diff --git a/dtb-aarch64.changes b/dtb-aarch64.changes index 960a05e..af3fa70 100644 --- a/dtb-aarch64.changes +++ b/dtb-aarch64.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/dtb-aarch64.spec b/dtb-aarch64.spec index 3d58164..0f859e0 100644 --- a/dtb-aarch64.spec +++ b/dtb-aarch64.spec @@ -27,7 +27,7 @@ Name: dtb-aarch64 Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif diff --git a/dtb-armv7l.changes b/dtb-armv7l.changes index 960a05e..af3fa70 100644 --- a/dtb-armv7l.changes +++ b/dtb-armv7l.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/dtb-armv7l.spec b/dtb-armv7l.spec index df6118b..34d2731 100644 --- a/dtb-armv7l.spec +++ b/dtb-armv7l.spec @@ -27,7 +27,7 @@ Name: dtb-armv7l Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif diff --git a/kernel-64kb.changes b/kernel-64kb.changes index 960a05e..af3fa70 100644 --- a/kernel-64kb.changes +++ b/kernel-64kb.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/kernel-64kb.spec b/kernel-64kb.spec index 3f87339..b8e145d 100644 --- a/kernel-64kb.spec +++ b/kernel-64kb.spec @@ -19,7 +19,7 @@ %define srcversion 6.4 %define patchversion 6.4.0 -%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec +%define git_commit eaf1535983230cf8de98f116dbbd91c1356c2bd9 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux gz @@ -42,7 +42,7 @@ Name: kernel-64kb Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif diff --git a/kernel-debug.changes b/kernel-debug.changes index 960a05e..af3fa70 100644 --- a/kernel-debug.changes +++ b/kernel-debug.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/kernel-debug.spec b/kernel-debug.spec index ae69b5e..20b5061 100644 --- a/kernel-debug.spec +++ b/kernel-debug.spec @@ -19,7 +19,7 @@ %define srcversion 6.4 %define patchversion 6.4.0 -%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec +%define git_commit eaf1535983230cf8de98f116dbbd91c1356c2bd9 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux gz @@ -42,7 +42,7 @@ Name: kernel-debug Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif diff --git a/kernel-default.changes b/kernel-default.changes index 960a05e..af3fa70 100644 --- a/kernel-default.changes +++ b/kernel-default.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/kernel-default.spec b/kernel-default.spec index 153a583..dc6dbc8 100644 --- a/kernel-default.spec +++ b/kernel-default.spec @@ -19,7 +19,7 @@ %define srcversion 6.4 %define patchversion 6.4.0 -%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec +%define git_commit eaf1535983230cf8de98f116dbbd91c1356c2bd9 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux gz @@ -42,7 +42,7 @@ Name: kernel-default Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif diff --git a/kernel-docs.changes b/kernel-docs.changes index 960a05e..af3fa70 100644 --- a/kernel-docs.changes +++ b/kernel-docs.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/kernel-docs.spec b/kernel-docs.spec index cb0a633..913186c 100644 --- a/kernel-docs.spec +++ b/kernel-docs.spec @@ -18,7 +18,7 @@ %define srcversion 6.4 %define patchversion 6.4.0 -%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec +%define git_commit eaf1535983230cf8de98f116dbbd91c1356c2bd9 %define variant %{nil} %define build_html 1 %define build_pdf 0 @@ -30,7 +30,7 @@ Name: kernel-docs Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif diff --git a/kernel-kvmsmall.changes b/kernel-kvmsmall.changes index 960a05e..af3fa70 100644 --- a/kernel-kvmsmall.changes +++ b/kernel-kvmsmall.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/kernel-kvmsmall.spec b/kernel-kvmsmall.spec index e290011..02aeac8 100644 --- a/kernel-kvmsmall.spec +++ b/kernel-kvmsmall.spec @@ -19,7 +19,7 @@ %define srcversion 6.4 %define patchversion 6.4.0 -%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec +%define git_commit eaf1535983230cf8de98f116dbbd91c1356c2bd9 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux gz @@ -42,7 +42,7 @@ Name: kernel-kvmsmall Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif diff --git a/kernel-lpae.changes b/kernel-lpae.changes index 960a05e..af3fa70 100644 --- a/kernel-lpae.changes +++ b/kernel-lpae.