{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-6_4_0-150700_7_3-rt":"1-150700.1.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP7","name":"kernel-livepatch-SLE15-SP7-RT_Update_1","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP7-RT_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-150700.1.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150700.7.3.1","dlm-kmp-rt":"6.4.0-150700.7.3.1","gfs2-kmp-rt":"6.4.0-150700.7.3.1","kernel-devel-rt":"6.4.0-150700.7.3.1","kernel-rt":"6.4.0-150700.7.3.1","kernel-rt-devel":"6.4.0-150700.7.3.1","kernel-rt_debug":"6.4.0-150700.7.3.1","kernel-rt_debug-devel":"6.4.0-150700.7.3.1","kernel-source-rt":"6.4.0-150700.7.3.1","kernel-syms-rt":"6.4.0-150700.7.3.1","ocfs2-kmp-rt":"6.4.0-150700.7.3.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP7","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150700.7.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150700.7.3.1","dlm-kmp-rt":"6.4.0-150700.7.3.1","gfs2-kmp-rt":"6.4.0-150700.7.3.1","kernel-devel-rt":"6.4.0-150700.7.3.1","kernel-rt":"6.4.0-150700.7.3.1","kernel-rt-devel":"6.4.0-150700.7.3.1","kernel-rt_debug":"6.4.0-150700.7.3.1","kernel-rt_debug-devel":"6.4.0-150700.7.3.1","kernel-source-rt":"6.4.0-150700.7.3.1","kernel-syms-rt":"6.4.0-150700.7.3.1","ocfs2-kmp-rt":"6.4.0-150700.7.3.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP7","name":"kernel-rt_debug","purl":"pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150700.7.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150700.7.3.1","dlm-kmp-rt":"6.4.0-150700.7.3.1","gfs2-kmp-rt":"6.4.0-150700.7.3.1","kernel-devel-rt":"6.4.0-150700.7.3.1","kernel-rt":"6.4.0-150700.7.3.1","kernel-rt-devel":"6.4.0-150700.7.3.1","kernel-rt_debug":"6.4.0-150700.7.3.1","kernel-rt_debug-devel":"6.4.0-150700.7.3.1","kernel-source-rt":"6.4.0-150700.7.3.1","kernel-syms-rt":"6.4.0-150700.7.3.1","ocfs2-kmp-rt":"6.4.0-150700.7.3.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP7","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150700.7.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150700.7.3.1","dlm-kmp-rt":"6.4.0-150700.7.3.1","gfs2-kmp-rt":"6.4.0-150700.7.3.1","kernel-devel-rt":"6.4.0-150700.7.3.1","kernel-rt":"6.4.0-150700.7.3.1","kernel-rt-devel":"6.4.0-150700.7.3.1","kernel-rt_debug":"6.4.0-150700.7.3.1","kernel-rt_debug-devel":"6.4.0-150700.7.3.1","kernel-source-rt":"6.4.0-150700.7.3.1","kernel-syms-rt":"6.4.0-150700.7.3.1","ocfs2-kmp-rt":"6.4.0-150700.7.3.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP7","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150700.7.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP7 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching (bsc#1242006).\n- CVE-2024-35840: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (bsc#1224597).\n- CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581).\n- CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192).\n- CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992).\n- CVE-2024-58070: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT (bsc#1238983).\n- CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142).\n- CVE-2025-21683: bpf: Fix bpf_sk_select_reuseport() memory leak (bsc#1236704).\n- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).\n- CVE-2025-21707: mptcp: consolidate suboption status (bsc#1238862).\n- CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack() (bsc#1238737).\n- CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels (bsc#1238714).\n- CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774).\n- CVE-2025-21792: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt (bsc#1238745).\n- CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473).\n- CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593).\n- CVE-2025-21962: cifs: Fix integer overflow while processing closetimeo mount option (bsc#1240655).\n- CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount option (bsc#1240717).\n- CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount option (bsc#1240740).\n- CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266).\n- CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282).\n- CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376).\n- CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525).\n- CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533).\n- CVE-2025-22058: udp: Fix memory accounting leak (bsc#1241332).\n- CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351).\n- CVE-2025-22064: netfilter: nf_tables: do not unregister hook when table is dormant (bsc#1241413).\n- CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305).\n- CVE-2025-22094: powerpc/perf: Fix ref-counting on the PMU 'vpa_pmu' (bsc#1241512).\n- CVE-2025-22102: Bluetooth: btnxpuart: Fix kernel panic during FW release (bsc#1241456).\n- CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448).\n- CVE-2025-22104: ibmvnic: Use kernel helpers for hex dumps (bsc#1241550).\n- CVE-2025-22107: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() (bsc#1241575).\n- CVE-2025-22109: ax25: Remove broken autobind (bsc#1241573).\n- CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648).\n- CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763).\n- CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596).\n- CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513).\n- CVE-2025-23154: io_uring/net: fix io_req_post_cqe abuse by send bundle (bsc#1242533).\n- CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507).\n- CVE-2025-37747: kABI workaround for perf-Fix-hang-while-freeing-sigtrap-event (References: bsc#1242520).\n- CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523).\n- CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859).\n- CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510).\n- CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506).\n- CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502).\n- CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786).\n- CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585).\n- CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).\n- CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509).\n- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).\n- CVE-2025-37798: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (bsc#1242414).\n- CVE-2025-37799: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (bsc#1242283).\n- CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852).\n- CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854).\n- CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856).\n- CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866).\n- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).\n- CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867).\n- CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875).\n- CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860).\n- CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861).\n- CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868).\n- CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951).\n- CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056).\n- CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077).\n- CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944).\n- CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962).\n- CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541).\n- CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513).\n- CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539).\n- CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519).\n- CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547).\n- CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627).\n- CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657).\n\nThe following non-security bugs were fixed:\n\n- ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls (stable-fixes).\n- ACPI: EC: Set ec_no_wakeup for Lenovo Go S (stable-fixes).\n- ACPI: PPTT: Fix processor subtable walk (git-fixes).\n- ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git-fixes).\n- ALSA: hda/realtek - Enable speaker for HP platform (git-fixes).