{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-6_4_0-150600_10_49-rt":"1-150600.1.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP6","name":"kernel-livepatch-SLE15-SP6-RT_Update_14","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP6-RT_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-150600.1.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150600.10.49.1","dlm-kmp-rt":"6.4.0-150600.10.49.1","gfs2-kmp-rt":"6.4.0-150600.10.49.1","kernel-devel-rt":"6.4.0-150600.10.49.1","kernel-rt":"6.4.0-150600.10.49.1","kernel-rt-devel":"6.4.0-150600.10.49.1","kernel-rt_debug":"6.4.0-150600.10.49.1","kernel-rt_debug-devel":"6.4.0-150600.10.49.1","kernel-source-rt":"6.4.0-150600.10.49.1","kernel-syms-rt":"6.4.0-150600.10.49.1","ocfs2-kmp-rt":"6.4.0-150600.10.49.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP6","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.10.49.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150600.10.49.1","dlm-kmp-rt":"6.4.0-150600.10.49.1","gfs2-kmp-rt":"6.4.0-150600.10.49.1","kernel-devel-rt":"6.4.0-150600.10.49.1","kernel-rt":"6.4.0-150600.10.49.1","kernel-rt-devel":"6.4.0-150600.10.49.1","kernel-rt_debug":"6.4.0-150600.10.49.1","kernel-rt_debug-devel":"6.4.0-150600.10.49.1","kernel-source-rt":"6.4.0-150600.10.49.1","kernel-syms-rt":"6.4.0-150600.10.49.1","ocfs2-kmp-rt":"6.4.0-150600.10.49.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP6","name":"kernel-rt_debug","purl":"pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.10.49.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150600.10.49.1","dlm-kmp-rt":"6.4.0-150600.10.49.1","gfs2-kmp-rt":"6.4.0-150600.10.49.1","kernel-devel-rt":"6.4.0-150600.10.49.1","kernel-rt":"6.4.0-150600.10.49.1","kernel-rt-devel":"6.4.0-150600.10.49.1","kernel-rt_debug":"6.4.0-150600.10.49.1","kernel-rt_debug-devel":"6.4.0-150600.10.49.1","kernel-source-rt":"6.4.0-150600.10.49.1","kernel-syms-rt":"6.4.0-150600.10.49.1","ocfs2-kmp-rt":"6.4.0-150600.10.49.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP6","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.10.49.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150600.10.49.1","dlm-kmp-rt":"6.4.0-150600.10.49.1","gfs2-kmp-rt":"6.4.0-150600.10.49.1","kernel-devel-rt":"6.4.0-150600.10.49.1","kernel-rt":"6.4.0-150600.10.49.1","kernel-rt-devel":"6.4.0-150600.10.49.1","kernel-rt_debug":"6.4.0-150600.10.49.1","kernel-rt_debug-devel":"6.4.0-150600.10.49.1","kernel-source-rt":"6.4.0-150600.10.49.1","kernel-syms-rt":"6.4.0-150600.10.49.1","ocfs2-kmp-rt":"6.4.0-150600.10.49.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP6","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.10.49.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150600.10.49.1","dlm-kmp-rt":"6.4.0-150600.10.49.1","gfs2-kmp-rt":"6.4.0-150600.10.49.1","kernel-devel-rt":"6.4.0-150600.10.49.1","kernel-rt":"6.4.0-150600.10.49.1","kernel-rt-devel":"6.4.0-150600.10.49.1","kernel-rt-extra":"6.4.0-150600.10.49.1","kernel-rt-livepatch-devel":"6.4.0-150600.10.49.1","kernel-rt-optional":"6.4.0-150600.10.49.1","kernel-rt-vdso":"6.4.0-150600.10.49.1","kernel-rt_debug":"6.4.0-150600.10.49.1","kernel-rt_debug-devel":"6.4.0-150600.10.49.1","kernel-rt_debug-vdso":"6.4.0-150600.10.49.1","kernel-source-rt":"6.4.0-150600.10.49.1","kernel-syms-rt":"6.4.0-150600.10.49.1","kselftests-kmp-rt":"6.4.0-150600.10.49.1","ocfs2-kmp-rt":"6.4.0-150600.10.49.1","reiserfs-kmp-rt":"6.4.0-150600.10.49.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-rt","purl":"pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.10.49.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150600.10.49.1","dlm-kmp-rt":"6.4.0-150600.10.49.1","gfs2-kmp-rt":"6.4.0-150600.10.49.1","kernel-devel-rt":"6.4.0-150600.10.49.1","kernel-rt":"6.4.0-150600.10.49.1","kernel-rt-devel":"6.4.0-150600.10.49.1","kernel-rt-extra":"6.4.0-150600.10.49.1","kernel-rt-livepatch-devel":"6.4.0-150600.10.49.1","kernel-rt-optional":"6.4.0-150600.10.49.1","kernel-rt-vdso":"6.4.0-150600.10.49.1","kernel-rt_debug":"6.4.0-150600.10.49.1","kernel-rt_debug-devel":"6.4.0-150600.10.49.1","kernel-rt_debug-vdso":"6.4.0-150600.10.49.1","kernel-source-rt":"6.4.0-150600.10.49.1","kernel-syms-rt":"6.4.0-150600.10.49.1","kselftests-kmp-rt":"6.4.0-150600.10.49.1","ocfs2-kmp-rt":"6.4.0-150600.10.49.1","reiserfs-kmp-rt":"6.4.0-150600.10.49.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-rt_debug","purl":"pkg:rpm/opensuse/kernel-rt_debug&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.10.49.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150600.10.49.1","dlm-kmp-rt":"6.4.0-150600.10.49.1","gfs2-kmp-rt":"6.4.0-150600.10.49.1","kernel-devel-rt":"6.4.0-150600.10.49.1","kernel-rt":"6.4.0-150600.10.49.1","kernel-rt-devel":"6.4.0-150600.10.49.1","kernel-rt-extra":"6.4.0-150600.10.49.1","kernel-rt-livepatch-devel":"6.4.0-150600.10.49.1","kernel-rt-optional":"6.4.0-150600.10.49.1","kernel-rt-vdso":"6.4.0-150600.10.49.1","kernel-rt_debug":"6.4.0-150600.10.49.1","kernel-rt_debug-devel":"6.4.0-150600.10.49.1","kernel-rt_debug-vdso":"6.4.0-150600.10.49.1","kernel-source-rt":"6.4.0-150600.10.49.1","kernel-syms-rt":"6.4.0-150600.10.49.1","kselftests-kmp-rt":"6.4.0-150600.10.49.1","ocfs2-kmp-rt":"6.4.0-150600.10.49.1","reiserfs-kmp-rt":"6.4.0-150600.10.49.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-source-rt","purl":"pkg:rpm/opensuse/kernel-source-rt&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.10.49.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"6.4.0-150600.10.49.1","dlm-kmp-rt":"6.4.0-150600.10.49.1","gfs2-kmp-rt":"6.4.0-150600.10.49.1","kernel-devel-rt":"6.4.0-150600.10.49.1","kernel-rt":"6.4.0-150600.10.49.1","kernel-rt-devel":"6.4.0-150600.10.49.1","kernel-rt-extra":"6.4.0-150600.10.49.1","kernel-rt-livepatch-devel":"6.4.0-150600.10.49.1","kernel-rt-optional":"6.4.0-150600.10.49.1","kernel-rt-vdso":"6.4.0-150600.10.49.1","kernel-rt_debug":"6.4.0-150600.10.49.1","kernel-rt_debug-devel":"6.4.0-150600.10.49.1","kernel-rt_debug-vdso":"6.4.0-150600.10.49.1","kernel-source-rt":"6.4.0-150600.10.49.1","kernel-syms-rt":"6.4.0-150600.10.49.1","kselftests-kmp-rt":"6.4.0-150600.10.49.1","ocfs2-kmp-rt":"6.4.0-150600.10.49.1","reiserfs-kmp-rt":"6.4.0-150600.10.49.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-syms-rt","purl":"pkg:rpm/opensuse/kernel-syms-rt&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.10.49.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11135: TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may (bsc#1139073)\n- CVE-2024-36028: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio() (bsc#1225707).\n- CVE-2024-36348, CVE-2024-36349, CVE-2024-36350, CVE-2024-36357: x86/process: Move the buffer clearing before MONITOR (bsc#1238896).\n- CVE-2024-44963: btrfs: do not BUG_ON() when freeing tree block after error (bsc#1230216).\n- CVE-2024-56742: vfio/mlx5: Fix an unwind issue in mlx5vf_add_migration_pages() (bsc#1235613).\n- CVE-2025-21839: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop (bsc#1239061).\n- CVE-2025-21872: efi/mokvar-table: Avoid repeated map/unmap of the same page (bsc#1240323).\n- CVE-2025-23163: net: vlan: do not propagate flags on open (bsc#1242837).\n- CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races (bsc#1243068).\n- CVE-2025-37864: net: dsa: clean up FDB, MDB, VLAN entries on unbind (bsc#1242965).\n- CVE-2025-37885: KVM: x86: Reset IRTE to host control if *new* route isn't postable (bsc#1242960).\n- CVE-2025-37920: kABI workaround for xsk: Fix race condition in AF_XDP generic RX path (bsc#1243479).\n- CVE-2025-37984: crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP() (bsc#1243669).\n- CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref (bsc#1244792).\n- CVE-2025-38035: nvmet-tcp: do not restore null sk_state_change (bsc#1244801).\n- CVE-2025-38051: smb: client: Fix use-after-free in cifs_fill_dirent (bsc#1244750).\n- CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (bsc#1245151).\n- CVE-2025-38061: net: pktgen: fix access outside of user given buffer in pktgen_thread_write() (bsc#1245440).\n- CVE-2025-38062: kABI: restore layout of struct msi_desc (bsc#1245216).\n- CVE-2025-38063: dm: fix unconditional IO throttle caused by REQ_PREFLUSH (bsc#1245202).\n- CVE-2025-38064: virtio: break and reset virtio devices on device_shutdown() (bsc#1245201).\n- CVE-2025-38074: vhost-scsi: protect vq->log_used with vq->mutex (bsc#1244735).\n- CVE-2025-38094: net: cadence: macb: Fix a possible deadlock in macb_halt_tx (bsc#1245649).\n- CVE-2025-38097: kabi: restore encap_sk in struct xfrm_state (bsc#1245660).\n- CVE-2025-38098: drm/amd/display: Do not treat wb connector as physical in (bsc#1245654).\n- CVE-2025-38099: Bluetooth: btusb: Fix regression in the initialization of fake Bluetooth controllers (bsc#1245671).\n- CVE-2025-38100: x86/iopl: Cure TIF_IO_BITMAP inconsistencies (bsc#1245650).\n- CVE-2025-38105: ALSA: usb-audio: Kill timer properly at removal (bsc#1245682).\n- CVE-2025-38115: net_sched: sch_sfq: fix a potential crash on gso_skb handling (bsc#1245689).\n- CVE-2025-38117: hci_dev centralize extra lock (bsc#1245695).\n- CVE-2025-38126: net: stmmac: make sure that ptp_rate is not 0 before configuring timestamping (bsc#1245708).\n- CVE-2025-38131: coresight: prevent deactivate active config while enabling the config (bsc#1245677).\n- CVE-2025-38132: coresight: holding cscfg_csdev_lock while removing cscfg from csdev (bsc#1245679).\n- CVE-2025-38147: calipso: unlock rcu before returning -EAFNOSUPPORT (bsc#1245768).\n- CVE-2025-38158: hisi_acc_vfio_pci: fix XQE dma address error (bsc#1245750).\n- CVE-2025-38162: netfilter: nft_set_pipapo: prevent overflow in lookup table allocation (bsc#1245752).\n- CVE-2025-38166: bpf: fix ktls panic with sockmap (bsc#1245758).\n- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).\n- CVE-2025-38182: ublk: santizize the arguments from userspace when adding a device (bsc#1245937).\n- CVE-2025-38183: net: lan743x: fix potential out-of-bounds write in lan743x_ptp_io_event_clock_get() (bsc#1246006).\n- CVE-2025-38187: drm/nouveau: fix a use-after-free in r535_gsp_rpc_push() (bsc#1245951).\n- CVE-2025-38188: drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE (bsc#1246098).\n- CVE-2025-38200: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (bsc#1246045).\n- CVE-2025-38202: bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem() (bsc#1245980).\n- CVE-2025-38203: jfs: Fix null-ptr-deref in jfs_ioc_trim (bsc#1246044).\n- CVE-2025-38204: jfs: fix array-index-out-of-bounds read in add_missing_indices (bsc#1245983).\n- CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246073).\n- CVE-2025-38210: configfs-tsm-report: Fix NULL dereference of tsm_ops (bsc#1246020).\n- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246029).\n- CVE-2025-38220: ext4: only dirty folios when data journaling regular files (bsc#1245966).\n- CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data (bsc#1245976).\n- CVE-2025-38236: af_unix: Disable MSG_OOB for unprivileged users (bsc#1246093).\n- CVE-2025-38239: scsi: megaraid_sas: Fix invalid node index (bsc#1246178).\n- CVE-2025-38244: smb: client: fix potential deadlock when reconnecting channels (bsc#1246183).