{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"6.4.0-25.1","kernel-default-base":"6.4.0-24.1.21.4","kernel-default-livepatch":"6.4.0-25.1","kernel-devel":"6.4.0-25.1","kernel-kvmsmall":"6.4.0-25.1","kernel-livepatch-6_4_0-25-default":"1-1.2","kernel-macros":"6.4.0-25.1","kernel-source":"6.4.0-25.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-25.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"6.4.0-25.1","kernel-default-base":"6.4.0-24.1.21.4","kernel-default-livepatch":"6.4.0-25.1","kernel-devel":"6.4.0-25.1","kernel-kvmsmall":"6.4.0-25.1","kernel-livepatch-6_4_0-25-default":"1-1.2","kernel-macros":"6.4.0-25.1","kernel-source":"6.4.0-25.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-24.1.21.4"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"6.4.0-25.1","kernel-default-base":"6.4.0-24.1.21.4","kernel-default-livepatch":"6.4.0-25.1","kernel-devel":"6.4.0-25.1","kernel-kvmsmall":"6.4.0-25.1","kernel-livepatch-6_4_0-25-default":"1-1.2","kernel-macros":"6.4.0-25.1","kernel-source":"6.4.0-25.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"kernel-kvmsmall","purl":"pkg:rpm/suse/kernel-kvmsmall&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-25.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"6.4.0-25.1","kernel-default-base":"6.4.0-24.1.21.4","kernel-default-livepatch":"6.4.0-25.1","kernel-devel":"6.4.0-25.1","kernel-kvmsmall":"6.4.0-25.1","kernel-livepatch-6_4_0-25-default":"1-1.2","kernel-macros":"6.4.0-25.1","kernel-source":"6.4.0-25.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"kernel-livepatch-MICRO-6-0_Update_5","purl":"pkg:rpm/suse/kernel-livepatch-MICRO-6-0_Update_5&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-1.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"6.4.0-25.1","kernel-default-base":"6.4.0-24.1.21.4","kernel-default-livepatch":"6.4.0-25.1","kernel-devel":"6.4.0-25.1","kernel-kvmsmall":"6.4.0-25.1","kernel-livepatch-6_4_0-25-default":"1-1.2","kernel-macros":"6.4.0-25.1","kernel-source":"6.4.0-25.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-25.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).\n- CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095).\n- CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726).\n- CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).\n- CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809).\n- CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205).\n- CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request (bsc#1235705).\n- CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).\n- CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again (bsc#1235727).\n- CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init() (bsc#1232161).\n- CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed (bsc#1232158).\n- CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from frag_list (bsc#1232101).\n- CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087).\n- CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419).\n- CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909).\n- CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038).\n- CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055).\n- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).\n- CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324).\n- CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200).\n- CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239).\n- CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized\n  delayed_work on cache_ctr error (bsc#1233467 bsc#1233469).\n- CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).\n- CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488).\n- CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546).\n- CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464).\n- CVE-2024-53090: afs: Fix lock recursion (bsc#1233637).\n- CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx (bsc#1233638).\n- CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo() (bsc#1233772).\n- CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069).\n- CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086).\n- CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077).\n- CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079).\n- CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071).\n- CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073).\n- CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076).\n- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).\n- CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219).\n- CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220).\n- CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221)\n- CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159).\n- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).\n- CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810).\n- CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856).\n- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).\n- CVE-2024-53170: block: fix uaf for flush rq while iterating tags (bsc#1234888).\n- CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching (bsc#1234898).\n- CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns (bsc#1234893).\n- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).\n- CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey() (bsc#1234901).\n- CVE-2024-53187: io_uring: check for overflows in io_pin_pages (bsc#1234947).\n- CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use (bsc#1234957).\n- CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction (bsc#1234906).\n- CVE-2024-53198: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (bsc#1234923).\n- CVE-2024-53203: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() (bsc#1235001).\n- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).\n- CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003).\n- CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974).\n- CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011).\n- CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050).\n- CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045).\n- CVE-2024-53236: xsk: Free skb when TX metadata options are invalid (bsc#1235000).\n- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).\n- CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282).\n- CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720).\n- CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device tree node (bsc#1235737).\n- CVE-2024-55881: KVM: x86: Play nice with protected guests in complete_hypercall_exit() (bsc#1235745).\n- CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753).\n- CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912).\n- CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033).\n- CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device bound (bsc#1235032).\n- CVE-2024-56569: ftrace: Fix regression with module command in stack_trace_filter (bsc#1235031).\n- CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).\n- CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128).\n- CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123).\n- CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption model (bsc#1235241).\n- CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138).\n- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).\n- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).\n- CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521).\n- CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in can_create() (bsc#1235415).\n- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).\n- CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' (bsc#1235487).\n- CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock (bsc#1235390).\n- CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM (bsc#1235391).\n- CVE-2024-56614: xsk: fix OOB map writes when deleting elements (bsc#1235424).\n- CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements (bsc#1235426).\n- CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU (bsc#1235429).\n- CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled (bsc#1235227).\n- CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251).\n- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).\n- CVE-2024-56635: net: avoid potential UAF in default_operstate() (bsc#1235519).\n- CVE-2024-56636: geneve: do not assume mac header is set in geneve_xmit_skb() (bsc#1235520).\n- CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a module (bsc#1235523).\n- CVE-2024-56641: net/smc: initialize close_work early to avoid warning (bsc#1235526).\n- CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv (bsc#1235132).\n- CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451).\n- CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not support (bsc#1235449).\n- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).\n- CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips (bsc#1235444).\n- CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439).\n- CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference (bsc#1235437).\n- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).\n- CVE-2024-56665: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog (bsc#1235489).\n- CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (bsc#1235555).\n- CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c (bsc#1235498).\n- CVE-2024-56693: brd: defer automatic disk creation until module initialization succeeds (bsc#1235418).\n- CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS (bsc#1235412).\n- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).\n- CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c (bsc#1235545).\n- CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload (bsc#1235564).\n- CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error path (bsc#1235565).\n- CVE-2024-56715: ionic: Fix netdev notifier unregister on failure (bsc#1235612).\n- CVE-2024-56716: netdevsim: prevent bad user input in nsim_dev_health_break_write() (bsc#1235587).\n- CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c (bsc#1235578).\n- CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c (bsc#1235582).\n- CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c (bsc#1235583).\n- CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c (bsc#1235656).\n- CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops (bsc#1235503).\n- CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934).\n- CVE-2024-56748: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() (bsc#1235627).\n- CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920).\n- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).\n- CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write (bsc#1235638).\n- CVE-2024-56774: btrfs: add a sanity check for btrfs root in btrfs_search_slot() (bsc#1235653).\n- CVE-2024-56775: drm/amd/display: Fix handling of plane refcount (bsc#1235657).\n- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).\n- CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768).\n- CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device (bsc#1235906).\n- CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without loaded flag (bsc#1235940).\n- CVE-2024-57802: netrom: check buffer length before accessing it (bsc#1235941).\n- CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs (bsc#1235779).\n- CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL (bsc#1235793).\n- CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings (bsc#1235798).\n- CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946).\n- CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (bsc#1235948).\n- CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (bsc#1235964).\n- CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount (bsc#1235965).\n- CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967).\n- CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap (bsc#1236127).\n- CVE-2024-57929: dm array: fix releasing a faulty array block twice in dm_array_cursor_end (bsc#1236096).\n- CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192).\n- CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues (bsc#1236190).\n- CVE-2024-57933: gve: guard XSK operations on the existence of queues (bsc#1236178).\n- CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in sctp_association_init() (bsc#1236182).\n- CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend (bsc#1236247).\n- CVE-2025-21632: x86/fpu: Ensure shadow stack is active before \"getting\" registers (bsc#1236106).\n- CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices (bsc#1236143).\n- CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue (bsc#1236144).\n- CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145).\n- CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink() (bsc#1236160).\n- CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (bsc#1236161).\n- CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (bsc#1236163).\n- CVE-2025-21662: net/mlx5: Fix variable not being completed when function returns (bsc#1236198).\n- CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device tree (bsc#1236260).\n- CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function (bsc#1236262).\n- CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel (bsc#1236688).\n- CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error (bsc#1236696).\n- CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing, fix null-deref (bsc#1236703).\n\nThe following non-security bugs were fixed:\n\n- 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes).\n- ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294)\n- ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A (stable-fixes).\n- ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11 (stable-fixes).\n- ACPI: PCC: Add PCC shared memory region command and status bitfields (stable-fixes).\n- ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467).\n- ACPI: fan: cleanup resources in the error path of .probe() (git-fixes).\n- ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[] (stable-fixes).\n- ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[] (stable-fixes).\n- ACPI: resource: Fix memory resource type union access (git-fixes).\n- ACPI: resource: acpi_dev_irq_override(): Check DMI match last (stable-fixes).\n- ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable-fixes).\n- ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable-fixes).\n- ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable-fixes).\n- ACPICA: events/evxfregn: do not release the ContextMutex that was never acquired (git-fixes).\n- ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes).\n- ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).\n- ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD audio (stable-fixes).\n- ALSA: hda/realtek - Fixed headphone distorted sound on Acer Aspire A115-31 laptop (git-fixes).\n- ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).\n- ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model (stable-fixes).\n- ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA (stable-fixes).\n- ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE) (stable-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP Laptop 14s-fq1xxx (stable-fixes).\n- ALSA: hda/realtek: Enable headset mic on Positivo C6400 (stable-fixes).\n- ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes).\n- ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130 (bsc#1235686).\n- ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).\n- ALSA: hda: Fix headset detection failure due to unstable sort (git-fixes).\n- ALSA: line6: Fix racy access to midibuf (stable-fixes).\n- ALSA: seq: Check UMP support for midi_version change (git-fixes).\n- ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes).\n- ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes).\n- ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes).\n- ALSA: seq: ump: Use guard() for locking (stable-fixes).\n- ALSA: ump: Use guard() for locking (stable-fixes).\n- ALSA: usb-audio: Add delay quirk for USB Audio Device (stable-fixes).\n- ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro (stable-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes).\n- ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes).\n- ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).\n- ALSA: usb-audio: US16x08: Initialize array before use (git-fixes).\n- ASoC: Intel: avs: Fix theoretical infinite loop (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes).\n- ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable-fixes).\n- ASoC: SOF: Remove libraries from topology lookups (git-fixes).\n- ASoC: acp: Support microphone from Lenovo Go S (stable-fixes).\n- ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5 21MES00B00 (stable-fixes).\n- ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6 21M1CTO1WW (stable-fixes).\n- ASoC: amd: yc: Fix the wrong return value (git-fixes).