\n- ALSA: hda/realtek: Fix built-mic regression on other ASUS models (git-fixes).\n- ALSA: seq: Fix delivery of UMP events to group ports (git-fixes).\n- ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes).\n- ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes).\n- ALSA: usb-audio: Add retry on -EPROTO from usb_set_interface() (stable-fixes).\n- ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes).\n- ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera (stable-fixes).\n- ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset (stable-fixes).\n- ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext (git-fixes).\n- ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback direction (git-fixes).\n- ASoC: Use of_property_read_bool() (stable-fixes).\n- ASoC: simple-card-utils: Fix pointer check in graph_util_parse_link_direction (git-fixes).\n- ASoC: soc-core: Stop using of_property_read_bool() for non-boolean properties (stable-fixes).\n- ASoC: soc-pcm: Fix hw_params() and DAPM widget sequence (git-fixes).\n- ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes).\n- Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes).\n- Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes).\n- Bluetooth: btintel_pcie: Add additional to checks to clear TX/RX paths (git-fixes).\n- Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue() (git-fixes).\n- Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling (git-fixes).\n- Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (git-fixes).\n- Fix write to cloned skb in ipv6_hop_ioam() (git-fixes).\n- HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes).\n- HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes).\n- IB/cm: use rwlock for MAD agent lock (git-fixes)\n- Input: cyttsp5 - ensure minimum reset pulse width (git-fixes).\n- Input: cyttsp5 - fix power control issue on wakeup (git-fixes).\n- Input: mtk-pmic-keys - fix possible null pointer dereference (git-fixes).\n- Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes).\n- Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable-fixes).\n- Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable-fixes).\n- Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 (stable-fixes).\n- Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes).\n- Input: synaptics-rmi - fix crash with unsupported versions of F34 (git-fixes).\n- Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable-fixes).\n- Input: xpad - fix Share button on Xbox One controllers (stable-fixes).\n- Input: xpad - fix two controller table values (git-fixes).\n- KVM: PPC: Book3S HV: Fix IRQ map warnings with XICS on pSeries KVM Guest (bsc#1242205 ltc#212592).\n- KVM: SVM: Allocate IR data using atomic allocation (git-fixes).\n- KVM: SVM: Do not change target vCPU state on AP Creation VMGEXIT error (git-fixes).\n- KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes).\n- KVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest had an invalid VMSA (git-fixes).\n- KVM: SVM: Save host DR masks on CPUs with DebugSwap (jsc#PED-348).\n- KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes).\n- KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes).\n- KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes).\n- KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes).\n- KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes).\n- KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git-fixes).\n- KVM: arm64: Mark some header functions as inline (git-fixes).\n- KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes).\n- KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes).\n- KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git-fixes).\n- KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes).\n- KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes).\n- KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git-fixes).\n- KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes).\n- KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation (git-fixes).\n- KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes).\n- KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation (git-fixes).\n- KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657).\n- KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658).\n- KVM: x86/mmu: Check and free obsolete roots in kvm_mmu_reload() (git-fixes).\n- KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes).\n- KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (git-fixes).\n- KVM: x86: Check that the high 32bits are clear in kvm_arch_vcpu_ioctl_run() (git-fixes).\n- KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend notifier (git-fixes).\n- KVM: x86: Explicitly treat routing entry type changes as changes (git-fixes).\n- KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM (git-fixes).\n- KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes).\n- KVM: x86: Make x2APIC ID 100% readonly (git-fixes).\n- KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git-fixes).\n- KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func() (git-fixes).\n- KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found (git-fixes).\n- KVM: x86: block KVM_CAP_SYNC_REGS if guest state is protected (git-fixes).\n- Move upstreamed sound patch into sorted section\n- Move upstreamed tpm patch into sorted section\n- NFS: O_DIRECT writes must check and adjust the file length (git-fixes).\n- NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes).\n- NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes).\n- NFSv4: Do not trigger uneccessary scans for return-on-close delegations (git-fixes).\n- RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git-fixes)\n- RDMA/core: Fix 'KASAN: slab-use-after-free Read in ib_register_device' problem (git-fixes)\n- RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes)\n- RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git-fixes)\n- RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git-fixes)\n- RDMA/rxe: Fix 'trying to register non-static key in rxe_qp_do_cleanup' bug (git-fixes)\n- RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes)\n- Readd patches.kabi/md-md_personality-workaround-v2.patch dropped in merge by accident.\n- Refresh fixes for cBPF issue (bsc#1242778)\n- Remove debug flavor (bsc#1243919). This is only released in Leap, and we do not have Leap 15.7\n- Revert 'drm/amd/display: Hardware cursor changes color when switched to software cursor' (stable-fixes).\n- Revert 'drm/amd: Keep display off while going into S4' (git-fixes).\n- Revert 'drm/amd: Stop evicting resources on APUs in suspend' (stable-fixes).\n- Revert 'rndis_host: Flag RNDIS modems as WWAN devices' (git-fixes).\n- Sort ITS patches\n- Squashfs: check return result of sb_min_blocksize (git-fixes).\n- USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02) (stable-fixes).\n- USB: VLI disk crashes if LPM is used (stable-fixes).\n- USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe (stable-fixes).\n- USB: serial: option: add Sierra Wireless EM9291 (stable-fixes).\n- USB: serial: simple: add OWON HDS200 series oscilloscope support (stable-fixes).\n- USB: storage: quirk for ADATA Portable HDD CH94 (stable-fixes).\n- USB: usbtmc: use interruptible sleep in usbtmc_read (git-fixes).\n- Update patches.suse/nvme-fixup-scan-failure-for-non-ANA-multipath-contro.patch (git-fixes bsc#1235149).\n- Update patches.suse/nvme-re-read-ANA-log-page-after-ns-scan-completes.patch (git-fixes bsc#1235149).\n- Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes).\n- add bug reference for an existing hv_netvsc change (bsc#1243737).\n- afs: Fix the server_list to unuse a displaced server rather than putting it (git-fixes).\n- afs: Make it possible to find the volumes that are using a server (git-fixes).\n- arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778).\n- arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes)\n- arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778).