in inet_select_addr() (bsc#1239994).
  • ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994).
  • ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994).
  • ipv4: use RCU protection in rt_is_expired() (bsc#1239994).
  • ipv6: Align behavior across nexthops during path selection (git-fixes).
  • ipv6: Do not consider link down nexthops in path selection (git-fixes).
  • ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes).
  • ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git-fixes).
  • ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git-fixes).
  • ipv6: Start path selection from the first nexthop (git-fixes).
  • ipv6: Use RCU in ip6_input() (bsc#1239994).
  • ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes).
  • ipv6: avoid atomic fragment on GSO packets (git-fixes).
  • ipv6: fib6_rules: flush route cache when rule is changed (git-fixes).
  • ipv6: fib: hide unused 'pn' variable (git-fixes).
  • ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes).
  • ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS (git-fixes).
  • ipv6: fix potential NULL deref in fib6_add() (git-fixes).
  • ipv6: icmp: convert to dev_net_rcu() (bsc#1239994).
  • ipv6: introduce dst_rt6_info() helper (git-fixes).
  • ipv6: ioam: block BH from ioam6_output() (git-fixes).
  • ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes).
  • ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes).
  • ipv6: sr: add missing seg6_local_exit (git-fixes).
  • ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes).
  • ipv6: take care of scope when choosing the src addr (git-fixes).
  • irqchip/davinci: Remove leftover header (git-fixes).
  • irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() (git-fixes).
  • irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs (git-fixes).
  • isofs: fix KMSAN uninit-value bug in do_isofs_readdir() (bsc#1242307).
  • jbd2: add a missing data flush during file and fs synchronization (bsc#1242346).
  • jbd2: fix off-by-one while erasing journal (bsc#1242344).
  • jbd2: flush filesystem device before updating tail sequence (bsc#1242333).
  • jbd2: increase IO priority for writing revoke records (bsc#1242332).
  • jbd2: increase the journal IO's priority (bsc#1242537).
  • jbd2: remove wrong sb->s_sequence check (bsc#1242343).
  • jfs: Fix uninit-value access of imap allocated in the diMount() function (git-fixes).
  • jfs: Prevent copying of nlink with value 0 from disk inode (git-fixes).
  • jfs: add check read-only before truncation in jfs_truncate_nolock() (git-fixes).
  • jfs: add check read-only before txBeginAnon() call (git-fixes).
  • jfs: add index corruption check to DT_GETPAGE() (git-fixes).
  • jfs: add sanity check for agwidth in dbMount (git-fixes).
  • jfs: fix slab-out-of-bounds read in ea_get() (git-fixes).
  • jfs: reject on-disk inodes of an unsupported type (git-fixes).
  • jiffies: Cast to unsigned long in secs_to_jiffies() conversion (bsc#1242993).
  • jiffies: Define secs_to_jiffies() (bsc#1242993).
  • kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes)
  • kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes).
  • kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes).
  • kABI fix for netlink: terminate outstanding dump on socket close (git-fixes).
  • kABI fix for sctp: detect and prevent references to a freed transport in sendmsg (git-fixes).
  • kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes).
  • kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes).
  • kABI workaround for intel-ish-hid (git-fixes).
  • kABI workaround for powercap update (bsc#1241010).
  • kABI workaround for soc_mixer_control changes (git-fixes).
  • kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749).
  • kbuild: hdrcheck: fix cross build with clang (git-fixes).
  • kernel-binary: Support livepatch_rt with merged RT branch
  • kernel-obs-qa: Use srchash for dependency as well
  • kernel-source: Also replace bin/env
  • ktest: Fix Test Failures Due to Missing LOG_FILE Directories (stable-fixes).
  • kunit: qemu_configs: SH: Respect kunit cmdline (git-fixes).
  • kunit: qemu_configs: sparc: use Zilog console (git-fixes).
  • l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes).
  • l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes).
  • l2tp: fix lockdep splat (git-fixes).
  • leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git-fixes).
  • leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git-fixes).
  • lib: 842: Improve error handling in sw842_compress() (git-fixes).
  • lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes).
  • libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309).
  • libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309).
  • libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309).
  • libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309).
  • libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309).
  • libperf cpumap: Rename perf_cpu_map__default_new() to perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309).
  • libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309).
  • libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309).
  • lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes).
  • loop: Add sanity check for read/write_iter (git-fixes).
  • loop: LOOP_SET_FD: send uevents for partitions (git-fixes).
  • loop: aio inherit the ioprio of original request (git-fixes).
  • loop: do not require ->write_iter for writable files in loop_configure (git-fixes).
  • loop: properly send KOBJ_CHANGED uevent for disk device (git-fixes).
  • loop: stop using vfs_iter_{read,write} for buffered I/O (git-fixes).
  • md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes).
  • md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes).
  • md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb (bsc#1238212).
  • md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes).
  • md/md-cluster: fix spares warnings for __le64 (git-fixes).
  • md/raid0: do not free conf on raid0_run failure (git-fixes).
  • md/raid1,raid10: do not ignore IO flags (git-fixes).
  • md/raid10: fix missing discard IO accounting (git-fixes).
  • md/raid10: wait barrier before returning discard request with REQ_NOWAIT (git-fixes).
  • md/raid1: Add check for missing source disk in process_checks() (git-fixes).
  • md/raid1: do not free conf on raid0_run failure (git-fixes).
  • md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes).
  • md/raid5: Wait sync io to finish before changing group cnt (git-fixes).
  • md/raid5: implement pers->bitmap_sector() (git-fixes).
  • md: Do not flush sync_work in md_write_start() (git-fixes).
  • md: add a new callback pers->bitmap_sector() (git-fixes).
  • md: convert comma to semicolon (git-fixes).
  • md: ensure resync is prioritized over recovery (git-fixes).
  • md: fix mddev uaf while iterating all_mddevs list (git-fixes).
  • md: preserve KABI in struct md_personality v2 (git-fixes).
  • mdacon: rework dependency list (git-fixes).
  • media: i2c: adv748x: Fix test pattern selection mask (git-fixes).
  • media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes).
  • media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes).
  • media: i2c: ov7251: Set enable GPIO low in probe (git-fixes).
  • media: platform: allgro-dvt: unregister v4l2_device on the error path (git-fixes).
  • media: platform: stm32: Add check for clk_enable() (git-fixes).
  • media: siano: Fix error handling in smsdvb_module_init() (git-fixes).
  • media: streamzap: fix race between device disconnection and urb callback (git-fixes).
