--===============9090364861219098036== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:0955-1 Release Date: 2025-03-19T16:11:26Z Rating: important References:
* bsc#1012628 * bsc#1215199 * bsc#1219367 * bsc#1222672 * bsc#1222803 * bsc#1225606 * bsc#1225742 * bsc#1225981 * bsc#1227937 * bsc#1228521 * bsc#1230235 * bsc#1230438 * bsc#1230439 * bsc#1230497 * bsc#1231432 * bsc#1231912 * bsc#1231920 * bsc#1231949 * bsc#1232159 * bsc#1232198 * bsc#1232201 * bsc#1232299 * bsc#1232508 * bsc#1232520 * bsc#1232919 * bsc#1233028 * bsc#1233109 * bsc#1233483 * bsc#1233749 * bsc#1234070 * bsc#1234853 * bsc#1234857 * bsc#1234891 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1234963 * bsc#1235054 * bsc#1235061 * bsc#1235073 * bsc#1235435 * bsc#1235485 * bsc#1235592 * bsc#1235599 * bsc#1235609 * bsc#1235932 * bsc#1235933 * bsc#1236113 * bsc#1236114 * bsc#1236115 * bsc#1236122 * bsc#1236123 * bsc#1236133 * bsc#1236138 * bsc#1236199 * bsc#1236200 * bsc#1236203 * bsc#1236205 * bsc#1236573 * bsc#1236575 * bsc#1236576 * bsc#1236591 * bsc#1236661 * bsc#1236677 * bsc#1236681 * bsc#1236682 * bsc#1236684 * bsc#1236689 * bsc#1236700 * bsc#1236702 * bsc#1236752 * bsc#1236759 * bsc#1236821 * bsc#1236822 * bsc#1236896 * bsc#1236897 * bsc#1236952 * bsc#1236967 * bsc#1236994 * bsc#1237007 * bsc#1237017 * bsc#1237025 * bsc#1237028 * bsc#1237045 * bsc#1237126 * bsc#1237132 * bsc#1237139 * bsc#1237155 * bsc#1237158 * bsc#1237159 * bsc#1237232 * bsc#1237234 * bsc#1237325 * bsc#1237356 * bsc#1237415 * bsc#1237452 * bsc#1237504 * bsc#1237521 * bsc#1237558 * bsc#1237562 * bsc#1237563 * bsc#1237848 * bsc#1237849 * bsc#1237879 * bsc#1237889 * bsc#1237891 * bsc#1237901 * bsc#1237950 * bsc#1238214 * bsc#1238303 * bsc#1238347 * bsc#1238368 * bsc#1238509 * bsc#1238525 * bsc#1238570 * bsc#1238739 * bsc#1238751 * bsc#1238753 * bsc#1238759 * bsc#1238860 * bsc#1238863 * bsc#1238877 * jsc#PED-10028 * jsc#PED-11253 * jsc#PED-12094 * jsc#PED-348
Cross-References:
* CVE-2023-52924 * CVE-2023-52925 * CVE-2024-26708 * CVE-2024-26810 * CVE-2024-40980 * CVE-2024-41055 * CVE-2024-44974 * CVE-2024-45009 * CVE-2024-45010 * CVE-2024-47701 * CVE-2024-49884 * CVE-2024-49950 * CVE-2024-50029 * CVE-2024-50036 * CVE-2024-50073 * CVE-2024-50085 * CVE-2024-50115 * CVE-2024-50142 * CVE-2024-50185 * CVE-2024-50294 * CVE-2024-53123 * CVE-2024-53147 * CVE-2024-53173 * CVE-2024-53176 * CVE-2024-53177 * CVE-2024-53178 * CVE-2024-53226 * CVE-2024-53239 * CVE-2024-56539 * CVE-2024-56548 * CVE-2024-56579 * CVE-2024-56605 * CVE-2024-56633 * CVE-2024-56647 * CVE-2024-56720 * CVE-2024-57889 * CVE-2024-57948 * CVE-2024-57994 * CVE-2025-21636 * CVE-2025-21637 * CVE-2025-21638 * CVE-2025-21639 * CVE-2025-21640 * CVE-2025-21647 * CVE-2025-21665 * CVE-2025-21667 * CVE-2025-21668 * CVE-2025-21673 * CVE-2025-21680 * CVE-2025-21681 * CVE-2025-21684 * CVE-2025-21687 * CVE-2025-21688 * CVE-2025-21689 * CVE-2025-21690 * CVE-2025-21692 * CVE-2025-21697 * CVE-2025-21699 * CVE-2025-21700 * CVE-2025-21705 * CVE-2025-21715 * CVE-2025-21716 * CVE-2025-21719 * CVE-2025-21724 * CVE-2025-21725 * CVE-2025-21728 * CVE-2025-21767 * CVE-2025-21790 * CVE-2025-21795 * CVE-2025-21799 * CVE-2025-21802
CVSS scores:
* CVE-2023-52924 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52924 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52925 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52925 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44974 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-44974 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-44974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45010 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53147 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53147 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56579 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56579 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56647 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57889 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57948 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21647 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21665 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21668 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21668 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21673 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21673 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21681 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-21681 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-21681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21684 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21687 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21687 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21688 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21697 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21697 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21700 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Real Time Module 15-SP6
An update that solves 71 vulnerabilities, contains four features and has 51 security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
* CVE-2024-26708: mptcp: fix inconsistent state on fastopen race (bsc#1222672). * CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937). * CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235). * CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438). * CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439). * CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949). * CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912). * CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508). * CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028). * CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption (bsc#1233109). * CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483). * CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070). * CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-56633: selftests/bpf: Add apply_bytes test to test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485). * CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435). * CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592). * CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901). * CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113). * CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114). * CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115). * CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122). * CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123). * CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133). * CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684). * CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681). * CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682). * CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700). * CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702). * CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028). * CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159). * CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525). * CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889). * CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891). * CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860). * CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863). * CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877). * CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879). * CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509). * CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753). * CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759). * CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739). * CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751).
The following non-security bugs were fixed:
* acct: block access to kernel internal filesystems (git-fixes). * acct: perform last write from workqueue (git-fixes). * ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes). * ACPI: property: Fix return value for nval == 0 in acpi_data_prop_read() (git-fixes). * ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V (stable-fixes). * add nf_tables for iptables non-legacy network handling * af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849). * ALSA: hda: Add error check for snd_ctl_rename_id() in snd_hda_create_dig_out_ctls() (git-fixes). * ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes). * ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED (stable-fixes). * ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes). * ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes). * ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes). * ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes). * ALSA: seq: Make dependency on UMP clearer (git-fixes). * ALSA: seq: remove redundant 'tristate' for SND_SEQ_UMP_CLIENT (stable- fixes). * ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git- fixes). * ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable- fixes). * amdgpu/pm/legacy: fix suspend/resume issues (git-fixes). * APEI: GHES: Have GHES honor the panic= setting (stable-fixes). * arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes) * arm64: Handle .ARM.attributes section in linker scripts (git-fixes) * arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes) * arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes) * arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git- fixes) * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * ASoC: amd: Add ACPI dependency to fix build error (stable-fixes). * ASoC: es8328: fix route from DAC to output (git-fixes). * ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes). * ASoC: Intel: avs: Abstract IPC handling (stable-fixes). * ASoC: Intel: avs: Do not readq() u32 registers (git-fixes). * ASoC: Intel: avs: Prefix SKL/APL-specific members (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V (stable-fixes). * ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git- fixes). * ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes). * ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (git- fixes). * ata: libata-sff: Ensure that we cannot write outside the allocated buffer (stable-fixes). * batman-adv: Drop unmanaged ELP metric worker (git-fixes). * batman-adv: fix panic during interface removal (git-fixes). * batman-adv: Ignore neighbor throughput metrics in error case (stable-fixes). * bio-integrity: do not restrict the size of integrity metadata (git-fixes). * blk_iocost: remove some duplicate irq disable/enables (git-fixes). * blk-cgroup: Fix class @block_class's subsystem refcount leakage (bsc#1237558). * blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606). * blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git- fixes). * blk-mq: add number of queue calc helper (bsc#1236897). * blk-mq: create correct map for fallback case (bsc#1236896). * blk-mq: do not count completed flush data request as inflight in case of quiesce (git-fixes). * blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1236897). * blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long (git- fixes). * blk-mq: move cpuhp callback registering out of q->sysfs_lock (git-fixes). * blk-mq: register cpuhp callback after hctx is added to xarray table (git- fixes). * blk-mq: use hk cpus only when isolcpus=managed_irq is enabled (bsc#1236897). * block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes). * block: add a disk_has_partscan helper (git-fixes). * block: add a partscan sysfs attribute for disks (git-fixes). * block: add check of 'minors' and 'first_minor' in device_add_disk() (git- fixes). * block: avoid to reuse `hctx` not removed from cpuhp callback list (git- fixes). * block: change rq_integrity_vec to respect the iterator (git-fixes). * block: Clear zone limits for a non-zoned stacked queue (git-fixes). * block: copy back bounce buffer to user-space correctly in case of split (git-fixes). * block: ensure we hold a queue reference when using queue limits (git-fixes). * block: fix and simplify blkdevparts= cmdline parsing (git-fixes). * block: fix bio_split_rw_at to take zone_write_granularity into account (git- fixes). * block: Fix elevator_get_default() checking for NULL q->tag_set (git-fixes). * block: fix integer overflow in BLKSECDISCARD (git-fixes). * block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes). * block: fix missing dispatching request when queue is started or unquiesced (git-fixes). * block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git- fixes). * block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding (git-fixes). * block: Fix page refcounts for unaligned buffers in __bio_release_pages() (git-fixes). * block: fix sanity checks in blk_rq_map_user_bvec (git-fixes). * block: propagate partition scanning errors to the BLKRRPART ioctl (git- fixes). * block: Provide bdev_open_* functions (git-fixes). * block: Remove special-casing of compound pages (git-fixes). * block: remove the blk_flush_integrity call in blk_integrity_unregister (git- fixes). * block: retry call probe after request_module in blk_request_module (git- fixes). * block: return unsigned int from bdev_io_min (git-fixes). * block: sed-opal: avoid possible wrong address reference in read_sed_opal_key() (git-fixes). * block: Set memalloc_noio to false on device_add_disk() error path (git- fixes). * block: support to account io_ticks precisely (git-fixes). * block: use the right type for stub rq_integrity_vec() (git-fixes). * bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git- fixes). * bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes). * bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git- fixes). * bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes). * bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (stable-fixes). * bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes). * bnxt_en: Refactor bnxt_ptp_init() (git-fixes). * bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1237232). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1237232). * can: c_can: fix unbalanced runtime PM disable in error path (git-fixes). * can: ctucanfd: handle skb allocation failure (git-fixes). * can: etas_es58x: fix potential NULL pointer dereference on udev->serial (git-fixes). * can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero (git-fixes). * chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes). * cifs: commands that are retried should have replay flag set (bsc#1231432). * cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432). * cifs: helper function to check replayable error codes (bsc#1231432). * cifs: new mount option called retrans (bsc#1231432). * cifs: open_cached_dir should not rely on primary channel (bsc#1231432). * cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes). * cifs: Remove intermediate object of failed create reparse call (git-fixes). * cifs: update desired access while requesting for directory lease (git- fixes). * cifs: update the same create_guid on replay (git-fixes). * clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-img: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes). * clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes). * clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes). * clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg (git-fixes). * clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes). * clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable() (git-fixes). * clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes). * cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562). * cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562). * cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily (git-fixes). * cpufreq: imx6q: do not warn for disabling a non-existing frequency (git- fixes). * cpufreq: mediatek-hw: Do not error out if supply is not found (git-fixes). * cpufreq: mediatek-hw: Wait for CPU supplies before probing (git-fixes). * cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes). * cpufreq: qcom-nvmem: drop pvs_ver for format a fuses (git-fixes). * cpufreq: qcom-nvmem: Enable virtual power domain devices (git-fixes). * cpufreq: qcom-nvmem: fix memory leaks in probe error paths (git-fixes). * cpufreq: qcom-nvmem: Simplify driver data allocation (stable-fixes). * cpufreq: qcom-nvmem: use helper to get SMEM SoC ID (git-fixes). * cpufreq: qcom-nvmem: use SoC ID-s from bindings (git-fixes). * cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh IRQ is not available (git-fixes). * cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq* clocks (git-fixes). * cpufreq: s3c64xx: Fix compilation warning (stable-fixes). * crypto: hisilicon/sec2 - fix for aead icv error (git-fixes). * crypto: hisilicon/sec2 - fix for aead invalid authsize (git-fixes). * crypto: hisilicon/sec2 - optimize the error return process (stable-fixes). * cxgb4: Avoid removal of uninserted tid (git-fixes). * cxgb4: use port number to set mac addr (git-fixes). * devlink: avoid potential loop in devlink_rel_nested_in_notify_work() (bsc#1237234). * dlm: fix srcu_read_lock() return type to int (git-fixes). * doc: update managed_irq documentation (bsc#1236897). * driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896). * drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor (stable-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes). * drm/amd/pm: Mark MM activity as unsupported (stable-fixes). * drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable- fixes). * drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() (git-fixes). * drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes). * drm/amdgpu: fix UVD contiguous CS mapping problem (bsc#1236759). * drm/amdkfd: only flush the validate MES contex (stable-fixes). * drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable- fixes). * drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes). * drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes). * drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes). * drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes). * drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes). * drm/i915: Fix page cleanup on DMA remap failure (git-fixes). * drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes). * drm/i915/dp: Fix error handling during 128b/132b link training (stable- fixes). * drm/i915/dp: Iterate DSC BPP from high to low on all platforms (git-fixes). * drm/i915/guc: Debug print LRC state entries only if the context is pinned (git-fixes). * drm/i915/pmu: Fix zero delta busyness issue (git-fixes). * drm/i915/selftests: avoid using uninitialized context (git-fixes). * drm/komeda: Add check for komeda_get_layer_fourcc_list() (git-fixes). * drm/mgag200: Added support for the new device G200eH5 (jsc#PED-12094) * drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes). * drm/msm: Avoid rounding up to one jiffy (git-fixes). * drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes). * drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields (git- fixes). * drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes). * drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes). * drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes). * drm/rockchip: move output interface related definition to rockchip_drm_drv.h (stable-fixes). * drm/rockchip: vop2: Fix the windows switch between different layers (git- fixes). * drm/rockchip: vop2: include rockchip_drm_drv.h (git-fixes). * drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config (stable- fixes). * drm/rockchip: vop2: Set YUV/RGB overlay mode (stable-fixes). * drm/sched: Fix preprocessor guard (git-fixes). * drm/virtio: New fence for every plane update (stable-fixes). * efi: Avoid cold plugged memory for placing the kernel (stable-fixes). * efi: libstub: Use '-std=gnu11' to fix build with GCC 15 (stable-fixes). * eth: gve: use appropriate helper to set xdp_features (git-fixes). * exfat: convert to ctime accessor functions (git-fixes). * exfat: do not zero the extended part (bsc#1237356). * exfat: fix appending discontinuous clusters to empty file (bsc#1237356). * exfat: fix file being changed by unaligned direct