\n- arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git-fixes)\n- arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes)\n- arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes)\n- arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes)\n- arm64: insn: Add support for encoding DSB (bsc#1242778).\n- arm64: insn: Add support for encoding DSB (git-fixes)\n- arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778).\n- arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git-fixes)\n- arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778).\n- arm64: proton-pack: Expose whether the branchy loop k value (git-fixes)\n- arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes)\n- arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778).\n- arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes).\n- ata: libata-scsi: Fix ata_mselect_control_ata_feature() return type (git-fixes).\n- ata: libata-scsi: Fix ata_msense_control_ata_feature() (git-fixes).\n- ata: libata-scsi: Improve CDL control (git-fixes).\n- auxdisplay: hd44780: Convert to platform remove callback returning void (stable-fixes).\n- auxdisplay: hd44780: Fix an API misuse in hd44780.c (git-fixes).\n- bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes).\n- bnxt_en: Fix coredump logic to free allocated buffer (git-fixes).\n- bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes).\n- bnxt_en: Fix ethtool selftest output in one of the failure cases (git-fixes).\n- bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes).\n- bnxt_en: call pci_alloc_irq_vectors() after bnxt_reserve_rings() (git-fixes).\n- bnxt_en: fix module unload sequence (git-fixes).\n- bnxt_en: improve TX timestamping FIFO configuration (git-fixes).\n- bonding: fix incorrect MAC address setting to receive NS messages (git-fixes).\n- bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes).\n- bpf: Scrub packet on bpf_redirect_peer (git-fixes).\n- bpf: add find_containing_subprog() utility function (bsc#1241590). Both spellings are actually used\n- bpf: check changes_pkt_data property for extension programs (bsc#1241590).\n- bpf: consider that tail calls invalidate packet pointers (bsc#1241590).\n- bpf: fix null dereference when computing changes_pkt_data of prog w/o subprogs (bsc#1241590).\n- bpf: refactor bpf_helper_changes_pkt_data to use helper number (bsc#1241590).\n- bpf: track changes_pkt_data property for global functions (bsc#1241590).\n- btrfs: adjust subpage bit start based on sectorsize (bsc#1241492).\n- btrfs: always fallback to buffered write if the inode requires checksum (bsc#1242831 bsc#1242710).\n- btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342).\n- btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208).\n- btrfs: avoid monopolizing a core when activating a swap file (git-fixes).\n- btrfs: do not loop for nowait writes when checking for cross references (git-fixes).\n- btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes).\n- btrfs: fix discard worker infinite loop after disabling discard (bsc#1242012).\n- btrfs: fix non-empty delayed iputs list on unmount due to compressed write workers (git-fixes).\n- can: bcm: add locking for bcm_op runtime updates (git-fixes).\n- can: bcm: add missing rcu read protection for procfs content (git-fixes).\n- can: gw: fix RCU/BH usage in cgw_create_job() (git-fixes).\n- can: mcan: m_can_class_unregister(): fix order of unregistration calls (git-fixes).\n- can: mcp251xfd: fix TDC setting for low data bit rates (git-fixes).\n- can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls (git-fixes).\n- can: slcan: allow reception of short error messages (git-fixes).\n- check-for-config-changes: Fix flag name typo\n- cifs: Fix integer overflow while processing actimeo mount option (git-fixes).\n- cifs: reduce warning log level for server not advertising interfaces (git-fixes).\n- crypto: algif_hash - fix double free in hash_accept (git-fixes).\n- crypto: ccp - Add support for PCI device 0x1134 (stable-fixes).\n- cxl/core/regs.c: Skip Memory Space Enable check for RCD and RCH Ports (bsc#1242125).\n- devlink: fix port new reply cmd type (git-fixes).\n- dm-bufio: do not schedule in atomic context (git-fixes).\n- dm-ebs: fix prefetch-vs-suspend race (git-fixes).\n- dm-integrity: fix a warning on invalid table line (git-fixes).\n- dm-integrity: set ti->error on memory allocation failure (git-fixes).\n- dm-verity: fix prefetch-vs-suspend race (git-fixes).\n- dm: add missing unlock on in dm_keyslot_evict() (git-fixes).\n- dm: always update the array size in realloc_argv on success (git-fixes).\n- dm: fix copying after src array boundaries (git-fixes).\n- dma-buf: insert memory barrier before updating num_fences (git-fixes).\n- dmaengine: Revert 'dmaengine: dmatest: Fix dmatest waiting less when interrupted' (git-fixes).\n- dmaengine: dmatest: Fix dmatest waiting less when interrupted (stable-fixes).\n- dmaengine: idxd: Add missing cleanup for early error out in idxd_setup_internals (git-fixes).\n- dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes).\n- dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call (git-fixes).\n- dmaengine: idxd: Fix ->poll() return value (git-fixes).\n- dmaengine: idxd: Fix allowing write() from different address spaces (git-fixes).\n- dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git-fixes).\n- dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git-fixes).\n- dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe (git-fixes).\n- dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines (git-fixes).\n- dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups (git-fixes).\n- dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs (git-fixes).\n- dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() (git-fixes).\n- dmaengine: mediatek: drop unused variable (git-fixes).\n- dmaengine: ti: k3-udma: Add missing locking (git-fixes).\n- dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy (git-fixes).\n- drm/amd/display: Add scoped mutexes for amdgpu_dm_dhcp (stable-fixes).\n- drm/amd/display: Avoid flooding unnecessary info messages (git-fixes).\n- drm/amd/display: Copy AUX read reply data whenever length > 0 (git-fixes).\n- drm/amd/display: Correct the reply value when AUX write incomplete (git-fixes).\n- drm/amd/display: Fix invalid context error in dml helper (git-fixes).\n- drm/amd/display: Fix slab-use-after-free in hdcp (git-fixes).\n- drm/amd/display: Fix the checking condition in dmub aux handling (stable-fixes).\n- drm/amd/display: Fix wrong handling for AUX_DEFER case (git-fixes).\n- drm/amd/display: Force full update in gpu reset (stable-fixes).\n- drm/amd/display: Remove incorrect checking in dmub aux handler (git-fixes).\n- drm/amd/display: Shift DMUB AUX reply command if necessary (git-fixes).\n- drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes).\n- drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes).\n- drm/amdgpu/hdp4: use memcfg register to post the write for HDP flush (git-fixes).\n- drm/amdgpu/hdp5.2: use memcfg register to post the write for HDP flush (git-fixes).\n- drm/amdgpu/hdp5: use memcfg register to post the write for HDP flush (git-fixes).\n- drm/amdgpu/hdp6: use memcfg register to post the write for HDP flush (git-fixes).\n- drm/amdgpu/hdp7: use memcfg register to post the write for HDP flush (git-fixes).\n- drm/amdgpu/vcn: using separate VCN1_AON_SOC offset (stable-fixes).\n- drm/amdgpu: Fix offset for HDP remap in nbio v7.11 (stable-fixes).\n- drm/amdgpu: Increase KIQ invalidate_tlbs timeout (stable-fixes).\n- drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes).\n- drm/amdgpu: Use the right function for hdp flush (stable-fixes).\n- drm/amdgpu: fix pm notifier handling (git-fixes).\n- drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes).\n- drm/amdgpu: use a dummy owner for sysfs triggered cleaner shaders v4 (stable-fixes).\n- drm/edid: fixed the bug that hdr metadata was not reset (git-fixes).\n- drm/fdinfo: Protect against driver unbind (git-fixes).\n- drm/i915/pxp: fix undefined reference to `intel_pxp_gsccs_is_ready_for_sessions' (git-fixes).\n- drm/mipi-dbi: Fix blanking for non-16 bit formats (git-fixes).\n- drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() (git-fixes).\n- drm/panel: simple: Update timings for AUO G101EVN010 (git-fixes).