\n- CVE-2025-38248: bridge: mcast: Fix use-after-free during router port configuration (bsc#1246173).\n- CVE-2025-38250: kABI workaround for bluetooth hci_dev changes (bsc#1246182).\n- CVE-2025-38264: llist: add interface to check if a node is on a list (bsc#1246387).\n- CVE-2025-38272: net: dsa: b53: do not enable EEE on bcm63xx (bsc#1246268).\n- CVE-2025-38279: selftests/bpf: Add tests with stack ptr register in conditional jmp (bsc#1246264).\n- CVE-2025-38283: hisi_acc_vfio_pci: bugfix live migration function without VF device driver (bsc#1246273).\n- CVE-2025-38303: Bluetooth: eir: Fix possible crashes on eir_create_adv_data (bsc#1246354).\n- CVE-2025-38310: seg6: Fix validation of nexthop addresses (bsc#1246361).\n- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).\n- CVE-2025-38334: x86/sgx: Prevent attempts to reclaim poisoned pages (bsc#1246384).\n- CVE-2025-38335: Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT (bsc#1246250).\n- CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (bsc#1246253).\n- CVE-2025-38349: eventpoll: do not decrement ep refcount while still holding the ep mutex (bsc#1246777).\n- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).\n- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).\n- CVE-2025-38364: maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate() (bsc#1247091).\n- CVE-2025-38365: btrfs: fix a race between renames and directory logging (bsc#1247023).\n- CVE-2025-38371: drm/v3d: Disable interrupts before resetting the GPU (bsc#1247178).\n- CVE-2025-38375: virtio-net: ensure the received length does not exceed allocated size (bsc#1247177).\n- CVE-2025-38382: btrfs: fix iteration of extrefs during log replay (bsc#1247031).\n- CVE-2025-38392: idpf: convert control queue mutex to a spinlock (bsc#1247169).\n- CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (bsc#1247156).\n- CVE-2025-38399: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() (bsc#1247097).\n- CVE-2025-38403: vsock/vmci: Clear the vmci transport packet properly when initializing it (bsc#1247141).\n- CVE-2025-38414: wifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850 (bsc#1247145).\n- CVE-2025-38426: drm/amdgpu: Add basic validation for RAS header (bsc#1247252).\n- CVE-2025-38429: bus: mhi: ep: Update read pointer only after buffer is written (bsc#1247253).\n- CVE-2025-38455: KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight (bsc#1247101).\n- CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not exist (bsc#1247098).\n- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).\n- CVE-2025-38461: vsock: Fix transport_* TOCTOU (bsc#1247103).\n- CVE-2025-38462: vsock: Fix transport_{g2h,h2g} TOCTOU (bsc#1247104).\n- CVE-2025-38463: tcp: Correct signedness in skb remaining space calculation (bsc#1247113).\n- CVE-2025-38465: netlink: make sure we allow at least one dump skb (bsc#1247118).\n- CVE-2025-38470: kABI fix for net: vlan: fix VLAN 0 refcount imbalance of toggling (bsc#1247288).\n- CVE-2025-38471: tls: always refresh the queue when reading sock (bsc#1247450).\n- CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347).\n- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).\n\nThe following non-security bugs were fixed:\n\n- Fix dma_unmap_sg() nents value (git-fixes)\n- Reapply 'wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()' (git-fixes).\n- Revert 'ACPI: battery: negate current when discharging' (stable-fixes).\n- Revert 'cgroup_freezer: cgroup_freezing: Check if not frozen' (bsc#1219338).\n- Revert 'drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1' (stable-fixes).\n- Revert 'mmc: sdhci: Disable SD card clock before changing parameters' (git-fixes).\n- Revert 'usb: xhci: Implement xhci_handshake_check_state() helper' (git-fixes).\n- Revert 'vgacon: Add check for vc_origin address range in vgacon_scroll()' (stable-fixes).\n- [SMB3] send channel sequence number in SMB3 requests after reconnects (git-fixes).\n- acpi: LPSS: Remove AudioDSP related ID (git-fixes).\n- acpi: PRM: Reduce unnecessary printing to avoid user confusion (bsc#1246122).\n- acpi: processor: perflib: Fix initial _PPC limit application (git-fixes).\n- acpica: Refuse to evaluate a method if arguments are missing (stable-fixes).\n- af_packet: fix the SO_SNDTIMEO constraint not effective on tpacked_snd() (git-fixes).\n- af_unix: Add a prompt to CONFIG_AF_UNIX_OOB (bsc#1246093).\n- alsa: hda/ca0132: Fix missing error handling in ca0132_alt_select_out() (git-fixes).\n- alsa: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx (stable-fixes).\n- alsa: hda/realtek - Enable mute LED on HP Pavilion Laptop 15-eg100 (stable-fixes).\n- alsa: hda/realtek: Add quirk for ASUS ROG Strix G712LWS (stable-fixes).\n- alsa: hda/tegra: Add Tegra264 support (stable-fixes).\n- alsa: hda: Add missing NVIDIA HDA codec IDs (stable-fixes).\n- alsa: hda: Add new pci id for AMD GPU display HD audio controller (stable-fixes).\n- alsa: hda: Ignore unsol events for cards being shut down (stable-fixes).\n- alsa: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() (git-fixes).\n- alsa: sb: Do not allow changing the DMA mode during operations (stable-fixes).\n- alsa: sb: Force to disable DMAs once when DMA mode is changed (stable-fixes).\n- amd/amdkfd: fix a kfd_process ref leak (stable-fixes).\n- aoe: clean device rq_list in aoedev_downdev() (git-fixes).\n- apple-mfi-fastcharge: protect first device name (git-fixes).\n- asoc: amd: yc: Add DMI quirk for Lenovo IdeaPad Slim 5 15 (stable-fixes).\n- asoc: amd: yc: Add quirk for MSI Bravo 17 D7VF internal mic (stable-fixes).\n- asoc: amd: yc: add quirk for Acer Nitro ANV15-41 internal mic (stable-fixes).\n- asoc: amd: yc: update quirk data for HP Victus (stable-fixes).\n- asoc: codec: wcd9335: Convert to GPIO descriptors (stable-fixes).\n- asoc: codecs: wcd9335: Fix missing free of regulator supplies (git-fixes).\n- asoc: codecs: wcd9335: Handle nicer probe deferral and simplify with dev_err_probe() (stable-fixes).\n- asoc: cs35l56: probe() should fail if the device ID is not recognized (git-fixes).\n- asoc: fsl_asrc: use internal measured ratio for non-ideal ratio mode (git-fixes).\n- asoc: fsl_xcvr: get channel status data when PHY is not exists (git-fixes).\n- asoc: ops: dynamically allocate struct snd_ctl_elem_value (git-fixes).\n- asoc: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() (git-fixes).\n- ata: pata_cs5536: fix build on 32-bit UML (stable-fixes).\n- audit,module: restore audit logging in load failure case (git-fixes).\n- bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() (git-fixes).\n- bluetooth: L2CAP: Fix L2CAP MTU negotiation (stable-fixes).\n- bluetooth: L2CAP: Fix attempting to adjust outgoing MTU (git-fixes).\n- bluetooth: MGMT: Fix not generating command complete for MGMT_OP_DISCONNECT (git-fixes).\n- bluetooth: MGMT: mesh_send: check instances prior disabling advertising (git-fixes).\n- bluetooth: MGMT: set_mesh: update LE scan interval and window (git-fixes).\n- bluetooth: Prevent unintended pause by checking if advertising is active (git-fixes).\n- bluetooth: SMP: Fix using HCI_ERROR_REMOTE_USER_TERM on timeout (git-fixes).\n- bluetooth: SMP: If an unallowed command is received consider it a failure (git-fixes).\n- bluetooth: btusb: QCA: Fix downloading wrong NVM for WCN6855 GF variant without board ID (git-fixes).\n- bluetooth: hci_conn: Fix sending BT_HCI_CMD_LE_CREATE_CONN_CANCEL (git-fixes).\n- bluetooth: hci_event: Fix not marking Broadcast Sink BIS as connected (git-fixes).\n- bluetooth: hci_event: Mask data status from LE ext adv reports (git-fixes).\n- bluetooth: hci_sync: Attempt to dequeue connection attempt (git-fixes).\n- bluetooth: hci_sync: Fix UAF on create_le_conn_complete (git-fixes).\n- bluetooth: hci_sync: Fix handling of HCI_OP_CREATE_CONN_CANCEL (git-fixes).\n- bluetooth: hci_sync: Fix not disabling advertising instance (git-fixes).\n- bluetooth: hci_sync: fix connectable extended advertising when using static random address (git-fixes).\n- bluetooth: hci_sync: revert some mesh modifications (git-fixes).\n- bpf, sockmap: Fix sk_msg_reset_curr (git-fixes).\n- bpf/lpm_trie: Inline longest_prefix_match for fastpath (git-fixes).\n- bpf/selftests: Check errno when percpu map value size exceeds (git-fixes).\n- bpf: Add a possibly-zero-sized read test (git-fixes).\n- bpf: Avoid __hidden__ attribute in static object (git-fixes).\n- bpf: Check percpu map value size first (git-fixes).\n- bpf: Disable some `attribute ignored' warnings in GCC (git-fixes).\n- bpf: Fix memory leak in bpf_core_apply (git-fixes).\n- bpf: Fix potential integer overflow in resolve_btfids (git-fixes).\n- bpf: Harden __bpf_kfunc tag against linker kfunc removal (git-fixes).\n- bpf: Make the pointer returned by iter next method valid (git-fixes).\n- bpf: Simplify checking size of helper accesses (git-fixes).\n- bpf: fix order of args in call to bpf_map_kvcalloc (git-fixes).\n- bpf: sockmap, updating the sg structure should also update curr (git-fixes).\n- bpftool: Fix missing pids during link show (git-fixes).\n- bpftool: Fix undefined behavior caused by shifting into the sign bit (git-fixes).\n- bpftool: Mount bpffs on provided dir instead of parent dir (git-fixes).\n- bpftool: Remove unnecessary source files from bootstrap version (git-fixes).\n- bpftool: Un-const bpf_func_info to fix it for llvm 17 and newer (git-fixes).\n- btrfs: do not ignore inode missing when replaying log tree (git-fixes).\n- btrfs: do not silently ignore unexpected extent type when replaying log (git-fixes).\n- btrfs: do not skip remaining extrefs if dir not found during log replay (git-fixes).\n- btrfs: explicitly ref count block_group on new_bgs list (bsc#1243068)\n- btrfs: fix assertion when building free space tree (git-fixes).\n- btrfs: fix inode lookup error handling during log replay (git-fixes).\n- btrfs: fix invalid inode pointer dereferences during log replay (git-fixes).\n- btrfs: fix log tree replay failure due to file with 0 links and extents (git-fixes).\n- btrfs: fix missing error handling when searching for inode refs during log replay (git-fixes).\n- btrfs: fix non-empty delayed iputs list on unmount due to async workers (git-fixes).\n- btrfs: fix ssd_spread overallocation (git-fixes).\n- btrfs: make btrfs_discard_workfn() block_group ref explicit (bsc#1243068)\n- btrfs: propagate last_unlink_trans earlier when doing a rmdir (git-fixes).\n- btrfs: rename err to ret in btrfs_rmdir() (git-fixes).\n- btrfs: return a btrfs_inode from btrfs_iget_logging() (git-fixes).\n- btrfs: return a btrfs_inode from read_one_inode() (git-fixes).\n- btrfs: tests: fix chunk map leak after failure to add it to the tree (git-fixes).\n- btrfs: update superblock's device bytes_used when dropping chunk (git-fixes).\n- btrfs: use NOFS context when getting inodes during logging and log replay (git-fixes).\n- btrfs: use btrfs_record_snapshot_destroy() during rmdir (git-fixes).\n- bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint() (git-fixes).\n- bus: mhi: host: Detect events pointing to unexpected TREs (git-fixes).\n- can: dev: can_restart(): move debug message and stats after successful restart (stable-fixes).