  • media: streamzap: prevent processing IR data on URB failure (git-fixes).
  • media: uvcvideo: Add quirk for Actions UVC05 (stable-fixes).
  • media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git-fixes).
  • media: venus: hfi: add a check to handle OOB in sfr region (git-fixes).
  • media: venus: hfi: add check to handle incorrect queue size (git-fixes).
  • media: venus: hfi_parser: add check to avoid out of bound access (git-fixes).
  • media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes).
  • media: verisilicon: HEVC: Initialize start_bit field (git-fixes).
  • media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes).
  • media: vim2m: print device name after registering device (git-fixes).
  • media: visl: Fix ERANGE error when setting enum controls (git-fixes).
  • mei: me: add panther lake H DID (stable-fixes).
  • mei: me: add panther lake P DID (stable-fixes).
  • memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes).
  • memory: mtk-smi: Add ostd setting for mt8192 (git-fixes).
  • memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes).
  • mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes).
  • mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes).
  • mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes).
  • mfd: syscon: Fix race in device_node_get_regmap() (git-fixes).
  • mfd: syscon: Remove extern from function prototypes (stable-fixes).
  • mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes).
  • misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration (git-fixes).
  • misc: microchip: pci1xxxx: Fix incorrect IRQ status handling during ack (git-fixes).
  • mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600).
  • mm/readahead: fix large folio support in async readahead (bsc#1242321).
  • mm: accept to promo watermark (bsc#1239600).
  • mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600).
  • mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600).
  • mm: fix error handling in __filemap_get_folio() with FGP_NOWAIT (bsc#1242326).
  • mm: fix filemap_get_folios_contig returning batches of identical folios (bsc#1242327).
  • mm: fix oops when filemap_map_pmd() without prealloc_pte (bsc#1242546).
  • mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git-fixes)
  • mm: zswap: move allocations during CPU init outside the lock (git-fixes).
  • mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes).
  • mmc: dw_mmc: add a quirk for accessing 64-bit FIFOs in two halves (stable-fixes).
  • mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes).
  • mmc: renesas_sdhi: Fix error handling in renesas_sdhi_probe (git-fixes).
  • mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes).
  • mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes).
  • mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes).
  • mptcp: mptcp_parse_option() fix for MPTCPOPT_MP_JOIN (git-fixes).
  • mptcp: refine opt_mp_capable determination (git-fixes).
  • mptcp: relax check on MPC passive fallback (git-fixes).
  • mptcp: strict validation before using mp_opt->hmac (git-fixes).
  • mptcp: use OPTION_MPTCP_MPJ_SYN in subflow_check_req() (git-fixes).
  • mtd: Add check for devm_kcalloc() (git-fixes).
  • mtd: Replace kcalloc() with devm_kcalloc() (git-fixes).
  • mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes).
  • mtd: nand: Fix a kdoc comment (git-fixes).
  • mtd: phram: Add the kernel lock down check (bsc#1232649).
  • mtd: rawnand: Add status chack in r852_ready() (git-fixes).
  • mtd: rawnand: brcmnand: fix PM resume warning (git-fixes).
  • ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994).
  • ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994).
  • neighbour: delete redundant judgment statements (git-fixes).
  • net l2tp: drop flow hash on forward (git-fixes).
  • net/handshake: Fix handshake_req_destroy_test1 (git-fixes).
  • net/handshake: Fix memory leak in __sock_create() and sock_alloc_file() (git-fixes).
  • net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes).
  • net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git-fixes).
  • net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged (git-fixes).
  • net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes).
  • net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes).
  • net/mlx5: Fill out devlink dev info only for PFs (git-fixes).
  • net/mlx5: IRQ, Fix null string in debug print (git-fixes).
  • net/mlx5: Lag, Check shared fdb before creating MultiPort E-Switch (git-fixes).
  • net/mlx5: Start health poll after enable hca (git-fixes).
  • net/mlx5e: Disable MACsec offload for uplink representor profile (git-fixes).
  • net/mlx5e: Fix ethtool -N flow-type ip4 to RSS context (git-fixes).
  • net/mlx5e: Prevent bridge link show failure for non-eswitch-allowed devices (git-fixes).
  • net/mlx5e: SHAMPO, Make reserved size independent of page size (git-fixes).
  • net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes).
  • net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes).
  • net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes).
  • net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes).
  • net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes).
  • net/sched: flower: Add lock protection when remove filter handle (git-fixes).
  • net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes).
  • net/sched: tbf: correct backlog statistic for GSO packets (git-fixes).
  • net/tcp: refactor tcp_inet6_sk() (git-fixes).
  • net: Add non-RCU dev_getbyhwaddr() helper (git-fixes).
  • net: Clear old fragment checksum value in napi_reuse_skb (git-fixes).
  • net: Fix undefined behavior in netdev name allocation (bsc#1233749).
  • net: Handle napi_schedule() calls from non-interrupt (git-fixes).
  • net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes).
  • net: Remove acked SYN flag from packet in the transmit queue correctly (git-fixes).
  • net: add dev_net_rcu() helper (bsc#1239994).
  • net: annotate data-races around sk->sk_dst_pending_confirm (git-fixes).
  • net: annotate data-races around sk->sk_tx_queue_mapping (git-fixes).
  • net: avoid UAF on deleted altname (bsc#1233749).
  • net: blackhole_dev: fix build warning for ethh set but not used (git-fixes).
  • net: check for altname conflicts when changing netdev's netns (bsc#1233749).
  • net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes).
  • net: core: Use the bitmap API to allocate bitmaps (bsc#1233749).
  • net: do not dump stack on queue timeout (git-fixes).
  • net: do not send a MOVE event when netdev changes netns (bsc#1233749).
  • net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749).
  • net: ethtool: Do not call .cleanup_data when prepare_data fails (git-fixes).
  • net: ethtool: Fix RSS setting (git-fixes).
  • net: fix ifname in netlink ntf during netns move (bsc#1233749).
  • net: fix removing a namespace with conflicting altnames (bsc#1233749).
  • net: free altname using an RCU callback (bsc#1233749).
  • net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes).
  • net: ipv6: fix UDPv6 GSO segmentation with NAT (git-fixes).
  • net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes).
  • net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes).
  • net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes).
  • net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes).
  • net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes).
  • net: ipv6: fix wrong start position when receive hop-by-hop fragment (git-fixes).
  • net: ipv6: ioam6: code alignment (git-fixes).
  • net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes).