\n- ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).\n- ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).\n- ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes).\n- ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).\n- ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).\n- ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).\n- ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).\n- ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).\n- ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-fixes).\n- ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).\n- ASoC: hdmi-codec: reorder channel allocation list (stable-fixes).\n- ASoC: mediatek: disable buffer pre-allocation (stable-fixes).\n- ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).\n- ASoC: nau8822: Lower debug print priority (stable-fixes).\n- ASoC: rockchip: i2s_tdm: Re-add the set_sysclk callback (git-fixes).\n- ASoC: rt722: add delay time to wait for the calibration procedure (stable-fixes).\n- ASoC: samsung: Add missing depends on I2C (git-fixes).\n- ASoC: samsung: Add missing selects for MFD_WM8994 (stable-fixes).\n- ASoC: sun4i-spdif: Add clock multiplier settings (git-fixes).\n- ASoC: wm8994: Add depends on MFD core (stable-fixes).\n- Bluetooth: Add support ITTIM PE50-M75C (stable-fixes).\n- Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable-fixes).\n- Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes).\n- Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection (git-fixes).\n- Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (stable-fixes).\n- Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc (git-fixes).\n- Bluetooth: MGMT: Fix Add Device to responding before completing (git-fixes).\n- Bluetooth: MGMT: Fix possible deadlocks (git-fixes).\n- Bluetooth: SCO: Add support for 16 bits transparent voice setting (git-fixes).\n- Bluetooth: btnxpuart: Fix driver sending truncated data (git-fixes).\n- Bluetooth: btnxpuart: Fix glitches seen in dual A2DP streaming (git-fixes).\n- Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable-fixes).\n- Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925 (stable-fixes).\n- Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925 (stable-fixes).\n- Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925 (stable-fixes).\n- Bluetooth: btusb: add callback function in btusb suspend/resume (stable-fixes).\n- Bluetooth: btusb: mediatek: add callback function in btusb_disconnect (stable-fixes).\n- Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (stable-fixes).\n- Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git-fixes).\n- Bluetooth: hci_sync: Fix not setting Random Address when required (git-fixes).\n- Bluetooth: iso: Fix recursive locking warning (git-fixes).\n- Delete XHCI patch for regression (bsc#1235550)\n- Disable ceph (jsc#PED-7242)\n- Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git-fixes).\n- Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git-fixes).\n- Drop downstream TPM fix patch (bsc#1233260 bsc#1233259 bsc#1232421)\n- Drop uvcvideo fix due to regression (bsc#1235894)\n- EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693).\n- HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (git-fixes).\n- HID: fix generic desktop D-Pad controls (git-fixes).\n- HID: hid-sensor-hub: do not use stale platform-data on remove (git-fixes).\n- HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check (git-fixes).\n- HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes).\n- HID: multitouch: fix support for Goodix PID 0x01e9 (git-fixes).\n- Input: atkbd - map F23 key to support default copilot shortcut (stable-fixes).\n- Input: bbnsm_pwrkey - add remove hook (git-fixes).\n- Input: bbnsm_pwrkey - fix missed key press after suspend (git-fixes).\n- Input: davinci-keyscan - remove leftover header (git-fixes).\n- Input: xpad - add QH Electronics VID/PID (stable-fixes).\n- Input: xpad - add support for Nacon Evol-X Xbox One Controller (stable-fixes).\n- Input: xpad - add support for Nacon Pro Compact (stable-fixes).\n- Input: xpad - add support for wooting two he (arm) (stable-fixes).\n- Input: xpad - add unofficial Xbox 360 wireless receiver clone (stable-fixes).\n- Input: xpad - improve name of 8BitDo controller 2dc8:3106 (stable-fixes).\n- KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits (bsc#1234635).\n- KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes bsc#1235776).\n- KVM: s390: Reject setting flic pfault attributes on ucontrol VMs (git-fixes bsc#1235777).\n- KVM: s390: vsie: fix virtual/physical address in unpin_scb() (git-fixes bsc#1235778).\n- NFC: nci: Add bounds checking in nci_hci_create_pipe() (git-fixes).\n- NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git-fixes).\n- NFSD: Async COPY result needs to return a write verifier (git-fixes).\n- NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git-fixes).\n- NFSD: Fix nfsd4_shutdown_copy() (git-fixes).\n- NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes).\n- NFSD: Prevent a potential integer overflow (git-fixes).\n- NFSD: Remove a never-true comparison (git-fixes).\n- NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point (git-fixes).\n- NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git-fixes).\n- NFSv4.2: fix COPY_NOTIFY xdr buf size calculation (git-fixes).\n- NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE (git-fixes).\n- Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes).\n- PCI/AER: Disable AER service on suspend (stable-fixes).\n- PCI/MSI: Handle lack of irqdomain gracefully (git-fixes).\n- PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes).\n- PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes).\n- PCI: Add T_PERST_CLK_US macro (git-fixes).\n- PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (git-fixes).\n- PCI: Detect and trust built-in Thunderbolt chips (stable-fixes).\n- PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes).\n- PCI: Use preserve_config in place of pci_flags (stable-fixes).\n- PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup() (stable-fixes).\n- PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes).\n- PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes).\n- PCI: dwc: Always stop link in the dw_pcie_suspend_noirq (git-fixes).\n- PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (git-fixes).\n- PCI: dwc: ep: Write BAR_MASK before iATU registers in pci_epc_set_bar() (git-fixes).\n- PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy() (git-fixes).\n- PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf() (git-fixes).\n- PCI: endpoint: pci-epf-test: Fix check for DMA MEMCPY test (git-fixes).\n- PCI: endpoint: pci-epf-test: Set dma_chan_rx pointer to NULL on error (git-fixes).\n- PCI: imx6: Deassert apps_reset in imx_pcie_deassert_core_reset() (git-fixes).\n- PCI: imx6: Skip controller_id generation logic for i.MX7D (git-fixes).\n- PCI: j721e: Add PCIe 4x lane selection support (stable-fixes).\n- PCI: j721e: Add per platform maximum lane settings (stable-fixes).\n- PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes).\n- PCI: j721e: Add suspend and resume support (git-fixes).\n- PCI: j721e: Use T_PERST_CLK_US macro (git-fixes).\n- PCI: microchip: Set inbound address translation for coherent or non-coherent mode (git-fixes).\n- PCI: qcom: Add support for IPQ9574 (stable-fixes).\n- PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() (git-fixes).\n- PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable-fixes).\n- PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes).\n- PM: hibernate: Add error handling for syscore_suspend() (git-fixes).\n- RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467).\n- RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes)\n- RDMA/bnxt_re: Add send queue size check for variable wqe (git-fixes)\n- RDMA/bnxt_re: Avoid initializing the software queue for user queues (git-fixes)\n- RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters (git-fixes)\n- RDMA/bnxt_re: Disable use of reserved wqes (git-fixes)\n- RDMA/bnxt_re: Fix MSN table size for variable wqe mode (git-fixes)\n- RDMA/bnxt_re: Fix max SGEs for the Work Request (git-fixes)\n- RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes)\n- RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes)\n- RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes)\n- RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes)\n- RDMA/bnxt_re: Fix the max WQE size for static WQE support (git-fixes)\n- RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode (git-fixes)\n- RDMA/bnxt_re: Fix to drop reference to the mmap entry in case of error (git-fixes)\n- RDMA/bnxt_re: Fix to export port num to ib_query_qp (git-fixes)\n- RDMA/bnxt_re: Remove always true dattr validity check (git-fixes)\n- RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes)\n- RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes)\n- RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes)\n- RDMA/hns: Fix missing flush CQE for DWQE (git-fixes)\n- RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes)\n- RDMA/mlx4: Avoid false error about access to uninitialized gids array (git-fixes)\n- RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes)\n- RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (git-fixes)\n- RDMA/mlx5: Fix implicit ODP use after free (git-fixes)\n- RDMA/mlx5: Fix indirect mkey ODP page count (git-fixes)\n- RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes)\n- RDMA/rxe: Fix mismatched max_msg_sz (git-fixes)\n- RDMA/rxe: Fix the warning \"__rxe_cleanup+0x12c/0x170 [rdma_rxe]\" (git-fixes)\n- RDMA/srp: Fix error handling in srp_add_port (git-fixes)\n- RDMA/uverbs: Prevent integer overflow issue (git-fixes)\n- Revert \"HID: multitouch: Add support for lenovo Y9000P Touchpad\" (stable-fixes).\n- Revert \"block/mq-deadline: use correct way to throttling write requests\" (bsc#1234146).\n- Revert \"btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)\"\n- Revert \"drm/i915/dpt: Make DPT object unshrinkable\" (stable-fixes).\n- Revert \"igb: Disable threaded IRQ for igb_msix_other\" (git-fixes).\n- Revert \"mm, kmsan: fix infinite recursion due to RCU critical section\" (bsc#1230413)\n- Revert \"mm/sparsemem: fix race in accessing memory_section->usage\" (bsc#1230413)\n- Revert \"mm: prevent derefencing NULL ptr in pfn_section_valid()\" (bsc#1230413)\n- Revert \"mtd: spi-nor: core: replace dummy buswidth from addr to data\" (git-fixes).\n- Revert \"unicode: Do not special case ignorable code points\" (stable-fixes).\n- Revert \"usb: gadget: u_serial: Disable ep before setting port to null\n  to fix the crash caused by port being null\" (stable-fixes).\n- Revert 'arm64: Kconfig: Make SME depend on BROKEN for now' \n- Revert 0dd78566990 (\"Disable ceph (jsc#PED-7242)\") \n- SUNRPC: make sure cache entry active before cache_show (git-fixes).\n- SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes).\n- USB: core: Disable LPM only for non-suspended ports (git-fixes).\n- USB: serial: cp210x: add Phoenix Contact UPS Device (stable-fixes).\n- USB: serial: option: add MediaTek T7XX compositions (stable-fixes).\n- USB: serial: option: add MeiG Smart SLM770A (stable-fixes).\n- USB: serial: option: add MeiG Smart SRM815 (stable-fixes).\n- USB: serial: option: add Neoway N723-EA support (stable-fixes).\n- USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable-fixes).\n- USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes).\n- USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes).\n- USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (git-fixes).\n- USB: usblp: return error when setting unsupported protocol (git-fixes).\n- VFS: use system_unbound_wq for delayed_mntput (bsc#1234683).\n- VMCI: fix reference to ioctl-number.rst (git-fixes).\n- accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes).\n- accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE (stable-fixes).\n- accel/habanalabs: fix debugfs files permissions (stable-fixes).\n- accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable-fixes).\n- acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes).\n- af_unix: Call manage_oob() for every skb in unix_stream_read_generic() (bsc#1234725).\n- afs: Automatically generate trace tag enums (git-fixes).\n- afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY (git-fixes).\n- afs: Fix cleanup of immediately failed async calls (git-fixes).\n- afs: Fix directory format encoding struct (git-fixes).\n- afs: Fix missing subdir edit when renamed between parent dirs (git-fixes).\n- afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call (git-fixes).\n- afs: Fix the maximum cell name length (git-fixes).\n- amdgpu/uvd: get ring reference from rq scheduler (git-fixes).\n- arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773).\n- arch: Remove cmpxchg_double (bsc#1220773).\n- arch: consolidate arch_irq_work_raise prototypes (git-fixes).\n- arm64/sme: Move storage of reg_smidr to __cpuinfo_store_cpu() (git-fixes)\n- arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605)\n- arm64: Filter out SVE hwcaps when FEAT_SVE isn't implemented (git-fixes)\n- arm64: Force position-independent veneers (git-fixes).\n- arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes bsc#1236245)\n- arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).\n- arm64: dts: rockchip: Add sdmmc/sdio/emmc reset controls for RK3328 (git-fixes)\n- arm64: dts: rockchip: add hevc power domain clock to rk3328 (git-fixes).\n- arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma (git-fixes)\n- arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL (git-fixes).\n- arm64: tegra: Disable Tegra234 sce-fabric node (git-fixes)\n- arm64: tegra: Fix Tegra234 PCIe interrupt-map (git-fixes)\n- arm64: tegra: Fix typo in Tegra234 dce-fabric compatible (git-fixes)\n- ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf() (stable-fixes).\n- autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes).\n- batman-adv: Do not let TT changes list grows indefinitely (git-fixes).\n- batman-adv: Do not send uninitialized TT changes (git-fixes).\n- batman-adv: Remove uninitialized data in full table TT response (git-fixes).\n- blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726).\n- blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139).\n- blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144).\n- blk-iocost: do not WARN if iocg was already offlined (bsc#1234147).\n- blk-throttle: fix lockdep warning of \"cgroup_mutex or RCU read lock required!\" (bsc#1234140).\n- block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator() (bsc#1234149).\n- block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150).\n- block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160).\n- block, bfq: fix procress reference leakage for bfqq in merge chain (bsc#1234280).\n- block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279).\n- block/mq-deadline: Fix the tag reservation code (bsc#1234148).\n- block: Call .limit_depth() after .hctx has been set (bsc#1234148).\n- block: Fix where bio IO priority gets set (bsc#1234145).\n- block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142).\n- block: update the stable_writes flag in bdev_add (bsc#1234141).\n- bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (git-fixes)\n- bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes).\n- bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes).\n- bnxt_en: Set backplane link modes correctly for ethtool (git-fixes).\n- bpf, x86: Fix PROBE_MEM runtime load check (git-fixes).\n- bpf: verifier: prevent userspace memory access (git-fixes).\n- btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235445).\n- btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)\n- btrfs: fix use-after-free waiting for encoded read endios (bsc#1235445).\n- bus: mhi: host: Free mhi_buf vector inside mhi_alloc_bhie_table() (git-fixes).\n- can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes).\n- can: j1939: fix error in J1939 documentation (stable-fixes).\n- ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592).\n- checkpatch: always parse orig_commit in fixes tag (git-fixes).\n- checkpatch: check for missing Fixes tags (stable-fixes).\n- cleanup: Add conditional guard support (stable-fixes).\n- cleanup: Adjust scoped_guard() macros to avoid potential warning (stable-fixes).\n- cleanup: Remove address space of returned pointer (git-fixes).\n- clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git-fixes).\n- clocksource/drivers:sp804: Make user selectable (git-fixes).\n- counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes).\n- counter: ti-ecap-capture: Add check for clk_enable() (git-fixes).\n- cpufreq: ACPI: Fix max-frequency computation (git-fixes).\n- cpufreq: Do not unregister cpufreq cooling on CPU hotplug (git-fixes).\n- cpufreq: amd-pstate: remove global header file (git-fixes).\n- cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo() (bsc#1234619).\n- cpufreq: intel_pstate: Do not update global.turbo_disabled after initialization (bsc#1234619).