\n- can: dev: can_restart(): reverse logic to remove need for goto (stable-fixes).\n- can: kvaser_pciefd: Store device channel index (git-fixes).\n- can: kvaser_usb: Assign netdev.dev_port based on device channel index (git-fixes).\n- can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to debug level (git-fixes).\n- can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode (git-fixes).\n- can: peak_usb: fix USB FD devices potential malfunction (git-fixes).\n- cdc-acm: fix race between initial clearing halt and open (git-fixes).\n- cgroup,freezer: fix incomplete freezing when attaching tasks (bsc#1245789).\n- cgroup/cpuset: Extend kthread_is_per_cpu() check to all PF_NO_SETAFFINITY tasks (bsc#1241166).\n- cifs: reconnect helper should set reconnect for the right channel (git-fixes).\n- clk: clk-axi-clkgen: fix fpfd_max frequency for zynq (git-fixes).\n- clk: davinci: Add NULL check in davinci_lpsc_clk_register() (git-fixes).\n- clk: sunxi-ng: v3s: Fix de clock definition (git-fixes).\n- clk: xilinx: vcu: unregister pll_post only if registered correctly (git-fixes).\n- clocksource: Scale the watchdog read retries automatically (bsc#1241345 bsc#1244457).\n- clocksource: Set cs_watchdog_read() checks based on .uncertainty_margin (bsc#1241345 bsc#1244457).\n- comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large (git-fixes).\n- comedi: Fix initialization of data for instructions that write to subdevice (git-fixes).\n- comedi: Fix some signed shift left operations (git-fixes).\n- comedi: Fix use of uninitialized data in insn_rw_emulate_bits() (git-fixes).\n- comedi: aio_iiro_16: Fix bit shift out of bounds (git-fixes).\n- comedi: das16m1: Fix bit shift out of bounds (git-fixes).\n- comedi: das6402: Fix bit shift out of bounds (git-fixes).\n- comedi: pcl812: Fix bit shift out of bounds (git-fixes).\n- compiler_types.h: Define __retain for __attribute__((__retain__)) (git-fixes).\n- crypto: arm/aes-neonbs - work around gcc-15 warning (git-fixes).\n- crypto: ccp - Fix crash when rebind ccp device for ccp.ko (git-fixes).\n- crypto: ccp - Fix locking on alloc failure handling (git-fixes).\n- crypto: img-hash - Fix dma_unmap_sg() nents value (git-fixes).\n- crypto: inside-secure - Fix `dma_unmap_sg()` nents value (git-fixes).\n- crypto: keembay - Fix dma_unmap_sg() nents value (git-fixes).\n- crypto: marvell/cesa - Fix engine load inaccuracy (git-fixes).\n- crypto: qat - allow enabling VFs in the absence of IOMMU (git-fixes).\n- crypto: qat - disable ZUC-256 capability for QAT GEN5 (git-fixes).\n- crypto: qat - fix DMA direction for compression on GEN2 devices (git-fixes).\n- crypto: qat - fix seq_file position update in adf_ring_next() (git-fixes).\n- crypto: qat - fix state restore for banks with exceptions (git-fixes).\n- crypto: qat - flush misc workqueue during device shutdown (git-fixes).\n- crypto: qat - use unmanaged allocation for dc_data (git-fixes).\n- crypto: sun8i-ce - fix nents passed to dma_unmap_sg() (git-fixes).\n- dm-bufio: fix sched in atomic context (git-fixes).\n- dm-flakey: error all IOs when num_features is absent (git-fixes).\n- dm-flakey: make corrupting read bios work (git-fixes).\n- dm-mirror: fix a tiny race condition (git-fixes).\n- dm-raid: fix variable in journal device check (git-fixes).\n- dm-verity: fix a memory leak if some arguments are specified multiple times (git-fixes).\n- dm: do not change md if dm_table_set_restrictions() fails (git-fixes).\n- dm: free table mempools if not used in __bind (git-fixes).\n- dm: restrict dm device size to 2^63-512 bytes (git-fixes).\n- dma-buf: fix timeout handling in dma_resv_wait_timeout v2 (stable-fixes).\n- dmaengine: dw-edma: Drop unused dchan2dev() and chan2dev() (git-fixes).\n- dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using (stable-fixes).\n- dmaengine: mv_xor: Fix missing check after DMA map and missing unmap (git-fixes).\n- dmaengine: nbpfaxi: Add missing check after DMA map (git-fixes).\n- dmaengine: nbpfaxi: Fix memory corruption in probe() (git-fixes).\n- dmaengine: qcom: gpi: Drop unused gpi_write_reg_field() (git-fixes).\n- dmaengine: xilinx_dma: Set dma_device directions (stable-fixes).\n- docs/aBI: Fix sysfs-kernel-address_bits path (git-fixes).\n- documentation: ACPI: Fix parent device references (git-fixes).\n- documentation: usb: gadget: Wrap remaining usage snippets in literal code block (git-fixes).\n- drm/amd/display: Do not overwrite dce60_clk_mgr (git-fixes).\n- drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value (git-fixes).\n- drm/amdgpu/gfx8: reset compute ring wptr on the GPU on resume (git-fixes).\n- drm/amdgpu: amdgpu_vram_mgr_new(): Clamp lpfn to total vram (stable-fixes).\n- drm/amdkfd: Fix race in GWS queue scheduling (stable-fixes).\n- drm/bridge: panel: move prepare_prev_first handling to drm_panel_bridge_add_typed (git-fixes).\n- drm/bridge: ti-sn65dsi86: Add HPD for DisplayPort connector type (git-fixes).\n- drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe() (git-fixes).\n- drm/bridge: ti-sn65dsi86: make use of debugfs_init callback (stable-fixes).\n- drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling (git-fixes).\n- drm/exynos: fimd: Guard display clock control with runtime PM calls (git-fixes).\n- drm/framebuffer: Acquire internal references on GEM handles (git-fixes).\n- drm/gem: Acquire references on GEM handles for framebuffers (stable-fixes).\n- drm/gem: Fix race in drm_gem_handle_create_tail() (stable-fixes).\n- drm/i915/gsc: mei interrupt top half should be in irq disabled context (git-fixes).\n- drm/i915/gt: Fix timeline left held on VMA alloc error (git-fixes).\n- drm/i915/selftests: Change mock_request() to return error pointers (git-fixes).\n- drm/msm/dpu: Fill in min_prefill_lines for SC8180X (git-fixes).\n- drm/msm: Fix a fence leak in submit error path (stable-fixes).\n- drm/msm: Fix another leak in the submit error path (stable-fixes).\n- drm/panfrost: Fix panfrost device variable name in devfreq (git-fixes).\n- drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed (git-fixes).\n- drm/sched: Increment job count before swapping tail spsc queue (git-fixes).\n- drm/sched: Remove optimization that causes hang when killing dependent jobs (git-fixes).\n- drm/scheduler: signal scheduled fence when kill job (stable-fixes).\n- drm/tegra: nvdec: Fix dma_alloc_coherent error check (git-fixes).\n- drm/ttm: fix error handling in ttm_buffer_object_transfer (git-fixes).\n- drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel (git-fixes).\n- exfat: fdatasync flag should be same like generic_write_sync() (git-fixes).\n- fbcon: Fix outdated registered_fb reference in comment (git-fixes).\n- fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref (git-fixes).\n- firewire: ohci: correct code comments about bus_reset tasklet (git-fixes).\n- fs/jfs: consolidate sanity checking in dbMount (git-fixes).\n- fs/orangefs: Allow 2 more characters in do_c_string() (git-fixes).\n- gpio: mlxbf2: use platform_get_irq_optional() (git-fixes).\n- gpio: pca953x: log an error when failing to get the reset GPIO (git-fixes).\n- gpio: sim: include a missing header (git-fixes).\n- gpio: vf610: add locking to gpio direction functions (git-fixes).\n- gpio: virtio: Fix config space reading (git-fixes).\n- gpiolib: Fix debug messaging in gpiod_find_and_request() (git-fixes).\n- gpiolib: Handle no pin_ranges in gpiochip_generic_config() (git-fixes).\n- gpiolib: acpi: Do not use GPIO chip fwnode in acpi_gpiochip_find() (bsc#1233300).\n- gpiolib: acpi: Fix failed in acpi_gpiochip_find() by adding parent node match (bsc#1233300).\n- gpiolib: cdev: Ignore reconfiguration without direction (git-fixes).\n- gpiolib: of: Add polarity quirk for s5m8767 (stable-fixes).\n- hfs: make splice write available again (git-fixes).\n- hfsplus: make splice write available again (git-fixes).\n- hfsplus: remove mutex_lock check in hfsplus_free_extents (git-fixes).\n- hid: Add IGNORE quirk for SMARTLINKTECHNOLOGY (stable-fixes).\n- hid: core: do not bypass hid_hw_raw_request (stable-fixes).\n- hid: core: ensure __hid_request reserves the report ID as the first byte (git-fixes).\n- hid: core: ensure the allocated report buffer can contain the reserved report ID (stable-fixes).\n- hid: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2 (stable-fixes).\n- hid: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras (stable-fixes).\n- hv_netvsc: Use VF's tso_max_size value when data path is VF (bsc#1246203).\n- hwmon: (corsair-cpro) Validate the size of the received input buffer (git-fixes).\n- hwmon: (gsc-hwmon) fix fan pwm setpoint show functions (git-fixes).\n- hwmon: (pmbus/max34440) Fix support for max34451 (stable-fixes).\n- hwrng: mtk - handle devm_pm_runtime_enable errors (git-fixes).\n- i2c/designware: Fix an initialization issue (git-fixes).\n- i2c: qup: jump out of the loop in case of timeout (git-fixes).\n- i2c: stm32: fix the device used for the DMA map (git-fixes).\n- i2c: tegra: Fix reset error handling with ACPI (git-fixes).\n- i2c: virtio: Avoid hang by using interruptible completion wait (git-fixes).\n- i3c: fix module_i3c_i2c_driver() with I3C=n (git-fixes).\n- ib/mlx5: Fix potential deadlock in MR deregistration (git-fixes)\n- iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush (git-fixes).\n- iio: adc: ad7949: use spi_is_bpw_supported() (git-fixes).\n- iio: adc: ad_sigma_delta: Fix use of uninitialized status_pos (stable-fixes).\n- iio: adc: ad_sigma_delta: change to buffer predisable (git-fixes).\n- iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] (stable-fixes).\n- iio: adc: max1363: Reorder mode_list[] entries (stable-fixes).\n- iio: adc: stm32-adc: Fix race in installing chained IRQ handler (git-fixes).\n- iio: imu: bno055: fix OOB access of hw_xlate array (git-fixes).\n- iio: pressure: zpa2326: Use aligned_s64 for the timestamp (stable-fixes).\n- input: iqs7222 - explicitly define number of external channels (git-fixes).\n- input: xpad - adjust error handling for disconnect (git-fixes).\n- input: xpad - set correct controller type for Acer NGR200 (git-fixes).\n- input: xpad - support Acer NGR 200 Controller (stable-fixes).\n- iommu/amd: Fix geometry.aperture_end for V2 tables (git-fixes).\n- iommu/amd: Set the pgsize_bitmap correctly (git-fixes).\n- iommu/arm-smmu-qcom: Add SM6115 MDSS compatible (git-fixes).\n- iommu/vt-d: Fix possible circular locking dependency (git-fixes).\n- iommu/vt-d: Fix system hang on reboot -f (git-fixes).\n- ipv6: fix possible infinite loop in fib6_info_uses_dev() (git-fixes).\n- ipv6: mcast: Delay put pmc->idev in mld_del_delrec() (git-fixes).\n- ipv6: prevent infinite loop in rt6_nlmsg_size() (git-fixes).\n- ipv6: reject malicious packets in ipv6_gso_segment() (git-fixes).\n- iwlwifi: Add missing check for alloc_ordered_workqueue (git-fixes).\n- jfs: fix metapage reference count leak in dbAllocCtl (git-fixes).\n- kABI workaround for struct drm_framebuffer changes (git-fixes).\n- kABI: Fix the module::name type in audit_context (git-fixes).\n- kasan: remove kasan_find_vm_area() to prevent possible deadlock (git-fixes).\n- kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).