\n- drm/tests: shmem: Fix memleak (git-fixes).\n- drm/v3d: Add job to pending list if the reset was skipped (stable-fixes).\n- drm/xe/tests/mocs: Hold XE_FORCEWAKE_ALL for LNCF regs (git-fixes).\n- drm/xe/tests/mocs: Update xe_force_wake_get() return handling (stable-fixes).\n- drm/xe/xe3lpg: Apply Wa_14022293748, Wa_22019794406 (stable-fixes).\n- drm/xe: Add page queue multiplier (git-fixes).\n- drm/xe: Save CTX_TIMESTAMP mmio value instead of LRC value (git-fixes).\n- drm: Select DRM_KMS_HELPER from DRM_DEBUG_DP_MST_TOPOLOGY_REFS (git-fixes).\n- ethtool: cmis_cdb: use correct rpl size in ethtool_cmis_module_poll() (git-fixes).\n- ethtool: ntuple: fix rss + ring_cookie check (git-fixes).\n- ethtool: rss: fix hiding unsupported fields in dumps (git-fixes).\n- exfat: fix potential wrong error return from get_block (git-fixes).\n- ext4: add missing brelse() for bh2 in ext4_dx_add_entry() (bsc#1242342).\n- ext4: correct encrypted dentry name hash when not casefolded (bsc#1242540).\n- ext4: do not over-report free space or inodes in statvfs (bsc#1242345).\n- ext4: do not treat fhandle lookup of ea_inode as FS corruption (bsc#1242347).\n- ext4: fix FS_IOC_GETFSMAP handling (bsc#1240557).\n- ext4: goto right label 'out_mmap_sem' in ext4_setattr() (bsc#1242556).\n- ext4: make block validity check resistent to sb bh corruption (bsc#1242348).\n- ext4: partial zero eof block on unaligned inode size extension (bsc#1242336).\n- ext4: protect ext4_release_dquot against freezing (bsc#1242335).\n- ext4: replace the traditional ternary conditional operator with with max()/min() (bsc#1242536).\n- ext4: treat end of range as exclusive in ext4_zero_range() (bsc#1242539).\n- ext4: unify the type of flexbg_size to unsigned int (bsc#1242538).\n- firmware: arm_ffa: Skip Rx buffer ownership release if not acquired (git-fixes).\n- firmware: arm_scmi: Balance device refcount when destroying devices (git-fixes).\n- fs: better handle deep ancestor chains in is_subdir() (bsc#1242528).\n- fs: consistently deref the files table with rcu_dereference_raw() (bsc#1242535).\n- fs: do not allow non-init s_user_ns for filesystems without FS_USERNS_MOUNT (bsc#1242526).\n- fs: support relative paths with FSCONFIG_SET_STRING (git-fixes).\n- hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git-fixes).\n- hv_netvsc: Remove rmsg_pgcnt (git-fixes).\n- hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git-fixes).\n- i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git-fixes).\n- i2c: imx-lpi2c: Fix clock count when probe defers (git-fixes).\n- ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes).\n- idpf: fix offloads support for encapsulated packets (git-fixes).\n- idpf: fix potential memory leak on kcalloc() failure (git-fixes).\n- idpf: protect shutdown from reset (git-fixes).\n- igc: fix lock order in igc_ptp_reset (git-fixes).\n- iio: accel: adxl367: fix setting odr for activity time update (git-fixes).\n- iio: adc: ad7606: fix serial register access (git-fixes).\n- iio: adc: ad7768-1: Fix conversion result sign (git-fixes).\n- iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary return value check (stable-fixes).\n- iio: adis16201: Correct inclinometer channel resolution (git-fixes).\n- iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo (git-fixes).\n- iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo (git-fixes).\n- iio: temp: maxim-thermocouple: Fix potential lack of DMA safe buffer (git-fixes).\n- inetpeer: remove create argument of inet_getpeer_v() (git-fixes).\n- inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes).\n- io_uring/sqpoll: Increase task_work submission batch size (bsc#1238585).\n- iommu/arm-smmu-v3: Fix pgsize_bit for sva domains (bsc#1243341)\n- iommu: Fix two issues in iommu_copy_struct_from_user() (git-fixes).\n- ipv4/route: avoid unused-but-set-variable warning (git-fixes).\n- ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes).\n- ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes).\n- ipv4: Fix incorrect source address in Record Route option (git-fixes).\n- ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git-fixes).\n- ipv4: fix source address selection with route leak (git-fixes).\n- ipv4: give an IPv4 dev to blackhole_netdev (git-fixes).\n- ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes).\n- ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes).\n- ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes).\n- ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes).\n- ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes).\n- ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes).\n- ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes).\n- ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git-fixes).\n- ipv6: Align behavior across nexthops during path selection (git-fixes).\n- ipv6: Do not consider link down nexthops in path selection (git-fixes).\n- ipv6: Start path selection from the first nexthop (git-fixes).\n- ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS (git-fixes).\n- irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs (git-fixes).\n- isofs: fix KMSAN uninit-value bug in do_isofs_readdir() (bsc#1242307).\n- iwlwifi: correct modinfo firmware ucode (bsc#1243020).\n- jbd2: add a missing data flush during file and fs synchronization (bsc#1242346).\n- jbd2: fix off-by-one while erasing journal (bsc#1242344).\n- jbd2: flush filesystem device before updating tail sequence (bsc#1242333).\n- jbd2: increase IO priority for writing revoke records (bsc#1242332).\n- jbd2: increase the journal IO's priority (bsc#1242537).\n- jbd2: remove wrong sb->s_sequence check (bsc#1242343).\n- jiffies: Cast to unsigned long in secs_to_jiffies() conversion (bsc#1242993).\n- jiffies: Define secs_to_jiffies() (bsc#1242993).\n- kernel-obs-qa: Use srchash for dependency as well\n- loop: Add sanity check for read/write_iter (git-fixes).\n- loop: aio inherit the ioprio of original request (git-fixes).\n- loop: do not require ->write_iter for writable files in loop_configure (git-fixes).\n- md/raid1,raid10: do not ignore IO flags (git-fixes).\n- md/raid10: fix missing discard IO accounting (git-fixes).\n- md/raid10: wait barrier before returning discard request with REQ_NOWAIT (git-fixes).\n- md/raid1: Add check for missing source disk in process_checks() (git-fixes).\n- md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes).\n- md/raid5: implement pers->bitmap_sector() (git-fixes).\n- md: add a new callback pers->bitmap_sector() (git-fixes).\n- md: ensure resync is prioritized over recovery (git-fixes).\n- md: fix mddev uaf while iterating all_mddevs list (git-fixes).\n- md: preserve KABI in struct md_personality v2 (git-fixes).\n- media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes).\n- mei: me: add panther lake H DID (stable-fixes).\n- mm/readahead: fix large folio support in async readahead (bsc#1242321).\n- mm: fix error handling in __filemap_get_folio() with FGP_NOWAIT (bsc#1242326).\n- mm: fix filemap_get_folios_contig returning batches of identical folios (bsc#1242327).\n- mm: fix oops when filemap_map_pmd() without prealloc_pte (bsc#1242546).\n- mptcp: mptcp_parse_option() fix for MPTCPOPT_MP_JOIN (git-fixes).\n- mptcp: refine opt_mp_capable determination (git-fixes).\n- mptcp: relax check on MPC passive fallback (git-fixes).\n- mptcp: strict validation before using mp_opt->hmac (git-fixes).\n- mptcp: use OPTION_MPTCP_MPJ_SYN in subflow_check_req() (git-fixes).\n- mtd: phram: Add the kernel lock down check (bsc#1232649).\n- neighbour: delete redundant judgment statements (git-fixes).\n- net/handshake: Fix handshake_req_destroy_test1 (git-fixes).\n- net/handshake: Fix memory leak in __sock_create() and sock_alloc_file() (git-fixes).\n- net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes).\n- net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git-fixes).\n- net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged (git-fixes).\n- net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes).\n- net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes).\n- net/mlx5e: Disable MACsec offload for uplink representor profile (git-fixes).