\n- cpufreq: intel_pstate: Drop redundant locking from intel_pstate_driver_cleanup() (bsc#1234619).\n- cpufreq: intel_pstate: Fix unchecked HWP MSR access (bsc#1234619).\n- cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller (bsc#1234619).\n- cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations (bsc#1234619).\n- cpufreq: intel_pstate: Make hwp_notify_lock a raw spinlock (git-fixes).\n- cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE() (bsc#1234619).\n- cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo() (bsc#1234619).\n- cpufreq: intel_pstate: Refine computation of P-state for given frequency (bsc#1234619).\n- cpufreq: intel_pstate: Replace three global.turbo_disabled checks (bsc#1234619).\n- cpufreq: intel_pstate: Revise global turbo disable check (bsc#1234619).\n- cpufreq: intel_pstate: Simplify spinlock locking (bsc#1234619).\n- cpufreq: intel_pstate: Update the maximum CPU frequency consistently (bsc#1234619).\n- cpufreq: intel_pstate: Use HWP to initialize ITMT if CPPC is missing (git-fixes).\n- cpufreq: intel_pstate: Use __ro_after_init for three variables (bsc#1234619).\n- cpufreq: intel_pstate: Wait for canceled delayed work to complete (bsc#1234619).\n- cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back (git-fixes).\n- cpuidle: Avoid potential overflow in integer multiplication (git-fixes).\n- cpupower: fix TSC MHz calculation (git-fixes).\n- crypto: caam - use JobR's space to access page 0 regs (git-fixes).\n- crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (git-fixes).\n- crypto: ecdsa - Avoid signed integer overflow on signature decoding (stable-fixes).\n- crypto: ecdsa - Convert byte arrays with key coordinates to digits (stable-fixes).\n- crypto: ecdsa - Rename keylen to bufsize where necessary (stable-fixes).\n- crypto: ecdsa - Use ecc_digits_from_bytes to convert signature (stable-fixes).\n- crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async' (git-fixes).\n- crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto() (git-fixes).\n- crypto: qat - disable IOV in adf_dev_stop() (git-fixes).\n- crypto: qce - fix goto jump in error path (git-fixes).\n- crypto: qce - fix priority to be less than ARMv8 CE (git-fixes).\n- crypto: qce - unregister previously registered algos in error path (git-fixes).\n- crypto: x86/sha256 - Add parentheses around macros' single arguments (stable-fixes).\n- cyrpto/b128ops: Remove struct u128 (bsc#1220773).\n- devcoredump: cleanup some comments (git-fixes).\n- devlink: Fix length of eswitch inline-mode (git-fixes).\n- dlm: fix possible lkb_resource null dereference (git-fixes).\n- dma-buf: fix dma_fence_array_signaled v4 (stable-fixes).\n- dma-debug: fix a possible deadlock on radix_lock (stable-fixes).\n- dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes).\n- dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git-fixes).\n- dmaengine: dw: Select only supported masters for ACPI devices (git-fixes).\n- dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357).\n- dmaengine: mv_xor: fix child node refcount handling in early exit (git-fixes).\n- dmaengine: tegra: Return correct DMA status when paused (git-fixes).\n- dmaengine: ti: edma: fix OF node reference leaks in edma_driver (git-fixes).\n- docs: media: update location of the media patches (stable-fixes).\n- docs: power: Fix footnote reference for Toshiba Satellite P10-554 (git-fixes).\n- driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link (stable-fixes).\n- driver core: class: Fix wild pointer dereferences in API class_dev_iter_next() (git-fixes).\n- driver core: fw_devlink: Improve logs for cycle detection (stable-fixes).\n- driver core: fw_devlink: Stop trying to optimize cycle detection logic (git-fixes).\n- drivers/card_reader/rtsx_usb: Restore interrupt based detection (git-fixes).\n- drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path (git-fixes).\n- drm/amd/display: Add HDR workaround for specific eDP (stable-fixes).\n- drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes).\n- drm/amd/display: Add check for granularity in dml ceil/floor helpers (stable-fixes).\n- drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).\n- drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes).\n- drm/amd/display: Fix DSC-re-computing (stable-fixes).\n- drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-fixes).\n- drm/amd/display: Fix incorrect DSC recompute trigger (stable-fixes).\n- drm/amd/display: Revert Avoid overflow assignment (stable-fixes).\n- drm/amd/display: Use HW lock mgr for PSR1 (stable-fixes).\n- drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable-fixes).\n- drm/amd/display: increase MAX_SURFACES to the value supported by hw (stable-fixes).\n- drm/amd/pm: Fix an error handling path in vega10_enable_se_edc_force_stall_config() (git-fixes).\n- drm/amd/pm: fix the high voltage issue after unload (stable-fixes).\n- drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu v13.0.7 (stable-fixes).\n- drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes).\n- drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes).\n- drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes).\n- drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes).\n- drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes).\n- drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes).\n- drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend (stable-fixes).\n- drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes).\n- drm/amdgpu/vcn: reset fw_shared under SRIOV (git-fixes).\n- drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3 (stable-fixes).\n- drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes).\n- drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes).\n- drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (git-fixes).\n- drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).\n- drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes).\n- drm/amdgpu: always sync the GFX pipe on ctx switch (stable-fixes).\n- drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih (stable-fixes).\n- drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes).\n- drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-fixes).\n- drm/amdgpu: do not access invalid sched (git-fixes).\n- drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).\n- drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-fixes).\n- drm/amdgpu: fix usage slab after free (stable-fixes).\n- drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).\n- drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable-fixes).\n- drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes).\n- drm/amdgpu: simplify return statement in amdgpu_ras_eeprom_init (git-fixes).\n- drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes).\n- drm/amdgpu: tear down ttm range manager for doorbell in amdgpu_ttm_fini() (git-fixes).\n- drm/amdkfd: Correct the migration DMA map direction (stable-fixes).\n- drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).\n- drm/amdkfd: Use device based logging for errors (stable-fixes).\n- drm/amdkfd: Use the correct wptr size (stable-fixes).\n- drm/amdkfd: fixed page fault when enable MES shader debugger (git-fixes).\n- drm/amdkfd: pause autosuspend when creating pdd (stable-fixes).\n- drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes).\n- drm/bridge: it6505: Change definition of AUX_FIFO_MAX_SIZE (git-fixes).\n- drm/bridge: it6505: Enable module autoloading (stable-fixes).\n- drm/bridge: it6505: Fix inverted reset polarity (git-fixes).\n- drm/bridge: it6505: update usleep_range for RC circuit charge time (stable-fixes).\n- drm/display: Fix building with GCC 15 (stable-fixes).\n- drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (stable-fixes).\n- drm/dp_mst: Fix MST sideband message body length check (stable-fixes).\n- drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes).\n- drm/dp_mst: Verify request type in the corresponding down message reply (stable-fixes).\n- drm/etnaviv: Fix page property being used for non writecombine buffers (git-fixes).\n- drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes).\n- drm/i915/dg1: Fix power gate sequence (git-fixes).\n- drm/i915/fb: Relax clear color alignment to 64 bytes (stable-fixes).\n- drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes).\n- drm/i915: Fix memory leak by correcting cache object name in error handler (git-fixes).\n- drm/mcde: Enable module autoloading (stable-fixes).\n- drm/mediatek: Add return value check when reading DPCD (git-fixes).\n- drm/mediatek: Add support for 180-degree rotation in the display driver (git-fixes).\n- drm/mediatek: Fix YCbCr422 color format issue for DP (git-fixes).\n- drm/mediatek: Fix mode valid issue for dp (git-fixes).\n- drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err (git-fixes).\n- drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188 (git-fixes).\n- drm/mediatek: stop selecting foreign drivers (git-fixes).\n- drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable-fixes).\n- drm/msm/dp: set safe_to_exit_level before printing it (git-fixes).\n- drm/msm/dpu: link DSPP_2/_3 blocks on SC8180X (git-fixes).\n- drm/msm/dpu: link DSPP_2/_3 blocks on SM8150 (git-fixes).\n- drm/msm/dpu: link DSPP_2/_3 blocks on SM8250 (git-fixes).\n- drm/msm/dpu: link DSPP_2/_3 blocks on SM8350 (git-fixes).\n- drm/msm/dpu: link DSPP_2/_3 blocks on SM8550 (git-fixes).\n- drm/msm: Check return value of of_dma_configure() (git-fixes).\n- drm/msm: do not clean up priv->kms prematurely (git-fixes).\n- drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes).\n- drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git-fixes).\n- drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes).\n- drm/printer: Allow NULL data in devcoredump printer (stable-fixes).\n- drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-fixes).\n- drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check() (stable-fixes).\n- drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes).\n- drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes).\n- drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes).\n- drm/rcar-du: dsi: Fix PHY lock bit check (git-fixes).\n- drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event() (git-fixes).\n- drm/rockchip: vop2: Check linear format for Cluster windows on rk3566/8 (git-fixes).\n- drm/rockchip: vop2: Fix cluster windows alpha ctrl regsiters offset (git-fixes).\n- drm/rockchip: vop2: Fix the mixer alpha setup for layer 0 (git-fixes).\n- drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes).\n- drm/tidss: Clear the interrupt status for interrupts being disabled (git-fixes).\n- drm/tidss: Fix issue in irq handling causing irq-flood issue (git-fixes).\n- drm/v3d: Assign job pointer to NULL before signaling the fence (git-fixes).\n- drm/v3d: Ensure job pointer is set to NULL after job completion (git-fixes).\n- drm/v3d: Stop active perfmon if it is being destroyed (git-fixes).\n- drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes).\n- drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes).\n- drm/vmwgfx: Add new keep_resv BO param (git-fixes).\n- drm: adv7511: Drop dsi single lane support (git-fixes).\n- drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes).\n- drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition (stable-fixes).\n- drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes).\n- drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes).\n- erofs: avoid debugging output for (de)compressed data (git-fixes).\n- exfat: ensure that ctime is updated whenever the mtime is (git-fixes).\n- exfat: fix the infinite loop in __exfat_free_cluster() (git-fixes).\n- exfat: fix the infinite loop in exfat_readdir() (git-fixes).\n- exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes).\n- ext4: add a new helper to check if es must be kept (bsc#1234170).\n- ext4: add correct group descriptors and reserved GDT blocks to system zone (bsc#1234164).\n- ext4: add missed brelse in update_backups (bsc#1234171).\n- ext4: allow for the last group to be marked as trimmed (bsc#1234278).\n- ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191).\n- ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180).\n- ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193).\n- ext4: avoid overlapping preallocations due to overflow (bsc#1234162).\n- ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192).\n- ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187).\n- ext4: check the extent status again before inserting delalloc block (bsc#1234186).\n- ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard (bsc#1234190).\n- ext4: convert to exclusive lock while inserting delalloc extents (bsc#1234178).\n- ext4: correct best extent lstart adjustment logic (bsc#1234179).\n- ext4: correct grp validation in ext4_mb_good_group (bsc#1234163).\n- ext4: correct return value of ext4_convert_meta_bg (bsc#1234172).\n- ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178).\n- ext4: correct the start block of counting reserved clusters (bsc#1234169).\n- ext4: do not let fstrim block system suspend (bsc#1234166).\n- ext4: do not trim the group with corrupted block bitmap (bsc#1234177).\n- ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170).\n- ext4: factor out a common helper to query extent map (bsc#1234186).\n- ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176).\n- ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space() (bsc#1234188).\n- ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit() (bsc#1234188).\n- ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list() (bsc#1234188).\n- ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954).\n- ext4: fix potential unnitialized variable (bsc#1234183).\n- ext4: fix race between writepages and remount (bsc#1234168).\n- ext4: fix rec_len verify error (bsc#1234167).\n- ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170).\n- ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185).\n- ext4: forbid commit inconsistent quota data when errors=remount-ro (bsc#1234178).\n- ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170).\n- ext4: make ext4_es_insert_extent() return void (bsc#1234170).\n- ext4: make ext4_es_remove_extent() return void (bsc#1234170).\n- ext4: make ext4_zeroout_es() return void (bsc#1234170).\n- ext4: make sure allocate pending entry not fail (bsc#1234170).\n- ext4: mark buffer new if it is unwritten to avoid stale data exposure (bsc#1234175).\n- ext4: move 'ix' sanity check to corrent position (bsc#1234174).\n- ext4: move setting of trimmed bit into ext4_try_to_trim_range() (bsc#1234165).\n- ext4: nested locking for xattr inode (bsc#1234189).\n- ext4: propagate errors from ext4_find_extent() in ext4_insert_range() (bsc#1234194).\n- ext4: refactor ext4_da_map_blocks() (bsc#1234178).\n- ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks (bsc#1234173).\n- ext4: remove the redundant folio_wait_stable() (bsc#1234184).\n- ext4: set the type of max_zeroout to unsigned int to avoid overflow (bsc#1234182).\n- ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow (bsc#1234181).\n- ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170).\n- ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170).\n- ext4: using nofail preallocation in ext4_es_insert_delayed_block() (bsc#1234170).\n- ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170).\n- ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170).\n- fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device() (git-fixes).\n- filemap: Fix bounds checking in filemap_read() (bsc#1234209).\n- filemap: add a per-mapping stable writes flag (bsc#1234141).\n- firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes).\n- fs-writeback: do not requeue a clean inode having skipped pages (bsc#1234200).\n- fs/writeback: bail out if there is no more inodes for IO and queued once (bsc#1234207).\n- fsnotify: fix sending inotify event with unexpected filename (bsc#1234198).\n- genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git-fixes).\n- genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git-fixes).\n- genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes).\n- genirq: Make handle_enforce_irqctx() unconditionally available (git-fixes).\n- genksyms: fix memory leak when the same symbol is added from source (git-fixes).\n- genksyms: fix memory leak when the same symbol is read from *.symref file (git-fixes).\n- gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (git-fixes).\n- gpio: grgpio: Add NULL check in grgpio_probe (git-fixes).\n- gpio: grgpio: use a helper variable to store the address of ofdev->dev (stable-fixes).\n- gpio: mxc: remove dead code after switch to DT-only (git-fixes).\n- gpio: xilinx: Convert gpio_lock to raw spinlock (git-fixes).\n- hfsplus: do not query the device logical block size multiple times (git-fixes).\n- hvc/xen: fix console unplug (git-fixes).\n- hvc/xen: fix error path in xen_hvc_init() to always register frontend driver (git-fixes).