\n- leds: multicolor: Fix intensity setting while SW blinking (stable-fixes).\n- lib/group_cpus.c: avoid acquiring cpu hotplug lock in group_cpus_evenly (bsc#1236897).\n- lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly() (bsc#1236897).\n- logitech C-270 even more broken (stable-fixes).\n- maple_tree: fix mt_destroy_walk() on root leaf node (git-fixes).\n- md/md-bitmap: fix dm-raid max_write_behind setting (git-fixes).\n- media: gspca: Add bounds checking to firmware parser (git-fixes).\n- media: hi556: correct the test pattern configuration (git-fixes).\n- media: imx: fix a potential memory leak in imx_media_csc_scaler_device_init() (git-fixes).\n- media: ov2659: Fix memory leaks in ov2659_probe() (git-fixes).\n- media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() (git-fixes).\n- media: usbtv: Lock resolution while streaming (git-fixes).\n- media: uvcvideo: Do not mark valid metadata as invalid (git-fixes).\n- media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (git-fixes).\n- media: v4l2-ctrls: Do not reset handler's error in v4l2_ctrl_handler_free() (git-fixes).\n- media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check (git-fixes).\n- media: venus: Add a check for packet size after reading from shared memory (git-fixes).\n- media: venus: hfi: explicitly release IRQ during teardown (git-fixes).\n- media: venus: protect against spurious interrupts during probe (git-fixes).\n- media: venus: vdec: Clamp param smaller than 1fps and bigger than 240 (git-fixes).\n- media: venus: venc: Clamp param smaller than 1fps and bigger than 240 (git-fixes).\n- media: vivid: fix wrong pixel_array control size (git-fixes).\n- memstick: core: Zero initialize id_reg in h_memstick_read_dev_id() (git-fixes).\n- mfd: max14577: Fix wakeup source leaks on device unbind (stable-fixes).\n- misc: rtsx: usb: Ensure mmc child device is active when card is present (git-fixes).\n- mmc: bcm2835: Fix dma_unmap_sg() nents value (git-fixes).\n- mmc: core: sd: Apply BROKEN_SD_DISCARD quirk earlier (git-fixes).\n- mmc: sdhci-pci: Quirk for broken command queuing on Intel GLK-based Positivo models (git-fixes).\n- mmc: sdhci: Add a helper function for dump register in dynamic debug mode (stable-fixes).\n- mmc: sdhci_am654: Workaround for Errata i2312 (git-fixes).\n- module: Fix memory deallocation on error path in move_module() (git-fixes).\n- module: Remove unnecessary +1 from last_unloaded_module::name size (git-fixes).\n- module: Restore the moduleparam prefix length check (git-fixes).\n- mtd: fix possible integer overflow in erase_xfer() (git-fixes).\n- mtd: rawnand: atmel: Fix dma_mapping_error() address (git-fixes).\n- mtd: rawnand: atmel: set pmecc data setup time (git-fixes).\n- mtd: rawnand: fsmc: Add missing check after DMA map (git-fixes).\n- mtd: rawnand: renesas: Add missing check after DMA map (git-fixes).\n- mtd: rawnand: rockchip: Add missing check after DMA map (git-fixes).\n- mtd: spi-nor: Fix spi_nor_try_unlock_all() (git-fixes).\n- mtd: spinand: fix memory leak of ECC engine conf (stable-fixes).\n- mtd: spinand: propagate spinand_wait() errors from spinand_write_page() (git-fixes).\n- mtk-sd: Fix a pagefault in dma_unmap_sg() for not prepared data (git-fixes).\n- mtk-sd: Prevent memory corruption from DMA map failure (git-fixes).\n- mtk-sd: reset host->mrq on prepare_data() error (git-fixes).\n- mwl8k: Add missing check after DMA map (git-fixes).\n- nbd: fix uaf in nbd_genl_connect() error path (git-fixes).\n- net/packet: fix a race in packet_set_ring() and packet_notifier() (git-fixes).\n- net/sched: Restrict conditions for adding duplicating netems to qdisc tree (git-fixes).\n- net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (git-fixes).\n- net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (git-fixes).\n- net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (git-fixes).\n- net/sched: sch_qfq: Fix race condition on qfq_aggregate (git-fixes).\n- net/sched: taprio: enforce minimum value for picos_per_byte (git-fixes).\n- net: mana: Add debug logs in MANA network driver (bsc#1246212).\n- net: mana: Add handler for hardware servicing events (bsc#1245730).\n- net: mana: Allocate MSI-X vectors dynamically (bsc#1245457).\n- net: mana: Allow irq_setup() to skip cpus for affinity (bsc#1245457).\n- net: mana: Allow tso_max_size to go up-to GSO_MAX_SIZE (bsc#1246203).\n- net: mana: Expose additional hardware counters for drop and TC via ethtool (bsc#1245729).\n- net: mana: Set tx_packets to post gso processing packet count (bsc#1245731).\n- net: mana: explain irq_setup() algorithm (bsc#1245457).\n- net: phy: Do not register LEDs for genphy (git-fixes).\n- net: phy: micrel: fix KSZ8081/KSZ8091 cable test (git-fixes).\n- net: phy: microchip: limit 100M workaround to link-down events on LAN88xx (git-fixes).\n- net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap (git-fixes).\n- net: phy: smsc: Fix link failure in forced mode with Auto-MDIX (git-fixes).\n- net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect (git-fixes).\n- net: usb: qmi_wwan: add SIMCom 8230C composition (stable-fixes).\n- net: usbnet: Avoid potential RCU stall on LINK_CHANGE event (git-fixes).\n- net: usbnet: Fix the wrong netif_carrier_on() call (git-fixes).\n- netpoll: prevent hanging NAPI when netcons gets enabled (git-fixes).\n- nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails (git-fixes).\n- nfs: Fix filehandle bounds checking in nfs_fh_to_dentry() (git-fixes).\n- nfs: Fix the setting of capabilities when automounting a new filesystem (git-fixes).\n- nfs: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (git-fixes).\n- nfs: Fixup allocation flags for nfsiod's __GFP_NORETRY (git-fixes).\n- nfsd: detect mismatch of file handle and delegation stateid in OPEN op (git-fixes).\n- nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (git-fixes).\n- nfsv4.2: another fix for listxattr (git-fixes).\n- nfsv4.2: fix listxattr to return selinux security label (git-fixes).\n- nfsv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN (git-fixes).\n- nfsv4: Always set NLINK even if the server does not support it (git-fixes).\n- nfsv4: xattr handlers should check for absent nfs filehandles (git-fixes).\n- nilfs2: reject invalid file types when reading inodes (git-fixes).\n- nvme-pci: refresh visible attrs after being checked (git-fixes).\n- nvme: Fix incorrect cdw15 value in passthru error logging (git-fixes).\n- nvme: fix endianness of command word prints in nvme_log_err_passthru() (git-fixes).\n- nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list() (git-fixes).\n- nvme: fix misaccounting of nvme-mpath inflight I/O (git-fixes).\n- nvmet-tcp: fix callback lock for TLS handshake (git-fixes).\n- objtool: Fix INSN_CONTEXT_SWITCH handling in validate_unret() (git-fixes).\n- objtool: Fix UNWIND_HINT_{SAVE,RESTORE} across basic blocks (git-fixes).\n- objtool: Fix _THIS_IP_ detection for cold functions (git-fixes).\n- objtool: Fix error handling inconsistencies in check() (git-fixes).\n- objtool: Ignore dangling jump table entries (git-fixes).\n- objtool: Ignore end-of-section jumps for KCOV/GCOV (git-fixes).\n- objtool: Properly disable uaccess validation (git-fixes).\n- objtool: Silence more KCOV warnings (git-fixes).\n- objtool: Silence more KCOV warnings, part 2 (git-fixes).\n- objtool: Stop UNRET validation on UD2 (git-fixes).\n- pNFS/flexfiles: do not attempt pnfs on fatal DS errors (git-fixes).\n- pch_uart: Fix dma_sync_sg_for_device() nents value (git-fixes).\n- pci/msi: Export pci_msix_prepare_desc() for dynamic MSI-X allocations (bsc#1245457).\n- pci: dwc: Make link training more robust by setting PORT_LOGIC_LINK_WIDTH to one lane (stable-fixes).\n- pci: endpoint: Fix configfs group list head handling (git-fixes).\n- pci: endpoint: Fix configfs group removal on driver teardown (git-fixes).\n- pci: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute (git-fixes).\n- pci: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar() fails (git-fixes).\n- pci: hv: Allow dynamic MSI-X vector allocation (bsc#1245457).\n- pci: rockchip-host: Fix 'Unexpected Completion' log message (git-fixes).\n- perf: Fix sample vs do_exit() (bsc#1246547).\n- phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode (git-fixes).\n- pinctrl: amd: Clear GPIO debounce for suspend (git-fixes).\n- pinctrl: qcom: msm: mark certain pins as invalid for interrupts (git-fixes).\n- pinctrl: sunxi: Fix memory leak on krealloc failure (git-fixes).\n- pinmux: fix race causing mux_owner NULL with active mux_usecount (git-fixes).\n- platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() (git-fixes).\n- platform/mellanox: mlxbf-pmc: Fix duplicate event ID for CACHE_DATA1 (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: fix vring_desc.len assignment (git-fixes).\n- platform/mellanox: mlxreg-lc: Fix logic error in power state check (git-fixes).\n- platform/mellanox: nvsw-sn2201: Fix bus number in adapter error message (git-fixes).\n- platform/x86/amd/pmc: Add PCSpecialist Lafite Pro V 14M to 8042 quirks list (stable-fixes).\n- platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks (git-fixes).\n- platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots (git-fixes).\n- platform/x86: think-lmi: Create ksets consecutively (stable-fixes).\n- platform/x86: think-lmi: Fix kobject cleanup (git-fixes).\n- platform/x86: think-lmi: Fix sysfs group cleanup (git-fixes).\n- pm / devfreq: Check governor before using governor->name (git-fixes).\n- power: supply: cpcap-charger: Fix null check for power_supply_get_by_name (git-fixes).\n- power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set (git-fixes).\n- powercap: call put_device() on an error path in powercap_register_control_type() (stable-fixes).\n- powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() (git-fixes).\n- powercap: intel_rapl: Do not change CLAMPING bit if ENABLE bit cannot be changed (git-fixes).\n- powerpc/bpf: enforce full ordering for ATOMIC operations with BPF_FETCH (git-fixes).\n- ptp: fix breakage after ptp_vclock_in_use() rework (bsc#1246506).\n- pwm: imx-tpm: Reset counter if CMOD is 0 (git-fixes).\n- pwm: mediatek: Ensure to disable clocks in error path (git-fixes).\n- rdma/core: Rate limit GID cache warning messages (git-fixes)\n- rdma/counter: Check CAP_NET_RAW check in user namespace for RDMA counters (git-fixes)\n- rdma/hns: Drop GFP_NOWARN (git-fixes)\n- rdma/hns: Fix -Wframe-larger-than issue (git-fixes)\n- rdma/hns: Fix HW configurations not cleared in error flow (git-fixes)\n- rdma/hns: Fix accessing uninitialized resources (git-fixes)\n- rdma/hns: Fix double destruction of rsv_qp (git-fixes)\n- rdma/hns: Get message length of ack_req from FW (git-fixes)\n- rdma/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes)\n- rdma/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes)\n- rdma/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes)\n- rdma/mlx5: Fix CC counters query for MPV (git-fixes)\n- rdma/mlx5: Fix HW counters query for non-representor devices (git-fixes)\n- rdma/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes)\n- rdma/mlx5: Fix vport loopback for MPV device (git-fixes)\n- rdma/mlx5: Initialize obj_event->obj_sub_list before xa_insert (git-fixes)\n- rdma/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes)\n- rdma/siw: Fix the sendmsg byte count in siw_tcp_sendpages (git-fixes)\n- rdma/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes)\n- rdma/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes)\n- rdma/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git-fixes)\n- rdma/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes)\n- regmap: fix potential memory leak of regmap_bus (git-fixes).\n- regulator: fan53555: add enable_time support and soft-start times (stable-fixes).\n- regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods (git-fixes).\n- regulator: pwm-regulator: Calculate the output voltage for disabled PWMs (stable-fixes).\n- resource: fix false warning in __request_region() (git-fixes).\n- restore UCSI_CONNECTOR_RESET_HARD definition (git-fixes).\n- ring-buffer: Do not allow events in NMI with generic atomic64 cmpxchg() (git-fixes).\n- rose: fix dangling neighbour pointers in rose_rt_device_down() (git-fixes).\n- rpl: Fix use-after-free in rpl_do_srh_inline() (git-fixes).\n- rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation (bsc#1246879) Put the same workaround to avoid file truncation of vmlinux and co in kernel-default-base package, too.\n- rtc: ds1307: fix incorrect maximum clock rate handling (git-fixes).\n- rtc: hym8563: fix incorrect maximum clock rate handling (git-fixes).\n- rtc: nct3018y: fix incorrect maximum clock rate handling (git-fixes).\n- rtc: pcf85063: fix incorrect maximum clock rate handling (git-fixes).\n- rtc: pcf8563: fix incorrect maximum clock rate handling (git-fixes).\n- rtc: rv3028: fix incorrect maximum clock rate handling (git-fixes).\n- s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again (git-fixes bsc#1246870).\n- s390/entry: Fix last breaking event handling in case of stack corruption (git-fixes bsc#1243806).\n- s390/pci: Do not try re-enabling load/store if device is disabled (git-fixes bsc#1245646).\n- s390/pci: Fix stale function handles in error handling (git-fixes bsc#1245647).\n- s390/pkey: Prevent overflow in size calculation for memdup_user() (git-fixes bsc#1245598).\n- s390: Add z17 elf platform (LTC#214086 bsc#1245540).\n- samples: mei: Fix building on musl libc (git-fixes).\n- sched,freezer: Remove unnecessary warning in __thaw_task (bsc#1219338).\n- sched: Add test_and_clear_wake_up_bit() and atomic_dec_and_wake_up() (git-fixes).\n- scsi: core: Enforce unlimited max_segment_size when virt_boundary_mask is set (git-fixes).\n- scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure (bsc#1245260 bsc#1243100 bsc#1246125).\n- scsi: lpfc: Early return out of FDMI cmpl for locally rejected statuses (bsc#1245260 bsc#1243100 bsc#1246125).\n- scsi: lpfc: Ensure HBA_SETUP flag is used only for SLI4 in dev_loss_tmo_callbk (bsc#1245260 bsc#1243100 bsc#1246125).\n- scsi: lpfc: Modify end-of-life adapters' model descriptions (bsc#1245260 bsc#1243100 bsc#1246125 bsc#1204142).\n- scsi: lpfc: Move clearing of HBA_SETUP flag to before lpfc_sli4_queue_unset (bsc#1245260 bsc#1243100 bsc#1246125).\n- scsi: lpfc: Relocate clearing initial phba flags from link up to link down hdlr (bsc#1245260 bsc#1243100 bsc#1246125).\n- scsi: lpfc: Revise CQ_CREATE_SET mailbox bitfield definitions (bsc#1245260 bsc#1243100 bsc#1246125).\n- scsi: lpfc: Revise logging format for failed CT MIB requests (bsc#1245260 bsc#1243100 bsc#1246125).\n- scsi: lpfc: Simplify error handling for failed lpfc_get_sli4_parameters cmd (bsc#1245260 bsc#1243100 bsc#1246125).\n- scsi: lpfc: Skip RSCN processing when FC_UNLOADING flag is set (bsc#1245260 bsc#1243100 bsc#1246125).\n- scsi: lpfc: Update debugfs trace ring initialization messages (bsc#1245260 bsc#1243100 bsc#1246125).\n- scsi: lpfc: Update lpfc version to 14.4.0.10 (bsc#1245260 bsc#1243100 bsc#1246125).\n- scsi: megaraid_sas: Fix invalid node index (git-fixes).\n- scsi: qla2xxx: Fix DMA mapping test in qla24xx_get_port_database() (git-fixes).\n- scsi: qla4xxx: Fix missing DMA mapping error in qla4xxx_alloc_pdu() (git-fixes).\n- scsi: s390: zfcp: Ensure synchronous unit_add (git-fixes bsc#1245599).\n- selftests/bpf: Add CFLAGS per source file and runner (git-fixes).\n- selftests/bpf: Add tests for iter next method returning valid pointer (git-fixes).\n- selftests/bpf: Change functions definitions to support GCC (git-fixes).\n- selftests/bpf: Fix a few tests for GCC related warnings (git-fixes).\n- selftests/bpf: Fix pointer arithmetic in test_xdp_do_redirect (git-fixes).\n- selftests/bpf: Fix prog numbers in test_sockmap (git-fixes).\n- smb3: move server check earlier when setting channel sequence number (git-fixes).\n- smb3: rename macro CIFS_SERVER_IS_CHAN to avoid confusion (git-fixes).\n- soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS (git-fixes).\n- soc: aspeed: lpc-snoop: Cleanup resources in stack-order (git-fixes).\n- soc: aspeed: lpc-snoop: Do not disable channels that are not enabled (git-fixes).\n- soc: qcom: QMI encoding/decoding for big endian (git-fixes).\n- soc: qcom: fix endianness for QMI header (git-fixes).\n- soc: qcom: pmic_glink: fix OF node leak (git-fixes).\n- soundwire: amd: fix for clearing command status register (git-fixes).\n- soundwire: stream: restore params when prepare ports fail (git-fixes).\n- spi: spi-fsl-dspi: Clear completion counter before initiating transfer (git-fixes).\n- staging: axis-fifo: remove sysfs interface (git-fixes).\n- staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() (git-fixes).\n- staging: nvec: Fix incorrect null termination of battery manufacturer (git-fixes).\n- struct cdns: move new member to the end (git-fixes).\n- struct ucsi_operations: use padding for new operation (git-fixes).\n- sunrpc: do not immediately retransmit on seqno miss (git-fixes).\n- sunrpc: fix client side handling of tls alerts (git-fixes).\n- supported.conf: add missing entries for armv7hl\n- supported.conf: move nvme-apple to optional again\n- supported.conf: sort entries again\n- tcp: call tcp_measure_rcv_mss() for ooo packets (git-fixes).\n- thunderbolt: Fix bit masking in tb_dp_port_set_hops() (git-fixes).\n- thunderbolt: Fix copy+paste error in match_service_id() (git-fixes).\n- thunderbolt: Fix wake on connect at runtime (git-fixes).\n- tracing/kprobe: Make trace_kprobe's module callback called after jump_label update (git-fixes).\n- tracing/kprobes: Fix to free objects when failed to copy a symbol (git-fixes).\n- types: Complement the aligned types with signed 64-bit one (stable-fixes).\n- ucount: fix atomic_long_inc_below() argument type (git-fixes).\n- ucsi-glink: adapt to kABI consistency (git-fixes).\n- ucsi_ccg: Refine the UCSI Interrupt handling (git-fixes).\n- ucsi_operations: add stubs for all operations (git-fixes).\n- ucsi_ops: adapt update_connector to kABI consistency (git-fixes).\n- usb: Add checks for snprintf() calls in usb_alloc_dev() (stable-fixes).\n- usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init() (git-fixes).\n- usb: cdc-wdm: avoid setting WDM_READ for ZLP-s (stable-fixes).\n- usb: cdnsp: Fix issue with CV Bad Descriptor test (git-fixes).\n- usb: cdnsp: Fix issue with resuming from L1 (git-fixes).\n- usb: cdnsp: Replace snprintf() with the safer scnprintf() variant (stable-fixes).\n- usb: cdnsp: do not disable slot for disabled slot (git-fixes).\n- usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume (git-fixes).\n- usb: common: usb-conn-gpio: use a unique name for usb connector device (stable-fixes).\n- usb: dwc2: also exit clock_gating when stopping udc while suspended (stable-fixes).\n- usb: dwc3: meson-g12a: fix device leaks at unbind (git-fixes).\n- usb: early: xhci-dbc: Fix early_ioremap leak (git-fixes).\n- usb: gadget : fix use-after-free in composite_dev_cleanup() (git-fixes).\n- usb: gadget: u_serial: Fix race condition in TTY wakeup (git-fixes).\n- usb: gadget: udc: renesas_usb3: fix device leak at unbind (git-fixes).\n- usb: host: xhci-plat: fix incorrect type for of_match variable in xhci_plat_probe() (git-fixes).\n- usb: hub: Do not try to recover devices lost during warm reset (git-fixes).\n- usb: misc: apple-mfi-fastcharge: Make power supply names unique (git-fixes).\n- usb: musb: fix gadget state on disconnect (git-fixes).\n- usb: musb: omap2430: fix device leak at unbind (git-fixes).\n- usb: net: sierra: check for no status endpoint (git-fixes).\n- usb: potential integer overflow in usbg_make_tpg() (stable-fixes).\n- usb: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI (stable-fixes).\n- usb: serial: option: add Foxconn T99W640 (stable-fixes).\n- usb: serial: option: add Telit Cinterion FE910C04 (ECM) composition (stable-fixes).\n- usb: typec: Update sysfs when setting ops (git-fixes).\n- usb: typec: altmodes/displayport: do not index invalid pin_assignments (git-fixes).\n- usb: typec: displayport: Fix potential deadlock (git-fixes).\n- usb: typec: displayport: Receive DP Status Update NAK request exit dp altmode (stable-fixes).\n- usb: typec: mux: do not return on EOPNOTSUPP in {mux, switch}_set (stable-fixes).\n- usb: typec: tcpm: allow switching to mode accessory to mux properly (stable-fixes).\n- usb: typec: tcpm: allow to use sink in accessory mode (stable-fixes).\n- usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach (git-fixes).\n- usb: typec: ucsi: Add DATA_RESET option of Connector Reset command (git-fixes).\n- usb: typec: ucsi: Add qcm6490-pmic-glink as needing PDOS quirk (git-fixes).\n- usb: typec: ucsi: Delay alternate mode discovery (git-fixes).\n- usb: typec: ucsi: Fix busy loop on ASUS VivoBooks (git-fixes).\n- usb: typec: ucsi: Fix the partner PD revision (git-fixes).\n- usb: typec: ucsi: Get PD revision for partner (git-fixes).\n- usb: typec: ucsi: Set orientation as none when connector is unplugged (git-fixes).\n- usb: typec: ucsi: Update power_supply on power role change (git-fixes).\n- usb: typec: ucsi: add callback for connector status updates (git-fixes).\n- usb: typec: ucsi: add update_connector callback (git-fixes).\n- usb: typec: ucsi: do not retrieve PDOs if not supported (git-fixes).\n- usb: typec: ucsi: extract code to read PD caps (git-fixes).\n- usb: typec: ucsi: fix UCSI on SM8550 & SM8650 Qualcomm devices (git-fixes).\n- usb: typec: ucsi: glink: fix off-by-one in connector_status (git-fixes).\n- usb: typec: ucsi: glink: increase max ports for x1e80100 (git-fixes).\n- usb: typec: ucsi: glink: move GPIO reading into connector_status callback (git-fixes).\n- usb: typec: ucsi: glink: use typec_set_orientation (git-fixes).\n- usb: typec: ucsi: move ucsi_acknowledge() from ucsi_read_error() (git-fixes).\n- usb: typec: ucsi: properly register partner's PD device (git-fixes).\n- usb: typec: ucsi: support delaying GET_PDOS for device (git-fixes).\n- usb: typec: ucsi_acpi: Add LG Gram quirk (git-fixes).\n- usb: typec: ucsi_glink: drop NO_PARTNER_PDOS quirk for sm8550 / sm8650 (git-fixes).\n- usb: typec: ucsi_glink: enable the UCSI_DELAY_DEVICE_PDOS quirk (git-fixes).\n- usb: typec: ucsi_glink: enable the UCSI_DELAY_DEVICE_PDOS quirk on qcm6490 (git-fixes).\n- usb: typec: ucsi_glink: rework quirks implementation (git-fixes).\n- usb: xhci: Skip xhci_reset in xhci_resume if xhci is being removed (git-fixes).\n- usb: xhci: quirk for data loss in ISOC transfers (stable-fixes).\n- usb:cdnsp: remove TRB_FLUSH_ENDPOINT command (stable-fixes).\n- virtgpu: do not reset on shutdown (git-fixes).\n- vmci: Prevent the dispatching of uninitialized payloads (git-fixes).\n- vt: add missing notification when switching back to text mode (stable-fixes).\n- vt: defkeymap: Map keycodes above 127 to K_HOLE (git-fixes).\n- vt: keyboard: Do not process Unicode characters in K_OFF mode (git-fixes).\n- watchdog: ziirave_wdt: check record length in ziirave_firm_verify() (git-fixes).\n- wifi: ath11k: clear initialized flag for deinit-ed srng lists (git-fixes).\n- wifi: ath11k: fix dest ring-buffer corruption (git-fixes).\n- wifi: ath11k: fix dest ring-buffer corruption when ring is full (git-fixes).\n- wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() (git-fixes).\n- wifi: ath11k: fix source ring-buffer corruption (git-fixes).\n- wifi: ath11k: fix suspend use-after-free after probe failure (git-fixes).\n- wifi: ath12k: fix dest ring-buffer corruption (git-fixes).\n- wifi: ath12k: fix dest ring-buffer corruption when ring is full (git-fixes).\n- wifi: ath12k: fix endianness handling while accessing wmi service bit (git-fixes).\n- wifi: ath12k: fix source ring-buffer corruption (git-fixes).\n- wifi: ath6kl: remove WARN on bad firmware input (stable-fixes).\n- wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE (git-fixes).\n- wifi: brcmsmac: Remove const from tbl_ptr parameter in wlc_lcnphy_common_read_table() (git-fixes).\n- wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (git-fixes).\n- wifi: iwlwifi: Fix memory leak in iwl_mvm_init() (git-fixes).\n- wifi: iwlwifi: return ERR_PTR from opmode start() (stable-fixes).\n- wifi: mac80211: Add link iteration macro for link data (stable-fixes).\n- wifi: mac80211: Check 802.11 encaps offloading in ieee80211_tx_h_select_key() (git-fixes).\n- wifi: mac80211: Do not call fq_flow_idx() for management frames (git-fixes).\n- wifi: mac80211: Do not schedule stopped TXQs (git-fixes).\n- wifi: mac80211: chan: chandef is non-NULL for reserved (stable-fixes).\n- wifi: mac80211: drop invalid source address OCB frames (stable-fixes).\n- wifi: mac80211: reject TDLS operations when station is not associated (git-fixes).\n- wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init() (git-fixes).\n- wifi: mt76: mt7925: fix invalid array index in ssid assignment during hw scan (git-fixes).\n- wifi: mt76: mt7925: fix the wrong config for tx interrupt (git-fixes).\n- wifi: plfxlc: Fix error handling in usb driver probe (git-fixes).\n- wifi: prevent A-MSDU attacks in mesh networks (stable-fixes).\n- wifi: rtl818x: Kill URBs before clearing tx status queue (git-fixes).\n- wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band (git-fixes).\n- wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() (git-fixes).\n- x86/cpu/amd: Fix workaround for erratum 1054 (git-fixes).\n- x86/mce/amd: Add default names for MCA banks and blocks (git-fixes).\n- x86/mce/amd: Fix threshold limit reset (git-fixes).\n- x86/mce: Do not remove sysfs if thresholding sysfs init fails (git-fixes).\n- x86/mce: Make sure CMCI banks are cleared during shutdown on Intel (git-fixes).\n- x86/tdx: Fix __noreturn build warning around __tdx_hypercall_failed() (git-fixes).\n- x86/traps: Initialize DR6 by writing its architectural reset value (git-fixes).\n- x86/virt/tdx: Avoid indirect calls to TDX assembly functions (git-fixes).\n- x86: UV RTC: Add parameter to disable RTC clocksource (bsc#1241345).\n- xfs: fix off-by-one error in fsmap's end_daddr usage (bsc#1235837).\n- xfs: only create event xfs_file_compat_ioctl when CONFIG_COMPAT is configure (git-fixes).\n- xfs: remove unused event xfs_alloc_near_error (git-fixes).\n- xfs: remove unused event xfs_alloc_near_nominleft (git-fixes).\n- xfs: remove unused event xfs_attr_node_removename (git-fixes).\n- xfs: remove unused event xfs_ioctl_clone (git-fixes).\n- xfs: remove unused event xfs_pagecache_inval (git-fixes).\n- xfs: remove unused event xlog_iclog_want_sync (git-fixes).\n- xfs: remove unused trace event xfs_attr_remove_iter_return (git-fixes).\n- xfs: remove unused trace event xfs_attr_rmtval_set (git-fixes).\n- xfs: remove unused trace event xfs_reflink_cow_enospc (git-fixes).\n- xfs: remove unused xfs_attr events (git-fixes).\n- xfs: remove unused xfs_reflink_compare_extents events (git-fixes).\n- xfs: remove usused xfs_end_io_direct events (git-fixes).\n- xhci: Disable stream for xHC controller with XHCI_BROKEN_STREAMS (git-fixes).\n- xhci: dbc: Flush queued requests before stopping dbc (git-fixes).\n- xhci: dbctty: disable ECHO flag by default (git-fixes).\n","id":"SUSE-SU-2025:03023-1","modified":"2025-08-29T11:54:08Z","published":"2025-08-29T11:54:08Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202503023-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1139073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219338"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225707"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230216"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233300"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235613"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236333"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238896"},{"type":"REPORT","url":"https://bugzilla.suse.com/1239061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240323"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240966"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241166"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242086"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242960"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242965"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242993"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243068"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243100"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243669"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244309"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244457"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244735"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244749"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245151"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245216"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245431"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245440"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245457"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245498"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245504"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245508"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245510"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245598"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245599"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245646"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245647"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245649"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245654"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245658"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245660"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245665"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245666"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245668"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245669"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245670"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245671"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245675"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245676"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245679"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245682"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245683"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245684"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245688"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245689"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245690"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245691"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245695"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245711"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245713"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245714"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245719"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245731"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245735"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245737"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245744"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245745"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245746"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245749"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245751"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245765"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245777"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245789"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245937"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245945"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245951"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245966"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245970"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245976"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245980"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246002"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246006"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246008"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246020"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246023"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246029"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246031"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246037"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246041"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246044"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246047"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246049"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246050"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246055"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246093"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246109"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246122"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246173"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246178"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246183"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246186"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246195"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246203"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246212"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246236"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246240"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246243"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246246"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246249"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246250"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246253"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246258"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246262"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246264"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246266"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246268"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246273"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246283"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246287"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246292"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246295"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246334"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246337"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246361"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246364"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246370"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246375"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246384"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246386"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246387"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246438"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246473"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246547"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246777"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246870"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246879"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246911"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247018"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247023"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247028"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247031"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247089"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247091"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247097"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247101"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247103"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247113"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247118"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247128"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247141"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247143"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247146"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247149"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247150"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247151"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247153"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247156"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247170"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247172"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247176"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247177"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247178"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247209"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247210"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247227"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247233"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247236"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247253"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247255"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247271"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247273"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247276"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247277"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247278"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247284"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247288"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247289"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247311"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247314"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247374"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247437"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247450"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36028"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36348"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36357"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44963"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57947"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23163"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37856"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37864"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38034"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38052"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38061"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38084"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38090"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38100"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38102"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38105"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38107"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38109"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38111"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38112"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38113"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38117"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38118"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38122"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38123"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38126"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38129"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38132"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38136"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38147"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38149"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38151"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38157"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38159"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38165"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38174"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38177"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38180"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38182"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38187"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38188"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38192"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38193"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38194"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38197"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38200"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38202"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38203"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38206"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38210"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38211"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38212"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38213"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38214"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38217"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38222"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38225"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38226"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38227"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38231"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38246"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38248"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38249"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38250"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38272"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38273"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38275"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38277"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38279"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38283"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38290"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38293"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38300"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38303"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38304"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38305"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38307"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38313"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38319"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38326"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38328"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38332"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38334"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38335"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38336"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38337"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38338"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38342"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38343"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38344"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38345"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38348"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38352"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38354"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38362"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38363"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38364"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38365"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38369"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38371"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38373"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38375"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38376"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38377"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38380"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38382"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38384"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38385"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38386"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38387"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38389"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