\n- net/mlx5e: Fix lock order in mlx5e_tx_reporter_ptpsq_unhealthy_recover (git-fixes).\n- net/mlx5e: TC, Continue the attr process even if encap entry is invalid (git-fixes).\n- net/mlx5e: Use custom tunnel header for vxlan gbp (git-fixes).\n- net: Add non-RCU dev_getbyhwaddr() helper (git-fixes).\n- net: Clear old fragment checksum value in napi_reuse_skb (git-fixes).\n- net: Handle napi_schedule() calls from non-interrupt (git-fixes).\n- net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes).\n- net: Remove acked SYN flag from packet in the transmit queue correctly (git-fixes).\n- net: do not dump stack on queue timeout (git-fixes).\n- net: free_netdev: exit earlier if dummy (bsc#1243215).\n- net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes).\n- net: ipv6: fix UDPv6 GSO segmentation with NAT (git-fixes).\n- net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes).\n- net: loopback: Avoid sending IP packets without an Ethernet header (git-fixes).\n- net: qede: Initialize qede_ll_ops with designated initializer (git-fixes).\n- net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes).\n- net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes).\n- net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension (git-fixes).\n- net_sched: drr: Fix double list add in class with netem as child qdisc (git-fixes).\n- net_sched: ets: Fix double list add in class with netem as child qdisc (git-fixes).\n- net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (git-fixes).\n- net_sched: qfq: Fix double list add in class with netem as child qdisc (git-fixes).\n- netdev-genl: avoid empty messages in queue dump (git-fixes).\n- netdev: fix repeated netlink messages in queue dump (git-fixes).\n- netlink: annotate data-races around sk->sk_err (git-fixes).\n- netlink: specs: tc: all actions are indexed arrays (git-fixes).\n- netlink: specs: tc: fix a couple of attribute names (git-fixes).\n- netpoll: Ensure clean state on setup failures (git-fixes).\n- nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes).\n- nfsd: add list_head nf_gc to struct nfsd_file (git-fixes).\n- nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes).\n- nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git-fixes).\n- ntb: reduce stack usage in idt_scan_mws (stable-fixes).\n- ntb_hw_amd: Add NTB PCI ID for new gen CPU (stable-fixes).\n- nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes bsc#1223096).\n- nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148).\n- nvme-pci: fix queue unquiesce check on slot_reset (git-fixes).\n- nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes).\n- nvme-tcp: fix premature queue removal and I/O failover (git-fixes).\n- nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes).\n- nvme: Add 'partial_nid' quirk (bsc#1241148).\n- nvme: Add warning when a partiually unique NID is detected (bsc#1241148).\n- nvme: fixup scan failure for non-ANA multipath controllers (git-fixes).\n- nvme: multipath: fix return value of nvme_available_path (git-fixes).\n- nvme: re-read ANA log page after ns scan completes (git-fixes).\n- nvme: requeue namespace scan on missed AENs (git-fixes).\n- nvme: unblock ctrl state transition for firmware update (git-fixes).\n- nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes).\n- nvmet-fc: inline nvmet_fc_free_hostport (git-fixes).\n- nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes).\n- nvmet-fc: take tgtport reference only once (git-fixes).\n- nvmet-fc: update tgtport ref per assoc (git-fixes).\n- nvmet-fcloop: Remove remote port from list when unlinking (git-fixes).\n- nvmet-fcloop: add ref counting to lport (git-fixes).\n- nvmet-fcloop: replace kref with refcount (git-fixes).\n- nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes).\n- objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963).\n- ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes).\n- octeontx2-pf: Do not reallocate all ntuple filters (git-fixes).\n- octeontx2-pf: Fix ethtool support for SDP representors (git-fixes).\n- octeontx2-pf: qos: fix VF root node parent queue index (git-fixes).\n- padata: do not leak refcount in reorder_work (git-fixes).\n- perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering (bsc#1242172)\n- perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc (bsc#1242172)\n- perf: arm_cspmu: nvidia: monitor all ports by default (bsc#1242172)\n- perf: arm_cspmu: nvidia: remove unsupported SCF events (bsc#1242172)\n- phy: Fix error handling in tegra_xusb_port_init (git-fixes).\n- phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes).\n- phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes).\n- phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git-fixes).\n- phy: tegra: xusb: remove a stray unlock (git-fixes).\n- pinctrl: renesas: rza2: Fix potential NULL pointer dereference (stable-fixes).\n- platform/x86/amd/pmc: Declare quirk_spurious_8042 for MECHREVO Wujie 14XA (GX4HRXL) (git-fixes).\n- platform/x86/amd: pmc: Require at least 2.5 seconds between HW sleep cycles (stable-fixes).\n- platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection (git-fixes).\n- platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() (git-fixes).\n- powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes).\n- powerpc/pseries/iommu: Fix kmemleak in TCE table userspace view (jsc#PED-10539 git-fixes).\n- powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (bsc#1239691 bsc#1243044 ltc#212555).\n- powerpc: Do not use --- in kernel logs (git-fixes).\n- qibfs: fix _another_ leak (git-fixes)\n- rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes)\n- rcu/tasks: Handle new PF_IDLE semantics (git-fixes)\n- rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes)\n- rcu: Introduce rcu_cpu_online() (git-fixes)\n- regulator: max20086: fix invalid memory access (git-fixes).\n- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN\n- rtc: pcf85063: do a SW reset if POR failed (stable-fixes).\n- s390/ap: Fix CCA crypto card behavior within protected execution environment (git-fixes bsc#1243817 LTC#213623).\n- s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805).\n- s390/cpumf: Update CPU Measurement facility extended counter set support (bsc#1243115).\n- s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFs (git-fixes).\n- s390: Add z17 elf platform (bsc#1243116).\n- sched/fair: Fix CPU bandwidth limit bypass during CPU hotplug (BSC#1241319).\n- sched/fair: Fix CPU bandwidth limit bypass during CPU hotplug (bsc#1241319).\n- sched/topology: Refinement to topology_span_sane speedup (bsc#1242119).\n- sched/topology: improve topology_span_sane speed (bsc#1242119).\n- sched: Add deprecation warning for users of RT_GROUP_SCHED (jsc#PED-11761 jsc#PED-12405).\n- scsi: Improve CDL control (git-fixes).\n- scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes).\n- scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git-fixes).\n- scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1242993).\n- scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993).\n- scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993).\n- scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993).\n- scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands (bsc#1242993).\n- scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993).\n- scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset (bsc#1242993).\n- scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI retry (bsc#1242993).\n- scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset (bsc#1242993).\n- scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993).\n- scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966).\n- scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993).\n- scsi: megaraid_sas: Block zero-length ATA VPD inquiry (bsc#1241388 jsc#PED-11258).\n- scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes).\n- scsi: megaraid_sas: Driver version update to 07.734.00.00-rc1 (bsc#1241388 jsc#PED-11258).\n- scsi: megaraid_sas: Make most module parameters static (bsc#1241388 jsc#PED-11258).