\n- hvc/xen: fix event channel handling for secondary consoles (git-fixes).\n- hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur (git-fixes).\n- hwmon: (drivetemp) Set scsi command timeout to 10s (stable-fixes).\n- hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable-fixes).\n- hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes).\n- hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes).\n- hwmon: (tmp513) Do not use \"proxy\" headers (stable-fixes).\n- hwmon: (tmp513) Fix Current Register value interpretation (git-fixes).\n- hwmon: (tmp513) Fix division of negative numbers (git-fixes).\n- hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers (git-fixes).\n- hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers (git-fixes).\n- hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes).\n- hwmon: (tmp513) Use SI constants from units.h (stable-fixes).\n- hyperv: Do not overlap the hvcall IO areas in get_vtl() (git-fixes).\n- i2c: core: fix reference leak in i2c_register_adapter() (git-fixes).\n- i2c: i801: Add support for Intel Arrow Lake-H (stable-fixes).\n- i2c: i801: Add support for Intel Panther Lake (stable-fixes).\n- i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git-fixes).\n- i2c: microchip-core: actually use repeated sends (git-fixes).\n- i2c: microchip-core: fix \"ghost\" detections (git-fixes).\n- i2c: mux: demux-pinctrl: check initial mux selection, too (git-fixes).\n- i2c: pnx: Fix timeout in wait functions (git-fixes).\n- i2c: rcar: fix NACK handling when being a target (git-fixes).\n- i2c: riic: Always round-up when calculating bus period (git-fixes).\n- i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros (stable-fixes).\n- i40e: Fix handling changed priv flags (git-fixes).\n- i915/guc: Accumulate active runtime on gt reset (git-fixes).\n- i915/guc: Ensure busyness counter increases motonically (git-fixes).\n- i915/guc: Reset engine utilization buffer before registration (git-fixes).\n- ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980).\n- ice: Unbind the workqueue (bsc#1234989)\n- ice: change q_index variable type to s16 to store -1 value (git-fixes).\n- ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes).\n- ice: fix PHY Clock Recovery availability check (git-fixes).\n- idpf: add support for SW triggered interrupts (bsc#1235507).\n- idpf: enable WB_ON_ITR (bsc#1235507).\n- idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).\n- ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe() (git-fixes).\n- igb: Fix potential invalid memory access in igb_init_module() (git-fixes).\n- iio: adc: ad7124: Disable all channels at probe time (git-fixes).\n- iio: adc: ad_sigma_delta: Handle CS assertion as intended in ad_sd_read_reg_raw() (git-fixes).\n- iio: adc: at91: call input_free_device() on allocated iio_dev (git-fixes).\n- iio: adc: rockchip_saradc: fix information leak in triggered buffer (git-fixes).\n- iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep() (git-fixes).\n- iio: adc: ti-ads8688: fix information leak in triggered buffer (git-fixes).\n- iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer (git-fixes).\n- iio: gyro: fxas21002c: Fix missing data update in trigger handler (git-fixes).\n- iio: iio-mux: kzalloc instead of devm_kzalloc to ensure page alignment (git-fixes).\n- iio: imu: kmx61: fix information leak in triggered buffer (git-fixes).\n- iio: inkern: call iio_device_put() only on mapped devices (git-fixes).\n- iio: light: as73211: fix channel handling in only-color triggered buffer (git-fixes).\n- iio: light: vcnl4035: fix information leak in triggered buffer (git-fixes).\n- iio: magnetometer: yas530: use signed integer type for clamp limits (git-fixes).\n- iio: pressure: zpa2326: fix information leak in triggered buffer (git-fixes).\n- iio: test : check null return of kunit_kmalloc in iio_rescale_test_scale (git-fixes).\n- instrumentation: Wire up cmpxchg128() (bsc#1220773).\n- intel_th: core: fix kernel-doc warnings (git-fixes).\n- io_uring/rw: avoid punting to io-wq directly (git-fixes).\n- io_uring/tctx: work around xa_store() allocation error issue (git-fixes).\n- io_uring: Fix registered ring file refcount leak (git-fixes).\n- io_uring: always lock __io_cqring_overflow_flush (git-fixes).\n- io_uring: check if iowq is killed before queuing (git-fixes).\n- iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git-fixes).\n- ipmi: ipmb: Add check devm_kasprintf() returned value (git-fixes).\n- ipmi: ssif_bmc: Fix new request loss when bmc ready for a response (git-fixes).\n- irqchip/gic-v3: Force propagation of the active state with a read-back (stable-fixes).\n- irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base (stable-fixes).\n- irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes).\n- isofs: handle CDs with bad root inode but good Joliet root directory (bsc#1234199).\n- ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes).\n- ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes).\n- jffs2: Fix rtime decompressor (git-fixes).\n- jffs2: Prevent rtime decompress memory corruption (git-fixes).\n- jffs2: fix use of uninitialized variable (git-fixes).\n- jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git-fixes).\n- jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes).\n- jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes).\n- jfs: fix shift-out-of-bounds in dbSplit (git-fixes).\n- jfs: xattr: check invalid xattr size more strictly (git-fixes).\n- kABI workaround for struct auto_pin_cfg_item change (git-fixes).\n- kABI workaround for struct drm_dp_mst_topology_mgr (git-fixes).\n- kabi/severities: make vcap_find_actionfield PASS (bsc#1220773)\n- kasan: make report_lock a raw spinlock (git-fixes).\n- kconfig: fix file name in warnings when loading KCONFIG_DEFCONFIG_LIST (git-fixes).\n- kdb: Fix buffer overflow during tab-complete (bsc#1234652).\n- kdb: Fix console handling when editing and tab-completing commands (bsc#1234655).\n- kdb: Merge identical case statements in kdb_read() (bsc#1234657).\n- kdb: Use format-specifiers rather than memset() for padding in kdb_read() (bsc#1234658).\n- kdb: Use format-strings rather than '\\0' injection in kdb_read() (bsc#1234654).\n- kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654).\n- kdb: address -Wformat-security warnings (bsc#1234659).\n- kgdb: Flush console before entering kgdb on panic (bsc#1234651).\n- kheaders: Ignore silly-rename files (stable-fixes).\n- ktest.pl: Avoid false positives with grub2 skip regex (stable-fixes).\n- ktest.pl: Check kernelrelease return in get_version (git-fixes).\n- ktest.pl: Fix typo \"accesing\" (git-fixes).\n- ktest.pl: Fix typo in comment (git-fixes).\n- ktest.pl: Remove unused declarations in run_bisect_test function (git-fixes).\n- ktest: force $buildonly = 1 for 'make_warnings_file' test type (stable-fixes).\n- landlock: Handle weird files (git-fixes).\n- latencytop: use correct kernel-doc format for func params (git-fixes).\n- leds: class: Protect brightness_show() with led_cdev->led_access mutex (stable-fixes).\n- leds: lp8860: Write full EEPROM, not only half of it (git-fixes).\n- leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata() (git-fixes).\n- lib/inflate.c: remove dead code (git-fixes).\n- lib/stackdepot: print disabled message only if truly disabled (git-fixes).\n- linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes).\n- locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128() (bsc#1220773 git-fix).\n- loop: fix the the direct I/O support check when used on top of block devices (bsc#1234143).\n- mac80211: fix user-power when emulating chanctx (stable-fixes).\n- mac802154: check local interfaces before deleting sdata list (stable-fixes).\n- mailbox: pcc: Add support for platform notification handling (stable-fixes).\n- mailbox: pcc: Support shared interrupt for multiple subspaces (stable-fixes).\n- mailbox: tegra-hsp: Clear mailbox before using message (git-fixes).\n- maple_tree: simplify split calculation (git-fixes).\n- media: camif-core: Add check for clk_enable() (git-fixes).\n- media: ccs: Clean up parsed CCS static data on parse failure (git-fixes).\n- media: ccs: Fix CCS static data parsing for large block sizes (git-fixes).\n- media: ccs: Fix cleanup order in ccs_probe() (git-fixes).\n- media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable-fixes).\n- media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git-fixes).\n- media: dvb-usb-v2: af9035: fix ISO C90 compilation error on af9035_i2c_master_xfer (git-fixes).\n- media: i2c: imx412: Add missing newline to prints (git-fixes).\n- media: i2c: ov9282: Correct the exposure offset (git-fixes).\n- media: imx-jpeg: Fix potential error pointer dereference in detach_pm() (git-fixes).\n- media: imx296: Add standby delay during probe (git-fixes).\n- media: lmedm04: Handle errors for lme2510_int_read (git-fixes).\n- media: marvell: Add check for clk_enable() (git-fixes).\n- media: mc: fix endpoint iteration (git-fixes).\n- media: mipi-csis: Add check for clk_enable() (git-fixes).\n- media: nxp: imx8-isi: fix v4l2-compliance test errors (git-fixes).\n- media: ov5640: fix get_light_freq on auto (git-fixes).\n- media: rc: iguanair: handle timeouts (git-fixes).\n- media: rkisp1: Fix unused value issue (git-fixes).\n- media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera (stable-fixes).\n- media: uvcvideo: Fix crash during unbind if gpio unit is in use (git-fixes).\n- media: uvcvideo: Fix double free in error path (git-fixes).\n- media: uvcvideo: Fix event flags in uvc_ctrl_send_events (git-fixes).\n- media: uvcvideo: Force UVC version to 1.0a for 0408:4035 (stable-fixes).\n- media: uvcvideo: Only save async fh if success (git-fixes).\n- media: uvcvideo: Propagate buf->error to userspace (git-fixes).\n- media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes).\n- media: uvcvideo: Remove dangling pointers (git-fixes).\n- media: uvcvideo: Remove redundant NULL assignment (git-fixes).\n- media: uvcvideo: Support partial control reads (git-fixes).\n- memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled (git-fixes).\n- memory-failure: use a folio in me_huge_page() (git-fixes).\n- memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() (git-fixes).\n- mfd: da9052-spi: Change read-mask to write-mask (git-fixes).\n- mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes).\n- mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes).\n- mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes).\n- misc: fastrpc: Deregister device nodes properly in error scenarios (git-fixes).\n- misc: fastrpc: Fix copy buffer page size (git-fixes).\n- misc: fastrpc: Fix registered buffer page address (git-fixes).\n- misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling (git-fixes).\n- misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set config (git-fixes).\n- misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors (git-fixes).\n- mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).\n- mm,page_owner: do not remove __GFP_NOLOCKDEP in add_stack_record_to_list (git-fixes).\n- mm/filemap: avoid buffered read/write race to read inconsistent data (bsc#1234204).\n- mm/memory-failure: cast index to loff_t before shifting it (git-fixes).\n- mm/memory-failure: check the mapcount of the precise page (git-fixes).\n- mm/memory-failure: fix crash in split_huge_page_to_list from soft_offline_page (git-fixes).\n- mm/memory-failure: pass the folio and the page to collect_procs() (git-fixes).\n- mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu (git-fixes).\n- mm/memory_hotplug: add missing mem_hotplug_lock (git-fixes).\n- mm/memory_hotplug: fix error handling in add_memory_resource() (git-fixes).\n- mm/memory_hotplug: prevent accessing by index=-1 (git-fixes).\n- mm/memory_hotplug: use pfn math in place of direct struct page manipulation (git-fixes).\n- mm/migrate: correct nr_failed in migrate_pages_sync() (git-fixes).\n- mm/migrate: fix deadlock in migrate_pages_batch() on large folios (git-fixes).\n- mm/migrate: putback split folios when numa hint migration fails (git-fixes).\n- mm/migrate: split source folio if it is on deferred split list (git-fixes).\n- mm/page_owner: remove free_ts from page_owner output (git-fixes).\n- mm/readahead: do not allow order-1 folio (bsc#1234205).\n- mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208).\n- mm/rodata_test: use READ_ONCE() to read const variable (git-fixes).\n- mm: convert DAX lock/unlock page to lock/unlock folio (git-fixes).\n- mm: memory-failure: ensure moving HWPoison flag to the raw error pages (git-fixes).\n- mm: memory-failure: fetch compound head after extra page refcnt is held (git-fixes).\n- mm: memory-failure: fix potential page refcnt leak in memory_failure() (git-fixes).\n- mm: memory-failure: fix race window when trying to get hugetlb folio (git-fixes).\n- mm: memory-failure: remove unneeded PageHuge() check (git-fixes).\n- mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).\n- mmc: core: Add SD card quirk for broken poweroff notification (stable-fixes).\n- mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes).\n- mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes).\n- mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes).\n- mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet (stable-fixes).\n- mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git-fixes).\n- modpost: fix the missed iteration for the max bit in do_input() (git-fixes).\n- mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes).\n- mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- mtd: hyperbus: rpc-if: Convert to platform remove callback returning void (stable-fixes).\n- mtd: onenand: Fix uninitialized retlen in do_otp_read() (git-fixes).\n- mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes).\n- mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes).\n- mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes).\n- mtd: spinand: Remove write_enable_op() in markbad() (git-fixes).\n- net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes).\n- net/ipv6: release expired exception dst cached in socket (bsc#1216813).\n- net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).\n- net/mlx5e: Remove workaround to avoid syndrome for internal port (git-fixes).\n- net/mlx5e: clear xdp features on non-uplink representors (git-fixes).\n- net/qed: allow old cards not supporting \"num_images\" to work (git-fixes).\n- net/rose: prevent integer overflows in rose_setsockopt() (git-fixes).\n- net: Return error from sk_stream_wait_connect() if sk_wait_event() fails (git-fixes).\n- net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).\n- net: phy: c45-tjaxx: add delay between MDIO write and read in soft_reset (git-fixes).\n- net: rose: fix timer races against user threads (git-fixes).\n- net: usb: qmi_wwan: add Quectel RG650V (stable-fixes).\n- net: usb: qmi_wwan: add Telit FE910C04 compositions (stable-fixes).\n- net: usb: rtl8150: enable basic endpoint checking (git-fixes).\n- net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init() (git-fixes).\n- net: wwan: t7xx: Fix FSM command timeout issue (git-fixes).\n- netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778 ZDI-24-1454).\n- nfs: ignore SB_RDONLY when mounting nfs (git-fixes).\n- nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes).\n- nfsd: make sure exp active before svc_export_show (git-fixes).\n- nfsd: release svc_expkey/svc_export with rcu_work (git-fixes).\n- nfsd: restore callback functionality for NFSv4.0 (git-fixes).\n- nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git-fixes).\n- nilfs2: fix possible int overflows in nilfs_fiemap() (git-fixes).\n- nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes).\n- nilfs2: prevent use of deleted inode (git-fixes).\n- nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes).\n- nvme-rdma: unquiesce admin_q before destroy it (git-fixes).\n- nvme-tcp: Fix I/O queue cpu spreading for multiple controllers (git-fixes).\n- nvme-tcp: fix the memleak while create new ctrl failed (git-fixes).\n- nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes).\n- nvme: Add error check for xa_store in nvme_get_effects_log (git-fixes).\n- nvme: Add error path for xa_store in nvme_init_effects (git-fixes).\n- nvme: apple: fix device reference counting (git-fixes).\n- nvme: fix bogus kzalloc() return check in nvme_init_effects_log() (git-fixes).\n- nvme: fix metadata handling in nvme-passthrough (git-fixes).\n- nvmet-loop: avoid using mutex in IO hotpath (git-fixes).\n- nvmet: propagate npwg topology (git-fixes).\n- ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes).\n- ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes).\n- of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one() (git-fixes).\n- of: Fix error path in of_parse_phandle_with_args_map() (git-fixes).\n- of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git-fixes).\n- of: address: Report error on resource bounds overflow (stable-fixes).\n- padata: add pd get/put refcnt helper (git-fixes).\n- padata: avoid UAF for reorder_work (git-fixes).