  • net: ipv6: ioam6: new feature tunsrc (git-fixes).
  • net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes).
  • net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes).
  • net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git-fixes).
  • net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes).
  • net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes).
  • net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes).
  • net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes).
  • net: loopback: Avoid sending IP packets without an Ethernet header (git-fixes).
  • net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749).
  • net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
  • net: mana: Allow variable size indirection table (bsc#1239016).
  • net: mana: Assigning IRQ affinity on HT cores (bsc#1239015).
  • net: mana: Avoid open coded arithmetic (bsc#1239016).
  • net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015).
  • net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015).
  • net: mana: Support holes in device list reply msg (git-fixes).
  • net: mana: Switch to page pool for jumbo frames (git-fixes).
  • net: mana: add a function to spread IRQs per CPUs (bsc#1239015).
  • net: mana: cleanup mana struct after debugfs_remove() (git-fixes).
  • net: mark racy access on sk->sk_rcvbuf (git-fixes).
  • net: move altnames together with the netdevice (bsc#1233749).
  • net: phy: leds: fix memory leak (git-fixes).
  • net: phy: microchip: force IRQ polling mode for lan88xx (git-fixes).
  • net: qede: Initialize qede_ll_ops with designated initializer (git-fixes).
  • net: reduce indentation of __dev_alloc_name() (bsc#1233749).
  • net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes).
  • net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749).
  • net: remove else after return in dev_prep_valid_name() (bsc#1233749).
  • net: sctp: fix skb leak in sctp_inq_free() (git-fixes).
  • net: set SOCK_RCU_FREE before inserting socket into hashtable (git-fixes).
  • net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes).
  • net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension (git-fixes).
  • net: trust the bitmap in __dev_alloc_name() (bsc#1233749).
  • net: usb: asix_devices: add FiberGecko DeviceID (stable-fixes).
  • net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes).
  • net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes).
  • net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480).
  • net: use unrcu_pointer() helper (git-fixes).
  • net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable-fixes).
  • net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes).
  • net_sched: drr: Fix double list add in class with netem as child qdisc (git-fixes).
  • net_sched: ets: Fix double list add in class with netem as child qdisc (git-fixes).
  • net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (git-fixes).
  • net_sched: qfq: Fix double list add in class with netem as child qdisc (git-fixes).
  • net_sched: sch_sfq: annotate data-races around q->perturb_period (git-fixes).
  • net_sched: sch_sfq: handle bigger packets (git-fixes).
  • netdev-genl: avoid empty messages in queue dump (git-fixes).
  • netdev: fix repeated netlink messages in queue dump (git-fixes).
  • netlink: annotate data-races around sk->sk_err (git-fixes).
  • netpoll: Ensure clean state on setup failures (git-fixes).
  • netpoll: Use rcu_access_pointer() in netpoll_poll_lock (git-fixes).
  • nfs: add missing selections of CONFIG_CRC32 (git-fixes).
  • nfs: clear SB_RDONLY before getting superblock (bsc#1238565).
  • nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes).
  • nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565).
  • nfsd: add list_head nf_gc to struct nfsd_file (git-fixes).
  • nfsd: clear acl_access/acl_default after releasing them (git-fixes).
  • nfsd: decrease sc_count directly if fail to queue dl_recall (git-fixes).
  • nfsd: put dl_stid if fail to queue dl_recall (git-fixes).
  • nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes).
  • nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git-fixes).
  • ntb: Force physically contiguous allocation of rx ring buffers (git-fixes).
  • ntb: intel: Fix using link status DB's (git-fixes).
  • ntb: reduce stack usage in idt_scan_mws (stable-fixes).
  • ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes).
  • ntb_hw_amd: Add NTB PCI ID for new gen CPU (stable-fixes).
  • ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes).
  • ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes).
  • ntb_perf: Fix printk format (git-fixes).
  • nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649).
  • nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649).
  • nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649).
  • nvme-fc: use ctrl state getter (git-fixes).
  • nvme-ioctl: fix leaked requests on mapping error (git-fixes).
  • nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes).
  • nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes).
  • nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes bsc#1223096).
  • nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148).
  • nvme-pci: clean up CMBMSC when registering CMB fails (git-fixes).
  • nvme-pci: fix queue unquiesce check on slot_reset (git-fixes).
  • nvme-pci: fix stuck reset on concurrent DPC and HP (git-fixes).
  • nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes).
  • nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes).
  • nvme-pci: remove stale comment (git-fixes).
  • nvme-pci: skip CMB blocks incompatible with PCI P2P DMA (git-fixes).
  • nvme-pci: skip nvme_write_sq_db on empty rqlist (git-fixes).
  • nvme-tcp: Fix a C2HTermReq error message (git-fixes).
  • nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes).
  • nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes).
  • nvme-tcp: fix possible UAF in nvme_tcp_poll (git-fixes).
  • nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git-fixes).
  • nvme-tcp: fix premature queue removal and I/O failover (git-fixes).
  • nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes).
  • nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes).
  • nvme/ioctl: add missing space in err message (git-fixes).
  • nvme/ioctl: do not warn on vectorized uring_cmd with fixed buffer (git-fixes).
  • nvme: Add 'partial_nid' quirk (bsc#1241148).
  • nvme: Add warning when a partiually unique NID is detected (bsc#1241148).
  • nvme: fixup scan failure for non-ANA multipath controllers (git-fixes).
  • nvme: handle connectivity loss in nvme_set_queue_count (git-fixes).
  • nvme: introduce nvme_disk_is_ns_head helper (git-fixes).
  • nvme: make nvme_tls_attrs_group static (git-fixes).
  • nvme: move error logging from nvme_end_req() to __nvme_end_req() (git-fixes).
  • nvme: move passthrough logging attribute to head (git-fixes).
  • nvme: multipath: fix return value of nvme_available_path (git-fixes).
  • nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649).
  • nvme: re-read ANA log page after ns scan completes (git-fixes).
  • nvme: requeue namespace scan on missed AENs (git-fixes).
  • nvme: tcp: Fix compilation warning with W=1 (git-fixes).
  • nvme: unblock ctrl state transition for firmware update (git-fixes).
  • nvmet-fc: Remove unused functions (git-fixes).
  • nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes).
  • nvmet-fc: inline nvmet_fc_free_hostport (git-fixes).
  • nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes).
  • nvmet-fc: take tgtport reference only once (git-fixes).
  • nvmet-fc: update tgtport ref per assoc (git-fixes).