\n- scsi: mpi3mr: Add level check to control event logging (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Avoid reply queue full condition (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Check admin reply queue from Watchdog (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Fix pending I/O counter (git-fixes).\n- scsi: mpi3mr: Fix spelling mistake 'skiping' -> 'skipping' (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Handling of fault code for insufficient power (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Reset the pending interrupt flag (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Support for Segmented Hardware Trace buffer (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Synchronize access to ioctl data buffer (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Task Abort EH Support (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Update MPI Headers to revision 35 (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Update driver version to 8.12.0.3.50 (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Update driver version to 8.12.1.0.50 (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Update driver version to 8.13.0.5.50 (bsc#1241388 jsc#PED-12372).\n- scsi: mpi3mr: Update timestamp only for supervisor IOCs (bsc#1241388 jsc#PED-12372).\n- scsi: mpt3sas: Add details to EEDPTagMode error message (bsc#1241388 jsc#PED-11253).\n- scsi: mpt3sas: Add support for MCTP Passthrough commands (bsc#1241388 jsc#PED-11253).\n- scsi: mpt3sas: Fix buffer overflow in mpt3sas_send_mctp_passthru_req() (bsc#1241388 jsc#PED-11253).\n- scsi: mpt3sas: Fix spelling mistake 'receveid' -> 'received' (bsc#1241388 jsc#PED-11253).\n- scsi: mpt3sas: Remove unused config functions (bsc#1241388 jsc#PED-11253).\n- scsi: mpt3sas: Report driver capability as part of IOCINFO command (bsc#1241388 jsc#PED-11253).\n- scsi: mpt3sas: Send a diag reset if target reset fails (bsc#1241388 jsc#PED-11253).\n- scsi: mpt3sas: Update MPI headers to 02.00.62 version (bsc#1241388 jsc#PED-11253).\n- scsi: mpt3sas: update driver version to 52.100.00.00 (bsc#1241388 jsc#PED-11253).\n- scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes).\n- scsi: qla2xxx: Fix typos in a comment (bsc#1243090).\n- scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090).\n- scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090).\n- scsi: qla2xxx: Remove unused module parameters (bsc#1243090).\n- scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090).\n- scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090).\n- scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090).\n- scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090).\n- scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090).\n- scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090).\n- scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090).\n- selftests/bpf: extend changes_pkt_data with cases w/o subprograms (bsc#1241590).\n- selftests/bpf: freplace tests for tracking of changes_packet_data (bsc#1241590).\n- selftests/bpf: test for changing packet data from global functions (bsc#1241590).\n- selftests/bpf: validate that tail call invalidates packet pointers (bsc#1241590).\n- selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test (bsc#1242203).\n- sound/virtio: Fix cancel_sync warnings on uninitialized work_structs (stable-fixes).\n- soundwire: bus: Fix race on the creation of the IRQ domain (git-fixes).\n- spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes).\n- spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes).\n- spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes).\n- spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes).\n- spi: tegra114: Do not fail set_cs_timing when delays are zero (git-fixes).\n- spi: tegra114: Use value to check for invalid delays (git-fixes).\n- spi: tegra210-quad: add rate limiting and simplify timeout error message (stable-fixes).\n- spi: tegra210-quad: use WARN_ON_ONCE instead of WARN_ON for timeouts (stable-fixes).\n- splice: remove duplicate noinline from pipe_clear_nowait (bsc#1242328).\n- staging: axis-fifo: Correct handling of tx_fifo_depth for size validation (git-fixes).\n- staging: axis-fifo: Remove hardware resets for user errors (git-fixes).\n- staging: iio: adc: ad7816: Correct conditional logic for store mode (git-fixes).\n- tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes).\n- tcp_cubic: fix incorrect HyStart round start detection (git-fixes).\n- thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git-fixes).\n- thunderbolt: Scan retimers after device router has been enumerated (stable-fixes).\n- tools/hv: update route parsing in kvp daemon (git-fixes).\n- tty: Require CAP_SYS_ADMIN for all usages of TIOCL_SELMOUSEREPORT (git-fixes).\n- udf: Fix inode_getblk() return value (bsc#1242313).\n- udf: Skip parent dir link count update if corrupted (bsc#1242315).\n- udf: Verify inode link counts before performing rename (bsc#1242314).\n- usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version (git-fixes).\n- usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield (stable-fixes).\n- usb: dwc3: gadget: Refactor loop to avoid NULL endpoints (stable-fixes).\n- usb: gadget: Use get_status callback to set remote wakeup capability (git-fixes).\n- usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev() (stable-fixes).\n- usb: gadget: f_ecm: Add get_status callback (git-fixes).\n- usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN (git-fixes).\n- usb: host: max3421-hcd: Add missing spi_device_id table (stable-fixes).\n- usb: host: tegra: Prevent host controller crash when OTG port is used (git-fixes).\n- usb: host: xhci-plat: mvebu: use ->quirks instead of ->init_quirk() func (stable-fixes).\n- usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive (stable-fixes).\n- usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive (stable-fixes).\n- usb: typec: class: Invalidate USB device pointers on partner unregistration (git-fixes).\n- usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition (git-fixes).\n- usb: typec: ucsi: displayport: Fix NULL pointer access (git-fixes).\n- usb: uhci-platform: Make the clock really optional (git-fixes).\n- usb: usbtmc: Fix erroneous generic_read ioctl return (git-fixes).\n- usb: usbtmc: Fix erroneous get_stb ioctl error returns (git-fixes).\n- usb: usbtmc: Fix erroneous wait_srq ioctl return (git-fixes).\n- usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running (stable-fixes).\n- vfs: do not mod negative dentry count when on shrinker list (bsc#1242534).\n- vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git-fixes).\n- virtio_console: fix missing byte order handling for cols and rows (git-fixes).\n- wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() (git-fixes).\n- wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation (git-fixes).\n- wifi: iwlwifi: do not warn if the NIC is gone in resume (git-fixes).\n- wifi: iwlwifi: fix the check for the SCRATCH register upon resume (git-fixes).\n- wifi: mac80211, cfg80211: miscellaneous spelling fixes (git-fixes).\n- wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request (git-fixes).\n- wifi: mt76: disable napi on driver removal (git-fixes).\n- wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release (git-fixes).\n- x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).\n- x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).\n- x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).\n- x86/cpu/amd: Fix workaround for erratum 1054 (git-fixes).\n- x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes).\n- x86/xen: move xen_reserve_extra_memory() (git-fixes).\n- xen/mcelog: Add __nonstring annotations for unterminated strings (git-fixes).\n- xen: Change xen-acpi-processor dom0 dependency (git-fixes).\n- xenfs/xensyms: respect hypervisor's 'next' indication (git-fixes).\n- xhci: Add helper to set an interrupters interrupt moderation interval (git-fixes).\n- xhci: Clean up stale comment on ERST_SIZE macro (stable-fixes).\n- xhci: Limit time spent with xHC interrupts disabled during bus resume (stable-fixes).\n- xhci: split free interrupter into separate remove and free parts (git-fixes).