3 Commits

Author SHA256 Message Date
d60296228c GIT Revision: 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
GIT Branch: SLE15-SP6-LTSS
2026-02-26 00:30:49 +0000
2026-02-26 08:01:44 +01:00
be7cbd78e2 GIT Revision: e0a7f05966eab57a70c00d3ef1d127ffd21b183d
GIT Branch: SLE15-SP6-LTSS
2026-02-25 00:30:52 +0000
2026-02-25 08:01:51 +01:00
7eecc54cef GIT Revision: eaf1535983230cf8de98f116dbbd91c1356c2bd9
GIT Branch: SLE15-SP6-LTSS
2026-02-23 15:43:43 +0000
2026-02-24 08:01:42 +01:00
29 changed files with 989 additions and 29 deletions

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -27,7 +27,7 @@
Name: dtb-aarch64
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -27,7 +27,7 @@
Name: dtb-armv7l
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -19,7 +19,7 @@
%define srcversion 6.4
%define patchversion 6.4.0
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
%define variant %{nil}
%define compress_modules zstd
%define compress_vmlinux gz
@@ -42,7 +42,7 @@
Name: kernel-64kb
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -19,7 +19,7 @@
%define srcversion 6.4
%define patchversion 6.4.0
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
%define variant %{nil}
%define compress_modules zstd
%define compress_vmlinux gz
@@ -42,7 +42,7 @@
Name: kernel-debug
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -19,7 +19,7 @@
%define srcversion 6.4
%define patchversion 6.4.0
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
%define variant %{nil}
%define compress_modules zstd
%define compress_vmlinux gz
@@ -42,7 +42,7 @@
Name: kernel-default
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -18,7 +18,7 @@
%define srcversion 6.4
%define patchversion 6.4.0
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
%define variant %{nil}
%define build_html 1
%define build_pdf 0
@@ -30,7 +30,7 @@
Name: kernel-docs
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -19,7 +19,7 @@
%define srcversion 6.4
%define patchversion 6.4.0
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
%define variant %{nil}
%define compress_modules zstd
%define compress_vmlinux gz
@@ -42,7 +42,7 @@
Name: kernel-kvmsmall
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -19,7 +19,7 @@
%define srcversion 6.4
%define patchversion 6.4.0
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
%define variant %{nil}
%define compress_modules zstd
%define compress_vmlinux gz
@@ -42,7 +42,7 @@
Name: kernel-lpae
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -38,7 +38,7 @@
%endif
%endif
%endif
%global kernel_package kernel%kernel_flavor-srchash-baf4c488af6bfa6b842c91bee4aec8becbfb31ec
%global kernel_package kernel%kernel_flavor-srchash-33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
%endif
%if 0%{?rhel_version}
%global kernel_package kernel
@@ -47,14 +47,14 @@
Name: kernel-obs-build
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif
Summary: package kernel and initrd for OBS VM builds
License: GPL-2.0-only
Group: SLES
Provides: kernel-obs-build-srchash-baf4c488af6bfa6b842c91bee4aec8becbfb31ec
Provides: kernel-obs-build-srchash-33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
BuildRequires: coreutils
BuildRequires: device-mapper
BuildRequires: dracut

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -25,7 +25,7 @@
Name: kernel-obs-qa
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif
@@ -36,7 +36,7 @@ BuildRequires: kernel-default
# kernel-obs-build must be also configured as VMinstall, but is required
# here as well to avoid that qa and build package build parallel
%if ! 0%{?qemu_user_space_build}
BuildRequires: kernel-obs-build-srchash-baf4c488af6bfa6b842c91bee4aec8becbfb31ec
BuildRequires: kernel-obs-build-srchash-33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
%endif
BuildRequires: modutils
ExclusiveArch: aarch64 armv7hl ppc64le s390x x86_64

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -18,7 +18,7 @@
%define srcversion 6.4
%define patchversion 6.4.0
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
%define variant %{nil}
%define gcc_package gcc
%define gcc_compiler gcc
@@ -30,7 +30,7 @@
Name: kernel-source
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -16,7 +16,7 @@
#
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
%define variant %{nil}
%include %_sourcedir/kernel-spec-macros
@@ -24,7 +24,7 @@
Name: kernel-syms
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif

View File

@@ -1,3 +1,76 @@
-------------------------------------------------------------------
Tue Feb 24 07:09:26 CET 2026 - wqu@suse.com
- btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377 CVE-2026-23141).
- commit b93c18b
-------------------------------------------------------------------
Tue Feb 24 06:55:00 CET 2026 - wqu@suse.com
- btrfs: reject new transactions if the fs is fully read-only
(bsc#1258464 CVE-2026-23214).
- commit c375a48
-------------------------------------------------------------------
Mon Feb 23 16:43:38 CET 2026 - tbogendoerfer@suse.de
- macvlan: observe an RCU grace period in macvlan_common_newlink()
error path (CVE-2026-23209 bsc#1258518).
- macvlan: fix error recovery in macvlan_common_newlink()
(CVE-2026-23209 bsc#1258518).
- commit eaf1535
-------------------------------------------------------------------
Fri Feb 20 17:39:16 CET 2026 - lduncan@suse.com
- scsi: mpi3mr: Synchronous access b/w reset and tm thread for
reply queue (CVE-2025-37861 bsc#1243055).
- commit 807000c
-------------------------------------------------------------------
Thu Feb 19 16:10:25 CET 2026 - tiwai@suse.de
- ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191
bsc#1258395).
- commit 114f0d2
-------------------------------------------------------------------
Wed Feb 18 16:16:18 CET 2026 - nstange@suse.de
- crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735 CVE-2026-23060).
- commit 9347d8b
-------------------------------------------------------------------
Wed Feb 18 15:30:59 CET 2026 - nstange@suse.de
- crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716 CVE-2025-71113).
- commit 449e0ae
-------------------------------------------------------------------
Wed Feb 18 14:20:17 CET 2026 - nstange@suse.de
- crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992 CVE-2023-53817).
- commit f8259ad
-------------------------------------------------------------------
Wed Feb 18 11:20:26 CET 2026 - nstange@suse.de
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
(bsc#1251966 CVE-2025-39964).
- commit 2a9a19a
-------------------------------------------------------------------
Wed Feb 18 11:14:34 CET 2026 - nstange@suse.de
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
(bsc#1251966 CVE-2025-39964).
Refresh patches.suse/crypto-add-suse_kabi_padding.patch.
- commit a6b1063
-------------------------------------------------------------------
Wed Feb 11 14:39:19 CET 2026 - mkubecek@suse.cz

View File

@@ -19,7 +19,7 @@
%define srcversion 6.4
%define patchversion 6.4.0
%define git_commit baf4c488af6bfa6b842c91bee4aec8becbfb31ec
%define git_commit 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
%define variant %{nil}
%define compress_modules zstd
%define compress_vmlinux gz
@@ -42,7 +42,7 @@
Name: kernel-zfcpdump
Version: 6.4.0
%if 0%{?is_kotd}
Release: <RELEASE>.gbaf4c48
Release: <RELEASE>.g33c8f6b
%else
Release: 0
%endif

Binary file not shown.