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/kernel-lpae.spec b/kernel-lpae.spec index 4d1c7ec..81da478 100644 --- a/kernel-lpae.spec +++ b/kernel-lpae.spec @@ -19,7 +19,7 @@ %define srcversion 6.4 %define patchversion 6.4.0 -%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec +%define git_commit eaf1535983230cf8de98f116dbbd91c1356c2bd9 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux gz @@ -42,7 +42,7 @@ Name: kernel-lpae Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif diff --git a/kernel-obs-build.changes b/kernel-obs-build.changes index 960a05e..af3fa70 100644 --- a/kernel-obs-build.changes +++ b/kernel-obs-build.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/kernel-obs-build.spec b/kernel-obs-build.spec index cb5b1a8..cad0990 100644 --- a/kernel-obs-build.spec +++ b/kernel-obs-build.spec @@ -38,7 +38,7 @@ %endif %endif %endif -%global kernel_package kernel%kernel_flavor-srchash-baf4c488af6bfa6b842c91bee4aec8becbfb31ec +%global kernel_package kernel%kernel_flavor-srchash-eaf1535983230cf8de98f116dbbd91c1356c2bd9 %endif %if 0%{?rhel_version} %global kernel_package kernel @@ -47,14 +47,14 @@ Name: kernel-obs-build Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif Summary: package kernel and initrd for OBS VM builds License: GPL-2.0-only Group: SLES -Provides: kernel-obs-build-srchash-baf4c488af6bfa6b842c91bee4aec8becbfb31ec +Provides: kernel-obs-build-srchash-eaf1535983230cf8de98f116dbbd91c1356c2bd9 BuildRequires: coreutils BuildRequires: device-mapper BuildRequires: dracut diff --git a/kernel-obs-qa.changes b/kernel-obs-qa.changes index 960a05e..af3fa70 100644 --- a/kernel-obs-qa.changes +++ b/kernel-obs-qa.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/kernel-obs-qa.spec b/kernel-obs-qa.spec index ce84bda..fd8ddea 100644 --- a/kernel-obs-qa.spec +++ b/kernel-obs-qa.spec @@ -25,7 +25,7 @@ Name: kernel-obs-qa Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif @@ -36,7 +36,7 @@ BuildRequires: kernel-default # kernel-obs-build must be also configured as VMinstall, but is required # here as well to avoid that qa and build package build parallel %if ! 0%{?qemu_user_space_build} -BuildRequires: kernel-obs-build-srchash-baf4c488af6bfa6b842c91bee4aec8becbfb31ec +BuildRequires: kernel-obs-build-srchash-eaf1535983230cf8de98f116dbbd91c1356c2bd9 %endif BuildRequires: modutils ExclusiveArch: aarch64 armv7hl ppc64le s390x x86_64 diff --git a/kernel-source.changes b/kernel-source.changes index 960a05e..af3fa70 100644 --- a/kernel-source.changes +++ b/kernel-source.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/kernel-source.spec b/kernel-source.spec index 29c31ea..1e5ff85 100644 --- a/kernel-source.spec +++ b/kernel-source.spec @@ -18,7 +18,7 @@ %define srcversion 6.4 %define patchversion 6.4.0 -%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec +%define git_commit eaf1535983230cf8de98f116dbbd91c1356c2bd9 %define variant %{nil} %define gcc_package gcc %define gcc_compiler gcc @@ -30,7 +30,7 @@ Name: kernel-source Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif diff --git a/kernel-syms.changes b/kernel-syms.changes index 960a05e..af3fa70 100644 --- a/kernel-syms.changes +++ b/kernel-syms.