\n- xsk: Add truesize to skb_add_rx_frag() (git-fixes).\n- xsk: Do not assume metadata is always requested in TX completion (git-fixes).\n","id":"SUSE-SU-2025:01972-1","modified":"2025-06-17T11:37:43Z","published":"2025-06-17T11:37:43Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223809"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224013"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224597"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231103"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232493"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232649"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232882"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233192"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235149"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235501"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236704"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238473"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238527"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238714"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238737"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238745"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238774"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238862"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238961"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238992"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239079"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239476"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239691"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240593"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240655"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240711"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240717"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240740"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240966"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241148"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241266"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241282"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241305"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241319"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241332"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241333"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241341"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241343"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241351"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241361"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241369"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241376"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241388"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241402"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241412"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241419"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241441"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241442"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241443"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241448"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241458"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241459"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241492"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241525"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241528"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241533"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241535"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241541"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241545"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241573"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241574"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241575"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241590"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241596"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241597"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241598"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241599"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241601"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241628"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241638"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241648"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242006"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242012"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242172"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242203"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242205"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242283"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242314"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242315"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242321"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242326"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242327"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242328"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242332"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242333"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242335"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242336"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242343"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242502"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242509"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242510"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242523"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242528"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242533"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242534"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242535"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242536"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242537"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242538"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242546"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242556"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242596"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242762"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242778"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242786"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242831"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242852"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242856"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242859"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242860"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242861"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242866"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242868"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242875"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242924"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242944"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242951"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242962"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242993"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243020"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243044"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243077"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243090"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243116"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243215"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243341"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243541"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243547"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243658"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243737"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243805"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243817"