  • nvmet-fcloop: Remove remote port from list when unlinking (git-fixes).
  • nvmet-fcloop: add ref counting to lport (git-fixes).
  • nvmet-fcloop: replace kref with refcount (git-fixes).
  • nvmet-fcloop: swap list_add_tail arguments (git-fixes).
  • nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git-fixes).
  • nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes).
  • nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes).
  • nvmet: Fix crash when a namespace is disabled (git-fixes).
  • nvmet: remove old function prototype (git-fixes).
  • objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git-fixes).
  • objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963).
  • objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes).
  • objtool: Fix segfault in ignore_unreachable_insn() (git-fixes).
  • ocfs2: check dir i_size in ocfs2_find_entry (git-fixes).
  • ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes).
  • ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes).
  • ocfs2: handle a symlink read error correctly (git-fixes).
  • ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes).
  • ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes).
  • octeontx2-pf: qos: fix VF root node parent queue index (git-fixes).
  • orangefs: fix a oob in orangefs_debug_write (git-fixes).
  • packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).
  • packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 ("Use gcc-13 for build on SLE16 (jsc#PED-10028).")
  • padata: do not leak refcount in reorder_work (git-fixes).
  • padata: fix sysfs store callback check (git-fixes).
  • partitions: mac: fix handling of bogus partition table (git-fixes).
  • perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309).
  • perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309).
  • perf tools: annotate asm_pure_loop.S (bsc#1239906).
  • perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309).
  • perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering (bsc#1242172)
  • perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc (bsc#1242172)
  • perf: arm_cspmu: nvidia: monitor all ports by default (bsc#1242172)
  • perf: arm_cspmu: nvidia: remove unsupported SCF events (bsc#1242172)
  • phy: Fix error handling in tegra_xusb_port_init (git-fixes).
  • phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes).
  • phy: freescale: imx8m-pcie: assert phy reset and perst in power off (git-fixes).
  • phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes).
  • phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes).
  • phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes).
  • phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git-fixes).
  • phy: tegra: xusb: remove a stray unlock (git-fixes).
  • phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes).
  • pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes).
  • pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes).
  • pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git-fixes).
  • pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes).
  • pinctrl: renesas: rza2: Fix potential NULL pointer dereference (stable-fixes).
  • pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes).
  • pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes).
  • platform/x86/amd/pmc: Declare quirk_spurious_8042 for MECHREVO Wujie 14XA (GX4HRXL) (git-fixes).
  • platform/x86/amd: pmc: Require at least 2.5 seconds between HW sleep cycles (stable-fixes).
  • platform/x86/intel-uncore-freq: Fix missing uncore sysfs during CPU hotplug (git-fixes).
  • platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes).
  • platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable-fixes).
  • platform/x86: ISST: Correct command storage data length (git-fixes).
  • platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection (git-fixes).
  • platform/x86: dell-ddv: Fix temperature calculation (git-fixes).
  • platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() (git-fixes).
  • platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes).
  • platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable-fixes).
  • platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes).
  • platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable-fixes).
  • pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable-fixes).
  • pnfs/flexfiles: retry getting layout segment for reads (git-fixes).
  • power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes).
  • powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes).
  • powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes).
  • powercap: intel_rapl: Introduce APIs for PMU support (bsc#1241010).
  • powercap: intel_rapl_tpmi: Enable PMU support (bsc#1241010).
  • powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes).
  • powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes).
  • powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes).
  • powerpc/boot: Check for ld-option support (bsc#1215199).
  • powerpc/boot: Fix dash warning (bsc#1215199).
  • powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573).
  • powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573).
  • powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (bsc#1239691 bsc#1243044 ltc#212555).
  • powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055).
  • powerpc: Do not use --- in kernel logs (git-fixes).
  • powerpc: Stop using no_llseek (bsc#1239573).
  • printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950).
  • pwm: fsl-ftm: Handle clk_get_rate() returning 0 (git-fixes).
  • pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config() (git-fixes).
  • pwm: rcar: Improve register calculation (git-fixes).
  • qibfs: fix another leak (git-fixes)
  • rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes).
  • rapidio: fix an API misues when rio_add_net() fails (git-fixes).
  • rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes)
  • rcu/tasks: Handle new PF_IDLE semantics (git-fixes)
  • rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes)
  • rcu: Introduce rcu_cpu_online() (git-fixes)
  • regulator: check that dummy regulator has been probed before using it (stable-fixes).
  • regulator: core: Fix deadlock in create_regulator() (git-fixes).
  • regulator: dummy: force synchronous probing (git-fixes).
  • regulator: max20086: fix invalid memory access (git-fixes).
  • rndis_host: Flag RNDIS modems as WWAN devices (git-fixes).
  • rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN
  • rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).
  • rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986).
  • rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)
  • rpm/package-descriptions: Add rt and rt_debug descriptions
  • rpm/release-projects: Update the ALP projects again (bsc#1231293).
  • rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)
  • rtc: pcf85063: do a SW reset if POR failed (stable-fixes).
  • rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013).
  • s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805).
  • s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979).
  • s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368).
  • s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978).
  • s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git-fixes bsc#1238368).
  • s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594).
  • s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595).
  • sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743).
  • sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052)
  • scsi: Improve CDL control (git-fixes).
  • scsi: core: Clear driver private data when retrying request (git-fixes).
  • scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes).
  • scsi: core: Do not retry I/Os during depopulation (git-fixes).
  • scsi: core: Handle depopulation and restoration in progress (git-fixes).
  • scsi: core: Use GFP_NOIO to avoid circular locking dependency (git-fixes).
  • scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes).
  • scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes).
  • scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes).
  • scsi: hisi_sas: Enable force phy when SATA disk directly connected (git-fixes).
  • scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git-fixes).
  • scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes).
  • scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git-fixes).
  • scsi: iscsi: Fix missing scsi_host_put() in error path (git-fixes).
  • scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes).
  • scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1242993).
  • scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993).
  • scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347).
  • scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993).
  • scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993).
  • scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands (bsc#1242993).
  • scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993).
  • scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347).
  • scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347).
  • scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347).
  • scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset (bsc#1242993).
  • scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI retry (bsc#1242993).
  • scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347).
  • scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset (bsc#1242993).
  • scsi: lpfc: Restore clearing of NLP_UNREG_INP in ndlp->nlp_flag (git-fixes).
  • scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347).
  • scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993).
  • scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966).
  • scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993).
  • scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes).
  • scsi: megaraid_sas: Fix for a potential deadlock (git-fixes).
  • scsi: mpi3mr: Fix locking in an error path (git-fixes).
  • scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes).
  • scsi: mpi3mr: Start controller indexing from 0 (git-fixes).
  • scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes).
  • scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253).
  • scsi: mpt3sas: Fix a locking bug in an error path (git-fixes).
  • scsi: mpt3sas: Reduce log level of ignore_delay_remove message to KERN_INFO (git-fixes).
  • scsi: myrb: Remove dead code (git-fixes).
  • scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes).
  • scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes).
  • scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes).
  • scsi: qla2xxx: Fix typos in a comment (bsc#1243090).
  • scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090).
  • scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090).
  • scsi: qla2xxx: Remove unused module parameters (bsc#1243090).
  • scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090).
  • scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090).
  • scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090).
  • scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090).
  • scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090).
  • scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090).
  • scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090).
  • scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes).
  • scsi: scsi_debug: Remove a reference to in_use_bm (git-fixes).
  • scsi: sg: Enable runtime power management (git-fixes).
  • scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git-fixes).
  • scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes).
  • sctp: Fix undefined behavior in left shift operation (git-fixes).
  • sctp: add mutual exclusion in proc_sctp_do_udp_port() (git-fixes).
  • sctp: detect and prevent references to a freed transport in sendmsg (git-fixes).
  • sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start (git-fixes).
  • sctp: fix association labeling in the duplicate COOKIE-ECHO case (git-fixes).
  • sctp: fix busy polling (git-fixes).
  • sctp: prefer struct_size over open coded arithmetic (git-fixes).
  • sctp: support MSG_ERRQUEUE flag in recvmsg() (git-fixes).
  • security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375).
  • selftests/bpf: Add a few tests to cover (git-fixes).
  • selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes).
  • selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes).
  • selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes).
  • selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes).
  • selftests/bpf: add fp-leaking precise subprog result tests (git-fixes).
  • selftests/bpf: extend changes_pkt_data with cases w/o subprograms (bsc#1241590).
  • selftests/bpf: freplace tests for tracking of changes_packet_data (bsc#1241590).
  • selftests/bpf: test for changing packet data from global functions (bsc#1241590).
  • selftests/bpf: validate that tail call invalidates packet pointers (bsc#1241590).
  • selftests/futex: futex_waitv wouldblock test should fail (git-fixes).
  • selftests/mm/cow: fix the incorrect error handling (git-fixes).
  • selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test (bsc#1242203).
  • selftests/mm: generate a temporary mountpoint for cgroup filesystem (git-fixes).
  • selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes).
  • selftests: mptcp: close fd_in before returning in main_loop (git-fixes).
  • selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes).
  • selinux: Implement mptcp_add_subflow hook (bsc#1240375).
  • seq_file: add helper macro to define attribute for rw file (jsc#PED-12416).
  • serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes).
  • serial: msm: Configure correct working mode before starting earlycon (git-fixes).
  • serial: sifive: lock port in startup()/shutdown() callbacks (git-fixes).
  • series.conf: temporarily disable patches.suse/md-md-bitmap-fix-writing-non-bitmap-pages-ab99.patch (bsc#1238212)
  • slimbus: messaging: Free transaction ID in delayed interrupt scenario (git-fixes).
  • smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes).
  • smb3: request handle caching when caching directories (bsc#1231432).
  • smb3: retrying on failed server close (bsc#1231432).
  • smb: cached directories can be more than root file handle (bsc#1231432).
  • smb: cilent: set reparse mount points as automounts (git-fixes).
  • smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes).
  • smb: client: Fix minor whitespace errors and warnings (git-fixes).
  • smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes).
  • smb: client: add support for WSL reparse points (git-fixes).
  • smb: client: allow creating special files via reparse points (git-fixes).
  • smb: client: allow creating symlinks via reparse points (git-fixes).
  • smb: client: cleanup smb2_query_reparse_point() (git-fixes).
  • smb: client: destroy cfid_put_wq on module exit (git-fixes).
  • smb: client: do not query reparse points twice on symlinks (git-fixes).
  • smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432).
  • smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432).
  • smb: client: fix OOB in smb2_query_reparse_point() (git-fixes).
  • smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes).
  • smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes).
  • smb: client: fix folio leaks and perf improvements (bsc#1239997, bsc1241265).
  • smb: client: fix hardlinking of reparse points (git-fixes).
  • smb: client: fix missing mode bits for SMB symlinks (git-fixes).
  • smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616).
  • smb: client: fix possible double free in smb2_set_ea() (git-fixes).
  • smb: client: fix potential broken compound request (git-fixes).
  • smb: client: fix renaming of reparse points (git-fixes).
  • smb: client: get rid of smb311_posix_query_path_info() (git-fixes).
  • smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes).
  • smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes).
  • smb: client: handle path separator of created SMB symlinks (git-fixes).
  • smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes).
  • smb: client: ignore unhandled reparse tags (git-fixes).
  • smb: client: implement ->query_reparse_point() for SMB1 (git-fixes).
  • smb: client: instantiate when creating SFU files (git-fixes).
  • smb: client: introduce ->parse_reparse_point() (git-fixes).
  • smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes).
  • smb: client: introduce cifs_sfu_make_node() (git-fixes).
  • smb: client: introduce reparse mount option (git-fixes).
  • smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432).
  • smb: client: move most of reparse point handling code to common file (git-fixes).
  • smb: client: move some params to cifs_open_info_data (bsc#1231432).
  • smb: client: optimise reparse point querying (git-fixes).
  • smb: client: parse owner/group when creating reparse points (git-fixes).
  • smb: client: parse reparse point flag in create response (bsc#1231432).
  • smb: client: parse uid, gid, mode and dev from WSL reparse points (git-fixes).
  • smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896).
  • smb: client: reduce number of parameters in smb2_compound_op() (git-fixes).
  • smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432).
  • smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes).
  • smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432).
  • smb: client: retry compound request without reusing lease (git-fixes).
  • smb: client: return reparse type in /proc/mounts (git-fixes).
  • smb: client: reuse file lease key in compound operations (git-fixes).
  • smb: client: set correct d_type for reparse DFS/DFSR and mount point (git-fixes).
  • smb: client: set correct file type from NFS reparse points (git-fixes).