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/kernel-syms.spec b/kernel-syms.spec index 0ef4e37..220f4d8 100644 --- a/kernel-syms.spec +++ b/kernel-syms.spec @@ -16,7 +16,7 @@ # -%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec +%define git_commit eaf1535983230cf8de98f116dbbd91c1356c2bd9 %define variant %{nil} %include %_sourcedir/kernel-spec-macros @@ -24,7 +24,7 @@ Name: kernel-syms Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif diff --git a/kernel-zfcpdump.changes b/kernel-zfcpdump.changes index 960a05e..af3fa70 100644 --- a/kernel-zfcpdump.changes +++ b/kernel-zfcpdump.changes @@ -1,3 +1,62 @@ +------------------------------------------------------------------- +Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de + +- macvlan: observe an RCU grace period in macvlan_common_newlink() + error path (CVE-2026-23209 bsc#1258518). +- macvlan: fix error recovery in macvlan_common_newlink() + (CVE-2026-23209 bsc#1258518). +- commit eaf1535 + +------------------------------------------------------------------- +Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com + +- scsi: mpi3mr: Synchronous access b/w reset and tm thread for + reply queue (CVE-2025-37861 bsc#1243055). +- commit 807000c + +------------------------------------------------------------------- +Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de + +- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191 + bsc#1258395). +- commit 114f0d2 + +------------------------------------------------------------------- +Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de + +- crypto: authencesn - reject too-short AAD (assoclen<8) to + match ESP/ESN spec (bsc#1257735 CVE-2026-23060). +- commit 9347d8b + +------------------------------------------------------------------- +Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de + +- crypto: af_alg - zero initialize memory allocated via + sock_kmalloc (bsc#1256716 CVE-2025-71113). +- commit 449e0ae + +------------------------------------------------------------------- +Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de + +- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() + (bsc#1254992 CVE-2023-53817). +- commit f8259ad + +------------------------------------------------------------------- +Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de + +- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx + (bsc#1251966 CVE-2025-39964). +- commit 2a9a19a + +------------------------------------------------------------------- +Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de + +- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg + (bsc#1251966 CVE-2025-39964). + Refresh patches.suse/crypto-add-suse_kabi_padding.patch. +- commit a6b1063 + ------------------------------------------------------------------- Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz diff --git a/kernel-zfcpdump.spec b/kernel-zfcpdump.spec index d881795..558d051 100644 --- a/kernel-zfcpdump.spec +++ b/kernel-zfcpdump.spec @@ -19,7 +19,7 @@ %define srcversion 6.4 %define patchversion 6.4.0 -%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec +%define git_commit eaf1535983230cf8de98f116dbbd91c1356c2bd9 %define variant %{nil} %define compress_modules zstd %define compress_vmlinux gz @@ -42,7 +42,7 @@ Name: kernel-zfcpdump Version: 6.4.0 %if 0%{?is_kotd} -Release: .gbaf4c48 +Release: .geaf1535 %else Release: 0 %endif diff --git a/patches.suse.tar.bz2 b/patches.suse.tar.bz2 index 1632306..de98eb2 100644 --- a/patches.suse.tar.bz2 +++ b/patches.suse.tar.bz2 @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:86a5bebe2fe67fa57bb4ae240b3a7a4780868bb27b6ee63053cc455da4634d35 -size 29915447 +oid sha256:7606687cd9e7449f317e2294aa1ba322e1ce735ef12d0b9cf2b05597e4e66ddb +size 29916133 diff --git a/series.conf b/series.conf index ce487af..2881e32 100644 --- a/series.conf +++ b/series.conf @@ -7804,6 +7804,7 @@ patches.suse/crypto-af_alg-Decrement-struct-key.usage-in-alg_set_.patch patches.suse/crypto-qat-use-kfree_sensitive-instead-of-memset-kfr.patch patches.suse/crypto-api-Use-work-queue-in-crypto_destroy_instance.patch + patches.suse/crypto-lib-mpi-avoid-null-pointer-deref-in-mpi_cmp_u.patch patches.suse/crypto-jitter-Add-clarifying-comments-to-Jitter-Entr.patch patches.suse/crypto-caam-fix-unchecked-return-value-error.patch