write (git-fixes). * exfat: fix timing of synchronizing bitmap and inode (bsc#1237356). * exfat: fix zero the unwritten part for dio read (git-fixes). * fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes). * firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry (git-fixes). * Fix conditional for selecting gcc-13 * Fix conditional for selecting gcc-13. * Fix memory-hotplug regression (bsc#1237504) * futex: Do not include process MM in futex key on no-MMU (git-fixes). * gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes). * gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes). * gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git- fixes). * gpio: pca953x: Improve interrupt support (git-fixes). * gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock (git-fixes). * gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes). * gpu: drm_dp_cec: fix broken CEC adapter properties check (git-fixes). * Grab mm lock before grabbing pt lock (git-fixes). * gup: make the stack expansion warning a bit more targeted (bsc#1238214). * hfs: Sanity check the root record (git-fixes). * hid: hid-steam: Add Deck IMU support (stable-fixes). * hid: hid-steam: Add gamepad-only mode switched to by holding options (stable-fixes). * hid: hid-steam: Avoid overwriting smoothing parameter (stable-fixes). * hid: hid-steam: Clean up locking (stable-fixes). * hid: hid-steam: Disable watchdog instead of using a heartbeat (stable- fixes). * hid: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git- fixes). * hid: hid-steam: Fix cleanup in probe() (git-fixes). * hid: hid-steam: Make sure rumble work is canceled on removal (stable-fixes). * hid: hid-steam: Move hidraw input (un)registering to work (git-fixes). * hid: hid-steam: remove pointless error message (stable-fixes). * hid: hid-steam: Update list of identifiers from SDL (stable-fixes). * hid: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() (git-fixes). * hid: multitouch: Add NULL check in mt_input_configured (git-fixes). * hid: Wacom: Add PCI Wacom device support (stable-fixes). * i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes). * i2c: ls2x: Fix frequency division register access (git-fixes). * i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes). * iavf: allow changing VLAN state without calling PF (git-fixes). * IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes) * ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1237415). * ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415). * ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git- fixes). * ice: fix incorrect PHY settings for 100 GB/s (git-fixes). * ice: fix max values for dpll pin phase adjust (git-fixes). * ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415). * ice: gather page_count()'s of each frag right before XDP prog call (git- fixes). * ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497). * ice: put Rx buffers after being done with current frame (git-fixes). * ice: Skip PTP HW writes during PTP reset procedure (git-fixes). * ice: stop storing XDP verdict within ice_rx_buf (git-fixes). * ice: use internal pf id instead of function number (git-fixes). * idpf: add read memory barrier when checking descriptor done bit (git-fixes). * idpf: call set_real_num_queues in idpf_open (bsc#1236661). * idpf: convert workqueues to unbound (git-fixes). * idpf: fix handling rsc packet with a single segment (git-fixes). * idpf: fix VF dynamic interrupt ctl register initialization (git-fixes). * igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes). * igc: return early when failing to read EECD register (git-fixes). * igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes). * initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521). * Input: allocate keycode for phone linking (stable-fixes). * iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes). * kabi: fix bus type (bsc#1236896). * kabi: fix group_cpus_evenly (bsc#1236897). * kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749). * kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes). * kbuild: userprogs: fix bitsize and target detection on clang (git-fixes). * kernel-source: Also replace bin/env * kvm: arm64: Do not eagerly teardown the vgic on init error (git-fixes). * kvm: arm64: Ensure vgic_ready() is ordered against MMIO registration (git- fixes). * kvm: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes). * kvm: arm64: Flush hyp bss section after initialization of variables in bss (git-fixes). * kvm: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (git-fixes) * kvm: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes). * kvm: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes). * kvm: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes). * kvm: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes). * kvm: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes bsc#1237155). * kvm: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared (git-fixes). * kvm: VMX: Fix comment of handle_vmx_instruction() (git-fixes). * kvm: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes). * kvm: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes). * kvm: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX (git-fixes). * kvm: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes). * kvm: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes). * kvm: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes). * kvm: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git- fixes). * kvm: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git- fixes). * kvm: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes). * kvm: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348). * kvm: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348). * kvm: x86: Zero out PV features cache when the CPUID leaf is not present (git-fixes). * kvm: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE (git-fixes). * lib: stackinit: hide never-taken branch from compiler (stable-fixes). * lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897). * lib/group_cpus: let group_cpu_evenly return number initialized masks (bsc#1236897). * lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes). * lockdep: fix deadlock issue between lockdep and rcu (git-fixes). * lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes). * locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass() (git-fixes). * locking/rwsem: Add __always_inline annotation to __down_write_common() and inlined callers (git-fixes). * loop: do not set QUEUE_FLAG_NOMERGES (git-fixes). * md: convert comma to semicolon (git-fixes). * md: Do not flush sync_work in md_write_start() (git-fixes). * md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes). * md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes). * md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes). * md/md-cluster: fix spares warnings for __le64 (git-fixes). * md/raid0: do not free conf on raid0_run failure (git-fixes). * md/raid1: do not free conf on raid0_run failure (git-fixes). * md/raid5: Wait sync io to finish before changing group cnt (git-fixes). * media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes). * media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes). * media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a camera (stable-fixes). * media: uvcvideo: Implement dual stream quirk to fix loss of usb packets (stable-fixes). * media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes). * mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable- fixes). * mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git- fixes) * mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes). * mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes). * mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes). * Move upstreamed ACPI patch into sorted section * mptcp: export local_address (git-fixes) * mptcp: fix data races on local_id (git-fixes) * mptcp: fix inconsistent state on fastopen race (bsc#1222672). * mptcp: fix NL PM announced address accounting (git-fixes) * mptcp: fix recvbuffer adjust on sleeping rcvmsg (git-fixes) * mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes) * mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes) * mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git- fixes) * mptcp: pm: deny endp with signal + subflow + port (git-fixes) * mptcp: pm: do not ignore 'subflow' if 'signal' flag is also set (git-fixes) * mptcp: pm: do not try to create sf if alloc failed (git-fixes) * mptcp: pm: fullmesh: select the right ID later (git-fixes) * mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes) * mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes) * mptcp: pm: re-using ID of unused flushed subflows (git-fixes) * mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes) * mptcp: pm: re-using ID of unused removed subflows (git-fixes) * mptcp: pm: reduce indentation blocks (git-fixes) * mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes) * mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes) * mptcp: unify pm get_local_id interfaces (git-fixes) * mptcp: unify pm set_flags interfaces (git-fixes) * mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes). * mtd: rawnand: cadence: fix incorrect device in dma_unmap_single (git-fixes). * mtd: rawnand: cadence: fix unchecked dereference (git-fixes). * mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes). * nbd: do not allow reconnect after disconnect (git-fixes). * nbd: Fix signal handling (git-fixes). * nbd: Improve the documentation of the locking assumptions (git-fixes). * net: avoid UAF on deleted altname (bsc#1233749). * net: check for altname conflicts when changing netdev's netns (bsc#1233749). * net: core: Use the bitmap API to allocate bitmaps (bsc#1233749). * net: do not send a MOVE event when netdev changes netns (bsc#1233749). * net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749). * net: fix ifname in netlink ntf during netns move (bsc#1233749). * net: fix removing a namespace with conflicting altnames (bsc#1233749). * net: Fix undefined behavior in netdev name allocation (bsc#1233749). * net: free altname using an RCU callback (bsc#1233749). * net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749). * net: move altnames together with the netdevice (bsc#1233749). * net: reduce indentation of __dev_alloc_name() (bsc#1233749). * net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749). * net: remove else after return in dev_prep_valid_name() (bsc#1233749). * net: rose: lock the socket in rose_bind() (git-fixes). * net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes). * net: smc: fix spurious error message from __sock_release() (bsc#1237126). * net: trust the bitmap in __dev_alloc_name() (bsc#1233749). * net: wwan: iosm: Fix hibernation by re-binding the driver around it (stable- fixes). * net/mlx5: Correct TASR typo into TSAR (git-fixes). * net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981). * net/mlx5: Fix RDMA TX steering prio (git-fixes). * net/mlx5: SF, Fix add port error handling (git-fixes). * net/mlx5: Verify support for scheduling element and TSAR type (git-fixes). * net/mlx5e: Always start IPsec sequence number from 1 (git-fixes). * net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes). * net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes). * net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994). * nouveau/svm: fix missing folio unlock + put after make_device_exclusive_range() (git-fixes). * null_blk: Do not allow runt zone with zone capacity smaller then zone size (git-fixes). * null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes). * null_blk: Fix missing mutex_destroy() at module removal (git-fixes). * null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git- fixes). * null_blk: fix validation of block size (git-fixes). * null_blk: Print correct max open zones limit in null_init_zoned_dev() (git- fixes). * null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes). * nvme-fc: use ctrl state getter (git-fixes). * nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes). * nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897). * nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes). * nvme: handle connectivity loss in nvme_set_queue_count (git-fixes). * nvme: make nvme_tls_attrs_group static (git-fixes). * nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * nvme: tcp: Fix compilation warning with W=1 (git-fixes). * nvme/ioctl: add missing space in err message (git-fixes). * nvmet: Fix crash when a namespace is disabled (git-fixes). * ocfs2: fix incorrect CPU endianness conversion causing mount failure (bsc#1236138). * packaging: Turn gcc version into config.sh variable. * padata: Clean up in padata_do_multithreaded() (bsc#1237563). * padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563). * partitions: ldm: remove the initial kernel-doc notation (git-fixes). * PCI: hookup irq_get_affinity callback (bsc#1236896). * PCI: imx6: Simplify clock handling by using clk_bulk*() function (git- fixes). * PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes). * PCI: Use downstream bridges for distributing resources (bsc#1237325). * PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes). * phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes). * phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes). * phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes). * Pickup RXE code change introduced by upstream merge * pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes). * platform/x86: acer-wmi: Ignore AC events (stable-fixes). * platform/x86: int3472: Check for adev == NULL (stable-fixes). * platform/x86: ISST: Ignore minor version change (bsc#1237452). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452). * platform/x86/intel-uncore-freq: Increase minor number support (bsc#1237452). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1237452). * power: supply: da9150-fg: fix potential overflow (git-fixes). * powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline (bsc#1215199). * powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199). * powerpc/code-patching: Disable KASAN report during patching via temporary mm (bsc#1215199). * powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC (bsc#1215199). * powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode (ltc#210895 bsc#1235933 ltc#210896 bsc#1235932). * powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967 ltc#210988). * printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950). * rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes). * rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings (git-fixes). * rbd: do not move requests to the running list on errors (git-fixes). * rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes). * RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes) * RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes) * RDMA/efa: Reset device on probe failure (git-fixes) * RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes) * RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes). * RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git- fixes) * RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes) * RDMA/mlx5: Fix AH static rate parsing (git-fixes) * RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes) * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes) * RDMA/rxe: Improve newline in printing messages (git-fixes) * regmap-irq: Add missing kfree() (git-fixes). * Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes). * Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes). * rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303) * rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570) * s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes bsc#1236205). * s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158). * s390/iucv: fix receive buffer virtual vs physical address confusion (git- fixes bsc#1236200). * s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368). * s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails (bsc#1236752). * s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752). * s390/pci: Ignore RID for isolated VFs (bsc#1236752). * s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git- fixes bsc#1238368). * s390/pci: Sort PCI functions prior to creating virtual busses (bsc#1236752). * s390/pci: Use topology ID for multi-function devices (bsc#1236752). * s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199). * s390/topology: Improve topology detection (bsc#1236591). * s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes bsc#1236203). * scripts/gdb: fix aarch64 userspace detection in get_current_task (stable- fixes). * scsi: core: Clear driver private data when retrying request (git-fixes). * scsi: core: Do not retry I/Os during depopulation (git-fixes). * scsi: core: Handle depopulation and restoration in progress (git-fixes). * scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes). * scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes). * scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes). * scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes). * scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git- fixes). * scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes). * scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347). * scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347). * scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347). * scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347). * scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347). * scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347). * scsi: megaraid_sas: Fix for a potential deadlock (git-fixes). * scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes). * scsi: mpi3mr: Start controller indexing from 0 (git-fixes). * scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes). * scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253). * scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253). * scsi: myrb: Remove dead code (git-fixes). * scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes). * scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes). * scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes). * scsi: sg: Enable runtime power management (git-fixes). * scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git- fixes). * scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * scsi: use block layer helpers to calculate num of queues (bsc#1236897). * selftest: hugetlb_dio: fix test naming (git-fixes). * selftest: mm: Test if hugepage does not get leaked during __bio_release_pages() (git-fixes). * selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes). * selftests: hugetlb_dio: check for initial conditions to skip in the start (git-fixes). * selftests: hugetlb_dio: fixup check for initial conditions to skip in the start (git-fixes). * selftests: mptcp: connect: -f: no reconnect (git-fixes). * selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes). * selftests/futex: pass _GNU_SOURCE without a value to the compiler (git- fixes). * selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable- fixes). * serial: 8250: Fix fifo underflow on flush (git-fixes). * serial: sc16is7xx: use device_property APIs when configuring irda mode (stable-fixes). * smb: cached directories can be more than root file handle (bsc#1231432). * smb: cilent: set reparse mount points as automounts (git-fixes). * smb: client: add support for WSL reparse points (git-fixes). * smb: client: allow creating special files via reparse points (git-fixes). * smb: client: allow creating symlinks via reparse points (git-fixes). * smb: client: cleanup smb2_query_reparse_point() (git-fixes). * smb: client: do not query reparse points twice on symlinks (git-fixes). * smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432). * smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes). * smb: client: fix corruption in cifs_extend_writeback (bsc#1235609). * smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes). * smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes). * smb: client: fix hardlinking of reparse