  • smb: client: stop revalidating reparse points unnecessarily (git-fixes).
  • smb: use kernel_connect() and kernel_bind() (git-fixes).
  • soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes).
  • soc: imx8m: Remove global soc_uid (stable-fixes).
  • soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes).
  • soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes).
  • soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes).
  • soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes).
  • soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes).
  • soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes).
  • soc: qcom: pdr: Fix the potential deadlock (git-fixes).
  • soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes).
  • sound/virtio: Fix cancel_sync warnings on uninitialized work_structs (stable-fixes).
  • soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes).
  • spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes).
  • spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes).
  • spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes).
  • spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes).
  • spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes).
  • spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes).
  • spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes).
  • spi: tegra114: Do not fail set_cs_timing when delays are zero (git-fixes).
  • spi: tegra114: Use value to check for invalid delays (git-fixes).
  • spi: tegra210-quad: add rate limiting and simplify timeout error message (stable-fixes).
  • spi: tegra210-quad: use WARN_ON_ONCE instead of WARN_ON for timeouts (stable-fixes).
  • splice: do not checksum AF_UNIX sockets (bsc#1240333).
  • splice: remove duplicate noinline from pipe_clear_nowait (bsc#1242328).
  • staging: axis-fifo: Correct handling of tx_fifo_depth for size validation (git-fixes).
  • staging: axis-fifo: Remove hardware resets for user errors (git-fixes).
  • staging: iio: adc: ad7816: Correct conditional logic for store mode (git-fixes).
  • staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes).
  • string: Add load_unaligned_zeropad() code path to sized_strscpy() (git-fixes).
  • sunrpc: suppress warnings for unused procfs functions (git-fixes).
  • supported.conf: add now-included qat_420xx (external, intel)
  • tcp: Add memory barrier to tcp_push() (git-fixes).
  • tcp: Adjust clamping window for applications specifying SO_RCVBUF (git-fixes).
  • tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes).
  • tcp: Defer ts_recent changes until req is owned (git-fixes).
  • tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes).
  • tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes).
  • tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non-wildcard addresses (git-fixes).
  • tcp: Update window clamping condition (git-fixes).
  • tcp: add tcp_done_with_error() helper (git-fixes).
  • tcp: adjust rcvq_space after updating scaling ratio (git-fixes).
  • tcp: annotate data-races around tp->window_clamp (git-fixes).
  • tcp: avoid premature drops in tcp_add_backlog() (git-fixes).
  • tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes).
  • tcp: check mptcp-level constraints for backlog coalescing (git-fixes).
  • tcp: check space before adding MPTCP SYN options (git-fixes).
  • tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes).
  • tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes).
  • tcp: define initial scaling factor value as a macro (git-fixes).
  • tcp: derive delack_max from rto_min (git-fixes).
  • tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git-fixes).
  • tcp: fix cookie_init_timestamp() overflows (git-fixes).
  • tcp: fix forever orphan socket caused by tcp_abort (git-fixes).
  • tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes).
  • tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes).
  • tcp: fix mid stream window clamp (git-fixes).
  • tcp: fix mptcp DSS corruption due to large pmtu xmit (git-fixes).
  • tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes).
  • tcp: fix race in tcp_write_err() (git-fixes).
  • tcp: fix races in tcp_abort() (git-fixes).
  • tcp: fix races in tcp_v_err() (git-fixes).
  • tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git-fixes).
  • tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git-fixes).
  • tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes).
  • tcp: increase the default TCP scaling ratio (git-fixes).
  • tcp: introduce tcp_clock_ms() (git-fixes).
  • tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes).
  • tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes).
  • tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes).
  • tcp: replace tcp_time_stamp_raw() (git-fixes).
  • tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes).
  • tcp_cubic: fix incorrect HyStart round start detection (git-fixes).
  • thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes).
  • thermal: int340x: Add NULL check for adev (git-fixes).
  • thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git-fixes).
  • thunderbolt: Scan retimers after device router has been enumerated (stable-fixes).
  • tools/hv: update route parsing in kvp daemon (git-fixes).
  • tools/power turbostat: Increase CPU_SUBSET_MAXCPUS to 8192 (bsc#1241175).
  • tools/power turbostat: report CoreThr per measurement interval (git-fixes).
  • tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes).
  • tools: move alignment-related macros to new <linux/align.h> (git-fixes).
  • topology: Set capacity_freq_ref in all cases (bsc#1238052)
  • tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes).
  • tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870).
  • tpm: do not start chip while suspended (git-fixes).
  • tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870).
  • tpm: tis: Double the timeout B to 4s (bsc#1235870).
  • tpm_tis: Move CRC check to generic send routine (bsc#1235870).
  • tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870).
  • tty: n_tty: use uint for space returned by tty_write_room() (git-fixes).
  • tty: serial: 8250: Add Brainboxes XC devices (stable-fixes).
  • tty: serial: 8250: Add some more device IDs (stable-fixes).
  • tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes).
  • tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes).
  • ubi: Add a check for ubi_num (git-fixes).
  • ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes).
  • ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes).
  • ubi: correct the calculation of fastmap size (stable-fixes).
  • ubi: eba: properly rollback inside self_check_eba (git-fixes).
  • ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes).
  • ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes).
  • ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git-fixes).
  • ubi: wl: Put source PEB into correct list if trying locking LEB failed (git-fixes).
  • ublk: set_params: properly check if parameters can be applied (git-fixes).
  • ucsi_ccg: Do not show failed to get FW build information error (git-fixes).
  • udf: Fix inode_getblk() return value (bsc#1242313).
  • udf: Skip parent dir link count update if corrupted (bsc#1242315).
  • udf: Verify inode link counts before performing rename (bsc#1242314).
  • usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes).
  • usb: cdns3: Fix deadlock when using NCM gadget (git-fixes).
  • usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version (git-fixes).
  • usb: chipidea: ci_hdrc_imx: fix call balance of regulator routines (git-fixes).
  • usb: chipidea: ci_hdrc_imx: implement usb_phy_init() error handling (git-fixes).
  • usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes).
  • usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield (stable-fixes).
  • usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes).
  • usb: dwc3: gadget: Refactor loop to avoid NULL endpoints (stable-fixes).
  • usb: dwc3: gadget: check that event count does not exceed event buffer length (git-fixes).
  • usb: dwc3: xilinx: Prevent spike in reset signal (git-fixes).
  • usb: gadget: Check bmAttributes only if configuration is valid (git-fixes).