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243963"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53034"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27415"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-28956"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35840"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46763"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46865"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50083"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50106"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-54458"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56641"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57998"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-58097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21707"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21758"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21768"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21792"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21814"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21852"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21919"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21962"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21963"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21964"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22021"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22027"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22030"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22044"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22050"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22056"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22057"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22065"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22075"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22086"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22091"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22102"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22107"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22109"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22112"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22126"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22128"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23129"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23134"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23136"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23140"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23150"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37749"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37750"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37755"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37773"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37780"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37790"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37797"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37799"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37803"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37804"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37820"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37823"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37824"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37829"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37831"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37833"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37842"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37949"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37958"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37960"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37974"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38152"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38637"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40325"}],"related":["CVE-2023-53034","CVE-2024-27018","CVE-2024-27415","CVE-2024-28956","CVE-2024-35840","CVE-2024-46713","CVE-2024-46763","CVE-2024-46865","CVE-2024-50083","CVE-2024-50106","CVE-2024-50223","CVE-2024-54458","CVE-2024-56641","CVE-2024-56702","CVE-2024-57998","CVE-2024-58001","CVE-2024-58070","CVE-2024-58093","CVE-2024-58094","CVE-2024-58095","CVE-2024-58096","CVE-2024-58097","CVE-2025-21648","CVE-2025-21683","CVE-2025-21702","CVE-2025-21707","CVE-2025-21758","CVE-2025-21768","CVE-2025-21787","CVE-2025-21792","CVE-2025-21814","CVE-2025-21852","CVE-2025-21853","CVE-2025-21919","CVE-2025-21929","CVE-2025-21962","CVE-2025-21963","CVE-2025-21964","CVE-2025-22018","CVE-2025-22021","CVE-2025-22025","CVE-2025-22027","CVE-2025-22030","CVE-2025-22033","CVE-2025-22044","CVE-2025-22050","CVE-2025-22056","CVE-2025-22057","CVE-2025-22058","CVE-2025-22062","CVE-2025-22063","CVE-2025-22064","CVE-2025-22065","CVE-2025-22070","CVE-2025-22075","CVE-2025-22085","CVE-2025-22086","CVE-2025-22088","CVE-2025-22091","CVE-2025-22093","CVE-2025-22094","CVE-2025-22097","CVE-2025-22102","CVE-2025-22103","CVE-2025-22104","CVE-2025-22107","CVE-2025-22108","CVE-2025-22109","CVE-2025-22112","CVE-2025-22116","CVE-2025-22125","CVE-2025-22126","CVE-2025-22128","CVE-2025-23129","CVE-2025-23131","CVE-2025-23134","CVE-2025-23136","CVE-2025-23138","CVE-2025-23140","CVE-2025-23145","CVE-2025-23150","CVE-2025-23154","CVE-2025-23160","CVE-2025-37747","CVE-2025-37748","CVE-2025-37749","CVE-2025-37750","CVE-2025-37755","CVE-2025-37773","CVE-2025-37780","CVE-2025-37787","CVE-2025-37789","CVE-2025-37790","CVE-2025-37797","CVE-2025-37798","CVE-2025-37799","CVE-2025-37803","CVE-2025-37804","CVE-2025-37809","CVE-2025-37820","CVE-2025-37823","CVE-2025-37824","CVE-2025-37829","CVE-2025-37830","CVE-2025-37831","CVE-2025-37833","CVE-2025-37842","CVE-2025-37870","CVE-2025-37879","CVE-2025-37886","CVE-2025-37887","CVE-2025-37949","CVE-2025-37957","CVE-2025-37958","CVE-2025-37960","CVE-2025-37974","CVE-2025-38152","CVE-2025-38637","CVE-2025-40325"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2023-53034","CVE-2024-27018","CVE-2024-27415","CVE-2024-28956","CVE-2024-35840","CVE-2024-46713","CVE-2024-46763","CVE-2024-46865","CVE-2024-50083","CVE-2024-50106","CVE-2024-50223","CVE-2024-54458","CVE-2024-56641","CVE-2024-56702","CVE-2024-57998","CVE-2024-58001","CVE-2024-58070","CVE-2024-58093","CVE-2024-58094","CVE-2024-58095","CVE-2024-58096","CVE-2024-58097","CVE-2025-21648","CVE-2025-21683","CVE-2025-21702","CVE-2025-21707","CVE-2025-21758","CVE-2025-21768","CVE-2025-21787","CVE-2025-21792","CVE-2025-21814","CVE-2025-21852","CVE-2025-21853","CVE-2025-21919","CVE-2025-21929","CVE-2025-21962","CVE-2025-21963","CVE-2025-21964","CVE-2025-22018","CVE-2025-22021","CVE-2025-22025","CVE-2025-22027","CVE-2025-22030","CVE-2025-22033","CVE-2025-22044","CVE-2025-22050","CVE-2025-22056","CVE-2025-22057","CVE-2025-22058","CVE-2025-22062","CVE-2025-22063","CVE-2025-22064","CVE-2025-22065","CVE-2025-22070","CVE-2025-22075","CVE-2025-22085","CVE-2025-22086","CVE-2025-22088","CVE-2025-22091","CVE-2025-22093","CVE-2025-22094","CVE-2025-22097","CVE-2025-22102","CVE-2025-22103","CVE-2025-22104","CVE-2025-22107","CVE-2025-22108","CVE-2025-22109","CVE-2025-22112","CVE-2025-22116","CVE-2025-22125","CVE-2025-22126","CVE-2025-22128","CVE-2025-23129","CVE-2025-23131","CVE-2025-23134","CVE-2025-23136","CVE-2025-23138","CVE-2025-23140","CVE-2025-23145","CVE-2025-23150","CVE-2025-23154","CVE-2025-23160","CVE-2025-37747","CVE-2025-37748","CVE-2025-37749","CVE-2025-37750","CVE-2025-37755","CVE-2025-37773","CVE-2025-37780","CVE-2025-37787","CVE-2025-37789","CVE-2025-37790","CVE-2025-37797","CVE-2025-37798","CVE-2025-37799","CVE-2025-37803","CVE-2025-37804","CVE-2025-37809","CVE-2025-37820","CVE-2025-37823","CVE-2025-37824","CVE-2025-37829","CVE-2025-37830","CVE-2025-37831","CVE-2025-37833","CVE-2025-37842","CVE-2025-37870","CVE-2025-37879","CVE-2025-37886","CVE-2025-37887","CVE-2025-37949","CVE-2025-37957","CVE-2025-37958","CVE-2025-37960","CVE-2025-37974","CVE-2025-38152","CVE-2025-38637","CVE-2025-40325"]}