points (git-fixes). * smb: client: Fix minor whitespace errors and warnings (git-fixes). * smb: client: fix missing mode bits for SMB symlinks (git-fixes). * smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes). * smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432). * smb: client: fix OOB in smb2_query_reparse_point() (git-fixes). * smb: client: fix possible double free in smb2_set_ea() (git-fixes). * smb: client: fix potential broken compound request (git-fixes). * smb: client: fix renaming of reparse points (git-fixes). * smb: client: get rid of smb311_posix_query_path_info() (git-fixes). * smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes). * smb: client: handle path separator of created SMB symlinks (git-fixes). * smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes). * smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes). * smb: client: ignore unhandled reparse tags (git-fixes). * smb: client: implement ->query_reparse_point() for SMB1 (git-fixes). * smb: client: instantiate when creating SFU files (git-fixes). * smb: client: introduce ->parse_reparse_point() (git-fixes). * smb: client: introduce cifs_sfu_make_node() (git-fixes). * smb: client: introduce reparse mount option (git-fixes). * smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes). * smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432). * smb: client: move most of reparse point handling code to common file (git- fixes). * smb: client: move some params to cifs_open_info_data (bsc#1231432). * smb: client: optimise reparse point querying (git-fixes). * smb: client: parse owner/group when creating reparse points (git-fixes). * smb: client: parse reparse point flag in create response (bsc#1231432). * smb: client: parse uid, gid, mode and dev from WSL reparse points (git- fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * smb: client: reduce number of parameters in smb2_compound_op() (git-fixes). * smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432). * smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes). * smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432). * smb: client: retry compound request without reusing lease (git-fixes). * smb: client: return reparse type in /proc/mounts (git-fixes). * smb: client: reuse file lease key in compound operations (git-fixes). * smb: client: set correct d_type for reparse DFS/DFSR and mount point (git- fixes). * smb: client: set correct file type from NFS reparse points (git-fixes). * smb: client: stop revalidating reparse points unnecessarily (git-fixes). * smb: use kernel_connect() and kernel_bind() (git-fixes). * smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes). * smb3: request handle caching when caching directories (bsc#1231432). * smb3: retrying on failed server close (bsc#1231432). * soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes). * soc: qcom: smem: introduce qcom_smem_get_soc_id() (git-fixes). * soc: qcom: socinfo: move SMEM item struct and defines to a header (git- fixes). * soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes). * soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes). * spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes). * spi: atmel-quadspi: Create `atmel_qspi_ops` to support newer SoC families (stable-fixes). * spi: sn-f-ospi: Fix division by zero (git-fixes). * tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367). * tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes). * tools: fix annoying "mkdir -p ..." logs when building tools in parallel (git-fixes). * ublk: fix error code for unsupported command (git-fixes). * ublk: fix ublk_ch_mmap() for 64K page size (git-fixes). * ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes). * ublk: move zone report data out of request pdu (git-fixes). * usb: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable- fixes). * usb: cdc-acm: Check control transfer buffer size before access (git-fixes). * usb: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes). * usb: cdc-acm: Fix handling of oversized fragments (git-fixes). * usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes). * usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes). * usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes). * usb: dwc3: Fix timeout issue during controller enter/exit from halt state (git-fixes). * usb: Fix the issue of task recovery failure caused by USB status when S4 wakes up (git-fixes). * usb: gadget: core: flush gadget workqueue after device removal (git-fixes). * usb: gadget: f_midi: f_midi_complete to call queue_work (git-fixes). * usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes). * usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind retries (git-fixes). * usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes). * usb: hub: Ignore non-compliant devices with too many configs or interfaces (stable-fixes). * usb: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes). * usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device (git-fixes). * usb: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes). * usb: roles: set switch registered flag early on (git-fixes). * usb: serial: option: add MeiG Smart SLM828 (stable-fixes). * usb: serial: option: add Telit Cinterion FN990B compositions (stable-fixes). * usb: serial: option: drop MeiG Smart defines (stable-fixes). * usb: serial: option: fix Telit Cinterion FN990A name (stable-fixes). * usb: xhci: Fix NULL pointer dereference on certain command aborts (git- fixes). * usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes). * usbnet: ipheth: document scope of NCM implementation (stable-fixes). * Use gcc-13 for build on SLE16 (jsc#PED-10028). * util_macros.h: fix/rework find_closest() macros (git-fixes). * vhost/net: Set num_buffers for virtio 1.0 (git-fixes). * virtio_blk: reverse request order in virtio_queue_rqs (git-fixes). * virtio: blk/scsi: replace blk_mq_virtio_map_queues with blk_mq_map_hw_queues (bsc#1236896). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1236897). * virtio: hookup irq_get_affinity callback (bsc#1236896). * wifi: ath12k: fix handling of 6 GHz rules (git-fixes). * wifi: brcmfmac: Check the return value of of_property_read_string_index() (stable-fixes). * wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable- fixes). * wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (stable-fixes). * wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes). * wifi: iwlwifi: avoid memory leak (stable-fixes). * wifi: iwlwifi: limit printed string from FW file (git-fixes). * wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes). * wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac (stable-fixes). * wifi: mt76: mt7915: fix omac index assignment after hardware reset (git- fixes). * wifi: mt76: mt7915: improve hardware restart reliability (stable-fixes). * wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes). * wifi: nl80211: reject cooked mode if it is set along with other flags (git- fixes). * wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes). * wifi: rtw89: add crystal_cap check to avoid setting as overflow value (stable-fixes). * x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes). * x86/asm: Make serialize() always_inline (git-fixes). * x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes). * x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation (git-fixes). * x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes). * x86/mm: Carve out INVLPG inline asm for use by others (git-fixes). * x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes). * x86/xen: allow larger contiguous memory regions in PV guests (git-fixes). * x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes). * xen/swiotlb: relax alignment requirements (git-fixes). * xhci: dbgtty: remove kfifo_out() wrapper (git-fixes). * zram: clear IDLE flag after recompression (git-fixes). * zram: clear IDLE flag in mark_idle() (git-fixes). * zram: do not mark idle slots that cannot be idle (git-fixes). * zram: fix potential UAF of zram table (git-fixes). * zram: fix uninitialized ZRAM not releasing backing device (git-fixes). * zram: refuse to use zero sized block device as backing device (git-fixes). * zram: split memory-tracking and ac-time tracking (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-955=1
* SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-955=1
* SUSE Real Time Module 15-SP6 zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2025-955=1
## Package List:
* openSUSE Leap 15.6 (x86_64) * cluster-md-kmp-rt-6.4.0-150600.10.29.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.29.1 * reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.29.1 * kernel-rt-livepatch-devel-6.4.0-150600.10.29.1 * kernel-rt_debug-debugsource-6.4.0-150600.10.29.1 * kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.29.1 * kernel-rt-optional-debuginfo-6.4.0-150600.10.29.1 * dlm-kmp-rt-6.4.0-150600.10.29.1 * kernel-syms-rt-6.4.0-150600.10.29.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.29.1 * kernel-rt-vdso-debuginfo-6.4.0-150600.10.29.1 * ocfs2-kmp-rt-6.4.0-150600.10.29.1 * kernel-rt-optional-6.4.0-150600.10.29.1 * kselftests-kmp-rt-debuginfo-6.4.0-150600.10.29.1 * kernel-rt-vdso-6.4.0-150600.10.29.1 * kernel-rt-debugsource-6.4.0-150600.10.29.1 * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.29.1 * kernel-rt-debuginfo-6.4.0-150600.10.29.1 * reiserfs-kmp-rt-6.4.0-150600.10.29.1 * kernel-rt_debug-devel-6.4.0-150600.10.29.1 * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.29.1 * kernel-rt-extra-debuginfo-6.4.0-150600.10.29.1 * kernel-rt-extra-6.4.0-150600.10.29.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.29.1 * kselftests-kmp-rt-6.4.0-150600.10.29.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.29.1 * gfs2-kmp-rt-6.4.0-150600.10.29.1 * kernel-rt-devel-6.4.0-150600.10.29.1 * kernel-rt_debug-vdso-6.4.0-150600.10.29.1 * kernel-rt-devel-debuginfo-6.4.0-150600.10.29.1 * openSUSE Leap 15.6 (noarch) * kernel-source-rt-6.4.0-150600.10.29.1 * kernel-devel-rt-6.4.0-150600.10.29.1 * openSUSE Leap 15.6 (nosrc x86_64) * kernel-rt_debug-6.4.0-150600.10.29.1 * kernel-rt-6.4.0-150600.10.29.1 * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_29-rt-debuginfo-1-150600.1.3.2 * kernel-livepatch-6_4_0-150600_10_29-rt-1-150600.1.3.2 * kernel-livepatch-SLE15-SP6-RT_Update_9-debugsource-1-150600.1.3.2 * SUSE Real Time Module 15-SP6 (x86_64) * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.29.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.29.1 * cluster-md-kmp-rt-6.4.0-150600.10.29.1 * kernel-rt-devel-6.4.0-150600.10.29.1 * kernel-rt-debuginfo-6.4.0-150600.10.29.1 * ocfs2-kmp-rt-6.4.0-150600.10.29.1 * kernel-rt_debug-devel-6.4.0-150600.10.29.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.29.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.29.1 * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.29.1 * kernel-rt-devel-debuginfo-6.4.0-150600.10.29.1 * kernel-rt_debug-debugsource-6.4.0-150600.10.29.1 * kernel-rt-debugsource-6.4.0-150600.10.29.1 * dlm-kmp-rt-6.4.0-150600.10.29.1 * kernel-syms-rt-6.4.0-150600.10.29.1 * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.29.1 * gfs2-kmp-rt-6.4.0-150600.10.29.1 * SUSE Real Time Module 15-SP6 (noarch) * kernel-source-rt-6.4.0-150600.10.29.1 * kernel-devel-rt-6.4.0-150600.10.29.1 * SUSE Real Time Module 15-SP6 (nosrc x86_64) * kernel-rt_debug-6.4.0-150600.10.29.1 * kernel-rt-6.4.0-150600.10.29.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52924.html * https://www.suse.com/security/cve/CVE-2023-52925.html * https://www.suse.com/security/cve/CVE-2024-26708.html * https://www.suse.com/security/cve/CVE-2024-26810.html * https://www.suse.com/security/cve/CVE-2024-40980.html * https://www.suse.com/security/cve/CVE-2024-41055.html * https://www.suse.com/security/cve/CVE-2024-44974.html * https://www.suse.com/security/cve/CVE-2024-45009.html * https://www.suse.com/security/cve/CVE-2024-45010.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-50029.html * https://www.suse.com/security/cve/CVE-2024-50036.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50085.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50142.html * https://www.suse.com/security/cve/CVE-2024-50185.html * https://www.suse.com/security/cve/CVE-2024-50294.html * https://www.suse.com/security/cve/CVE-2024-53123.html * https://www.suse.com/security/cve/CVE-2024-53147.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53177.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-53226.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56579.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56633.html * https://www.suse.com/security/cve/CVE-2024-56647.html * https://www.suse.com/security/cve/CVE-2024-56720.html * https://www.suse.com/security/cve/CVE-2024-57889.html * https://www.suse.com/security/cve/CVE-2024-57948.html * https://www.suse.com/security/cve/CVE-2024-57994.html * https://www.suse.com/security/cve/CVE-2025-21636.html * https://www.suse.com/security/cve/CVE-2025-21637.html * https://www.suse.com/security/cve/CVE-2025-21638.html * https://www.suse.com/security/cve/CVE-2025-21639.html * https://www.suse.com/security/cve/CVE-2025-21640.html * https://www.suse.com/security/cve/CVE-2025-21647.html * https://www.suse.com/security/cve/CVE-2025-21665.html * https://www.suse.com/security/cve/CVE-2025-21667.html * https://www.suse.com/security/cve/CVE-2025-21668.html * https://www.suse.com/security/cve/CVE-2025-21673.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://www.suse.com/security/cve/CVE-2025-21681.html * https://www.suse.com/security/cve/CVE-2025-21684.html * https://www.suse.com/security/cve/CVE-2025-21687.html * https://www.suse.com/security/cve/CVE-2025-21688.html * https://www.suse.com/security/cve/CVE-2025-21689.html * https://www.suse.com/security/cve/CVE-2025-21690.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21697.html * https://www.suse.com/security/cve/CVE-2025-21699.html * https://www.suse.com/security/cve/CVE-2025-21700.html * https://www.suse.com/security/cve/CVE-2025-21705.html * https://www.suse.com/security/cve/CVE-2025-21715.html * https://www.suse.com/security/cve/CVE-2025-21716.html * https://www.suse.com/security/cve/CVE-2025-21719.html * https://www.suse.com/security/cve/CVE-2025-21724.html * https://www.suse.com/security/cve/CVE-2025-21725.html * https://www.suse.com/security/cve/CVE-2025-21728.html * https://www.suse.com/security/cve/CVE-2025-21767.html * https://www.suse.com/security/cve/CVE-2025-21790.html * https://www.suse.com/security/cve/CVE-2025-21795.html * https://www.suse.com/security/cve/CVE-2025-21799.html * https://www.suse.com/security/cve/CVE-2025-21802.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1219367 * https://bugzilla.suse.com/show_bug.cgi?id=1222672 * https://bugzilla.suse.com/show_bug.cgi?id=1222803 * https://bugzilla.suse.com/show_bug.cgi?id=1225606 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225981 * https://bugzilla.suse.com/show_bug.cgi?id=1227937 * https://bugzilla.suse.com/show_bug.cgi?id=1228521 * https://bugzilla.suse.com/show_bug.cgi?id=1230235 * https://bugzilla.suse.com/show_bug.cgi?id=1230438 * https://bugzilla.suse.com/show_bug.cgi?id=1230439 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231912 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231949 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232508 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1233028 * https://bugzilla.suse.com/show_bug.cgi?id=1233109 * https://bugzilla.suse.com/show_bug.cgi?id=1233483 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234070 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234857 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235435 * https://bugzilla.suse.com/show_bug.cgi?id=1235485 * https://bugzilla.suse.com/show_bug.cgi?id=1235592 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235609 * https://bugzilla.suse.com/show_bug.cgi?id=1235932 * https://bugzilla.suse.com/show_bug.cgi?id=1235933 * https://bugzilla.suse.com/show_bug.cgi?id=1236113 * https://bugzilla.suse.com/show_bug.cgi?id=1236114 * https://bugzilla.suse.com/show_bug.cgi?id=1236115 * https://bugzilla.suse.com/show_bug.cgi?id=1236122 * https://bugzilla.suse.com/show_bug.cgi?id=1236123 * https://bugzilla.suse.com/show_bug.cgi?id=1236133 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236199 * https://bugzilla.suse.com/show_bug.cgi?id=1236200 * https://bugzilla.suse.com/show_bug.cgi?id=1236203 * https://bugzilla.suse.com/show_bug.cgi?id=1236205 * https://bugzilla.suse.com/show_bug.cgi?id=1236573 * https://bugzilla.suse.com/show_bug.cgi?id=1236575 * https://bugzilla.suse.com/show_bug.cgi?id=1236576 * https://bugzilla.suse.com/show_bug.cgi?id=1236591 * https://bugzilla.suse.com/show_bug.cgi?id=1236661 * https://bugzilla.suse.com/show_bug.cgi?id=1236677 * https://bugzilla.suse.com/show_bug.cgi?id=1236681 * https://bugzilla.suse.com/show_bug.cgi?id=1236682 * https://bugzilla.suse.com/show_bug.cgi?id=1236684 * https://bugzilla.suse.com/show_bug.cgi?id=1236689 * https://bugzilla.suse.com/show_bug.cgi?id=1236700 * https://bugzilla.suse.com/show_bug.cgi?id=1236702 * https://bugzilla.suse.com/show_bug.cgi?id=1236752 * https://bugzilla.suse.com/show_bug.cgi?id=1236759 * https://bugzilla.suse.com/show_bug.cgi?id=1236821 * https://bugzilla.suse.com/show_bug.cgi?id=1236822 * https://bugzilla.suse.com/show_bug.cgi?id=1236896 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1236952 * https://bugzilla.suse.com/show_bug.cgi?id=1236967 * https://bugzilla.suse.com/show_bug.cgi?id=1236994 * https://bugzilla.suse.com/show_bug.cgi?id=1237007 * https://bugzilla.suse.com/show_bug.cgi?id=1237017 * https://bugzilla.suse.com/show_bug.cgi?id=1237025 * https://bugzilla.suse.com/show_bug.cgi?id=1237028 * https://bugzilla.suse.com/show_bug.cgi?id=1237045 * https://bugzilla.suse.com/show_bug.cgi?id=1237126 * https://bugzilla.suse.com/show_bug.cgi?id=1237132 * https://bugzilla.suse.com/show_bug.cgi?id=1237139 * https://bugzilla.suse.com/show_bug.cgi?id=1237155 * https://bugzilla.suse.com/show_bug.cgi?id=1237158 * https://bugzilla.suse.com/show_bug.cgi?id=1237159 * https://bugzilla.suse.com/show_bug.cgi?id=1237232 * https://bugzilla.suse.com/show_bug.cgi?id=1237234 * https://bugzilla.suse.com/show_bug.cgi?id=1237325 * https://bugzilla.suse.com/show_bug.cgi?id=1237356 * https://bugzilla.suse.com/show_bug.cgi?id=1237415 * https://bugzilla.suse.com/show_bug.cgi?id=1237452 * https://bugzilla.suse.com/show_bug.cgi?id=1237504 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237563 * https://bugzilla.suse.com/show_bug.cgi?id=1237848 * https://bugzilla.suse.com/show_bug.cgi?id=1237849 * https://bugzilla.suse.com/show_bug.cgi?id=1237879 * https://bugzilla.suse.com/show_bug.cgi?id=1237889 * https://bugzilla.suse.com/show_bug.cgi?id=1237891 * https://bugzilla.suse.com/show_bug.cgi?id=1237901 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238214 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238347 * https://bugzilla.suse.com/show_bug.cgi?id=1238368 * https://bugzilla.suse.com/show_bug.cgi?id=1238509 * https://bugzilla.suse.com/show_bug.cgi?id=1238525 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1238739 * https://bugzilla.suse.com/show_bug.cgi?id=1238751 * https://bugzilla.suse.com/show_bug.cgi?id=1238753 * https://bugzilla.suse.com/show_bug.cgi?id=1238759 * https://bugzilla.suse.com/show_bug.cgi?id=1238860 * https://bugzilla.suse.com/show_bug.cgi?id=1238863 * https://bugzilla.suse.com/show_bug.cgi?id=1238877 * https://jira.suse.com/browse/PED-10028 * https://jira.suse.com/browse/PED-11253 * https://jira.suse.com/browse/PED-12094 * https://jira.suse.com/browse/PED-348
--===============9090364861219098036== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2025:0955-1</td> </tr> <tr> <th>Release Date:</th> <td>2025-03-19T16:11:26Z</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">bsc#1012628</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">bsc#1215199</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219367">bsc#1219367</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222672">bsc#1222672</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222803">bsc#1222803</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225606">bsc#1225606</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">bsc#1225742</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225981">bsc#1225981</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227937">bsc#1227937</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228521">bsc#1228521</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230235">bsc#1230235</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230438">bsc#1230438</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230439">bsc#1230439</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230497">bsc#1230497</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231432">bsc#1231432</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231912">bsc#1231912</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">bsc#1231920</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231949">bsc#1231949</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232159">bsc#1232159</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">bsc#1232198</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">bsc#1232201</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232299">bsc#1232299</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232508">bsc#1232508</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232520">bsc#1232520</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">bsc#1232919</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233028">bsc#1233028</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233109">bsc#1233109</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233483">bsc#1233483</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233749">bsc#1233749</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234070">bsc#1234070</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">bsc#1234853</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234857">bsc#1234857</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">bsc#1234891</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234894">bsc#1234894</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234895">bsc#1234895</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234896">bsc#1234896</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">bsc#1234963</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">bsc#1235054</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">bsc#1235061</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">bsc#1235073</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235435">bsc#1235435</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235485">bsc#1235485</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235592">bsc#1235592</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235599">bsc#1235599</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235609">bsc#1235609</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235932">bsc#1235932</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235933">bsc#1235933</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236113">bsc#1236113</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236114">bsc#1236114</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236115">bsc#1236115</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236122">bsc#1236122</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236123">bsc#1236123</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236133">bsc#1236133</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236138">bsc#1236138</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236199">bsc#1236199</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236200">bsc#1236200</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236203">bsc#1236203</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236205">bsc#1236205</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236573">bsc#1236573</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236575">bsc#1236575</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236576">bsc#1236576</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236591">bsc#1236591</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236661">bsc#1236661</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236677">bsc#1236677</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236681">bsc#1236681</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236682">bsc#1236682</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236684">bsc#1236684</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236689">bsc#1236689</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236700">bsc#1236700</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236702">bsc#1236702</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236752">bsc#1236752</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236759">bsc#1236759</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236821">bsc#1236821</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236822">bsc#1236822</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236896">bsc#1236896</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236897">bsc#1236897</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236952">bsc#1236952</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236967">bsc#1236967</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236994">bsc#1236994</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237007">bsc#1237007</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237017">bsc#1237017</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237025">bsc#1237025</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237028">bsc#1237028</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237045">bsc#1237045</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237126">bsc#1237126</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237132">bsc#1237132</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237139">bsc#1237139</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237155">bsc#1237155</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237158">bsc#1237158</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237159">bsc#1237159</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237232">bsc#1237232</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237234">bsc#1237234</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237325">bsc#1237325</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237356">bsc#1237356</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237415">bsc#1237415</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237452">bsc#1237452</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237504">bsc#1237504</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237521">bsc#1237521</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237558">bsc#1237558</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237562">bsc#1237562</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237563">bsc#1237563</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237848">bsc#1237848</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237849">bsc#1237849</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237879">bsc#1237879</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237889">bsc#1237889</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237891">bsc#1237891</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237901">bsc#1237901</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237950">bsc#1237950</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238214">bsc#1238214</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238303">bsc#1238303</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238347">bsc#1238347</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238368">bsc#1238368</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238509">bsc#1238509</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238525">bsc#1238525</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238570">bsc#1238570</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238739">bsc#1238739</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238751">bsc#1238751</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238753">bsc#1238753</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238759">bsc#1238759</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238860">bsc#1238860</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238863">bsc#1238863</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238877">bsc#1238877</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-10028">jsc#PED-10028</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-11253">jsc#PED-11253</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-12094">jsc#PED-12094</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-348">jsc#PED-348</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52924.html">CVE-2023-52924</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52925.html">CVE-2023-52925</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26708.html">CVE-2024-26708</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26810.html">CVE-2024-26810</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40980.html">CVE-2024-40980</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41055.html">CVE-2024-41055</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-44974.html">CVE-2024-44974</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-45009.html">CVE-2024-45009</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-45010.html">CVE-2024-45010</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-47701.html">CVE-2024-47701</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-49884.html">CVE-2024-49884</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-49950.html">CVE-2024-49950</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50029.html">CVE-2024-50029</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50036.html">CVE-2024-50036</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50073.html">CVE-2024-50073</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50085.html">CVE-2024-50085</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50115.html">CVE-2024-50115</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50142.html">CVE-2024-50142</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50185.html">CVE-2024-50185</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50294.html">CVE-2024-50294</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53123.html">CVE-2024-53123</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53147.html">CVE-2024-53147</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53173.html">CVE-2024-53173</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53176.html">CVE-2024-53176</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53177.html">CVE-2024-53177</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53178.html">CVE-2024-53178</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53226.html">CVE-2024-53226</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53239.html">CVE-2024-53239</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56539.html">CVE-2024-56539</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56548.html">CVE-2024-56548</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56579.html">CVE-2024-56579</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56605.html">CVE-2024-56605</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56633.html">CVE-2024-56633</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56647.html">CVE-2024-56647</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56720.html">CVE-2024-56720</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-57889.html">CVE-2024-57889</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-57948.html">CVE-2024-57948</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-57994.html">CVE-2024-57994</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21636.html">CVE-2025-21636</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21637.html">CVE-2025-21637</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21638.html">CVE-2025-21638</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21639.html">CVE-2025-21639</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21640.html">CVE-2025-21640</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21647.html">CVE-2025-21647</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21665.html">CVE-2025-21665</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21667.html">CVE-2025-21667</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21668.html">CVE-2025-21668</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21673.html">CVE-2025-21673</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21680.html">CVE-2025-21680</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21681.html">CVE-2025-21681</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21684.html">CVE-2025-21684</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21687.html">CVE-2025-21687</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21688.html">CVE-2025-21688</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21689.html">CVE-2025-21689</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21690.html">CVE-2025-21690</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21692.html">CVE-2025-21692</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21697.html">CVE-2025-21697</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21699.html">CVE-2025-21699</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21700.html">CVE-2025-21700</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21705.html">CVE-2025-21705</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21715.html">CVE-2025-21715</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21716.html">CVE-2025-21716</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21719.html">CVE-2025-21719</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21724.html">CVE-2025-21724</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21725.html">CVE-2025-21725</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21728.html">CVE-2025-21728</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21767.html">CVE-2025-21767</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21790.html">CVE-2025-21790</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21795.html">CVE-2025-21795</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21799.html">CVE-2025-21799</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21802.html">CVE-2025-21802</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52924</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">1.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52924</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">1.9</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52925</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.6</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52925</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52925</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.2</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26708</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26708</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26810</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26810</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40980</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40980</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41055</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41055</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44974</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44974</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.6</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44974</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-45009</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-45009</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-45010</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-45010</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-47701</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-47701</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-47701</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-49884</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-49884</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-49950</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-49950</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50029</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50029</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50036</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50036</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50073</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50073</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50073</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50073</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50085</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50085</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50085</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50115</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50115</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.2</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50115</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50142</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50142</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50142</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50185</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50185</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50294</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53123</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53123</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53147</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53147</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53173</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53173</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53173</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53173</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53176</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53176</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53177</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53177</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53177</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53178</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53178</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53226</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53226</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53226</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53239</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53239</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53239</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53239</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56539</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.6</span> <span