  • usb: gadget: Fix setting self-powered state on suspend (git-fixes).
  • usb: gadget: Set self-powered based on MaxPower and bmAttributes (git-fixes).
  • usb: gadget: Use get_status callback to set remote wakeup capability (git-fixes).
  • usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev() (stable-fixes).
  • usb: gadget: f_ecm: Add get_status callback (git-fixes).
  • usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN (git-fixes).
  • usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git-fixes).
  • usb: host: max3421-hcd: Add missing spi_device_id table (stable-fixes).
  • usb: host: tegra: Prevent host controller crash when OTG port is used (git-fixes).
  • usb: host: xhci-plat: mvebu: use ->quirks instead of ->init_quirk() func (stable-fixes).
  • usb: hub: lack of clearing xHC resources (git-fixes).
  • usb: phy: generic: Use proper helper for property detection (stable-fixes).
  • usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes).
  • usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive (stable-fixes).
  • usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive (stable-fixes).
  • usb: renesas_usbhs: Call clk_put() (git-fixes).
  • usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes).
  • usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes).
  • usb: typec: class: Invalidate USB device pointers on partner unregistration (git-fixes).
  • usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes).
  • usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition (git-fixes).
  • usb: typec: ucsi: Fix NULL pointer access (git-fixes).
  • usb: typec: ucsi: displayport: Fix NULL pointer access (git-fixes).
  • usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes).
  • usb: uhci-platform: Make the clock really optional (git-fixes).
  • usb: usbtmc: Fix erroneous generic_read ioctl return (git-fixes).
  • usb: usbtmc: Fix erroneous get_stb ioctl error returns (git-fixes).
  • usb: usbtmc: Fix erroneous wait_srq ioctl return (git-fixes).
  • usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes).
  • usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes).
  • usb: xhci: correct debug message page size calculation (git-fixes).
  • usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes).
  • usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes).
  • usbnet:fix NPE during rx_complete (git-fixes).
  • vboxsf: fix building with GCC 15 (stable-fixes).
  • vdpa/mlx5: Fix oversized null mkey longer than 32bit (git-fixes).
  • vfs: do not mod negative dentry count when on shrinker list (bsc#1242534).
  • vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git-fixes).
  • virtchnl: make proto and filter action count unsigned (git-fixes).
  • virtio_console: fix missing byte order handling for cols and rows (git-fixes).
  • vmxnet3: Fix tx queue race condition with XDP (bsc#1241394).
  • vmxnet3: unregister xdp rxq info in the reset path (bsc#1241394).
  • wifi: at76c50x: fix use after free access in at76_disconnect (git-fixes).
  • wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes).
  • wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git-fixes).
  • wifi: ath11k: choose default PM policy for hibernation (bsc#1207948).
  • wifi: ath11k: determine PM policy based on machine model (bsc#1207948).
  • wifi: ath11k: fix RCU stall while reaping monitor destination ring (git-fixes).
  • wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes).
  • wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git-fixes).
  • wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948).
  • wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948).
  • wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948).
  • wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes).
  • wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (stable-fixes).
  • wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process (stable-fixes).
  • wifi: ath12k: encode max Tx power in scan channel list command (git-fixes).
  • wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes).
  • wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() (git-fixes).
  • wifi: brcmfmac: keep power during suspend if board requires it (stable-fixes).
  • wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes).
  • wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation (git-fixes).
  • wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes).
  • wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes).
  • wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes).
  • wifi: iwlwifi: limit printed string from FW file (git-fixes).
  • wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes).
  • wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes).
  • wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes).
  • wifi: mac80211: Purge vif txq in ieee80211_do_stop() (git-fixes).
  • wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request (git-fixes).
  • wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue() (git-fixes).
  • wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes).
  • wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes).
  • wifi: mt76: Add check for devm_kstrdup() (git-fixes).
  • wifi: mt76: disable napi on driver removal (git-fixes).
  • wifi: mt76: mt76x2u: add TP-Link TL-WDN6200 ID to device table (stable-fixes).
  • wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes).
  • wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes).
  • wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes).
  • wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes).
  • wifi: mwifiex: Fix premature release of RF calibration data (git-fixes).
  • wifi: nl80211: reject cooked mode if it is set along with other flags (git-fixes).
  • wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release (git-fixes).
  • wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git-fixes).
  • wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes).
  • wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes).
  • wifi: wl1251: fix memory leak in wl1251_tx_work (git-fixes).
  • x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes).
  • x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
  • x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes).
  • x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes).
  • x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes).
  • x86/boot/32: Temporarily map initrd for microcode loading (git-fixes).
  • x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes).
  • x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
  • x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).
  • x86/bugs: Add RSB mitigation document (git-fixes).
  • x86/bugs: Do not fill RSB on VMEXIT with eIBRS+retpoline (git-fixes).
  • x86/bugs: Do not fill RSB on context switch with eIBRS (git-fixes).
  • x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git-fixes).
  • x86/bugs: Rename entry_ibpb() to write_ibpb() (git-fixes).
  • x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes).
  • x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes).
  • x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes).
  • x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git-fixes).
  • x86/dumpstack: Fix inaccurate unwinding from exception stacks due to misplaced assignment (git-fixes).
  • x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes).
  • x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes).
  • x86/fpu: Fix guest FPU state buffer allocation size (git-fixes).
  • x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes).
  • x86/hyperv: Fix check of return value from snp_set_vmsa() (git-fixes).
  • x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes).
  • x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes).
  • x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes).
  • x86/microcode/32: Move early loading after paging enable (git-fixes).
  • x86/microcode/AMD: Fix a -Wsometimes-uninitialized clang false positive (git-fixes).
  • x86/microcode/AMD: Flush patch buffer mapping after application (git-fixes).
  • x86/microcode/AMD: Pay attention to the stepping dynamically (git-fixes).
  • x86/microcode/AMD: Split load_microcode_amd() (git-fixes).
  • x86/microcode/AMD: Use the family,model,stepping encoded in the patch ID (git-fixes).
  • x86/microcode/amd: Cache builtin microcode too (git-fixes).
  • x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes).
  • x86/microcode/amd: Use cached microcode for AP load (git-fixes).
  • x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes).
  • x86/microcode/intel: Add a minimum required revision for late loading (git-fixes).
  • x86/microcode/intel: Cleanup code further (git-fixes).
  • x86/microcode/intel: Move microcode functions out of cpu/intel.c (git-fixes).
  • x86/microcode/intel: Remove debug code (git-fixes).