View File

@@ -7804,6 +7804,7 @@
patches.suse/crypto-af_alg-Decrement-struct-key.usage-in-alg_set_.patch
patches.suse/crypto-qat-use-kfree_sensitive-instead-of-memset-kfr.patch
patches.suse/crypto-api-Use-work-queue-in-crypto_destroy_instance.patch
patches.suse/crypto-lib-mpi-avoid-null-pointer-deref-in-mpi_cmp_u.patch
patches.suse/crypto-jitter-Add-clarifying-comments-to-Jitter-Entr.patch
patches.suse/crypto-caam-fix-unchecked-return-value-error.patch
patches.suse/crypto-qat-Remove-unused-function-declarations.patch
@@ -31802,6 +31803,7 @@
patches.suse/ahci-add-PCI-ID-for-Marvell-88SE9215-SATA-Controller.patch
patches.suse/ata-libata-Fix-NCQ-Non-Data-log-not-supported-print.patch
patches.suse/scsi-st-Restore-some-drive-settings-after-reset.patch
patches.suse/scsi-mpi3mr-Synchronous-access-b-w-reset-and-tm-thread-for.patch
patches.suse/scsi-lpfc-Reduce-log-message-generation-during-ELS-r.patch
patches.suse/scsi-lpfc-Free-phba-irq-in-lpfc_sli4_enable_msi-when.patch
patches.suse/scsi-lpfc-Ignore-ndlp-rport-mismatch-in-dev_loss_tmo.patch
@@ -34674,6 +34676,7 @@
patches.suse/ASoC-rt5682s-Adjust-SAR-ADC-button-mode-to-fix-noise.patch
patches.suse/ALSA-hda-realtek-Fix-mute-led-for-HP-Laptop-15-dw4xx.patch
patches.suse/crypto-af_alg-Set-merge-to-zero-early-in-af_alg_send.patch
patches.suse/crypto-af_alg-Disallow-concurrent-writes-in-af_alg_s.patch
patches.suse/mmc-mvsdio-Fix-dma_unmap_sg-nents-value.patch
patches.suse/iommu-vt-d-Fix-__domain_mapping-s-usage-of-switch_to.patch
patches.suse/firewire-core-fix-overlooked-update-of-subsystem-ABI.patch
@@ -34681,6 +34684,7 @@
patches.suse/IB-mlx5-Fix-obj_type-mismatch-for-SRQ-event-subscrip.patch
patches.suse/cpufreq-Initialize-cpufreq-based-invariance-before-subsys.patch
patches.suse/arm64-dts-imx8mp-Correct-thermal-sensor-index.patch
patches.suse/crypto-af_alg-Fix-incorrect-boolean-values-in-af_alg.patch
patches.suse/tracing-dynevent-Add-a-missing-lockdown-check-on-dynevent.patch
patches.suse/vhost-Take-a-reference-on-the-task-in-struct-vhost_t.patch
patches.suse/Bluetooth-hci_sync-Fix-hci_resume_advertising_sync.patch
@@ -35438,6 +35442,7 @@
patches.suse/cpuidle-menu-Use-residency-threshold-in-polling-state-override-decisions.patch
patches.suse/KEYS-trusted-Fix-a-memory-leak-in-tpm2_load_cmd.patch
patches.suse/ima-Handle-error-code-returned-by-ima_filter_rule_ma.patch
patches.suse/crypto-af_alg-zero-initialize-memory-allocated-via-s.patch
patches.suse/crypto-authenc-Correctly-pass-EINPROGRESS-back-up-to.patch
patches.suse/crypto-asymmetric_keys-prevent-overflow-in-asymmetri.patch
patches.suse/crypto-hisilicon-qm-restore-original-qos-values.patch
@@ -35620,18 +35625,24 @@
patches.suse/msft-hv-3440-net-hv_netvsc-reject-RSS-hash-key-programming-withou.patch
patches.suse/ipv6-Fix-use-after-free-in-inet6_addr_del.patch
patches.suse/net-sched-sch_qfq-do-not-free-existing-class-in-qfq_.patch
patches.suse/btrfs-send-check-for-inline-extents-in-range_is_hole.patch
patches.suse/btrfs-reject-new-transactions-if-the-fs-is-fully-rea.patch
patches.suse/net-sched-Enforce-that-teql-can-only-be-used-as-root.patch
patches.suse/x86-make-page-fault-handling-disable-interrupts-prop.patch
patches.suse/crypto-authencesn-reject-too-short-AAD-assoclen-8-to.patch
patches.suse/ALSA-usb-audio-Fix-use-after-free-in-snd_usb_mixer_f.patch
patches.suse/clocksource-Reduce-watchdog-readout-delay-limit-to-p.patch
patches.suse/msft-hv-3448-scsi-storvsc-Process-unsupported-MODE_SENSE_10.patch
patches.suse/btrfs-do-not-strictly-require-dirty-metadata-thresho.patch
patches.suse/macvlan-fix-error-recovery-in-macvlan_common_newlink.patch
patches.suse/ALSA-aloop-Fix-racy-access-at-PCM-trigger.patch
patches.suse/spi-tegra210-quad-Return-IRQ_HANDLED-when-timeout-already-.patch
patches.suse/spi-tegra210-quad-Move-curr_xfer-read-inside-spinlock.patch
patches.suse/spi-tegra210-quad-Protect-curr_xfer-assignment-in-tegra_qs.patch
patches.suse/spi-tegra210-quad-Protect-curr_xfer-in-tegra_qspi_combined.patch
patches.suse/spi-tegra210-quad-Protect-curr_xfer-clearing-in-tegra_qspi.patch
patches.suse/spi-tegra210-quad-Protect-curr_xfer-check-in-IRQ-handler.patch
patches.suse/macvlan-observe-an-RCU-grace-period-in-macvlan_commo.patch
# netdev/net-next main
patches.suse/ice-use-netif_get_num_default_rss_queues.patch

View File

@@ -1,3 +1,3 @@
2026-02-21 00:32:15 +0000
GIT Revision: baf4c488af6bfa6b842c91bee4aec8becbfb31ec
2026-02-26 00:30:49 +0000
GIT Revision: 33c8f6b70d994f3d3f0fe4726034f9f6f322dfdf
GIT Branch: SLE15-SP6-LTSS