class="cvss-vector">CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56539</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.0</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56548</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.4</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56548</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56548</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56579</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56579</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56579</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56605</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56605</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56605</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56605</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56633</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56633</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56647</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56647</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56647</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56720</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56720</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56720</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-57889</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-57889</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-57948</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.4</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-57948</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-57994</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21636</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21636</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21636</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21637</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21637</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21637</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21638</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21638</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21638</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21639</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21639</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21639</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21640</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21640</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21640</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21647</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21647</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21665</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21665</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21665</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21667</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21667</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21667</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21668</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21668</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21673</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21673</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21673</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21680</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21680</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21680</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21681</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.2</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21681</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21681</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21684</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21684</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21684</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21687</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21687</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21687</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21688</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21688</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21689</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21689</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21689</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21690</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21690</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21690</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21692</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21692</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21692</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21697</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21697</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21699</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21699</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21699</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21700</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21700</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21700</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21705</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21715</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21715</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21716</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21716</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21719</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21724</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21725</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21728</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21767</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21790</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21795</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21799</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21802</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">openSUSE Leap 15.6</li> <li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP6</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li> <li class="list-group-item">SUSE Real Time Module 15-SP6</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves 71 vulnerabilities, contains four features and has 51 security fixes can now be installed.</p>
<h2>Description:</h2> <p>The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes.</p> <p>The following security bugs were fixed:</p> <ul> <li>CVE-2024-26708: mptcp: fix inconsistent state on fastopen race (bsc#1222672).</li> <li>CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937).</li> <li>CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235).</li> <li>CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438).</li> <li>CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439).</li> <li>CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949).</li> <li>CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912).</li> <li>CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508).</li> <li>CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028).</li> <li>CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption (bsc#1233109).</li> <li>CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483).</li> <li>CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070).</li> <li>CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857).</li> <li>CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894).</li> <li>CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).</li> <li>CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895).</li> <li>CVE-2024-56633: selftests/bpf: Add apply_bytes test to test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485).</li> <li>CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435).</li> <li>CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592).</li> <li>CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901).</li> <li>CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113).</li> <li>CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114).</li> <li>CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115).</li> <li>CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122).</li> <li>CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123).</li> <li>CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133).</li> <li>CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684).</li> <li>CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681).</li> <li>CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682).</li> <li>CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689).</li> <li>CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700).</li> <li>CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702).</li> <li>CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045).</li> <li>CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).</li> <li>CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).</li> <li>CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525).</li> <li>CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889).</li> <li>CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891).</li> <li>CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860).</li> <li>CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863).</li> <li>CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877).</li> <li>CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879).</li> <li>CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509).</li> <li>CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753).</li> <li>CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759).</li> <li>CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739).</li> <li>CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751).</li> </ul> <p>The following non-security bugs were fixed:</p> <ul> <li>acct: block access to kernel internal filesystems (git-fixes).</li> <li>acct: perform last write from workqueue (git-fixes).</li> <li>ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes).</li> <li>ACPI: property: Fix return value for nval == 0 in acpi_data_prop_read() (git-fixes).</li> <li>ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V (stable-fixes).</li> <li>add nf_tables for iptables non-legacy network handling </li> <li>af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849).</li> <li>ALSA: hda: Add error check for snd_ctl_rename_id() in snd_hda_create_dig_out_ctls() (git-fixes).</li> <li>ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes).</li> <li>ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED (stable-fixes).</li> <li>ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes).</li> <li>ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes).</li> <li>ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes).</li> <li>ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes).</li> <li>ALSA: seq: Make dependency on UMP clearer (git-fixes).</li> <li>ALSA: seq: remove redundant 'tristate' for SND_SEQ_UMP_CLIENT (stable-fixes).</li> <li>ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git-fixes).</li> <li>ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable-fixes).</li> <li>amdgpu/pm/legacy: fix suspend/resume issues (git-fixes).</li> <li>APEI: GHES: Have GHES honor the panic= setting (stable-fixes).</li> <li>arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes)</li> <li>arm64: Handle .ARM.attributes section in linker scripts (git-fixes)</li> <li>arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes)</li> <li>arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes)</li> <li>arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git-fixes)</li> <li>arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes)</li> <li>ASoC: amd: Add ACPI dependency to fix build error (stable-fixes).</li> <li>ASoC: es8328: fix route from DAC to output (git-fixes).</li> <li>ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes).</li> <li>ASoC: Intel: avs: Abstract IPC handling (stable-fixes).</li> <li>ASoC: Intel: avs: Do not readq() u32 registers (git-fixes).</li> <li>ASoC: Intel: avs: Prefix SKL/APL-specific members (stable-fixes).</li> <li>ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V (stable-fixes).</li> <li>ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git-fixes).</li> <li>ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes).</li> <li>ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (git-fixes).</li> <li>ata: libata-sff: Ensure that we cannot write outside the allocated buffer (stable-fixes).</li> <li>batman-adv: Drop unmanaged ELP metric worker (git-fixes).</li> <li>batman-adv: fix panic during interface removal (git-fixes).</li> <li>batman-adv: Ignore neighbor throughput metrics in error case (stable-fixes).</li> <li>bio-integrity: do not restrict the size of integrity metadata (git-fixes).</li> <li>blk_iocost: remove some duplicate irq disable/enables (git-fixes).</li> <li>blk-cgroup: Fix class @block_class's subsystem refcount leakage (bsc#1237558).</li> <li>blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606).</li> <li>blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git-fixes).</li> <li>blk-mq: add number of queue calc helper (bsc#1236897).</li> <li>blk-mq: create correct map for fallback case (bsc#1236896).</li> <li>blk-mq: do not count completed flush data request as inflight in case of quiesce (git-fixes).</li> <li>blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896).</li> <li>blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1236897).</li> <li>blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long (git-fixes).</li> <li>blk-mq: move cpuhp callback registering out of q->sysfs_lock (git-fixes).</li> <li>blk-mq: register cpuhp callback after hctx is added to xarray table (git-fixes).</li> <li>blk-mq: use hk cpus only when isolcpus=managed_irq is enabled (bsc#1236897).</li> <li>block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes).</li> <li>block: add a disk_has_partscan helper (git-fixes).</li> <li>block: add a partscan sysfs attribute for disks (git-fixes).</li> <li>block: add check of 'minors' and 'first_minor' in device_add_disk() (git-fixes).</li> <li>block: avoid to reuse <code>hctx</code> not removed from cpuhp callback list (git-fixes).</li> <li>block: change rq_integrity_vec to respect the iterator (git-fixes).</li> <li>block: Clear zone limits for a non-zoned stacked queue (git-fixes).</li> <li>block: copy back bounce buffer to user-space correctly in case of split (git-fixes).</li> <li>block: ensure we hold a queue reference when using queue limits (git-fixes).</li> <li>block: fix and simplify blkdevparts= cmdline parsing (git-fixes).</li> <li>block: fix bio_split_rw_at to take zone_write_granularity into account (git-fixes).</li> <li>block: Fix elevator_get_default() checking for NULL q->tag_set (git-fixes).</li> <li>block: fix integer overflow in BLKSECDISCARD (git-fixes).</li> <li>block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes).</li> <li>block: fix missing dispatching request when queue is started or unquiesced (git-fixes).</li> <li>block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git-fixes).</li> <li>block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding (git-fixes).</li> <li>block: Fix page refcounts for unaligned buffers in __bio_release_pages() (git-fixes).</li> <li>block: fix sanity checks in blk_rq_map_user_bvec (git-fixes).</li> <li>block: propagate partition scanning errors to the BLKRRPART ioctl (git-fixes).</li> <li>block: Provide bdev_open_* functions (git-fixes).</li> <li>block: Remove special-casing of compound pages (git-fixes).</li> <li>block: remove the blk_flush_integrity call in blk_integrity_unregister (git-fixes).</li> <li>block: retry call probe after request_module in blk_request_module (git-fixes).</li> <li>block: return unsigned int from bdev_io_min (git-fixes).</li> <li>block: sed-opal: avoid possible wrong address reference in read_sed_opal_key() (git-fixes).</li> <li>block: Set memalloc_noio to false on device_add_disk() error path (git-fixes).</li> <li>block: support to account io_ticks precisely (git-fixes).</li> <li>block: use the right type for stub rq_integrity_vec() (git-fixes).</li> <li>bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git-fixes).</li> <li>bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes).</li> <li>bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git-fixes).</li> <li>bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes).</li> <li>bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (stable-fixes).</li> <li>bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes).</li> <li>bnxt_en: Refactor bnxt_ptp_init() (git-fixes).</li> <li>bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes).</li> <li>btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1237232).</li> <li>btrfs: fix extent map merging not happening for adjacent extents (bsc#1237232).</li> <li>can: c_can: fix unbalanced runtime PM disable in error path (git-fixes).</li> <li>can: ctucanfd: handle skb allocation failure (git-fixes).</li> <li>can: etas_es58x: fix potential NULL pointer dereference on udev->serial (git-fixes).</li> <li>can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero (git-fixes).</li> <li>chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes).</li> <li>cifs: commands that are retried should have replay flag set (bsc#1231432).</li> <li>cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes).</li> <li>cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432).</li> <li>cifs: helper function to check replayable error codes (bsc#1231432).</li> <li>cifs: new mount option called retrans (bsc#1231432).</li> <li>cifs: open_cached_dir should not rely on primary channel (bsc#1231432).</li> <li>cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes).</li> <li>cifs: Remove intermediate object of failed create reparse call (git-fixes).</li> <li>cifs: update desired access while requesting for directory lease (git-fixes).</li> <li>cifs: update the same create_guid on replay (git-fixes).</li> <li>clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git-fixes).</li> <li>clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes).</li> <li>clk: mediatek: mt2701-img: add missing dummy clk (git-fixes).</li> <li>clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes).</li> <li>clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git-fixes).</li> <li>clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes).</li> <li>clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes).</li> <li>clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes).</li> <li>clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg (git-fixes).</li> <li>clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes).</li> <li>clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable() (git-fixes).</li> <li>clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes).</li> <li>cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562).</li> <li>cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562).</li> <li>cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily (git-fixes).</li> <li>cpufreq: imx6q: do not warn for disabling a non-existing frequency (git-fixes).</li> <li>cpufreq: mediatek-hw: Do not error out if supply is not found (git-fixes).</li> <li>cpufreq: mediatek-hw: Wait for CPU supplies before probing (git-fixes).</li> <li>cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes).</li> <li>cpufreq: qcom-nvmem: drop pvs_ver for format a fuses (git-fixes).</li> <li>cpufreq: qcom-nvmem: Enable virtual power domain devices (git-fixes).</li> <li>cpufreq: qcom-nvmem: fix memory leaks in probe error paths (git-fixes).</li> <li>cpufreq: qcom-nvmem: Simplify driver data allocation (stable-fixes).</li> <li>cpufreq: qcom-nvmem: use helper to get SMEM SoC ID (git-fixes).</li> <li>cpufreq: qcom-nvmem: use SoC ID-s from bindings (git-fixes).</li> <li>cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh IRQ is not available (git-fixes).</li> <li>cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq* clocks (git-fixes).</li> <li>cpufreq: s3c64xx: Fix compilation warning (stable-fixes).</li> <li>crypto: hisilicon/sec2 - fix for aead icv error (git-fixes).</li> <li>crypto: hisilicon/sec2 - fix for aead invalid authsize (git-fixes).</li> <li>crypto: hisilicon/sec2 - optimize the error return process (stable-fixes).</li> <li>cxgb4: Avoid removal of uninserted tid (git-fixes).</li> <li>cxgb4: use port number to set mac addr (git-fixes).</li> <li>devlink: avoid potential loop in devlink_rel_nested_in_notify_work() (bsc#1237234).</li> <li>dlm: fix srcu_read_lock() return type to int (git-fixes).</li> <li>doc: update managed_irq documentation (bsc#1236897).</li> <li>driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896).</li> <li>drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor (stable-fixes).</li> <li>drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes).</li> <li>drm/amd/pm: Mark MM activity as unsupported (stable-fixes).</li> <li>drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable-fixes).</li> <li>drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() (git-fixes).</li> <li>drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes).</li> <li>drm/amdgpu: fix UVD contiguous CS mapping problem (bsc#1236759).</li> <li>drm/amdkfd: only flush the validate MES contex (stable-fixes).</li> <li>drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable-fixes).</li> <li>drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes).</li> <li>drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes).</li> <li>drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes).</li> <li>drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes).</li> <li>drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes).</li> <li>drm/i915: Fix page cleanup on DMA remap failure (git-fixes).</li> <li>drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes).</li> <li>drm/i915/dp: Fix error handling during 128b/132b link training (stable-fixes).</li> <li>drm/i915/dp: Iterate DSC BPP from high to low on all platforms (git-fixes).</li> <li>drm/i915/guc: Debug print LRC state entries only if the context is pinned (git-fixes).</li> <li>drm/i915/pmu: Fix zero delta busyness issue (git-fixes).</li> <li>drm/i915/selftests: avoid using uninitialized context (git-fixes).</li> <li>drm/komeda: Add check for komeda_get_layer_fourcc_list() (git-fixes).</li> <li>drm/mgag200: Added support for the new device G200eH5 (jsc#PED-12094)</li> <li>drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes).</li> <li>drm/msm: Avoid rounding up to one jiffy (git-fixes).</li> <li>drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes).</li> <li>drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields (git-fixes).</li> <li>drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes).</li> <li>drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes).</li> <li>drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes).</li> <li>drm/rockchip: move output interface related definition to rockchip_drm_drv.h (stable-fixes).</li> <li>drm/rockchip: vop2: Fix the windows switch between different layers (git-fixes).</li> <li>drm/rockchip: vop2: include rockchip_drm_drv.h (git-fixes).</li> <li>drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config (stable-fixes).</li> <li>drm/rockchip: vop2: Set YUV/RGB overlay mode (stable-fixes).</li> <li>drm/sched: Fix preprocessor guard (git-fixes).</li> <li>drm/virtio: New fence for every plane update (stable-fixes).</li> <li>efi: Avoid cold plugged memory for placing the kernel (stable-fixes).</li> <li>efi: libstub: Use '-std=gnu11' to fix build with GCC 15 (stable-fixes).</li> <li>eth: gve: use appropriate helper to set xdp_features (git-fixes).</li> <li>exfat: convert to ctime accessor functions (git-fixes).</li> <li>exfat: do not zero the extended part (bsc#1237356).</li> <li>exfat: fix appending discontinuous clusters to empty file (bsc#1237356).</li> <li>exfat: fix file being changed by unaligned direct write (git-fixes).</li> <li>exfat: fix timing of synchronizing bitmap and inode (bsc#1237356).</li> <li>exfat: fix zero the unwritten part for dio read (git-fixes).</li> <li>fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes).</li> <li>firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry (git-fixes).</li> <li>Fix conditional for selecting gcc-13 </li> <li>Fix conditional for selecting gcc-13.</li> <li>Fix memory-hotplug regression (bsc#1237504) </li> <li>futex: Do not include process MM in futex key on no-MMU (git-fixes).</li> <li>gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes).</li> <li>gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes).</li> <li>gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git-fixes).</li> <li>gpio: pca953x: Improve interrupt support (git-fixes).</li> <li>gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock (git-fixes).</li> <li>gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes).</li> <li>gpu: drm_dp_cec: fix broken CEC adapter properties check (git-fixes).</li> <li>Grab mm lock before grabbing pt lock (git-fixes).</li> <li>gup: make the stack expansion warning a bit more targeted (bsc#1238214).</li> <li>hfs: Sanity check the root record (git-fixes).</li> <li>hid: hid-steam: Add Deck IMU support (stable-fixes).</li> <li>hid: hid-steam: Add gamepad-only mode switched to by holding options (stable-fixes).</li> <li>hid: hid-steam: Avoid overwriting smoothing parameter (stable-fixes).</li> <li>hid: hid-steam: Clean up locking (stable-fixes).</li> <li>hid: hid-steam: Disable watchdog instead of using a heartbeat (stable-fixes).</li> <li>hid: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git-fixes).</li> <li>hid: hid-steam: Fix cleanup in probe() (git-fixes).</li> <li>hid: hid-steam: Make sure rumble work is canceled on removal (stable-fixes).</li> <li>hid: hid-steam: Move hidraw input (un)registering to work (git-fixes).</li> <li>hid: hid-steam: remove pointless error message (stable-fixes).</li> <li>hid: hid-steam: Update list of identifiers from SDL (stable-fixes).</li> <li>hid: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() (git-fixes).</li> <li>hid: multitouch: Add NULL check in mt_input_configured (git-fixes).</li> <li>hid: Wacom: Add PCI Wacom device support (stable-fixes).</li> <li>i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes).</li> <li>i2c: ls2x: Fix frequency division register access (git-fixes).</li> <li>i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes).</li> <li>iavf: allow changing VLAN state without calling PF (git-fixes).</li> <li>IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes)</li> <li>ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1237415).</li> <li>ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415).</li> <li>ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git-fixes).</li> <li>ice: fix incorrect PHY settings for 100 GB/s (git-fixes).</li> <li>ice: fix max values for dpll pin phase adjust (git-fixes).</li> <li>ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415).</li> <li>ice: gather page_count()'s of each frag right before XDP prog call (git-fixes).</li> <li>ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497).</li> <li>ice: put Rx buffers after being done with current frame (git-fixes).</li> <li>ice: Skip PTP HW writes during PTP reset procedure (git-fixes).</li> <li>ice: stop storing XDP verdict within ice_rx_buf (git-fixes).</li> <li>ice: use internal pf id instead of function number (git-fixes).</li> <li>idpf: add read memory barrier when checking descriptor done bit (git-fixes).</li> <li>idpf: call set_real_num_queues in idpf_open (bsc#1236661).</li> <li>idpf: convert workqueues to unbound (git-fixes).</li> <li>idpf: fix handling rsc packet with a single segment (git-fixes).</li> <li>idpf: fix VF dynamic interrupt ctl register initialization (git-fixes).</li> <li>igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes).</li> <li>igc: return early when failing to read EECD register (git-fixes).</li> <li>igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes).</li> <li>initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521).</li> <li>Input: allocate keycode for phone linking (stable-fixes).</li> <li>iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes).</li> <li>kabi: fix bus type (bsc#1236896).</li> <li>kabi: fix group_cpus_evenly (bsc#1236897).</li> <li>kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749).</li> <li>kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes).</li> <li>kbuild: userprogs: fix bitsize and target detection on clang (git-fixes).</li> <li>kernel-source: Also replace bin/env</li> <li>kvm: arm64: Do not eagerly teardown the vgic on init error (git-fixes).</li> <li>kvm: arm64: Ensure vgic_ready() is ordered against MMIO registration (git-fixes).</li> <li>kvm: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes).</li> <li>kvm: arm64: Flush hyp bss section after initialization of variables in bss (git-fixes).</li> <li>kvm: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (git-fixes)</li> <li>kvm: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes).</li> <li>kvm: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes).</li> <li>kvm: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes).</li> <li>kvm: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes).</li> <li>kvm: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes bsc#1237155).</li> <li>kvm: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared (git-fixes).</li> <li>kvm: VMX: Fix comment of handle_vmx_instruction() (git-fixes).</li> <li>kvm: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes).</li> <li>kvm: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes).</li> <li>kvm: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX (git-fixes).</li> <li>kvm: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes).</li> <li>kvm: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes).</li> <li>kvm: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes).</li> <li>kvm: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git-fixes).</li> <li>kvm: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git-fixes).</li> <li>kvm: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes).</li> <li>kvm: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348).</li> <li>kvm: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348).</li> <li>kvm: x86: Zero out PV features cache when the CPUID leaf is not present (git-fixes).</li> <li>kvm: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE (git-fixes).</li> <li>lib: stackinit: hide never-taken branch from compiler (stable-fixes).</li> <li>lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897).</li> <li>lib/group_cpus: let group_cpu_evenly return number initialized masks (bsc#1236897).</li> <li>lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes).</li> <li>lockdep: fix deadlock issue between lockdep and rcu (git-fixes).</li> <li>lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes).</li> <li>locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass() (git-fixes).</li> <li>locking/rwsem: Add __always_inline annotation to __down_write_common() and inlined callers (git-fixes).</li> <li>loop: do not set QUEUE_FLAG_NOMERGES (git-fixes).</li> <li>md: convert comma to semicolon (git-fixes).</li> <li>md: Do not flush sync_work in md_write_start() (git-fixes).</li> <li>md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes).</li> <li>md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes).</li> <li>md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes).</li> <li>md/md-cluster: fix spares warnings for __le64 (git-fixes).</li> <li>md/raid0: do not free conf on raid0_run failure (git-fixes).</li> <li>md/raid1: do not free conf on raid0_run failure (git-fixes).</li> <li>md/raid5: Wait sync io to finish before changing group cnt (git-fixes).</li> <li>media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes).</li> <li>media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes).</li> <li>media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a camera (stable-fixes).</li> <li>media: uvcvideo: Implement dual stream quirk to fix loss of usb packets (stable-fixes).</li> <li>media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes).</li> <li>mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable-fixes).</li> <li>mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git-fixes)</li> <li>mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes).</li> <li>mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes).</li> <li>mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes).</li> <li>Move upstreamed ACPI patch into sorted section</li> <li>mptcp: export local_address (git-fixes)</li> <li>mptcp: fix data races on local_id (git-fixes)</li> <li>mptcp: fix inconsistent state on fastopen race (bsc#1222672).</li> <li>mptcp: fix NL PM announced address accounting (git-fixes)</li> <li>mptcp: fix recvbuffer adjust on sleeping rcvmsg (git-fixes)</li> <li>mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes)</li> <li>mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes)</li> <li>mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git-fixes)</li> <li>mptcp: pm: deny endp with signal + subflow + port (git-fixes)</li> <li>mptcp: pm: do not ignore 'subflow' if 'signal' flag is also set (git-fixes)</li> <li>mptcp: pm: do not try to create sf if alloc failed (git-fixes)</li> <li>mptcp: pm: fullmesh: select the right ID later (git-fixes)</li> <li>mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes)</li> <li>mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes)</li> <li>mptcp: pm: re-using ID of unused flushed subflows (git-fixes)</li> <li>mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes)</li> <li>mptcp: pm: re-using ID of unused removed subflows (git-fixes)</li> <li>mptcp: pm: reduce indentation blocks (git-fixes)</li> <li>mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes)</li> <li>mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes)</li> <li>mptcp: unify pm get_local_id interfaces (git-fixes)</li> <li>mptcp: unify pm set_flags interfaces (git-fixes)</li> <li>mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes).</li> <li>mtd: rawnand: cadence: fix incorrect device in dma_unmap_single (git-fixes).</li> <li>mtd: rawnand: cadence: fix unchecked dereference (git-fixes).</li> <li>mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes).</li> <li>nbd: do not allow reconnect after disconnect (git-fixes).</li> <li>nbd: Fix signal handling (git-fixes).</li> <li>nbd: Improve the documentation of the locking assumptions (git-fixes).</li> <li>net: avoid UAF on deleted altname (bsc#1233749).</li> <li>net: check for altname conflicts when changing netdev's netns (bsc#1233749).</li> <li>net: core: Use the bitmap API to allocate bitmaps (bsc#1233749).</li> <li>net: do not send a MOVE event when netdev changes netns (bsc#1233749).</li> <li>net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749).</li> <li>net: fix ifname in netlink ntf during netns move (bsc#1233749).</li> <li>net: fix removing a namespace with conflicting altnames (bsc#1233749).</li> <li>net: Fix undefined behavior in netdev name allocation (bsc#1233749).</li> <li>net: free altname using an RCU callback (bsc#1233749).</li> <li>net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749).</li> <li>net: move altnames together with the netdevice (bsc#1233749).</li> <li>net: reduce indentation of __dev_alloc_name() (bsc#1233749).</li> <li>net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749).</li> <li>net: remove else after return in dev_prep_valid_name() (bsc#1233749).</li> <li>net: rose: lock the socket in rose_bind() (git-fixes).</li> <li>net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes).</li> <li>net: smc: fix spurious error message from __sock_release() (bsc#1237126).</li> <li>net: trust the bitmap in __dev_alloc_name() (bsc#1233749).</li> <li>net: wwan: iosm: Fix hibernation by re-binding the driver around it (stable-fixes).</li> <li>net/mlx5: Correct TASR typo into TSAR (git-fixes).</li> <li>net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981).</li> <li>net/mlx5: Fix RDMA TX steering prio (git-fixes).</li> <li>net/mlx5: SF, Fix add port error handling (git-fixes).</li> <li>net/mlx5: Verify support for scheduling element and TSAR type (git-fixes).</li> <li>net/mlx5e: Always start IPsec sequence number from 1 (git-fixes).</li> <li>net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes).</li> <li>net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes).</li> <li>net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994).</li> <li>nouveau/svm: fix missing folio unlock + put after make_device_exclusive_range() (git-fixes).</li> <li>null_blk: Do not allow runt zone with zone capacity smaller then zone size (git-fixes).</li> <li>null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes).</li> <li>null_blk: Fix missing mutex_destroy() at module removal (git-fixes).</li> <li>null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git-fixes).</li> <li>null_blk: fix validation of block size (git-fixes).</li> <li>null_blk: Print correct max open zones limit in null_init_zoned_dev() (git-fixes).</li> <li>null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes).</li> <li>nvme-fc: use ctrl state getter (git-fixes).</li> <li>nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes).</li> <li>nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes).</li> <li>nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897).</li> <li>nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes).</li> <li>nvme: handle connectivity loss in nvme_set_queue_count (git-fixes).</li> <li>nvme: make nvme_tls_attrs_group static (git-fixes).</li> <li>nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896).</li> <li>nvme: tcp: Fix compilation warning with W=1 (git-fixes).</li> <li>nvme/ioctl: add missing space in err message (git-fixes).</li> <li>nvmet: Fix crash when a namespace is disabled (git-fixes).</li> <li>ocfs2: fix incorrect CPU endianness conversion causing mount failure (bsc#1236138).</li> <li>packaging: Turn gcc version into config.sh variable. </li> <li>padata: Clean up in padata_do_multithreaded() (bsc#1237563).</li> <li>padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563).</li> <li>partitions: ldm: remove the initial kernel-doc notation (git-fixes).</li> <li>PCI: hookup irq_get_affinity callback (bsc#1236896).</li> <li>PCI: imx6: Simplify clock handling by using clk_bulk*() function (git-fixes).</li> <li>PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes).</li> <li>PCI: Use downstream bridges for distributing resources (bsc#1237325).</li> <li>PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes).</li> <li>phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes).</li> <li>phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes).</li> <li>phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes).</li> <li>Pickup RXE code change introduced by upstream merge</li> <li>pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes).</li> <li>platform/x86: acer-wmi: Ignore AC events (stable-fixes).</li> <li>platform/x86: int3472: Check for adev == NULL (stable-fixes).</li> <li>platform/x86: ISST: Ignore minor version change (bsc#1237452).</li> <li>platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452).</li> <li>platform/x86/intel-uncore-freq: Increase minor number support (bsc#1237452).</li> <li>platform/x86/intel/tpmi: Add defines to get version information (bsc#1237452).</li> <li>power: supply: da9150-fg: fix potential overflow (git-fixes).</li> <li>powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline (bsc#1215199).</li> <li>powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199).</li> <li>powerpc/code-patching: Disable KASAN report during patching via temporary mm (bsc#1215199).</li> <li>powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC (bsc#1215199).</li> <li>powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode (ltc#210895 bsc#1235933 ltc#210896 bsc#1235932).</li> <li>powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967 ltc#210988).</li> <li>printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950).</li> <li>rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes).</li> <li>rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings (git-fixes).</li> <li>rbd: do not move requests to the running list on errors (git-fixes).</li> <li>rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes).</li> <li>RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes)</li> <li>RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes)</li> <li>RDMA/efa: Reset device on probe failure (git-fixes)</li> <li>RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes)</li> <li>RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes).</li> <li>RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git-fixes)</li> <li>RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes)</li> <li>RDMA/mlx5: Fix AH static rate parsing (git-fixes)</li> <li>RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes)</li> <li>RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes)</li> <li>RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes)</li> <li>RDMA/rxe: Improve newline in printing messages (git-fixes)</li> <li>regmap-irq: Add missing kfree() (git-fixes).</li> <li>Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes).</li> <li>Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes).</li> <li>rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)</li> <li>rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)</li> <li>s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes bsc#1236205).</li> <li>s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158).</li> <li>s390/iucv: fix receive buffer virtual vs physical address confusion (git-fixes bsc#1236200).</li> <li>s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368).</li> <li>s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails (bsc#1236752).</li> <li>s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752).</li> <li>s390/pci: Ignore RID for isolated VFs (bsc#1236752).</li> <li>s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git-fixes bsc#1238368).</li> <li>s390/pci: Sort PCI functions prior to creating virtual busses (bsc#1236752).</li> <li>s390/pci: Use topology ID for multi-function devices (bsc#1236752).</li> <li>s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199).</li> <li>s390/topology: Improve topology detection (bsc#1236591).</li> <li>s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes bsc#1236203).</li> <li>scripts/gdb: fix aarch64 userspace detection in get_current_task (stable-fixes).</li> <li>scsi: core: Clear driver private data when retrying request (git-fixes).</li> <li>scsi: core: Do not retry I/Os during depopulation (git-fixes).</li> <li>scsi: core: Handle depopulation and restoration in progress (git-fixes).</li> <li>scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes).</li> <li>scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes).</li> <li>scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes).</li> <li>scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes).</li> <li>scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git-fixes).</li> <li>scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes).</li> <li>scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347).</li> <li>scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347).</li> <li>scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347).</li> <li>scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347).</li> <li>scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347).</li> <li>scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347).</li> <li>scsi: megaraid_sas: Fix for a potential deadlock (git-fixes).</li> <li>scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes).</li> <li>scsi: mpi3mr: Start controller indexing from 0 (git-fixes).</li> <li>scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes).</li> <li>scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253).</li> <li>scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253).</li> <li>scsi: myrb: Remove dead code (git-fixes).</li> <li>scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes).</li> <li>scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes).</li> <li>scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896).</li> <li>scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes).</li> <li>scsi: sg: Enable runtime power management (git-fixes).</li> <li>scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git-fixes).</li> <li>scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes).</li> <li>scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes).</li> <li>scsi: use block layer helpers to calculate num of queues (bsc#1236897).</li> <li>selftest: hugetlb_dio: fix test naming (git-fixes).</li> <li>selftest: mm: Test if hugepage does not get leaked during __bio_release_pages() (git-fixes).</li> <li>selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes).</li> <li>selftests: hugetlb_dio: check for initial conditions to skip in the start (git-fixes).</li> <li>selftests: hugetlb_dio: fixup check for initial conditions to skip in the start (git-fixes).</li> <li>selftests: mptcp: connect: -f: no reconnect (git-fixes).</li> <li>selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes).</li> <li>selftests/futex: pass _GNU_SOURCE without a value to the compiler (git-fixes).</li> <li>selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable-fixes).</li> <li>serial: 8250: Fix fifo underflow on flush (git-fixes).</li> <li>serial: sc16is7xx: use device_property APIs when configuring irda mode (stable-fixes).</li> <li>smb: cached directories can be more than root file handle (bsc#1231432).</li> <li>smb: cilent: set reparse mount points as automounts (git-fixes).</li> <li>smb: client: add support for WSL reparse points (git-fixes).</li> <li>smb: client: allow creating special files via reparse points (git-fixes).</li> <li>smb: client: allow creating symlinks via reparse points (git-fixes).</li> <li>smb: client: cleanup smb2_query_reparse_point() (git-fixes).</li> <li>smb: client: do not query reparse points twice on symlinks (git-fixes).</li> <li>smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432).</li> <li>smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes).</li> <li>smb: client: fix corruption in cifs_extend_writeback (bsc#1235609).</li> <li>smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes).</li> <li>smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes).</li> <li>smb: client: fix hardlinking of reparse points (git-fixes).</li> <li>smb: client: Fix minor whitespace errors and warnings (git-fixes).</li> <li>smb: client: fix missing mode bits for SMB symlinks (git-fixes).</li> <li>smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes).</li> <li>smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432).</li> <li>smb: client: fix OOB in smb2_query_reparse_point() (git-fixes).</li> <li>smb: client: fix possible double free in smb2_set_ea() (git-fixes).</li> <li>smb: client: fix potential broken compound request (git-fixes).</li> <li>smb: client: fix renaming of reparse points (git-fixes).</li> <li>smb: client: get rid of smb311_posix_query_path_info() (git-fixes).</li> <li>smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes).</li> <li>smb: client: handle path separator of created SMB symlinks (git-fixes).</li> <li>smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes).</li> <li>smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes).</li> <li>smb: client: ignore unhandled reparse tags (git-fixes).</li> <li>smb: client: implement ->query_reparse_point() for SMB1 (git-fixes).</li> <li>smb: client: instantiate when creating SFU files (git-fixes).</li> <li>smb: client: introduce ->parse_reparse_point() (git-fixes).</li> <li>smb: client: introduce cifs_sfu_make_node() (git-fixes).</li> <li>smb: client: introduce reparse mount option (git-fixes).</li> <li>smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes).</li> <li>smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432).</li> <li>smb: client: move most of reparse point handling code to common file (git-fixes).</li> <li>smb: client: move some params to cifs_open_info_data (bsc#1231432).</li> <li>smb: client: optimise reparse point querying (git-fixes).</li> <li>smb: client: parse owner/group when creating reparse points (git-fixes).</li> <li>smb: client: parse reparse point flag in create response (bsc#1231432).</li> <li>smb: client: parse uid, gid, mode and dev from WSL reparse points (git-fixes).</li> <li>smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896).</li> <li>smb: client: reduce number of parameters in smb2_compound_op() (git-fixes).</li> <li>smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432).</li> <li>smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes).</li> <li>smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432).</li> <li>smb: client: retry compound request without reusing lease (git-fixes).</li> <li>smb: client: return reparse type in /proc/mounts (git-fixes).</li> <li>smb: client: reuse file lease key in compound operations (git-fixes).</li> <li>smb: client: set correct d_type for reparse DFS/DFSR and mount point (git-fixes).</li> <li>smb: client: set correct file type from NFS reparse points (git-fixes).</li> <li>smb: client: stop revalidating reparse points unnecessarily (git-fixes).</li> <li>smb: use kernel_connect() and kernel_bind() (git-fixes).</li> <li>smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes).</li> <li>smb3: request handle caching when caching directories (bsc#1231432).</li> <li>smb3: retrying on failed server close (bsc#1231432).</li> <li>soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes).</li> <li>soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes).</li> <li>soc: qcom: smem: introduce qcom_smem_get_soc_id() (git-fixes).</li> <li>soc: qcom: socinfo: move SMEM item struct and defines to a header (git-fixes).</li> <li>soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes).</li> <li>soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes).</li> <li>spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes).</li> <li>spi: atmel-quadspi: Create <code>atmel_qspi_ops</code> to support newer SoC families (stable-fixes).</li> <li>spi: sn-f-ospi: Fix division by zero (git-fixes).</li> <li>tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367).</li> <li>tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes).</li> <li>tools: fix annoying "mkdir -p ..." logs when building tools in parallel (git-fixes).</li> <li>ublk: fix error code for unsupported command (git-fixes).</li> <li>ublk: fix ublk_ch_mmap() for 64K page size (git-fixes).</li> <li>ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes).</li> <li>ublk: move zone report data out of request pdu (git-fixes).</li> <li>usb: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable-fixes).</li> <li>usb: cdc-acm: Check control transfer buffer size before access (git-fixes).</li> <li>usb: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes).</li> <li>usb: cdc-acm: Fix handling of oversized fragments (git-fixes).</li> <li>usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes).</li> <li>usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes).</li> <li>usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes).</li> <li>usb: dwc3: Fix timeout issue during controller enter/exit from halt state (git-fixes).</li> <li>usb: Fix the issue of task recovery failure caused by USB status when S4 wakes up (git-fixes).</li> <li>usb: gadget: core: flush gadget workqueue after device removal (git-fixes).</li> <li>usb: gadget: f_midi: f_midi_complete to call queue_work (git-fixes).</li> <li>usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes).</li> <li>usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind retries (git-fixes).</li> <li>usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes).</li> <li>usb: hub: Ignore non-compliant devices with too many configs or interfaces (stable-fixes).</li> <li>usb: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes).</li> <li>usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device (git-fixes).</li> <li>usb: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes).</li> <li>usb: roles: set switch registered flag early on (git-fixes).</li> <li>usb: serial: option: add MeiG Smart SLM828 (stable-fixes).</li> <li>usb: serial: option: add Telit Cinterion FN990B compositions (stable-fixes).</li> <li>usb: serial: option: drop MeiG Smart defines (stable-fixes).</li> <li>usb: serial: option: fix Telit Cinterion FN990A name (stable-fixes).</li> <li>usb: xhci: Fix NULL pointer dereference on certain command aborts (git-fixes).</li> <li>usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes).</li> <li>usbnet: ipheth: document scope of NCM implementation (stable-fixes).</li> <li>Use gcc-13 for build on SLE16 (jsc#PED-10028).</li> <li>util_macros.h: fix/rework find_closest() macros (git-fixes).</li> <li>vhost/net: Set num_buffers for virtio 1.0 (git-fixes).</li> <li>virtio_blk: reverse request order in virtio_queue_rqs (git-fixes).</li> <li>virtio: blk/scsi: replace blk_mq_virtio_map_queues with blk_mq_map_hw_queues (bsc#1236896).</li> <li>virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1236897).</li> <li>virtio: hookup irq_get_affinity callback (bsc#1236896).</li> <li>wifi: ath12k: fix handling of 6 GHz rules (git-fixes).</li> <li>wifi: brcmfmac: Check the return value of of_property_read_string_index() (stable-fixes).</li> <li>wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable-fixes).</li> <li>wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (stable-fixes).</li> <li>wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes).</li> <li>wifi: iwlwifi: avoid memory leak (stable-fixes).</li> <li>wifi: iwlwifi: limit printed string from FW file (git-fixes).</li> <li>wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes).</li> <li>wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac (stable-fixes).</li> <li>wifi: mt76: mt7915: fix omac index assignment after hardware reset (git-fixes).</li> <li>wifi: mt76: mt7915: improve hardware restart reliability (stable-fixes).</li> <li>wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes).</li> <li>wifi: nl80211: reject cooked mode if it is set along with other flags (git-fixes).</li> <li>wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes).</li> <li>wifi: rtw89: add crystal_cap check to avoid setting as overflow value (stable-fixes).</li> <li>x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes).</li> <li>x86/asm: Make serialize() always_inline (git-fixes).</li> <li>x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes).</li> <li>x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation (git-fixes).</li> <li>x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes).</li> <li>x86/mm: Carve out INVLPG inline asm for use by others (git-fixes).</li> <li>x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).</li> <li>x86/xen: allow larger contiguous memory regions in PV guests (git-fixes).</li> <li>x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes).</li> <li>xen/swiotlb: relax alignment requirements (git-fixes).</li> <li>xhci: dbgtty: remove kfifo_out() wrapper (git-fixes).</li> <li>zram: clear IDLE flag after recompression (git-fixes).</li> <li>zram: clear IDLE flag in mark_idle() (git-fixes).</li> <li>zram: do not mark idle slots that cannot be idle (git-fixes).</li> <li>zram: fix potential UAF of zram table (git-fixes).</li> <li>zram: fix uninitialized ZRAM not releasing backing device (git-fixes).</li> <li>zram: refuse to use zero sized block device as backing device (git-fixes).</li> <li>zram: split memory-tracking and ac-time tracking (git-fixes).</li> </ul>
<h2>Special Instructions and Notes:</h2> <ul> <li>Please reboot the system after installing this update.</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> openSUSE Leap 15.6 <br/> <code>zypper in -t patch openSUSE-SLE-15.6-2025-955=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Live Patching 15-SP6 <br/> <code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-955=1</code> </li> <li class="list-group-item"> SUSE Real Time Module 15-SP6 <br/> <code>zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2025-955=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> openSUSE Leap 15.6 (x86_64) <ul> <li>cluster-md-kmp-rt-6.4.0-150600.10.29.1</li> <li>dlm-kmp-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>kernel-rt-livepatch-devel-6.4.0-150600.10.29.1</li> <li>kernel-rt_debug-debugsource-6.4.0-150600.10.29.1</li> <li>kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.29.1</li> <li>kernel-rt-optional-debuginfo-6.4.0-150600.10.29.1</li> <li>dlm-kmp-rt-6.4.0-150600.10.29.1</li> <li>kernel-syms-rt-6.4.0-150600.10.29.1</li> <li>gfs2-kmp-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>kernel-rt-vdso-debuginfo-6.4.0-150600.10.29.1</li> <li>ocfs2-kmp-rt-6.4.0-150600.10.29.1</li> <li>kernel-rt-optional-6.4.0-150600.10.29.1</li> <li>kselftests-kmp-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>kernel-rt-vdso-6.4.0-150600.10.29.1</li> <li>kernel-rt-debugsource-6.4.0-150600.10.29.1</li> <li>cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>kernel-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>reiserfs-kmp-rt-6.4.0-150600.10.29.1</li> <li>kernel-rt_debug-devel-6.4.0-150600.10.29.1</li> <li>ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>kernel-rt-extra-debuginfo-6.4.0-150600.10.29.1</li> <li>kernel-rt-extra-6.4.0-150600.10.29.1</li> <li>kernel-rt_debug-debuginfo-6.4.0-150600.10.29.1</li> <li>kselftests-kmp-rt-6.4.0-150600.10.29.1</li> <li>kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.29.1</li> <li>gfs2-kmp-rt-6.4.0-150600.10.29.1</li> <li>kernel-rt-devel-6.4.0-150600.10.29.1</li> <li>kernel-rt_debug-vdso-6.4.0-150600.10.29.1</li> <li>kernel-rt-devel-debuginfo-6.4.0-150600.10.29.1</li> </ul> </li> <li> openSUSE Leap 15.6 (noarch) <ul> <li>kernel-source-rt-6.4.0-150600.10.29.1</li> <li>kernel-devel-rt-6.4.0-150600.10.29.1</li> </ul> </li> <li> openSUSE Leap 15.6 (nosrc x86_64) <ul> <li>kernel-rt_debug-6.4.0-150600.10.29.1</li> <li>kernel-rt-6.4.0-150600.10.29.1</li> </ul> </li> <li> SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) <ul> <li>kernel-livepatch-6_4_0-150600_10_29-rt-debuginfo-1-150600.1.3.2</li> <li>kernel-livepatch-6_4_0-150600_10_29-rt-1-150600.1.3.2</li> <li>kernel-livepatch-SLE15-SP6-RT_Update_9-debugsource-1-150600.1.3.2</li> </ul> </li> <li> SUSE Real Time Module 15-SP6 (x86_64) <ul> <li>kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.29.1</li> <li>gfs2-kmp-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>cluster-md-kmp-rt-6.4.0-150600.10.29.1</li> <li>kernel-rt-devel-6.4.0-150600.10.29.1</li> <li>kernel-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>ocfs2-kmp-rt-6.4.0-150600.10.29.1</li> <li>kernel-rt_debug-devel-6.4.0-150600.10.29.1</li> <li>dlm-kmp-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>kernel-rt_debug-debuginfo-6.4.0-150600.10.29.1</li> <li>ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>kernel-rt-devel-debuginfo-6.4.0-150600.10.29.1</li> <li>kernel-rt_debug-debugsource-6.4.0-150600.10.29.1</li> <li>kernel-rt-debugsource-6.4.0-150600.10.29.1</li> <li>dlm-kmp-rt-6.4.0-150600.10.29.1</li> <li>kernel-syms-rt-6.4.0-150600.10.29.1</li> <li>cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.29.1</li> <li>gfs2-kmp-rt-6.4.0-150600.10.29.1</li> </ul> </li> <li> SUSE Real Time Module 15-SP6 (noarch) <ul> <li>kernel-source-rt-6.4.0-150600.10.29.1</li> <li>kernel-devel-rt-6.4.0-150600.10.29.1</li> </ul> </li> <li> SUSE Real Time Module 15-SP6 (nosrc x86_64) <ul> <li>kernel-rt_debug-6.4.0-150600.10.29.1</li> <li>kernel-rt-6.4.0-150600.10.29.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52924.html">https://www.suse.com/security/cve/CVE-2023-52924.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52925.html">https://www.suse.com/security/cve/CVE-2023-52925.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26708.html">https://www.suse.com/security/cve/CVE-2024-26708.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26810.html">https://www.suse.com/security/cve/CVE-2024-26810.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40980.html">https://www.suse.com/security/cve/CVE-2024-40980.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41055.html">https://www.suse.com/security/cve/CVE-2024-41055.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-44974.html">https://www.suse.com/security/cve/CVE-2024-44974.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-45009.html">https://www.suse.com/security/cve/CVE-2024-45009.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-45010.html">https://www.suse.com/security/cve/CVE-2024-45010.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-47701.html">https://www.suse.com/security/cve/CVE-2024-47701.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-49884.html">https://www.suse.com/security/cve/CVE-2024-49884.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-49950.html">https://www.suse.com/security/cve/CVE-2024-49950.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50029.html">https://www.suse.com/security/cve/CVE-2024-50029.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50036.html">https://www.suse.com/security/cve/CVE-2024-50036.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50073.html">https://www.suse.com/security/cve/CVE-2024-50073.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50085.html">https://www.suse.com/security/cve/CVE-2024-50085.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50115.html">https://www.suse.com/security/cve/CVE-2024-50115.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50142.html">https://www.suse.com/security/cve/CVE-2024-50142.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50185.html">https://www.suse.com/security/cve/CVE-2024-50185.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50294.html">https://www.suse.com/security/cve/CVE-2024-50294.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53123.html">https://www.suse.com/security/cve/CVE-2024-53123.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53147.html">https://www.suse.com/security/cve/CVE-2024-53147.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53173.html">https://www.suse.com/security/cve/CVE-2024-53173.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53176.html">https://www.suse.com/security/cve/CVE-2024-53176.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53177.html">https://www.suse.com/security/cve/CVE-2024-53177.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53178.html">https://www.suse.com/security/cve/CVE-2024-53178.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53226.html">https://www.suse.com/security/cve/CVE-2024-53226.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53239.html">https://www.suse.com/security/cve/CVE-2024-53239.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56539.html">https://www.suse.com/security/cve/CVE-2024-56539.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56548.html">https://www.suse.com/security/cve/CVE-2024-56548.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56579.html">https://www.suse.com/security/cve/CVE-2024-56579.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56605.html">https://www.suse.com/security/cve/CVE-2024-56605.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56633.html">https://www.suse.com/security/cve/CVE-2024-56633.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56647.html">https://www.suse.com/security/cve/CVE-2024-56647.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56720.html">https://www.suse.com/security/cve/CVE-2024-56720.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-57889.html">https://www.suse.com/security/cve/CVE-2024-57889.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-57948.html">https://www.suse.com/security/cve/CVE-2024-57948.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-57994.html">https://www.suse.com/security/cve/CVE-2024-57994.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21636.html">https://www.suse.com/security/cve/CVE-2025-21636.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21637.html">https://www.suse.com/security/cve/CVE-2025-21637.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21638.html">https://www.suse.com/security/cve/CVE-2025-21638.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21639.html">https://www.suse.com/security/cve/CVE-2025-21639.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21640.html">https://www.suse.com/security/cve/CVE-2025-21640.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21647.html">https://www.suse.com/security/cve/CVE-2025-21647.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21665.html">https://www.suse.com/security/cve/CVE-2025-21665.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21667.html">https://www.suse.com/security/cve/CVE-2025-21667.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21668.html">https://www.suse.com/security/cve/CVE-2025-21668.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21673.html">https://www.suse.com/security/cve/CVE-2025-21673.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21680.html">https://www.suse.com/security/cve/CVE-2025-21680.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21681.html">https://www.suse.com/security/cve/CVE-2025-21681.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21684.html">https://www.suse.com/security/cve/CVE-2025-21684.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21687.html">https://www.suse.com/security/cve/CVE-2025-21687.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21688.html">https://www.suse.com/security/cve/CVE-2025-21688.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21689.html">https://www.suse.com/security/cve/CVE-2025-21689.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21690.html">https://www.suse.com/security/cve/CVE-2025-21690.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21692.html">https://www.suse.com/security/cve/CVE-2025-21692.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21697.html">https://www.suse.com/security/cve/CVE-2025-21697.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21699.html">https://www.suse.com/security/cve/CVE-2025-21699.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21700.html">https://www.suse.com/security/cve/CVE-2025-21700.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21705.html">https://www.suse.com/security/cve/CVE-2025-21705.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21715.html">https://www.suse.com/security/cve/CVE-2025-21715.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21716.html">https://www.suse.com/security/cve/CVE-2025-21716.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21719.html">https://www.suse.com/security/cve/CVE-2025-21719.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21724.html">https://www.suse.com/security/cve/CVE-2025-21724.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21725.html">https://www.suse.com/security/cve/CVE-2025-21725.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21728.html">https://www.suse.com/security/cve/CVE-2025-21728.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21767.html">https://www.suse.com/security/cve/CVE-2025-21767.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21790.html">https://www.suse.com/security/cve/CVE-2025-21790.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21795.html">https://www.suse.com/security/cve/CVE-2025-21795.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21799.html">https://www.suse.com/security/cve/CVE-2025-21799.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21802.html">https://www.suse.com/security/cve/CVE-2025-21802.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">https://bugzilla.suse.com/show_bug.cgi?id=1012628</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">https://bugzilla.suse.com/show_bug.cgi?id=1215199</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219367">https://bugzilla.suse.com/show_bug.cgi?id=1219367</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222672">https://bugzilla.suse.com/show_bug.cgi?id=1222672</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222803">https://bugzilla.suse.com/show_bug.cgi?id=1222803</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225606">https://bugzilla.suse.com/show_bug.cgi?id=1225606</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">https://bugzilla.suse.com/show_bug.cgi?id=1225742</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225981">https://bugzilla.suse.com/show_bug.cgi?id=1225981</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227937">https://bugzilla.suse.com/show_bug.cgi?id=1227937</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228521">https://bugzilla.suse.com/show_bug.cgi?id=1228521</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230235">https://bugzilla.suse.com/show_bug.cgi?id=1230235</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230438">https://bugzilla.suse.com/show_bug.cgi?id=1230438</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230439">https://bugzilla.suse.com/show_bug.cgi?id=1230439</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230497">https://bugzilla.suse.com/show_bug.cgi?id=1230497</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231432">https://bugzilla.suse.com/show_bug.cgi?id=1231432</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231912">https://bugzilla.suse.com/show_bug.cgi?id=1231912</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">https://bugzilla.suse.com/show_bug.cgi?id=1231920</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231949">https://bugzilla.suse.com/show_bug.cgi?id=1231949</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232159">https://bugzilla.suse.com/show_bug.cgi?id=1232159</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">https://bugzilla.suse.com/show_bug.cgi?id=1232198</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">https://bugzilla.suse.com/show_bug.cgi?id=1232201</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232299">https://bugzilla.suse.com/show_bug.cgi?id=1232299</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232508">https://bugzilla.suse.com/show_bug.cgi?id=1232508</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232520">https://bugzilla.suse.com/show_bug.cgi?id=1232520</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">https://bugzilla.suse.com/show_bug.cgi?id=1232919</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233028">https://bugzilla.suse.com/show_bug.cgi?id=1233028</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233109">https://bugzilla.suse.com/show_bug.cgi?id=1233109</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233483">https://bugzilla.suse.com/show_bug.cgi?id=1233483</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233749">https://bugzilla.suse.com/show_bug.cgi?id=1233749</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234070">https://bugzilla.suse.com/show_bug.cgi?id=1234070</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">https://bugzilla.suse.com/show_bug.cgi?id=1234853</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234857">https://bugzilla.suse.com/show_bug.cgi?id=1234857</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">https://bugzilla.suse.com/show_bug.cgi?id=1234891</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234894">https://bugzilla.suse.com/show_bug.cgi?id=1234894</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234895">https://bugzilla.suse.com/show_bug.cgi?id=1234895</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234896">https://bugzilla.suse.com/show_bug.cgi?id=1234896</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">https://bugzilla.suse.com/show_bug.cgi?id=1234963</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">https://bugzilla.suse.com/show_bug.cgi?id=1235054</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">https://bugzilla.suse.com/show_bug.cgi?id=1235061</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">https://bugzilla.suse.com/show_bug.cgi?id=1235073</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235435">https://bugzilla.suse.com/show_bug.cgi?id=1235435</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235485">https://bugzilla.suse.com/show_bug.cgi?id=1235485</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235592">https://bugzilla.suse.com/show_bug.cgi?id=1235592</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235599">https://bugzilla.suse.com/show_bug.cgi?id=1235599</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235609">https://bugzilla.suse.com/show_bug.cgi?id=1235609</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235932">https://bugzilla.suse.com/show_bug.cgi?id=1235932</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235933">https://bugzilla.suse.com/show_bug.cgi?id=1235933</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236113">https://bugzilla.suse.com/show_bug.cgi?id=1236113</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236114">https://bugzilla.suse.com/show_bug.cgi?id=1236114</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236115">https://bugzilla.suse.com/show_bug.cgi?id=1236115</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236122">https://bugzilla.suse.com/show_bug.cgi?id=1236122</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236123">https://bugzilla.suse.com/show_bug.cgi?id=1236123</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236133">https://bugzilla.suse.com/show_bug.cgi?id=1236133</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236138">https://bugzilla.suse.com/show_bug.cgi?id=1236138</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236199">https://bugzilla.suse.com/show_bug.cgi?id=1236199</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236200">https://bugzilla.suse.com/show_bug.cgi?id=1236200</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236203">https://bugzilla.suse.com/show_bug.cgi?id=1236203</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236205">https://bugzilla.suse.com/show_bug.cgi?id=1236205</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236573">https://bugzilla.suse.com/show_bug.cgi?id=1236573</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236575">https://bugzilla.suse.com/show_bug.cgi?id=1236575</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236576">https://bugzilla.suse.com/show_bug.cgi?id=1236576</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236591">https://bugzilla.suse.com/show_bug.cgi?id=1236591</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236661">https://bugzilla.suse.com/show_bug.cgi?id=1236661</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236677">https://bugzilla.suse.com/show_bug.cgi?id=1236677</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236681">https://bugzilla.suse.com/show_bug.cgi?id=1236681</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236682">https://bugzilla.suse.com/show_bug.cgi?id=1236682</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236684">https://bugzilla.suse.com/show_bug.cgi?id=1236684</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236689">https://bugzilla.suse.com/show_bug.cgi?id=1236689</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236700">https://bugzilla.suse.com/show_bug.cgi?id=1236700</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236702">https://bugzilla.suse.com/show_bug.cgi?id=1236702</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236752">https://bugzilla.suse.com/show_bug.cgi?id=1236752</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236759">https://bugzilla.suse.com/show_bug.cgi?id=1236759</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236821">https://bugzilla.suse.com/show_bug.cgi?id=1236821</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236822">https://bugzilla.suse.com/show_bug.cgi?id=1236822</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236896">https://bugzilla.suse.com/show_bug.cgi?id=1236896</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236897">https://bugzilla.suse.com/show_bug.cgi?id=1236897</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236952">https://bugzilla.suse.com/show_bug.cgi?id=1236952</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236967">https://bugzilla.suse.com/show_bug.cgi?id=1236967</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236994">https://bugzilla.suse.com/show_bug.cgi?id=1236994</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237007">https://bugzilla.suse.com/show_bug.cgi?id=1237007</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237017">https://bugzilla.suse.com/show_bug.cgi?id=1237017</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237025">https://bugzilla.suse.com/show_bug.cgi?id=1237025</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237028">https://bugzilla.suse.com/show_bug.cgi?id=1237028</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237045">https://bugzilla.suse.com/show_bug.cgi?id=1237045</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237126">https://bugzilla.suse.com/show_bug.cgi?id=1237126</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237132">https://bugzilla.suse.com/show_bug.cgi?id=1237132</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237139">https://bugzilla.suse.com/show_bug.cgi?id=1237139</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237155">https://bugzilla.suse.com/show_bug.cgi?id=1237155</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237158">https://bugzilla.suse.com/show_bug.cgi?id=1237158</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237159">https://bugzilla.suse.com/show_bug.cgi?id=1237159</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237232">https://bugzilla.suse.com/show_bug.cgi?id=1237232</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237234">https://bugzilla.suse.com/show_bug.cgi?id=1237234</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237325">https://bugzilla.suse.com/show_bug.cgi?id=1237325</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237356">https://bugzilla.suse.com/show_bug.cgi?id=1237356</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237415">https://bugzilla.suse.com/show_bug.cgi?id=1237415</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237452">https://bugzilla.suse.com/show_bug.cgi?id=1237452</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237504">https://bugzilla.suse.com/show_bug.cgi?id=1237504</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237521">https://bugzilla.suse.com/show_bug.cgi?id=1237521</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237558">https://bugzilla.suse.com/show_bug.cgi?id=1237558</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237562">https://bugzilla.suse.com/show_bug.cgi?id=1237562</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237563">https://bugzilla.suse.com/show_bug.cgi?id=1237563</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237848">https://bugzilla.suse.com/show_bug.cgi?id=1237848</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237849">https://bugzilla.suse.com/show_bug.cgi?id=1237849</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237879">https://bugzilla.suse.com/show_bug.cgi?id=1237879</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237889">https://bugzilla.suse.com/show_bug.cgi?id=1237889</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237891">https://bugzilla.suse.com/show_bug.cgi?id=1237891</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237901">https://bugzilla.suse.com/show_bug.cgi?id=1237901</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237950">https://bugzilla.suse.com/show_bug.cgi?id=1237950</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238214">https://bugzilla.suse.com/show_bug.cgi?id=1238214</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238303">https://bugzilla.suse.com/show_bug.cgi?id=1238303</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238347">https://bugzilla.suse.com/show_bug.cgi?id=1238347</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238368">https://bugzilla.suse.com/show_bug.cgi?id=1238368</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238509">https://bugzilla.suse.com/show_bug.cgi?id=1238509</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238525">https://bugzilla.suse.com/show_bug.cgi?id=1238525</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238570">https://bugzilla.suse.com/show_bug.cgi?id=1238570</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238739">https://bugzilla.suse.com/show_bug.cgi?id=1238739</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238751">https://bugzilla.suse.com/show_bug.cgi?id=1238751</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238753">https://bugzilla.suse.com/show_bug.cgi?id=1238753</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238759">https://bugzilla.suse.com/show_bug.cgi?id=1238759</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238860">https://bugzilla.suse.com/show_bug.cgi?id=1238860</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238863">https://bugzilla.suse.com/show_bug.cgi?id=1238863</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238877">https://bugzilla.suse.com/show_bug.cgi?id=1238877</a> </li> <li> <a href="https://jira.suse.com/browse/PED-10028">https://jira.suse.com/browse/PED-10028</a> </li> <li> <a href="https://jira.suse.com/browse/PED-11253">https://jira.suse.com/browse/PED-11253</a> </li> <li> <a href="https://jira.suse.com/browse/PED-12094">https://jira.suse.com/browse/PED-12094</a> </li> <li> <a href="https://jira.suse.com/browse/PED-348">https://jira.suse.com/browse/PED-348</a> </li> </ul> </div>
--===============9090364861219098036==--
|