patches.suse/crypto-qat-Remove-unused-function-declarations.patch @@ -31802,6 +31803,7 @@ patches.suse/ahci-add-PCI-ID-for-Marvell-88SE9215-SATA-Controller.patch patches.suse/ata-libata-Fix-NCQ-Non-Data-log-not-supported-print.patch patches.suse/scsi-st-Restore-some-drive-settings-after-reset.patch + patches.suse/scsi-mpi3mr-Synchronous-access-b-w-reset-and-tm-thread-for.patch patches.suse/scsi-lpfc-Reduce-log-message-generation-during-ELS-r.patch patches.suse/scsi-lpfc-Free-phba-irq-in-lpfc_sli4_enable_msi-when.patch patches.suse/scsi-lpfc-Ignore-ndlp-rport-mismatch-in-dev_loss_tmo.patch @@ -34674,6 +34676,7 @@ patches.suse/ASoC-rt5682s-Adjust-SAR-ADC-button-mode-to-fix-noise.patch patches.suse/ALSA-hda-realtek-Fix-mute-led-for-HP-Laptop-15-dw4xx.patch patches.suse/crypto-af_alg-Set-merge-to-zero-early-in-af_alg_send.patch + patches.suse/crypto-af_alg-Disallow-concurrent-writes-in-af_alg_s.patch patches.suse/mmc-mvsdio-Fix-dma_unmap_sg-nents-value.patch patches.suse/iommu-vt-d-Fix-__domain_mapping-s-usage-of-switch_to.patch patches.suse/firewire-core-fix-overlooked-update-of-subsystem-ABI.patch @@ -34681,6 +34684,7 @@ patches.suse/IB-mlx5-Fix-obj_type-mismatch-for-SRQ-event-subscrip.patch patches.suse/cpufreq-Initialize-cpufreq-based-invariance-before-subsys.patch patches.suse/arm64-dts-imx8mp-Correct-thermal-sensor-index.patch + patches.suse/crypto-af_alg-Fix-incorrect-boolean-values-in-af_alg.patch patches.suse/tracing-dynevent-Add-a-missing-lockdown-check-on-dynevent.patch patches.suse/vhost-Take-a-reference-on-the-task-in-struct-vhost_t.patch patches.suse/Bluetooth-hci_sync-Fix-hci_resume_advertising_sync.patch @@ -35438,6 +35442,7 @@ patches.suse/cpuidle-menu-Use-residency-threshold-in-polling-state-override-decisions.patch patches.suse/KEYS-trusted-Fix-a-memory-leak-in-tpm2_load_cmd.patch patches.suse/ima-Handle-error-code-returned-by-ima_filter_rule_ma.patch + patches.suse/crypto-af_alg-zero-initialize-memory-allocated-via-s.patch patches.suse/crypto-authenc-Correctly-pass-EINPROGRESS-back-up-to.patch patches.suse/crypto-asymmetric_keys-prevent-overflow-in-asymmetri.patch patches.suse/crypto-hisilicon-qm-restore-original-qos-values.patch @@ -35622,16 +35627,20 @@ patches.suse/net-sched-sch_qfq-do-not-free-existing-class-in-qfq_.patch patches.suse/net-sched-Enforce-that-teql-can-only-be-used-as-root.patch patches.suse/x86-make-page-fault-handling-disable-interrupts-prop.patch + patches.suse/crypto-authencesn-reject-too-short-AAD-assoclen-8-to.patch patches.suse/ALSA-usb-audio-Fix-use-after-free-in-snd_usb_mixer_f.patch patches.suse/clocksource-Reduce-watchdog-readout-delay-limit-to-p.patch patches.suse/msft-hv-3448-scsi-storvsc-Process-unsupported-MODE_SENSE_10.patch patches.suse/btrfs-do-not-strictly-require-dirty-metadata-thresho.patch + patches.suse/macvlan-fix-error-recovery-in-macvlan_common_newlink.patch + patches.suse/ALSA-aloop-Fix-racy-access-at-PCM-trigger.patch patches.suse/spi-tegra210-quad-Return-IRQ_HANDLED-when-timeout-already-.patch patches.suse/spi-tegra210-quad-Move-curr_xfer-read-inside-spinlock.patch patches.suse/spi-tegra210-quad-Protect-curr_xfer-assignment-in-tegra_qs.patch patches.suse/spi-tegra210-quad-Protect-curr_xfer-in-tegra_qspi_combined.patch patches.suse/spi-tegra210-quad-Protect-curr_xfer-clearing-in-tegra_qspi.patch patches.suse/spi-tegra210-quad-Protect-curr_xfer-check-in-IRQ-handler.patch + patches.suse/macvlan-observe-an-RCU-grace-period-in-macvlan_commo.patch # netdev/net-next main patches.suse/ice-use-netif_get_num_default_rss_queues.patch diff --git a/source-timestamp b/source-timestamp index 2827f3b..f34ea43 100644 --- a/source-timestamp +++ b/source-timestamp @@ -1,3 +1,3 @@ -2026-02-21 00:32:15 +0000 -GIT Revision: baf4c488af6bfa6b842c91bee4aec8becbfb31ec +2026-02-23 15:43:43 +0000 +GIT Revision: eaf1535983230cf8de98f116dbbd91c1356c2bd9 GIT Branch: SLE15-SP6-LTSS