  • x86/microcode/intel: Remove pointless mutex (git-fixes).
  • x86/microcode/intel: Rename get_datasize() since its used externally (git-fixes).
  • x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes).
  • x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes).
  • x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes).
  • x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git-fixes).
  • x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes).
  • x86/microcode/intel: Set new revision only after a successful update (git-fixes).
  • x86/microcode/intel: Simplify and rename generic_load_microcode() (git-fixes).
  • x86/microcode/intel: Simplify early loading (git-fixes).
  • x86/microcode/intel: Simplify scan_microcode() (git-fixes).
  • x86/microcode/intel: Switch to kvmalloc() (git-fixes).
  • x86/microcode/intel: Unify microcode apply() functions (git-fixes).
  • x86/microcode: Add per CPU control field (git-fixes).
  • x86/microcode: Add per CPU result state (git-fixes).
  • x86/microcode: Clarify the late load logic (git-fixes).
  • x86/microcode: Clean up mc_cpu_down_prep() (git-fixes).
  • x86/microcode: Get rid of the schedule work indirection (git-fixes).
  • x86/microcode: Handle "nosmt" correctly (git-fixes).
  • x86/microcode: Handle "offline" CPUs correctly (git-fixes).
  • x86/microcode: Hide the config knob (git-fixes).
  • x86/microcode: Include vendor headers into microcode.h (git-fixes).
  • x86/microcode: Make reload_early_microcode() static (git-fixes).
  • x86/microcode: Mop up early loading leftovers (git-fixes).
  • x86/microcode: Move core specific defines to local header (git-fixes).
  • x86/microcode: Prepare for minimal revision check (git-fixes).
  • x86/microcode: Protect against instrumentation (git-fixes).
  • x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes).
  • x86/microcode: Provide new control functions (git-fixes).
  • x86/microcode: Remove microcode_mutex (git-fixes).
  • x86/microcode: Remove pointless apply() invocation (git-fixes).
  • x86/microcode: Remove the driver announcement and version (git-fixes).
  • x86/microcode: Rendezvous and load in NMI (git-fixes).
  • x86/microcode: Replace the all-in-one rendevous handler (git-fixes).
  • x86/microcode: Rework early revisions reporting (git-fixes).
  • x86/microcode: Sanitize __wait_for_cpus() (git-fixes).
  • x86/mm: Remove unused microcode.h include (git-fixes).
  • x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes).
  • x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes).
  • x86/speculation: Add __update_spec_ctrl() helper (git-fixes).
  • x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git-fixes).
  • x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes).
  • x86/uaccess: Improve performance by aligning writes to 8 bytes in copy_user_generic(), on non-FSRM/ERMS CPUs (git-fixes).
  • x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes).
  • x86/xen: move xen_reserve_extra_memory() (git-fixes).
  • xen/mcelog: Add __nonstring annotations for unterminated strings (git-fixes).
  • xen: Change xen-acpi-processor dom0 dependency (git-fixes).
  • xenfs/xensyms: respect hypervisor's "next" indication (git-fixes).
  • xfs: flush inodegc before swapon (git-fixes).
  • xhci: Add helper to set an interrupters interrupt moderation interval (git-fixes).
  • xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes).
  • xhci: Clean up stale comment on ERST_SIZE macro (stable-fixes).
  • xhci: Cleanup Candence controller PCI device and vendor ID usage (git-fixes).
  • xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701).
  • xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701).
  • xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes).
  • xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550).
  • xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550).
  • xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes).
  • xhci: dbc: Convert to use sysfs_streq() (git-fixes).
  • xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes).
  • xhci: dbc: Fix STALL transfer event handling (git-fixes).
  • xhci: dbc: Replace custom return value with proper Linux error code (git-fixes).
  • xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes).
  • xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes).
  • xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550).
  • xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes).
  • xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes).
  • xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes).
  • xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes).
  • xhci: pci: Use standard pattern for device IDs (git-fixes).
  • xhci: split free interrupter into separate remove and free parts (git-fixes).
  • xsk: Add truesize to skb_add_rx_frag() (git-fixes).
  • xsk: Do not assume metadata is always requested in TX completion (git-fixes).
  • zap_pid_ns_processes: clear TIF_NOTIFY_SIGNAL along with TIF_SIGPENDING (bsc#1241167).
  • zram: clear IDLE flag after recompression (git-fixes).
  • zram: clear IDLE flag in mark_idle() (git-fixes).
  • zram: do not mark idle slots that cannot be idle (git-fixes).
  • zram: fix potential UAF of zram table (git-fixes).
  • zram: fix uninitialized ZRAM not releasing backing device (git-fixes).
  • zram: refuse to use zero sized block device as backing device (git-fixes).
  • zram: split memory-tracking and ac-time tracking (git-fixes).

Special Instructions and Notes:

  • Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • Confidential Computing Module 15-SP6
    zypper in -t patch SUSE-SLE-Module-Confidential-Computing-15-SP6-2025-1919=1

Package List:

  • Confidential Computing Module 15-SP6 (nosrc x86_64)
    • kernel-coco_debug-6.4.0-15061.21.coco15sp6.1
    • kernel-coco-6.4.0-15061.21.coco15sp6.1
  • Confidential Computing Module 15-SP6 (x86_64)
    • kernel-coco_debug-debuginfo-6.4.0-15061.21.coco15sp6.1
    • kernel-syms-coco-6.4.0-15061.21.coco15sp6.1
    • kernel-coco-devel-6.4.0-15061.21.coco15sp6.1
    • kernel-coco_debug-devel-6.4.0-15061.21.coco15sp6.1
    • kernel-coco-debugsource-6.4.0-15061.21.coco15sp6.1
    • reiserfs-kmp-coco-6.4.0-15061.21.coco15sp6.1
    • kernel-coco_debug-debugsource-6.4.0-15061.21.coco15sp6.1
    • kernel-coco_debug-devel-debuginfo-6.4.0-15061.21.coco15sp6.1
    • kernel-coco-debuginfo-6.4.0-15061.21.coco15sp6.1
    • kernel-coco-vdso-debuginfo-6.4.0-15061.21.coco15sp6.1
    • reiserfs-kmp-coco-debuginfo-6.4.0-15061.21.coco15sp6.1
  • Confidential Computing Module 15-SP6 (noarch)
    • kernel-devel-coco-6.4.0-15061.21.coco15sp6.1
    • kernel-source-coco-6.4.0-15061.21.coco15sp6.1

References: