
# Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1180-1 Release Date: 2025-04-09T07:02:50Z Rating: important References: * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1221651 * bsc#1222649 * bsc#1223047 * bsc#1224489 * bsc#1224610 * bsc#1225533 * bsc#1225742 * bsc#1225770 * bsc#1226871 * bsc#1227858 * bsc#1228653 * bsc#1229311 * bsc#1229361 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231293 * bsc#1231432 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1233033 * bsc#1233060 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234222 * bsc#1234480 * bsc#1234828 * bsc#1234936 * bsc#1235436 * bsc#1235455 * bsc#1235501 * bsc#1235524 * bsc#1235589 * bsc#1235591 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236206 * bsc#1236333 * bsc#1236692 * bsc#1237029 * bsc#1237164 * bsc#1237313 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237565 * bsc#1237571 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237881 * bsc#1237885 * bsc#1237890 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238212 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238747 * bsc#1238754 * bsc#1238757 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239707 * bsc#1239986 * bsc#1239994 * bsc#1240169 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * jsc#PED-10701 * jsc#PED-12251 * jsc#PED-12416 Cross-References: * CVE-2023-52831 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26873 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-41005 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-47408 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49994 * CVE-2024-50056 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50152 * CVE-2024-50290 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53140 * CVE-2024-53163 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21659 * CVE-2025-21671 * CVE-2025-21693 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21718 * CVE-2025-21723 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21796 * CVE-2025-21804 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21883 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21888 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * Legacy Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 An update that solves 189 vulnerabilities, contains three features and has 42 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-35910: tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). The following non-security bugs were fixed: * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acpi: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * acpi: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * alsa: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * alsa: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * alsa: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * alsa: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * alsa: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * alsa: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Always honor no_shutup_pins (git-fixes). * alsa: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * alsa: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * alsa: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * alsa: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * alsa: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * alsa: hda/realtek: update ALC222 depop optimize (stable-fixes). * alsa: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * alsa: seq: Avoid module auto-load handling at event delivery (stable-fixes). * alsa: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * alsa: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * alsa: usx2y: validate nrpacks module parameter on probe (git-fixes). * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * asoc: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * asoc: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * asoc: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * asoc: cs35l41: check the return value from spi_setup() (git-fixes). * asoc: ops: Consistently treat platform_max as control value (git-fixes). * asoc: rt722-sdca: add missing readable registers (git-fixes). * asoc: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * asoc: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * asoc: tas2764: Fix power control mask (stable-fixes). * asoc: tas2764: Set the SDOUT polarity correctly (stable-fixes). * asoc: tas2770: Fix volume scale (stable-fixes). * asoc: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() (jsc#PED-12416). * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * documentation: qat: fix auto_reset attribute details (git-fixes). * documentation: qat: fix auto_reset section (git-fixes). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * hid: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * hid: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * hid: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * hid: Enable playstation driver independently of sony driver (git-fixes). * hid: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * hid: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * hid: hid-steam: Fix use-after-free when detaching device (git-fixes). * hid: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * hid: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * hid: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * hid: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * hid: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * hid: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * hid: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * ib/mad: Check available slots before posting receive WRs (git-fixes) * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * init: add initramfs_internal.h (bsc#1232848). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * input: ads7846 - fix gpiod allocation (git-fixes). * input: i8042 - add required quirks for missing old boardnames (stable- fixes). * input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * input: iqs7222 - preserve system status register (git-fixes). * input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * input: xpad - add multiple supported devices (stable-fixes). * input: xpad - add support for TECNO Pocket Go (stable-fixes). * input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * input: xpad - rename QH controller to Legion Go S (stable-fixes). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * mdacon: rework dependency list (git-fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * net: add dev_net_rcu() helper (bsc#1239994). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). Refresh: - patches.suse/nvme-fc-use-ctrl-state-getter.patch * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: remove old function prototype (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251). * padata: fix sysfs store callback check (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * pci: Avoid reset when disabled via sysfs (git-fixes). * pci: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * pci: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * pci: brcmstb: Fix potential premature regulator disabling (git-fixes). * pci: brcmstb: Set generation limit before PCIe link up (git-fixes). * pci: brcmstb: Use internal register to change link capability (git-fixes). * pci: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * pci: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * pci: Fix reference leak in pci_alloc_child_bus() (git-fixes). * pci: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * pci: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * pci: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * pci/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * pci/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * pci/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * pci/DOE: Support discovery version 2 (bsc#1237853) * pci/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * pm: sleep: Adjust check before setting power.must_resume (git-fixes). * pm: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powerpc: Stop using no_llseek (bsc#1239573). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * ras: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). Replace our patch with the upstream version. * rdma/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * rdma/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * rdma/core: Do not expose hw_counters outside of init net namespace (git- fixes) * rdma/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * rdma/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * rdma/hns: Fix missing xa_destroy() (git-fixes) * rdma/hns: Fix soft lockup during bt pages loop (git-fixes) * rdma/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * rdma/hns: Fix wrong value of max_sge_rd (git-fixes) * rdma/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * rdma/mlx5: Fix cache entry update on dereg error (git-fixes) * rdma/mlx5: Fix calculation of total invalidated pages (git-fixes) * rdma/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * rdma/mlx5: Fix MR cache initialization error flow (git-fixes) * rdma/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * rdma/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * revert "dm: requeue IO if mapping table not yet available" (git-fixes). * revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * revert "wifi: ath11k: support hibernation" (bsc#1207948). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) * rpm/release-projects: Update the ALP projects again (bsc#1231293). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * sunrpc: convert RPC_TASK_* constants to enum (git-fixes). * sunrpc: Handle -ETIMEDOUT return from tlshd (git-fixes). * sunrpc: Prevent looping due to rpc_signal_task() races (git-fixes). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tcp: Update window clamping condition (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * tools: move alignment-related macros to new <linux/align.h> (git-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * usb: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * usb: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * usb: serial: option: match on interface class for Telit FN990B (stable- fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1180=1 openSUSE-SLE-15.6-2025-1180=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1180=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1180=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-1180=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1180=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-1180=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-1180=1 ## Package List: * openSUSE Leap 15.6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.47.1 * openSUSE Leap 15.6 (noarch) * kernel-macros-6.4.0-150600.23.47.2 * kernel-source-vanilla-6.4.0-150600.23.47.2 * kernel-devel-6.4.0-150600.23.47.2 * kernel-docs-html-6.4.0-150600.23.47.1 * kernel-source-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (nosrc ppc64le x86_64) * kernel-debug-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (ppc64le x86_64) * kernel-debug-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-debug-debugsource-6.4.0-150600.23.47.2 * kernel-debug-debuginfo-6.4.0-150600.23.47.2 * kernel-debug-devel-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (x86_64) * kernel-kvmsmall-vdso-6.4.0-150600.23.47.2 * kernel-default-vdso-6.4.0-150600.23.47.2 * kernel-debug-vdso-6.4.0-150600.23.47.2 * kernel-debug-vdso-debuginfo-6.4.0-150600.23.47.2 * kernel-default-vdso-debuginfo-6.4.0-150600.23.47.2 * kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * kernel-kvmsmall-devel-6.4.0-150600.23.47.2 * kernel-default-base-rebuild-6.4.0-150600.23.47.2.150600.12.20.2 * kernel-kvmsmall-debuginfo-6.4.0-150600.23.47.2 * kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-default-base-6.4.0-150600.23.47.2.150600.12.20.2 * kernel-kvmsmall-debugsource-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.47.2 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.47.2 * reiserfs-kmp-default-6.4.0-150600.23.47.2 * kselftests-kmp-default-6.4.0-150600.23.47.2 * kernel-syms-6.4.0-150600.23.47.1 * kernel-default-extra-debuginfo-6.4.0-150600.23.47.2 * kselftests-kmp-default-debuginfo-6.4.0-150600.23.47.2 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.47.2 * gfs2-kmp-default-6.4.0-150600.23.47.2 * kernel-default-optional-debuginfo-6.4.0-150600.23.47.2 * dlm-kmp-default-debuginfo-6.4.0-150600.23.47.2 * cluster-md-kmp-default-6.4.0-150600.23.47.2 * kernel-obs-build-6.4.0-150600.23.47.1 * kernel-default-devel-6.4.0-150600.23.47.2 * kernel-default-extra-6.4.0-150600.23.47.2 * dlm-kmp-default-6.4.0-150600.23.47.2 * kernel-default-livepatch-6.4.0-150600.23.47.2 * kernel-default-optional-6.4.0-150600.23.47.2 * kernel-default-debuginfo-6.4.0-150600.23.47.2 * ocfs2-kmp-default-6.4.0-150600.23.47.2 * kernel-default-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-obs-build-debugsource-6.4.0-150600.23.47.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.47.2 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-obs-qa-6.4.0-150600.23.47.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_47-default-1-150600.13.5.1 * kernel-default-livepatch-devel-6.4.0-150600.23.47.2 * kernel-livepatch-SLE15-SP6_Update_10-debugsource-1-150600.13.5.1 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-1-150600.13.5.1 * openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (s390x) * kernel-zfcpdump-debugsource-6.4.0-150600.23.47.2 * kernel-zfcpdump-debuginfo-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (nosrc) * dtb-aarch64-6.4.0-150600.23.47.1 * openSUSE Leap 15.6 (aarch64) * kselftests-kmp-64kb-6.4.0-150600.23.47.2 * dtb-mediatek-6.4.0-150600.23.47.1 * kernel-64kb-devel-6.4.0-150600.23.47.2 * kernel-64kb-extra-6.4.0-150600.23.47.2 * dtb-xilinx-6.4.0-150600.23.47.1 * kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * kernel-64kb-optional-debuginfo-6.4.0-150600.23.47.2 * dtb-allwinner-6.4.0-150600.23.47.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-64kb-extra-debuginfo-6.4.0-150600.23.47.2 * cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * dtb-renesas-6.4.0-150600.23.47.1 * kernel-64kb-debugsource-6.4.0-150600.23.47.2 * reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * dlm-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * dtb-marvell-6.4.0-150600.23.47.1 * dtb-amazon-6.4.0-150600.23.47.1 * kernel-64kb-optional-6.4.0-150600.23.47.2 * dtb-amd-6.4.0-150600.23.47.1 * dtb-hisilicon-6.4.0-150600.23.47.1 * dtb-apm-6.4.0-150600.23.47.1 * dlm-kmp-64kb-6.4.0-150600.23.47.2 * cluster-md-kmp-64kb-6.4.0-150600.23.47.2 * dtb-apple-6.4.0-150600.23.47.1 * dtb-rockchip-6.4.0-150600.23.47.1 * gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * ocfs2-kmp-64kb-6.4.0-150600.23.47.2 * dtb-sprd-6.4.0-150600.23.47.1 * reiserfs-kmp-64kb-6.4.0-150600.23.47.2 * kernel-64kb-debuginfo-6.4.0-150600.23.47.2 * dtb-arm-6.4.0-150600.23.47.1 * dtb-amlogic-6.4.0-150600.23.47.1 * dtb-cavium-6.4.0-150600.23.47.1 * dtb-freescale-6.4.0-150600.23.47.1 * dtb-exynos-6.4.0-150600.23.47.1 * dtb-lg-6.4.0-150600.23.47.1 * dtb-nvidia-6.4.0-150600.23.47.1 * dtb-qcom-6.4.0-150600.23.47.1 * dtb-socionext-6.4.0-150600.23.47.1 * dtb-altera-6.4.0-150600.23.47.1 * gfs2-kmp-64kb-6.4.0-150600.23.47.2 * dtb-broadcom-6.4.0-150600.23.47.1 * openSUSE Leap 15.6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (aarch64) * kernel-64kb-devel-6.4.0-150600.23.47.2 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-64kb-debuginfo-6.4.0-150600.23.47.2 * kernel-64kb-debugsource-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150600.23.47.2.150600.12.20.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-default-devel-6.4.0-150600.23.47.2 * kernel-default-debuginfo-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (noarch) * kernel-macros-6.4.0-150600.23.47.2 * kernel-devel-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (s390x) * kernel-zfcpdump-debugsource-6.4.0-150600.23.47.2 * kernel-zfcpdump-debuginfo-6.4.0-150600.23.47.2 * Development Tools Module 15-SP6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.47.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-syms-6.4.0-150600.23.47.1 * kernel-obs-build-6.4.0-150600.23.47.1 * kernel-obs-build-debugsource-6.4.0-150600.23.47.1 * Development Tools Module 15-SP6 (noarch) * kernel-source-6.4.0-150600.23.47.2 * Legacy Module 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.47.2 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-6.4.0-150600.23.47.2 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-default-debuginfo-6.4.0-150600.23.47.2 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.47.2 * SUSE Linux Enterprise Live Patching 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.47.2 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-default-livepatch-devel-6.4.0-150600.23.47.2 * kernel-livepatch-6_4_0-150600_23_47-default-1-150600.13.5.1 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-default-livepatch-6.4.0-150600.23.47.2 * kernel-livepatch-SLE15-SP6_Update_10-debugsource-1-150600.13.5.1 * kernel-default-debuginfo-6.4.0-150600.23.47.2 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-1-150600.13.5.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-6.4.0-150600.23.47.2 * ocfs2-kmp-default-6.4.0-150600.23.47.2 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.47.2 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.47.2 * dlm-kmp-default-6.4.0-150600.23.47.2 * dlm-kmp-default-debuginfo-6.4.0-150600.23.47.2 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.47.2 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-default-debuginfo-6.4.0-150600.23.47.2 * cluster-md-kmp-default-6.4.0-150600.23.47.2 * SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.47.2 * SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.47.2 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * kernel-default-extra-6.4.0-150600.23.47.2 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-default-extra-debuginfo-6.4.0-150600.23.47.2 * kernel-default-debuginfo-6.4.0-150600.23.47.2 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12416