\n- padata: fix UAF in padata_reorder (git-fixes).\n- parisc: Raise minimal GCC version (bsc#1220773).\n- parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix).\n- percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773).\n- percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg() (bsc#1220773 git-fix).\n- percpu: Wire up cmpxchg128 (bsc#1220773).\n- phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes).\n- phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git-fixes).\n- phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider (git-fixes).\n- phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git-fixes).\n- phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes).\n- phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes).\n- phy: rockchip: naneng-combphy: fix phy reset (git-fixes).\n- phy: usb: Toggle the PHY power during init (git-fixes).\n- pinctrl: amd: Take suspend type into consideration which pins are non-wake (git-fixes).\n- pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (git-fixes).\n- pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes).\n- pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes).\n- pinctrl: samsung: fix fwnode refcount cleanup if platform_get_irq_optional() fails (git-fixes).\n- pinmux: Use sequential access to access desc->pinmux data (stable-fixes).\n- platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).\n- platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it (git-fixes).\n- platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1225897).\n- platform/x86/intel/tpmi: Add defines to get version information (bsc#1225897).\n- platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes).\n- platform/x86: dell-smbios-base: Extends support to Alienware products (stable-fixes).\n- platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable-fixes).\n- platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect fan speed (stable-fixes).\n- pm:cpupower: Add missing powercap_set_enabled() stub function (git-fixes).\n- power: ip5xxx_power: Fix return value on ADC read errors (git-fixes).\n- power: supply: gpio-charger: Fix set charge current limits (git-fixes).\n- powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active (bsc#1235108).\n- powerpc/iommu: Move pSeries specific functions to pseries/iommu.c (bsc#1220711 ltc#205755).\n- powerpc/iommu: Only build sPAPR access functions on pSeries (bsc#1220711 ltc#205755).\n- powerpc/powernv/pci: Remove MVE code (bsc#1220711 ltc#205755).\n- powerpc/powernv/pci: Remove ioda1 support (bsc#1220711 ltc#205755).\n- powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711 ltc#205755).\n- powerpc/pseries/eeh: Fix get PE state translation (bsc#1215199).\n- powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531).\n- powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825).\n- pps: add an error check in parport_attach (git-fixes).\n- pps: remove usage of the deprecated ida_simple_xx() API (stable-fixes).\n- printk: Add is_printk_legacy_deferred() (bsc#1236733).\n- printk: Defer legacy printing when holding printk_cpu_sync (bsc#1236733).\n- proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git-fixes).\n- pwm: stm32-lp: Add check for clk_enable() (git-fixes).\n- pwm: stm32: Add check for clk_enable() (git-fixes).\n- quota: Fix rcu annotations of inode dquot pointers (bsc#1234197).\n- quota: explicitly forbid quota files from being encrypted (bsc#1234196).\n- quota: flush quota_release_work upon quota writeback (bsc#1234195).\n- quota: simplify drop_dquot_ref() (bsc#1234197).\n- rcu-tasks: Pull sampling of ->percpu_dequeue_lim out of loop (git-fixes)\n- rcu/tree: Defer setting of jiffies during stall reset (git-fixes)\n- rcu: Dump memory object info if callback function is invalid (git-fixes)\n- rcu: Eliminate rcu_gp_slow_unregister() false positive (git-fixes)\n- rcuscale: Move rcu_scale_writer() (git-fixes)\n- rdma/cxgb4: Prevent potential integer overflow on 32bit (git-fixes)\n- readahead: use ilog2 instead of a while loop in page_cache_ra_order() (bsc#1234208).\n- regmap: Use correct format specifier for logging range errors (stable-fixes).\n- regulator: core: Add missing newline character (git-fixes).\n- regulator: of: Implement the unwind path of of_regulator_match() (git-fixes).\n- regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes).\n- remoteproc: core: Fix ida_free call while not allocated (git-fixes).\n- rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes).\n- rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (git-fixes).\n- rtc: zynqmp: Fix optional clock name property (git-fixes).\n- s390/cio: Do not unregister the subchannel based on DNV (git-fixes).\n- s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773).\n- s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes).\n- s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes).\n- s390/facility: Disable compile time optimization for decompressor code (git-fixes).\n- s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes).\n- s390/pageattr: Implement missing kernel_page_present() (git-fixes).\n- s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646)\n- samples/landlock: Fix possible NULL dereference in parse_path() (git-fixes).\n- scatterlist: fix incorrect func name in kernel-doc (git-fixes).\n- sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat (bsc#1235865).\n- sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat -kabi (bsc#1235865).\n- sched/numa: fix memory leak due to the overwritten vma->numab_state (git fixes (sched/numa)).\n- scsi: lpfc: Add handling for LS_RJT reason explanation authentication required (bsc#1235409).\n- scsi: lpfc: Add support for large fw object application layer reads (bsc#1235409).\n- scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask (bsc#1235409).\n- scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409).\n- scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage (bsc#1235409).\n- scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI registration (bsc#1235409).\n- scsi: lpfc: Redefine incorrect type in lpfc_create_device_data() (bsc#1235409).\n- scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only (bsc#1235409).\n- scsi: lpfc: Update definition of firmware configuration mbox cmds (bsc#1235409).\n- scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409).\n- scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406).\n- scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406).\n- scsi: qla2xxx: Fix use after free on unload (bsc#1235406).\n- scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt (bsc#1235406).\n- scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port (bsc#1235406).\n- scsi: qla2xxx: Supported speed displayed incorrectly for VPorts (bsc#1235406).\n- scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406).\n- scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).\n- scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (git-fixes).\n- seccomp: Stub for !CONFIG_SECCOMP (stable-fixes).\n- selftest: media_tests: fix trivial UAF typo (git-fixes).\n- selftests/alsa: Fix circular dependency involving global-timer (stable-fixes).\n- selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes).\n- selftests/landlock: Fix error message (git-fixes).\n- selftests/mm/cow: modify the incorrect checking parameters (git-fixes).\n- selftests/powerpc: Fix argument order to timer_sub() (git-fixes).\n- selftests: harness: fix printing of mismatch values in __EXPECT() (git-fixes).\n- selftests: mptcp: avoid spurious errors on disconnect (git-fixes).\n- selftests: tc-testing: reduce rshift value (stable-fixes).\n- selftests: timers: clocksource-switch: Adapt progress to kselftest framework (git-fixes).\n- selinux: Fix SCTP error inconsistency in selinux_socket_bind() (git-fixes).\n- serial: 8250: Adjust the timeout for FIFO mode (git-fixes).\n- serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes).\n- serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git-fixes).\n- serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes).\n- serial: 8250_fintek: Add support for F81216E (stable-fixes).\n- serial: Do not hold the port lock when setting rx-during-tx GPIO (git-fixes).\n- serial: amba-pl011: Fix RX stall when DMA is used (git-fixes).\n- serial: amba-pl011: Use port lock wrappers (stable-fixes).\n- serial: amba-pl011: fix build regression (git-fixes).\n- serial: do not use uninitialized value in uart_poll_init() (git-fixes).\n- serial: imx: only set receiver level if it is zero (git-fixes).\n- serial: imx: set receiver level before starting uart (git-fixes).\n- serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git-fixes).\n- serial: qcom-geni: disable interrupts during console writes (git-fixes).\n- serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git-fixes).\n- serial: qcom-geni: fix console corruption (git-fixes).\n- serial: qcom-geni: fix dma rx cancellation (git-fixes).\n- serial: qcom-geni: fix false console tx restart (git-fixes).\n- serial: qcom-geni: fix fifo polling timeout (git-fixes).\n- serial: qcom-geni: fix hard lockup on buffer flush (git-fixes).\n- serial: qcom-geni: fix polled console corruption (git-fixes).\n- serial: qcom-geni: fix polled console initialisation (git-fixes).\n- serial: qcom-geni: fix receiver enable (git-fixes).\n- serial: qcom-geni: fix shutdown race (git-fixes).\n- serial: qcom-geni: fix soft lockup on sw flow control and suspend (git-fixes).\n- serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes).\n- serial: qcom-geni: revert broken hibernation support (git-fixes).\n- serial: sh-sci: Do not probe the serial port if its slot in sci_ports[] is in use (git-fixes).\n- serial: sh-sci: Drop __initdata macro for port_cfg (git-fixes).\n- serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git-fixes).\n- serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled (git-fixes).\n- slub: Replace cmpxchg_double() (bsc#1220773).\n- slub: Replace cmpxchg_double() - KABI fix (bsc#1220773).\n- smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix issue described in bsc#1233642]\n- soc/fsl: cpm: qmc: Convert to platform remove callback returning void (stable-fixes).\n- soc: atmel: fix device_node release in atmel_soc_device_init() (git-fixes).\n- soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes).\n- soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version (stable-fixes).\n- soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version (stable-fixes).\n- soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes).\n- soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure (git-fixes).\n- soc: imx8m: Probe the SoC driver as platform driver (stable-fixes).\n- soc: mediatek: mtk-devapc: Fix leaking IO map on error paths (git-fixes).\n- soc: qcom: Add check devm_kasprintf() returned value (stable-fixes).\n- soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes).\n- soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git-fixes).\n- soc: qcom: smem_state: fix missing of_node_put in error path (git-fixes).\n- soc: qcom: socinfo: Avoid out of bounds read of serial number (git-fixes).\n- soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes).\n- sound: usb: enable DSD output for ddHiFi TC44C (stable-fixes).\n- sound: usb: format: do not warn that raw DSD is unsupported (stable-fixes).\n- spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user() (git-fixes).\n- spi: zynq-qspi: Add check for clk_enable() (git-fixes).\n- srcu: Fix srcu_struct node grpmask overflow on 64-bit systems (git-fixes)\n- srcu: Only accelerate on enqueue time (git-fixes)\n- stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).\n- stackdepot: respect __GFP_NOLOCKDEP allocation flag (git-fixes).\n- staging: iio: ad9832: Correct phase range check (git-fixes).\n- staging: iio: ad9834: Correct phase range check (git-fixes).\n- staging: media: imx: fix OF node leak in imx_media_add_of_subdevs() (git-fixes).\n- staging: media: max96712: fix kernel oops when removing module (git-fixes).\n- sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes).\n- sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes).\n- sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes).\n- supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645)\n- svcrdma: Address an integer overflow (git-fixes).\n- svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git-fixes).\n- swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes).\n- swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes).\n- thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes).\n- thermal: of: fix OF node leak in of_thermal_zone_find() (git-fixes).\n- thunderbolt: Add support for Intel Lunar Lake (stable-fixes).\n- thunderbolt: Add support for Intel Panther Lake-M/P (stable-fixes).\n- tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).\n- tools: Sync if_xdp.h uapi tooling header (git-fixes).\n- tools: hv: change permissions of NetworkManager configuration file (git-fixes).\n- tpm/eventlog: Limit memory allocations for event logs with excessive size (bsc#1233260 bsc#1233259 bsc#1232421).\n- tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259 bsc#1232421).\n- tpm_tis_spi: Release chip select when flow control fails (bsc#1234338)\n- tty: serial: 8250: Fix another runtime PM usage counter underflow (git-fixes).\n- tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes).\n- types: Introduce [us]128 (bsc#1220773).\n- ubifs: Correct the total block count by deducting journal reservation (git-fixes).\n- ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git-fixes).\n- ubifs: skip dumping tnc tree when zroot is null (git-fixes).\n- udf: Fix lock ordering in udf_evict_inode() (bsc#1234238).\n- udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243).\n- udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239).\n- udf: refactor inode_bmap() to handle error (bsc#1234242).\n- udf: refactor udf_current_aext() to handle error (bsc#1234240).\n- udf: refactor udf_next_aext() to handle error (bsc#1234241).\n- udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237).\n- uio: Fix return value of poll (git-fixes).\n- uio: uio_dmem_genirq: check the return value of devm_kasprintf() (git-fixes).\n- usb-storage: Add max sectors quirk for Nokia 208 (stable-fixes).\n- usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver (stable-fixes).\n- usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes).\n- usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes).\n- usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag (stable-fixes).\n- usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable-fixes).\n- usb: dwc2: Fix HCD port connection race (git-fixes).\n- usb: dwc2: Fix HCD resume (git-fixes).\n- usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with iommu enabled (stable-fixes).\n- usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes).\n- usb: dwc3-am62: Disable autosuspend during remove (git-fixes).\n- usb: dwc3-am62: Fix an OF node leak in phy_syscon_pll_refclk() (git-fixes).\n- usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes).\n- usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes).\n- usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git-fixes).\n- usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes).\n- usb: dwc3: gadget: fix writing NYET threshold (git-fixes).\n- usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode (git-fixes).\n- usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes).\n- usb: fix reference leak in usb_new_device() (git-fixes).\n- usb: gadget: configfs: Ignore trailing LF for user strings to cdev (git-fixes).\n- usb: gadget: f_fs: Remove WARN_ON in functionfs_bind (git-fixes).\n- usb: gadget: f_tcm: Decrement command ref count on cleanup (git-fixes).\n- usb: gadget: f_tcm: Do not free command immediately (git-fixes).\n- usb: gadget: f_tcm: Do not prepare BOT write request twice (git-fixes).\n- usb: gadget: f_tcm: Fix Get/SetInterface return value (git-fixes).\n- usb: gadget: f_tcm: Translate error to sense (git-fixes).\n- usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint (git-fixes).\n- usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints (git-fixes).\n- usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null (git-fixes).\n- usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer (git-fixes).\n- usb: host: max3421-hcd: Correctly abort a USB request (git-fixes).\n- usb: host: xhci-plat: Assign shared_hcd->rsrc_start (git-fixes).\n- usb: typec: anx7411: fix OF node reference leaks in anx7411_typec_switch_probe() (git-fixes).\n- usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes).\n- usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control() (bsc#1235001)\n- usb: typec: tcpm/tcpci_maxim: fix error code in max_contaminant_read_resistance_kohm() (git-fixes).\n- usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to PD_T_SENDER_RESPONSE (git-fixes).\n- usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes).\n- usbnet: ipheth: break up NCM header size computation (git-fixes).\n- usbnet: ipheth: check that DPE points past NCM header (git-fixes).\n- usbnet: ipheth: fix DPE OoB read (git-fixes).\n- usbnet: ipheth: fix possible overflow in DPE length check (git-fixes).\n- usbnet: ipheth: refactor NCM datagram loop (git-fixes).\n- usbnet: ipheth: use static NDP16 location in URB (git-fixes).\n- vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes).\n- vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes).\n- vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes).\n- vdpa: solidrun: Fix UB bug with devres (git-fixes).\n- vfs: fix readahead(2) on block devices (bsc#1234201).\n- vmscan,migrate: fix page count imbalance on node stats when demoting pages (git-fixes).\n- watchdog: rzg2l_wdt: Power on the watchdog domain in the restart handler (stable-fixes).\n- watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset (stable-fixes).\n- watchdog: rzg2l_wdt: Remove reset de-assert from probe (stable-fixes).\n- wifi: ath11k: Fix unexpected return buffer manager error for WCN6750/WCN6855 (git-fixes).\n- wifi: ath11k: cleanup struct ath11k_mon_data (git-fixes).\n- wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() (stable-fixes).\n- wifi: ath12k: fix tx power, max reg power update to firmware (git-fixes).\n- wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes).\n- wifi: ath5k: add PCI ID for SX76X (git-fixes).\n- wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (stable-fixes).\n- wifi: brcmfmac: add missing header include for brcmf_dbg (git-fixes).\n- wifi: cfg80211: adjust allocation of colocated AP data (git-fixes).\n- wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes).\n- wifi: cw1200: Fix potential NULL dereference (git-fixes).\n- wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes).\n- wifi: iwlwifi: fw: read STEP table from correct UEFI var (git-fixes).\n- wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes).\n- wifi: mac80211: Add non-atomic station iterator (stable-fixes).\n- wifi: mac80211: Fix common size calculation for ML element (git-fixes).\n- wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable-fixes).\n- wifi: mac80211: do not flush non-uploaded STAs (git-fixes).\n- wifi: mac80211: export ieee80211_purge_tx_queue() for drivers (stable-fixes).\n- wifi: mac80211: fix mbss changed flags corruption on 32 bit systems (stable-fixes).\n- wifi: mac80211: fix station NSS capability initialization order (git-fixes).\n- wifi: mac80211: fix tid removal during mesh forwarding (git-fixes).\n- wifi: mac80211: init cnt before accessing elem in ieee80211_copy_mbssid_beacon (git-fixes).\n- wifi: mac80211: prohibit deactivating all links (git-fixes).\n- wifi: mac80211: wake the queues in case of failure in resume (stable-fixes).\n- wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO (git-fixes).\n- wifi: mt76: mt7915: Fix mesh scan on MT7916 DBDC (git-fixes).\n- wifi: mt76: mt7915: add module param to select 5 GHz or 6 GHz on MT7916 (git-fixes).\n- wifi: mt76: mt7915: firmware restart on devices with a second pcie link (git-fixes).\n- wifi: mt76: mt7915: fix overflows seen when writing limit attributes (git-fixes).\n- wifi: mt76: mt7915: fix register mapping (git-fixes).\n- wifi: mt76: mt7921: fix using incorrect group cipher after disconnection (git-fixes).\n- wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (git-fixes).\n- wifi: mt76: mt7996: add max mpdu len capability (git-fixes).\n- wifi: mt76: mt7996: fix HE Phy capability (git-fixes).\n- wifi: mt76: mt7996: fix definition of tx descriptor (git-fixes).\n- wifi: mt76: mt7996: fix incorrect indexing of MIB FW event (git-fixes).\n- wifi: mt76: mt7996: fix ldpc setting (git-fixes).\n- wifi: mt76: mt7996: fix overflows seen when writing limit attributes (git-fixes).\n- wifi: mt76: mt7996: fix register mapping (git-fixes).\n- wifi: mt76: mt7996: fix rx filter setting for bfee functionality (git-fixes).\n- wifi: mt76: mt7996: fix the capability of reception of EHT MU PPDU (git-fixes).\n- wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes).\n- wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures (stable-fixes).\n- wifi: rtlwifi: destroy workqueue at rtl_deinit_core (git-fixes).\n- wifi: rtlwifi: do not complete firmware loading needlessly (git-fixes).\n- wifi: rtlwifi: fix init_sw_vars leak when probe fails (git-fixes).\n- wifi: rtlwifi: fix memory leaks and invalid access at probe error path (git-fixes).\n- wifi: rtlwifi: pci: wait for firmware loading before releasing memory (git-fixes).\n- wifi: rtlwifi: remove unused check_buddy_priv (git-fixes).\n- wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step (git-fixes).\n- wifi: rtlwifi: rtl8821ae: Fix media status report (git-fixes).\n- wifi: rtlwifi: rtl8821ae: phy: restore removed code to fix infinite loop (git-fixes).\n- wifi: rtlwifi: usb: fix workqueue leak when probe fails (git-fixes).\n- wifi: rtlwifi: wait for firmware loading before releasing memory (git-fixes).\n- wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb (stable-fixes).\n- wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable-fixes).\n- wifi: rtw89: mcc: consider time limits not divisible by 1024 (git-fixes).\n- wifi: wcn36xx: fix channel survey memory allocation size (git-fixes).\n- wifi: wlcore: fix unbalanced pm_runtime calls (git-fixes).\n- workqueue: Add rcu lock check at the end of work item execution (bsc#1236732).\n- workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416).\n- writeback, cgroup: switch inodes with dirty timestamps to release dying cgwbs (bsc#1234203).\n- x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773).\n- x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773).\n- x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes).\n- x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes).\n- xfs: Add error handling for xfs_reflink_cancel_cow_range (git-fixes).\n- xfs: Propagate errors from xfs_reflink_cancel_cow_range in xfs_dax_write_iomap_end (git-fixes).\n- xfs: do not allocate COW extents when unsharing a hole (git-fixes).\n- xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes).\n- xfs: remove unknown compat feature check in superblock write validation (git-fixes).\n- xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes).\n- xfs: sb_spino_align is not verified (git-fixes).\n- xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes).\n- xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes).\n- xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes).\n","id":"SUSE-SU-2025:20165-1","modified":"2025-03-27T15:23:42Z","published":"2025-03-27T15:23:42Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520165-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012628"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215199"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218470"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220711"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224095"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226980"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227445"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228592"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229809"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229833"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230205"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230697"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231909"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232101"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232158"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232161"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232418"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232419"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232420"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232421"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232882"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233055"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233112"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233200"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233204"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233239"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233259"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233324"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233328"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233461"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233467"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233469"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233488"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233546"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233558"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233637"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233638"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233642"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233778"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234024"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234069"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234071"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234075"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234076"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234077"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234079"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234086"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234139"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234140"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234141"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234143"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234144"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234146"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234148"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234149"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234150"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234153"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234156"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234158"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234159"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234161"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234163"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234165"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234166"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234167"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234168"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234170"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234172"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234173"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234175"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234176"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234177"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234178"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234179"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234183"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234184"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234186"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234187"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234188"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234190"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234192"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234194"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234195"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234196"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234199"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234200"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234203"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234204"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234205"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234207"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234209"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234219"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234221"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234237"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234239"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234240"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234242"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234243"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234278"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234280"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234281"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234282"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234294"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234338"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234381"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234464"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234605"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234619"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234651"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234652"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234654"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234655"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234658"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234659"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234668"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234683"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234690"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234693"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234810"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234811"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234825"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234826"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234832"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234843"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234848"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234853"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234855"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234856"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234863"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234884"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234889"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234898"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234899"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234900"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234905"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234906"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234907"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234909"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234911"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234912"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234916"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234918"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234921"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234922"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234923"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234934"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234937"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234947"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234948"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234950"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234960"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234962"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234968"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234970"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234971"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234974"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234999"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235001"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235002"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235003"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235004"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235007"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235011"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235019"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235031"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235032"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235037"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235039"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235040"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235043"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235050"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235053"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235054"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235057"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235059"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235065"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235075"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235100"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235112"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235122"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235128"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235133"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235134"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235219"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235222"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235223"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235227"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235246"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235249"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235389"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235390"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235391"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235406"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235409"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235412"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235415"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235418"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235423"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235425"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235426"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235430"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235437"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235439"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235444"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235445"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235451"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235458"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235459"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235464"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235473"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235480"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235486"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235488"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235491"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235494"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235495"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235497"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235498"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235502"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235521"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235523"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235528"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235532"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235533"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235534"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235537"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235538"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235545"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235552"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235563"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235571"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235578"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235583"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235584"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235587"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235622"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235632"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235638"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235641"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235643"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235646"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235647"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235653"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235656"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235663"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235700"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235707"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235714"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235716"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235720"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235727"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235737"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235745"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235753"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235759"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235776"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235777"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235778"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235779"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235793"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235798"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235814"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235818"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235842"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235865"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235894"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235906"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235918"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235924"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235940"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235941"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235946"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235948"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235964"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235965"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235976"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235977"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236078"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236080"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236082"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236090"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236091"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236097"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236101"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236102"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236106"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236120"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236127"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236131"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236143"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236144"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236161"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236163"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236168"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236178"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236190"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236192"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236227"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236245"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236248"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236262"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236628"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236688"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236696"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236703"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236732"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236733"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27397"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39282"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39480"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41042"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44996"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45828"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-48873"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-48881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49569"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49951"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49998"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50039"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50047"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50106"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50151"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50199"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50202"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50203"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50211"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50228"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50256"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50262"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50272"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50278"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50280"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50299"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-52332"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53050"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53090"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53091"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53105"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53111"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53113"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53117"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53118"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53122"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53126"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53129"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53130"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53133"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53134"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53136"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53144"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53150"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53151"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53157"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53159"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53164"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53168"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53169"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53170"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53171"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53172"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53174"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53175"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53180"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53187"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53188"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53190"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53191"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53194"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53195"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53196"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53197"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53200"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53202"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53203"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53206"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53207"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53208"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53210"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53213"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53214"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53216"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53217"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53222"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53224"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53227"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53230"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53231"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53234"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53241"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53685"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53690"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-54680"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-55639"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-55881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-55916"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56369"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56372"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56531"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56532"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56533"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56536"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56538"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56543"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56546"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56549"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56551"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56557"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56558"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56562"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56566"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56567"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56568"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56569"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56570"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56571"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56572"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56573"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56574"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56575"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56576"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56577"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56578"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56582"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56584"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56587"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56588"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56589"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56590"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56593"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56594"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56595"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56596"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56597"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56598"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56602"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56603"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56604"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56605"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56606"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56607"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56608"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56609"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56610"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56611"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56614"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56615"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56616"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56617"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56619"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56620"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56622"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56623"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56625"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56629"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56630"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56631"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56632"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56634"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56635"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56636"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56637"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56641"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56642"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56643"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56644"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56645"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56649"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56651"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56654"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56656"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56659"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56660"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56661"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56663"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56665"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56670"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56672"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56677"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56687"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56688"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56690"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56691"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56693"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56694"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56698"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56700"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56701"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56704"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56705"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56707"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56708"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56709"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56712"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56715"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56716"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56722"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56723"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56724"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56725"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56726"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56727"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56729"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56741"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56754"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56755"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56756"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56760"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56763"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56767"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56769"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56776"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56778"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56779"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56780"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57792"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57793"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57795"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57801"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57802"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57804"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57838"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57849"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57857"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57874"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57876"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57888"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57890"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57892"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57899"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57904"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57916"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57926"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57940"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57946"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-8805"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21632"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21645"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21646"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21649"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21651"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21652"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21653"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21655"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21656"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21663"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21682"}],"related":["CVE-2023-52923","CVE-2024-26924","CVE-2024-27397","CVE-2024-35839","CVE-2024-36476","CVE-2024-36908","CVE-2024-39282","CVE-2024-39480","CVE-2024-41042","CVE-2024-43913","CVE-2024-44934","CVE-2024-44996","CVE-2024-45828","CVE-2024-46896","CVE-2024-47141","CVE-2024-47143","CVE-2024-47678","CVE-2024-47809","CVE-2024-48873","CVE-2024-48881","CVE-2024-49569","CVE-2024-49854","CVE-2024-49884","CVE-2024-49915","CVE-2024-49948","CVE-2024-49951","CVE-2024-49978","CVE-2024-49998","CVE-2024-50016","CVE-2024-50018","CVE-2024-50039","CVE-2024-50047","CVE-2024-50051","CVE-2024-50106","CVE-2024-50143","CVE-2024-50151","CVE-2024-50154","CVE-2024-50199","CVE-2024-50202","CVE-2024-50203","CVE-2024-50211","CVE-2024-50228","CVE-2024-50256","CVE-2024-50262","CVE-2024-50272","CVE-2024-50278","CVE-2024-50280","CVE-2024-50299","CVE-2024-52332","CVE-2024-53050","CVE-2024-53064","CVE-2024-53090","CVE-2024-53091","CVE-2024-53095","CVE-2024-53099","CVE-2024-53103","CVE-2024-53105","CVE-2024-53111","CVE-2024-53113","CVE-2024-53117","CVE-2024-53118","CVE-2024-53119","CVE-2024-53120","CVE-2024-53122","CVE-2024-53125","CVE-2024-53126","CVE-2024-53127","CVE-2024-53129","CVE-2024-53130","CVE-2024-53131","CVE-2024-53133","CVE-2024-53134","CVE-2024-53136","CVE-2024-53141","CVE-2024-53142","CVE-2024-53144","CVE-2024-53146","CVE-2024-53148","CVE-2024-53150","CVE-2024-53151","CVE-2024-53154","CVE-2024-53155","CVE-2024-53156","CVE-2024-53157","CVE-2024-53158","CVE-2024-53159","CVE-2024-53160","CVE-2024-53161","CVE-2024-53162","CVE-2024-53164","CVE-2024-53166","CVE-2024-53168","CVE-2024-53169","CVE-2024-53170","CVE-2024-53171","CVE-2024-53172","CVE-2024-53173","CVE-2024-53174","CVE-2024-53175","CVE-2024-53179","CVE-2024-53180","CVE-2024-53185","CVE-2024-53187","CVE-2024-53188","CVE-2024-53190","CVE-2024-53191","CVE-2024-53194","CVE-2024-53195","CVE-2024-53196","CVE-2024-53197","CVE-2024-53198","CVE-2024-53200","CVE-2024-53201","CVE-2024-53202","CVE-2024-53203","CVE-2024-53206","CVE-2024-53207","CVE-2024-53208","CVE-2024-53209","CVE-2024-53210","CVE-2024-53213","CVE-2024-53214","CVE-2024-53215","CVE-2024-53216","CVE-2024-53217","CVE-2024-53222","CVE-2024-53224","CVE-2024-53227","CVE-2024-53229","CVE-2024-53230","CVE-2024-53231","CVE-2024-53232","CVE-2024-53233","CVE-2024-53234","CVE-2024-53236","CVE-2024-53237","CVE-2024-53239","CVE-2024-53240","CVE-2024-53241","CVE-2024-53685","CVE-2024-53690","CVE-2024-54680","CVE-2024-55639","CVE-2024-55881","CVE-2024-55916","CVE-2024-56369","CVE-2024-56372","CVE-2024-56531","CVE-2024-56532","CVE-2024-56533","CVE-2024-56536","CVE-2024-56538","CVE-2024-56539","CVE-2024-56543","CVE-2024-56546","CVE-2024-56548","CVE-2024-56549","CVE-2024-56551","CVE-2024-56557","CVE-2024-56558","CVE-2024-56562","CVE-2024-56566","CVE-2024-56567","CVE-2024-56568","CVE-2024-56569","CVE-2024-56570","CVE-2024-56571","CVE-2024-56572","CVE-2024-56573","CVE-2024-56574","CVE-2024-56575","CVE-2024-56576","CVE-2024-56577","CVE-2024-56578","CVE-2024-56582","CVE-2024-56584","CVE-2024-56587","CVE-2024-56588","CVE-2024-56589","CVE-2024-56590","CVE-2024-56593","CVE-2024-56594","CVE-2024-56595","CVE-2024-56596","CVE-2024-56597","CVE-2024-56598","CVE-2024-56599","CVE-2024-56600","CVE-2024-56601","CVE-2024-56602","CVE-2024-56603","CVE-2024-56604","CVE-2024-56605","CVE-2024-56606","CVE-2024-56607","CVE-2024-56608","CVE-2024-56609","CVE-2024-56610","CVE-2024-56611","CVE-2024-56614","CVE-2024-56615","CVE-2024-56616","CVE-2024-56617","CVE-2024-56619","CVE-2024-56620","CVE-2024-56622","CVE-2024-56623","CVE-2024-56625","CVE-2024-56629","CVE-2024-56630","CVE-2024-56631","CVE-2024-56632","CVE-2024-56634","CVE-2024-56635","CVE-2024-56636","CVE-2024-56637","CVE-2024-56641","CVE-2024-56642","CVE-2024-56643","CVE-2024-56644","CVE-2024-56645","CVE-2024-56648","CVE-2024-56649","CVE-2024-56650","CVE-2024-56651","CVE-2024-56654","CVE-2024-56656","CVE-2024-56659","CVE-2024-56660","CVE-2024-56661","CVE-2024-56662","CVE-2024-56663","CVE-2024-56664","CVE-2024-56665","CVE-2024-56667","CVE-2024-56670","CVE-2024-56672","CVE-2024-56675","CVE-2024-56677","CVE-2024-56678","CVE-2024-56679","CVE-2024-56681","CVE-2024-56683","CVE-2024-56687","CVE-2024-56688","CVE-2024-56690","CVE-2024-56691","CVE-2024-56693","CVE-2024-56694","CVE-2024-56698","CVE-2024-56700","CVE-2024-56701","CVE-2024-56704","CVE-2024-56705","CVE-2024-56707","CVE-2024-56708","CVE-2024-56709","CVE-2024-56712","CVE-2024-56715","CVE-2024-56716","CVE-2024-56722","CVE-2024-56723","CVE-2024-56724","CVE-2024-56725","CVE-2024-56726","CVE-2024-56727","CVE-2024-56728","CVE-2024-56729","CVE-2024-56739","CVE-2024-56741","CVE-2024-56745","CVE-2024-56746","CVE-2024-56747","CVE-2024-56748","CVE-2024-56752","CVE-2024-56754","CVE-2024-56755","CVE-2024-56756","CVE-2024-56759","CVE-2024-56760","CVE-2024-56763","CVE-2024-56765","CVE-2024-56766","CVE-2024-56767","CVE-2024-56769","CVE-2024-56774","CVE-2024-56775","CVE-2024-56776","CVE-2024-56777","CVE-2024-56778","CVE-2024-56779","CVE-2024-56780","CVE-2024-56787","CVE-2024-57791","CVE-2024-57792","CVE-2024-57793","CVE-2024-57795","CVE-2024-57798","CVE-2024-57801","CVE-2024-57802","CVE-2024-57804","CVE-2024-57809","CVE-2024-57838","CVE-2024-57849","CVE-2024-57850","CVE-2024-57857","CVE-2024-57874","CVE-2024-57876","CVE-2024-57884","CVE-2024-57887","CVE-2024-57888","CVE-2024-57890","CVE-2024-57892","CVE-2024-57893","CVE-2024-57896","CVE-2024-57897","CVE-2024-57899","CVE-2024-57903","CVE-2024-57904","CVE-2024-57906","CVE-2024-57907","CVE-2024-57908","CVE-2024-57910","CVE-2024-57911","CVE-2024-57912","CVE-2024-57913","CVE-2024-57915","CVE-2024-57916","CVE-2024-57917","CVE-2024-57922","CVE-2024-57926","CVE-2024-57929","CVE-2024-57931","CVE-2024-57932","CVE-2024-57933","CVE-2024-57935","CVE-2024-57936","CVE-2024-57938","CVE-2024-57940","CVE-2024-57946","CVE-2024-8805","CVE-2025-21632","CVE-2025-21645","CVE-2025-21646","CVE-2025-21649","CVE-2025-21650","CVE-2025-21651","CVE-2025-21652","CVE-2025-21653","CVE-2025-21655","CVE-2025-21656","CVE-2025-21662","CVE-2025-21663","CVE-2025-21664","CVE-2025-21674","CVE-2025-21676","CVE-2025-21682"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2023-52923","CVE-2024-26924","CVE-2024-27397","CVE-2024-35839","CVE-2024-36476","CVE-2024-36908","CVE-2024-39282","CVE-2024-39480","CVE-2024-41042","CVE-2024-43913","CVE-2024-44934","CVE-2024-44996","CVE-2024-45828","CVE-2024-46896","CVE-2024-47141","CVE-2024-47143","CVE-2024-47678","CVE-2024-47809","CVE-2024-48873","CVE-2024-48881","CVE-2024-49569","CVE-2024-49854","CVE-2024-49884","CVE-2024-49915","CVE-2024-49948","CVE-2024-49951","CVE-2024-49978","CVE-2024-49998","CVE-2024-50016","CVE-2024-50018","CVE-2024-50039","CVE-2024-50047","CVE-2024-50051","CVE-2024-50106","CVE-2024-50143","CVE-2024-50151","CVE-2024-50154","CVE-2024-50199","CVE-2024-50202","CVE-2024-50203","CVE-2024-50211","CVE-2024-50228","CVE-2024-50256","CVE-2024-50262","CVE-2024-50272","CVE-2024-50278","CVE-2024-50280","CVE-2024-50299","CVE-2024-52332","CVE-2024-53050","CVE-2024-53064","CVE-2024-53090","CVE-2024-53091","CVE-2024-53095","CVE-2024-53099","CVE-2024-53103","CVE-2024-53105","CVE-2024-53111","CVE-2024-53113","CVE-2024-53117","CVE-2024-53118","CVE-2024-53119","CVE-2024-53120","CVE-2024-53122","CVE-2024-53125","CVE-2024-53126","CVE-2024-53127","CVE-2024-53129","CVE-2024-53130","CVE-2024-53131","CVE-2024-53133","CVE-2024-53134","CVE-2024-53136","CVE-2024-53141","CVE-2024-53142","CVE-2024-53144","CVE-2024-53146","CVE-2024-53148","CVE-2024-53150","CVE-2024-53151","CVE-2024-53154","CVE-2024-53155","CVE-2024-53156","CVE-2024-53157","CVE-2024-53158","CVE-2024-53159","CVE-2024-53160","CVE-2024-53161","CVE-2024-53162","CVE-2024-53164","CVE-2024-53166","CVE-2024-53168","CVE-2024-53169","CVE-2024-53170","CVE-2024-53171","CVE-2024-53172","CVE-2024-53173","CVE-2024-53174","CVE-2024-53175","CVE-2024-53179","CVE-2024-53180","CVE-2024-53185","CVE-2024-53187","CVE-2024-53188","CVE-2024-53190","CVE-2024-53191","CVE-2024-53194","CVE-2024-53195","CVE-2024-53196","CVE-2024-53197","CVE-2024-53198","CVE-2024-53200","CVE-2024-53201","CVE-2024-53202","CVE-2024-53203","CVE-2024-53206","CVE-2024-53207","CVE-2024-53208","CVE-2024-53209","CVE-2024-53210","CVE-2024-53213","CVE-2024-53214","CVE-2024-53215","CVE-2024-53216","CVE-2024-53217","CVE-2024-53222","CVE-2024-53224","CVE-2024-53227","CVE-2024-53229","CVE-2024-53230","CVE-2024-53231","CVE-2024-53232","CVE-2024-53233","CVE-2024-53234","CVE-2024-53236","CVE-2024-53237","CVE-2024-53239","CVE-2024-53240","CVE-2024-53241","CVE-2024-53685","CVE-2024-53690","CVE-2024-54680","CVE-2024-55639","CVE-2024-55881","CVE-2024-55916","CVE-2024-56369","CVE-2024-56372","CVE-2024-56531","CVE-2024-56532","CVE-2024-56533","CVE-2024-56536","CVE-2024-56538","CVE-2024-56539","CVE-2024-56543","CVE-2024-56546","CVE-2024-56548","CVE-2024-56549","CVE-2024-56551","CVE-2024-56557","CVE-2024-56558","CVE-2024-56562","CVE-2024-56566","CVE-2024-56567","CVE-2024-56568","CVE-2024-56569","CVE-2024-56570","CVE-2024-56571","CVE-2024-56572","CVE-2024-56573","CVE-2024-56574","CVE-2024-56575","CVE-2024-56576","CVE-2024-56577","CVE-2024-56578","CVE-2024-56582","CVE-2024-56584","CVE-2024-56587","CVE-2024-56588","CVE-2024-56589","CVE-2024-56590","CVE-2024-56593","CVE-2024-56594","CVE-2024-56595","CVE-2024-56596","CVE-2024-56597","CVE-2024-56598","CVE-2024-56599","CVE-2024-56600","CVE-2024-56601","CVE-2024-56602","CVE-2024-56603","CVE-2024-56604","CVE-2024-56605","CVE-2024-56606","CVE-2024-56607","CVE-2024-56608","CVE-2024-56609","CVE-2024-56610","CVE-2024-56611","CVE-2024-56614","CVE-2024-56615","CVE-2024-56616","CVE-2024-56617","CVE-2024-56619","CVE-2024-56620","CVE-2024-56622","CVE-2024-56623","CVE-2024-56625","CVE-2024-56629","CVE-2024-56630","CVE-2024-56631","CVE-2024-56632","CVE-2024-56634","CVE-2024-56635","CVE-2024-56636","CVE-2024-56637","CVE-2024-56641","CVE-2024-56642","CVE-2024-56643","CVE-2024-56644","CVE-2024-56645","CVE-2024-56648","CVE-2024-56649","CVE-2024-56650","CVE-2024-56651","CVE-2024-56654","CVE-2024-56656","CVE-2024-56659","CVE-2024-56660","CVE-2024-56661","CVE-2024-56662","CVE-2024-56663","CVE-2024-56664","CVE-2024-56665","CVE-2024-56667","CVE-2024-56670","CVE-2024-56672","CVE-2024-56675","CVE-2024-56677","CVE-2024-56678","CVE-2024-56679","CVE-2024-56681","CVE-2024-56683","CVE-2024-56687","CVE-2024-56688","CVE-2024-56690","CVE-2024-56691","CVE-2024-56693","CVE-2024-56694","CVE-2024-56698","CVE-2024-56700","CVE-2024-56701","CVE-2024-56704","CVE-2024-56705","CVE-2024-56707","CVE-2024-56708","CVE-2024-56709","CVE-2024-56712","CVE-2024-56715","CVE-2024-56716","CVE-2024-56722","CVE-2024-56723","CVE-2024-56724","CVE-2024-56725","CVE-2024-56726","CVE-2024-56727","CVE-2024-56728","CVE-2024-56729","CVE-2024-56739","CVE-2024-56741","CVE-2024-56745","CVE-2024-56746","CVE-2024-56747","CVE-2024-56748","CVE-2024-56752","CVE-2024-56754","CVE-2024-56755","CVE-2024-56756","CVE-2024-56759","CVE-2024-56760","CVE-2024-56763","CVE-2024-56765","CVE-2024-56766","CVE-2024-56767","CVE-2024-56769","CVE-2024-56774","CVE-2024-56775","CVE-2024-56776","CVE-2024-56777","CVE-2024-56778","CVE-2024-56779","CVE-2024-56780","CVE-2024-56787","CVE-2024-57791","CVE-2024-57792","CVE-2024-57793","CVE-2024-57795","CVE-2024-57798","CVE-2024-57801","CVE-2024-57802","CVE-2024-57804","CVE-2024-57809","CVE-2024-57838","CVE-2024-57849","CVE-2024-57850","CVE-2024-57857","CVE-2024-57874","CVE-2024-57876","CVE-2024-57884","CVE-2024-57887","CVE-2024-57888","CVE-2024-57890","CVE-2024-57892","CVE-2024-57893","CVE-2024-57896","CVE-2024-57897","CVE-2024-57899","CVE-2024-57903","CVE-2024-57904","CVE-2024-57906","CVE-2024-57907","CVE-2024-57908","CVE-2024-57910","CVE-2024-57911","CVE-2024-57912","CVE-2024-57913","CVE-2024-57915","CVE-2024-57916","CVE-2024-57917","CVE-2024-57922","CVE-2024-57926","CVE-2024-57929","CVE-2024-57931","CVE-2024-57932","CVE-2024-57933","CVE-2024-57935","CVE-2024-57936","CVE-2024-57938","CVE-2024-57940","CVE-2024-57946","CVE-2024-8805","CVE-2025-21632","CVE-2025-21645","CVE-2025-21646","CVE-2025-21649","CVE-2025-21650","CVE-2025-21651","CVE-2025-21652","CVE-2025-21653","CVE-2025-21655","CVE-2025-21656","CVE-2025-21662","CVE-2025-21663","CVE-2025-21664","CVE-2025-21674","CVE-2025-21676","CVE-2025-21682"]}