38391"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38392"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38393"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38395"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38396"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38399"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38400"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38401"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38403"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38404"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38406"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38409"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38410"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38412"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38414"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38415"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38416"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38420"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38424"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38425"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38426"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38428"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38429"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38430"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38436"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38443"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38448"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38449"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38455"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38457"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38460"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38461"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38462"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38463"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38465"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38467"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38468"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38470"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38471"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38473"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38474"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38477"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38478"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38480"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38481"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38482"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38483"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38485"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38487"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38494"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38495"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38496"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38497"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38498"}],"related":["CVE-2019-11135","CVE-2024-36028","CVE-2024-36348","CVE-2024-36349","CVE-2024-36350","CVE-2024-36357","CVE-2024-44963","CVE-2024-56742","CVE-2024-57947","CVE-2025-21839","CVE-2025-21872","CVE-2025-23163","CVE-2025-37798","CVE-2025-37856","CVE-2025-37864","CVE-2025-37885","CVE-2025-37920","CVE-2025-37984","CVE-2025-38034","CVE-2025-38035","CVE-2025-38051","CVE-2025-38052","CVE-2025-38058","CVE-2025-38061","CVE-2025-38062","CVE-2025-38063","CVE-2025-38064","CVE-2025-38074","CVE-2025-38084","CVE-2025-38085","CVE-2025-38087","CVE-2025-38088","CVE-2025-38089","CVE-2025-38090","CVE-2025-38094","CVE-2025-38095","CVE-2025-38097","CVE-2025-38098","CVE-2025-38099","CVE-2025-38100","CVE-2025-38102","CVE-2025-38105","CVE-2025-38107","CVE-2025-38108","CVE-2025-38109","CVE-2025-38110","CVE-2025-38111","CVE-2025-38112","CVE-2025-38113","CVE-2025-38115","CVE-2025-38117","CVE-2025-38118","CVE-2025-38120","CVE-2025-38122","CVE-2025-38123","CVE-2025-38124","CVE-2025-38126","CVE-2025-38127","CVE-2025-38129","CVE-2025-38131","CVE-2025-38132","CVE-2025-38135","CVE-2025-38136","CVE-2025-38138","CVE-2025-38142","CVE-2025-38143","CVE-2025-38145","CVE-2025-38147","CVE-2025-38148","CVE-2025-38149","CVE-2025-38151","CVE-2025-38153","CVE-2025-38154","CVE-2025-38155","CVE-2025-38157","CVE-2025-38158","CVE-2025-38159","CVE-2025-38161","CVE-2025-38162","CVE-2025-38165","CVE-2025-38166","CVE-2025-38173","CVE-2025-38174","CVE-2025-38177","CVE-2025-38180","CVE-2025-38181","CVE-2025-38182","CVE-2025-38183","CVE-2025-38187","CVE-2025-38188","CVE-2025-38192","CVE-2025-38193","CVE-2025-38194","CVE-2025-38197","CVE-2025-38198","CVE-2025-38200","CVE-2025-38202","CVE-2025-38203","CVE-2025-38204","CVE-2025-38206","CVE-2025-38210","CVE-2025-38211","CVE-2025-38212","CVE-2025-38213","CVE-2025-38214","CVE-2025-38215","CVE-2025-38217","CVE-2025-38220","CVE-2025-38222","CVE-2025-38225","CVE-2025-38226","CVE-2025-38227","CVE-2025-38229","CVE-2025-38231","CVE-2025-38236","CVE-2025-38239","CVE-2025-38244","CVE-2025-38246","CVE-2025-38248","CVE-2025-38249","CVE-2025-38250","CVE-2025-38257","CVE-2025-38259","CVE-2025-38264","CVE-2025-38272","CVE-2025-38273","CVE-2025-38275","CVE-2025-38277","CVE-2025-38279","CVE-2025-38283","CVE-2025-38286","CVE-2025-38289","CVE-2025-38290","CVE-2025-38292","CVE-2025-38293","CVE-2025-38300","CVE-2025-38303","CVE-2025-38304","CVE-2025-38305","CVE-2025-38307","CVE-2025-38310","CVE-2025-38312","CVE-2025-38313","CVE-2025-38319","CVE-2025-38323","CVE-2025-38326","CVE-2025-38328","CVE-2025-38332","CVE-2025-38334","CVE-2025-38335","CVE-2025-38336","CVE-2025-38337","CVE-2025-38338","CVE-2025-38342","CVE-2025-38343","CVE-2025-38344","CVE-2025-38345","CVE-2025-38348","CVE-2025-38349","CVE-2025-38350","CVE-2025-38352","CVE-2025-38354","CVE-2025-38362","CVE-2025-38363","CVE-2025-38364","CVE-2025-38365","CVE-2025-38369","CVE-2025-38371","CVE-2025-38373","CVE-2025-38375","CVE-2025-38376","CVE-2025-38377","CVE-2025-38380","CVE-2025-38382","CVE-2025-38384","CVE-2025-38385","CVE-2025-38386","CVE-2025-38387","CVE-2025-38389","CVE-2025-38391","CVE-2025-38392","CVE-2025-38393","CVE-2025-38395","CVE-2025-38396","CVE-2025-38399","CVE-2025-38400","CVE-2025-38401","CVE-2025-38403","CVE-2025-38404","CVE-2025-38406","CVE-2025-38409","CVE-2025-38410","CVE-2025-38412","CVE-2025-38414","CVE-2025-38415","CVE-2025-38416","CVE-2025-38420","CVE-2025-38424","CVE-2025-38425","CVE-2025-38426","CVE-2025-38428","CVE-2025-38429","CVE-2025-38430","CVE-2025-38436","CVE-2025-38443","CVE-2025-38448","CVE-2025-38449","CVE-2025-38455","CVE-2025-38457","CVE-2025-38460","CVE-2025-38461","CVE-2025-38462","CVE-2025-38463","CVE-2025-38465","CVE-2025-38467","CVE-2025-38468","CVE-2025-38470","CVE-2025-38471","CVE-2025-38473","CVE-2025-38474","CVE-2025-38476","CVE-2025-38477","CVE-2025-38478","CVE-2025-38480","CVE-2025-38481","CVE-2025-38482","CVE-2025-38483","CVE-2025-38485","CVE-2025-38487","CVE-2025-38489","CVE-2025-38494","CVE-2025-38495","CVE-2025-38496","CVE-2025-38497","CVE-2025-38498"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2019-11135","CVE-2024-36028","CVE-2024-36348","CVE-2024-36349","CVE-2024-36350","CVE-2024-36357","CVE-2024-44963","CVE-2024-56742","CVE-2024-57947","CVE-2025-21839","CVE-2025-21872","CVE-2025-23163","CVE-2025-37798","CVE-2025-37856","CVE-2025-37864","CVE-2025-37885","CVE-2025-37920","CVE-2025-37984","CVE-2025-38034","CVE-2025-38035","CVE-2025-38051","CVE-2025-38052","CVE-2025-38058","CVE-2025-38061","CVE-2025-38062","CVE-2025-38063","CVE-2025-38064","CVE-2025-38074","CVE-2025-38084","CVE-2025-38085","CVE-2025-38087","CVE-2025-38088","CVE-2025-38089","CVE-2025-38090","CVE-2025-38094","CVE-2025-38095","CVE-2025-38097","CVE-2025-38098","CVE-2025-38099","CVE-2025-38100","CVE-2025-38102","CVE-2025-38105","CVE-2025-38107","CVE-2025-38108","CVE-2025-38109","CVE-2025-38110","CVE-2025-38111","CVE-2025-38112","CVE-2025-38113","CVE-2025-38115","CVE-2025-38117","CVE-2025-38118","CVE-2025-38120","CVE-2025-38122","CVE-2025-38123","CVE-2025-38124","CVE-2025-38126","CVE-2025-38127","CVE-2025-38129","CVE-2025-38131","CVE-2025-38132","CVE-2025-38135","CVE-2025-38136","CVE-2025-38138","CVE-2025-38142","CVE-2025-38143","CVE-2025-38145","CVE-2025-38147","CVE-2025-38148","CVE-2025-38149","CVE-2025-38151","CVE-2025-38153","CVE-2025-38154","CVE-2025-38155","CVE-2025-38157","CVE-2025-38158","CVE-2025-38159","CVE-2025-38161","CVE-2025-38162","CVE-2025-38165","CVE-2025-38166","CVE-2025-38173","CVE-2025-38174","CVE-2025-38177","CVE-2025-38180","CVE-2025-38181","CVE-2025-38182","CVE-2025-38183","CVE-2025-38187","CVE-2025-38188","CVE-2025-38192","CVE-2025-38193","CVE-2025-38194","CVE-2025-38197","CVE-2025-38198","CVE-2025-38200","CVE-2025-38202","CVE-2025-38203","CVE-2025-38204","CVE-2025-38206","CVE-2025-38210","CVE-2025-38211","CVE-2025-38212","CVE-2025-38213","CVE-2025-38214","CVE-2025-38215","CVE-2025-38217","CVE-2025-38220","CVE-2025-38222","CVE-2025-38225","CVE-2025-38226","CVE-2025-38227","CVE-2025-38229","CVE-2025-38231","CVE-2025-38236","CVE-2025-38239","CVE-2025-38244","CVE-2025-38246","CVE-2025-38248","CVE-2025-38249","CVE-2025-38250","CVE-2025-38257","CVE-2025-38259","CVE-2025-38264","CVE-2025-38272","CVE-2025-38273","CVE-2025-38275","CVE-2025-38277","CVE-2025-38279","CVE-2025-38283","CVE-2025-38286","CVE-2025-38289","CVE-2025-38290","CVE-2025-38292","CVE-2025-38293","CVE-2025-38300","CVE-2025-38303","CVE-2025-38304","CVE-2025-38305","CVE-2025-38307","CVE-2025-38310","CVE-2025-38312","CVE-2025-38313","CVE-2025-38319","CVE-2025-38323","CVE-2025-38326","CVE-2025-38328","CVE-2025-38332","CVE-2025-38334","CVE-2025-38335","CVE-2025-38336","CVE-2025-38337","CVE-2025-38338","CVE-2025-38342","CVE-2025-38343","CVE-2025-38344","CVE-2025-38345","CVE-2025-38348","CVE-2025-38349","CVE-2025-38350","CVE-2025-38352","CVE-2025-38354","CVE-2025-38362","CVE-2025-38363","CVE-2025-38364","CVE-2025-38365","CVE-2025-38369","CVE-2025-38371","CVE-2025-38373","CVE-2025-38375","CVE-2025-38376","CVE-2025-38377","CVE-2025-38380","CVE-2025-38382","CVE-2025-38384","CVE-2025-38385","CVE-2025-38386","CVE-2025-38387","CVE-2025-38389","CVE-2025-38391","CVE-2025-38392","CVE-2025-38393","CVE-2025-38395","CVE-2025-38396","CVE-2025-38399","CVE-2025-38400","CVE-2025-38401","CVE-2025-38403","CVE-2025-38404","CVE-2025-38406","CVE-2025-38409","CVE-2025-38410","CVE-2025-38412","CVE-2025-38414","CVE-2025-38415","CVE-2025-38416","CVE-2025-38420","CVE-2025-38424","CVE-2025-38425","CVE-2025-38426","CVE-2025-38428","CVE-2025-38429","CVE-2025-38430","CVE-2025-38436","CVE-2025-38443","CVE-2025-38448","CVE-2025-38449","CVE-2025-38455","CVE-2025-38457","CVE-2025-38460","CVE-2025-38461","CVE-2025-38462","CVE-2025-38463","CVE-2025-38465","CVE-2025-38467","CVE-2025-38468","CVE-2025-38470","CVE-2025-38471","CVE-2025-38473","CVE-2025-38474","CVE-2025-38476","CVE-2025-38477","CVE-2025-38478","CVE-2025-38480","CVE-2025-38481","CVE-2025-38482","CVE-2025-38483","CVE-2025-38485","CVE-2025-38487","CVE-2025-38489","CVE-2025-38494","CVE-2025-38495","CVE-2025-38496","CVE-2025-38497","CVE-2025-38498"]}