From null at suse.de Mon Dec 1 19:08:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 01 Dec 2025 19:08:20 -0000 Subject: SUSE-SU-2025:4315-1: important: Security update for the Linux Kernel Message-ID: <176461610032.30264.3413118473825103700@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:4315-1 Release Date: 2025-12-01T10:12:40Z Rating: important References: * bsc#1078788 * bsc#1209291 * bsc#1213666 * bsc#1244824 * bsc#1246911 * bsc#1247374 * bsc#1248621 * bsc#1249200 * bsc#1249220 * bsc#1249604 * bsc#1249808 * bsc#1249846 * bsc#1249880 * bsc#1249988 * bsc#1250257 * bsc#1250311 * bsc#1250323 * bsc#1250358 * bsc#1250392 * bsc#1250522 * bsc#1250742 * bsc#1252035 * bsc#1252499 * bsc#1252554 * bsc#963449 * jsc#PED-8240 Cross-References: * CVE-2022-50116 * CVE-2022-50252 * CVE-2022-50272 * CVE-2022-50381 * CVE-2022-50409 * CVE-2023-28328 * CVE-2023-3772 * CVE-2023-53147 * CVE-2023-53282 * CVE-2023-53322 * CVE-2023-53365 * CVE-2023-53395 * CVE-2023-53705 * CVE-2023-53722 * CVE-2025-38352 * CVE-2025-38498 * CVE-2025-38617 * CVE-2025-38685 * CVE-2025-38713 * CVE-2025-39973 CVSS scores: * CVE-2022-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50252 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50381 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50381 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-28328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53282 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53282 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53322 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53322 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53395 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53395 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53705 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53705 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2023-53722 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53722 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38352 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38352 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38352 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38498 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38498 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38713 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38713 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-39973 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 11 SP4 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE An update that solves 20 vulnerabilities, contains one feature and has five security fixes can now be installed. ## Description: The SUSE Linux Enterprise 11 SP4 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2022-50116: Update config files. Disable N_GSM (bsc#1244824 jsc#PED-8240). * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846). * CVE-2022-50381: MD: add rdev reference for super write (bsc#1250257). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250392). * CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1250311). * CVE-2023-53322: scsi: qla2xxx: Wait for io return on terminate rport (bsc#1250323). * CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988). * CVE-2023-53395: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer (bsc#1250358). * CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554). * CVE-2023-53722: md: raid1: fix potential OOB in raid1_remove_disk() (bsc#1252499). * CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911). * CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621). * CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220). * CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200). * CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2025-4315=1 * SUSE Linux Enterprise Server 11 SP4 zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2025-4315=1 ## Package List: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (nosrc x86_64) * kernel-default-3.0.101-108.192.1 * kernel-xen-3.0.101-108.192.1 * kernel-trace-3.0.101-108.192.1 * kernel-ec2-3.0.101-108.192.1 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (x86_64) * kernel-default-devel-debuginfo-3.0.101-108.192.1 * kernel-trace-debuginfo-3.0.101-108.192.1 * kernel-ec2-debugsource-3.0.101-108.192.1 * kernel-default-base-3.0.101-108.192.1 * kernel-trace-debugsource-3.0.101-108.192.1 * kernel-xen-base-3.0.101-108.192.1 * kernel-trace-base-3.0.101-108.192.1 * kernel-xen-devel-debuginfo-3.0.101-108.192.1 * kernel-trace-devel-debuginfo-3.0.101-108.192.1 * kernel-source-3.0.101-108.192.1 * kernel-syms-3.0.101-108.192.1 * kernel-xen-devel-3.0.101-108.192.1 * kernel-trace-devel-3.0.101-108.192.1 * kernel-default-debugsource-3.0.101-108.192.1 * kernel-ec2-devel-3.0.101-108.192.1 * kernel-ec2-base-3.0.101-108.192.1 * kernel-xen-debuginfo-3.0.101-108.192.1 * kernel-xen-debugsource-3.0.101-108.192.1 * kernel-default-debuginfo-3.0.101-108.192.1 * kernel-default-devel-3.0.101-108.192.1 * kernel-ec2-debuginfo-3.0.101-108.192.1 * kernel-ec2-devel-debuginfo-3.0.101-108.192.1 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (noarch nosrc) * kernel-docs-3.0.101-108.192.1 * SUSE Linux Enterprise Server 11 SP4 (nosrc x86_64) * kernel-default-3.0.101-108.192.1 * kernel-xen-3.0.101-108.192.1 * kernel-trace-3.0.101-108.192.1 * kernel-ec2-3.0.101-108.192.1 * SUSE Linux Enterprise Server 11 SP4 (x86_64) * kernel-default-devel-debuginfo-3.0.101-108.192.1 * kernel-trace-debuginfo-3.0.101-108.192.1 * kernel-ec2-debugsource-3.0.101-108.192.1 * kernel-default-base-3.0.101-108.192.1 * kernel-trace-debugsource-3.0.101-108.192.1 * kernel-xen-base-3.0.101-108.192.1 * kernel-trace-base-3.0.101-108.192.1 * kernel-xen-devel-debuginfo-3.0.101-108.192.1 * kernel-trace-devel-debuginfo-3.0.101-108.192.1 * kernel-source-3.0.101-108.192.1 * kernel-syms-3.0.101-108.192.1 * kernel-xen-devel-3.0.101-108.192.1 * kernel-trace-devel-3.0.101-108.192.1 * kernel-default-debugsource-3.0.101-108.192.1 * kernel-ec2-devel-3.0.101-108.192.1 * kernel-ec2-base-3.0.101-108.192.1 * kernel-xen-debuginfo-3.0.101-108.192.1 * kernel-xen-debugsource-3.0.101-108.192.1 * kernel-default-debuginfo-3.0.101-108.192.1 * kernel-default-devel-3.0.101-108.192.1 * kernel-ec2-debuginfo-3.0.101-108.192.1 * kernel-ec2-devel-debuginfo-3.0.101-108.192.1 * SUSE Linux Enterprise Server 11 SP4 (noarch nosrc) * kernel-docs-3.0.101-108.192.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50116.html * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2022-50272.html * https://www.suse.com/security/cve/CVE-2022-50381.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2023-28328.html * https://www.suse.com/security/cve/CVE-2023-3772.html * https://www.suse.com/security/cve/CVE-2023-53147.html * https://www.suse.com/security/cve/CVE-2023-53282.html * https://www.suse.com/security/cve/CVE-2023-53322.html * https://www.suse.com/security/cve/CVE-2023-53365.html * https://www.suse.com/security/cve/CVE-2023-53395.html * https://www.suse.com/security/cve/CVE-2023-53705.html * https://www.suse.com/security/cve/CVE-2023-53722.html * https://www.suse.com/security/cve/CVE-2025-38352.html * https://www.suse.com/security/cve/CVE-2025-38498.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38713.html * https://www.suse.com/security/cve/CVE-2025-39973.html * https://bugzilla.suse.com/show_bug.cgi?id=1078788 * https://bugzilla.suse.com/show_bug.cgi?id=1209291 * https://bugzilla.suse.com/show_bug.cgi?id=1213666 * https://bugzilla.suse.com/show_bug.cgi?id=1244824 * https://bugzilla.suse.com/show_bug.cgi?id=1246911 * https://bugzilla.suse.com/show_bug.cgi?id=1247374 * https://bugzilla.suse.com/show_bug.cgi?id=1248621 * https://bugzilla.suse.com/show_bug.cgi?id=1249200 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249808 * https://bugzilla.suse.com/show_bug.cgi?id=1249846 * https://bugzilla.suse.com/show_bug.cgi?id=1249880 * https://bugzilla.suse.com/show_bug.cgi?id=1249988 * https://bugzilla.suse.com/show_bug.cgi?id=1250257 * https://bugzilla.suse.com/show_bug.cgi?id=1250311 * https://bugzilla.suse.com/show_bug.cgi?id=1250323 * https://bugzilla.suse.com/show_bug.cgi?id=1250358 * https://bugzilla.suse.com/show_bug.cgi?id=1250392 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250742 * https://bugzilla.suse.com/show_bug.cgi?id=1252035 * https://bugzilla.suse.com/show_bug.cgi?id=1252499 * https://bugzilla.suse.com/show_bug.cgi?id=1252554 * https://bugzilla.suse.com/show_bug.cgi?id=963449 * https://jira.suse.com/browse/PED-8240 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 1 19:08:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 01 Dec 2025 19:08:22 -0000 Subject: SUSE-SU-2025:4313-1: low: Security update for python Message-ID: <176461610298.30264.113221698726952235@smelt2.prg2.suse.org> # Security update for python Announcement ID: SUSE-SU-2025:4313-1 Release Date: 2025-12-01T09:31:56Z Rating: low References: * bsc#1251305 Cross-References: * CVE-2025-8291 CVSS scores: * CVE-2025-8291 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-8291 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-8291 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python fixes the following issues: * CVE-2025-8291: Check the validity the ZIP64 End of Central Directory (EOCD). (bsc#1251305) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4313=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4313=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4313=1 ## Package List: * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * python-base-debugsource-2.7.18-150000.86.1 * python-curses-2.7.18-150000.86.1 * python-gdbm-2.7.18-150000.86.1 * python-xml-2.7.18-150000.86.1 * python-gdbm-debuginfo-2.7.18-150000.86.1 * python-xml-debuginfo-2.7.18-150000.86.1 * python-2.7.18-150000.86.1 * python-debuginfo-2.7.18-150000.86.1 * libpython2_7-1_0-2.7.18-150000.86.1 * python-curses-debuginfo-2.7.18-150000.86.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.86.1 * python-debugsource-2.7.18-150000.86.1 * python-base-2.7.18-150000.86.1 * python-base-debuginfo-2.7.18-150000.86.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * python-base-debugsource-2.7.18-150000.86.1 * python-curses-2.7.18-150000.86.1 * python-gdbm-2.7.18-150000.86.1 * python-xml-2.7.18-150000.86.1 * python-gdbm-debuginfo-2.7.18-150000.86.1 * python-xml-debuginfo-2.7.18-150000.86.1 * python-2.7.18-150000.86.1 * python-debuginfo-2.7.18-150000.86.1 * libpython2_7-1_0-2.7.18-150000.86.1 * python-curses-debuginfo-2.7.18-150000.86.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.86.1 * python-debugsource-2.7.18-150000.86.1 * python-base-2.7.18-150000.86.1 * python-base-debuginfo-2.7.18-150000.86.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python-base-debugsource-2.7.18-150000.86.1 * python-curses-2.7.18-150000.86.1 * python-devel-2.7.18-150000.86.1 * python-gdbm-2.7.18-150000.86.1 * python-gdbm-debuginfo-2.7.18-150000.86.1 * python-xml-2.7.18-150000.86.1 * python-xml-debuginfo-2.7.18-150000.86.1 * python-tk-2.7.18-150000.86.1 * python-idle-2.7.18-150000.86.1 * python-2.7.18-150000.86.1 * python-debuginfo-2.7.18-150000.86.1 * libpython2_7-1_0-2.7.18-150000.86.1 * python-curses-debuginfo-2.7.18-150000.86.1 * python-demo-2.7.18-150000.86.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.86.1 * python-debugsource-2.7.18-150000.86.1 * python-tk-debuginfo-2.7.18-150000.86.1 * python-base-2.7.18-150000.86.1 * python-base-debuginfo-2.7.18-150000.86.1 * openSUSE Leap 15.6 (x86_64) * libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.86.1 * python-base-32bit-debuginfo-2.7.18-150000.86.1 * python-base-32bit-2.7.18-150000.86.1 * python-32bit-debuginfo-2.7.18-150000.86.1 * python-32bit-2.7.18-150000.86.1 * libpython2_7-1_0-32bit-2.7.18-150000.86.1 * openSUSE Leap 15.6 (noarch) * python-doc-pdf-2.7.18-150000.86.1 * python-doc-2.7.18-150000.86.1 ## References: * https://www.suse.com/security/cve/CVE-2025-8291.html * https://bugzilla.suse.com/show_bug.cgi?id=1251305 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 3 21:58:56 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 03 Dec 2025 21:58:56 -0000 Subject: SUSE-SU-2025:4319-1: important: Security update for cups Message-ID: <176479913632.30265.1827838609602887548@smelt2.prg2.suse.org> # Security update for cups Announcement ID: SUSE-SU-2025:4319-1 Release Date: 2025-12-03T12:34:37Z Rating: important References: * bsc#1254353 Cross-References: * CVE-2025-58436 CVSS scores: * CVE-2025-58436 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-58436 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58436 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for cups fixes the following issues: * The fix for CVE-2025-58436 causes a regression where GTK applications will hang. (bsc#1254353) See also https://github.com/OpenPrinting/cups/issues/1429 The fix has been temporary disabled. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4319=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4319=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4319=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4319=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4319=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4319=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4319=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4319=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-4319=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-4319=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-4319=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-4319=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4319=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4319=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cups-2.2.7-150000.3.80.1 * cups-config-2.2.7-150000.3.80.1 * cups-ddk-debuginfo-2.2.7-150000.3.80.1 * libcupscgi1-debuginfo-2.2.7-150000.3.80.1 * cups-client-debuginfo-2.2.7-150000.3.80.1 * cups-client-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * libcupsimage2-2.2.7-150000.3.80.1 * libcups2-2.2.7-150000.3.80.1 * libcupscgi1-2.2.7-150000.3.80.1 * libcups2-debuginfo-2.2.7-150000.3.80.1 * libcupsmime1-debuginfo-2.2.7-150000.3.80.1 * libcupsmime1-2.2.7-150000.3.80.1 * libcupsppdc1-2.2.7-150000.3.80.1 * libcupsimage2-debuginfo-2.2.7-150000.3.80.1 * cups-devel-2.2.7-150000.3.80.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 * cups-ddk-2.2.7-150000.3.80.1 * openSUSE Leap 15.6 (x86_64) * libcupsmime1-32bit-debuginfo-2.2.7-150000.3.80.1 * libcupsimage2-32bit-2.2.7-150000.3.80.1 * cups-devel-32bit-2.2.7-150000.3.80.1 * libcupscgi1-32bit-2.2.7-150000.3.80.1 * libcupsmime1-32bit-2.2.7-150000.3.80.1 * libcupsimage2-32bit-debuginfo-2.2.7-150000.3.80.1 * libcups2-32bit-debuginfo-2.2.7-150000.3.80.1 * libcupsppdc1-32bit-2.2.7-150000.3.80.1 * libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.80.1 * libcups2-32bit-2.2.7-150000.3.80.1 * libcupscgi1-32bit-debuginfo-2.2.7-150000.3.80.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * cups-config-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * libcups2-2.2.7-150000.3.80.1 * libcups2-debuginfo-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * cups-config-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * libcups2-2.2.7-150000.3.80.1 * libcups2-debuginfo-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * cups-config-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * libcups2-2.2.7-150000.3.80.1 * libcups2-debuginfo-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * cups-config-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * libcups2-2.2.7-150000.3.80.1 * libcups2-debuginfo-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * cups-config-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * libcups2-2.2.7-150000.3.80.1 * libcups2-debuginfo-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cups-2.2.7-150000.3.80.1 * cups-config-2.2.7-150000.3.80.1 * libcupscgi1-debuginfo-2.2.7-150000.3.80.1 * cups-client-debuginfo-2.2.7-150000.3.80.1 * cups-client-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * libcupsimage2-2.2.7-150000.3.80.1 * libcups2-2.2.7-150000.3.80.1 * libcupscgi1-2.2.7-150000.3.80.1 * libcups2-debuginfo-2.2.7-150000.3.80.1 * libcupsmime1-debuginfo-2.2.7-150000.3.80.1 * libcupsmime1-2.2.7-150000.3.80.1 * libcupsppdc1-2.2.7-150000.3.80.1 * libcupsimage2-debuginfo-2.2.7-150000.3.80.1 * cups-devel-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.80.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * cups-2.2.7-150000.3.80.1 * cups-config-2.2.7-150000.3.80.1 * libcupscgi1-debuginfo-2.2.7-150000.3.80.1 * cups-client-debuginfo-2.2.7-150000.3.80.1 * cups-client-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * libcupsimage2-2.2.7-150000.3.80.1 * libcups2-2.2.7-150000.3.80.1 * libcupscgi1-2.2.7-150000.3.80.1 * libcups2-debuginfo-2.2.7-150000.3.80.1 * libcupsmime1-debuginfo-2.2.7-150000.3.80.1 * libcupsmime1-2.2.7-150000.3.80.1 * libcupsppdc1-2.2.7-150000.3.80.1 * libcupsimage2-debuginfo-2.2.7-150000.3.80.1 * cups-devel-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 * libcupsppdc1-debuginfo-2.2.7-150000.3.80.1 * Desktop Applications Module 15-SP6 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.80.1 * libcups2-32bit-2.2.7-150000.3.80.1 * Desktop Applications Module 15-SP7 (x86_64) * libcups2-32bit-debuginfo-2.2.7-150000.3.80.1 * libcups2-32bit-2.2.7-150000.3.80.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cups-ddk-debuginfo-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 * cups-ddk-2.2.7-150000.3.80.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * cups-ddk-debuginfo-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 * cups-ddk-2.2.7-150000.3.80.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * cups-config-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * libcups2-2.2.7-150000.3.80.1 * libcups2-debuginfo-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * cups-config-2.2.7-150000.3.80.1 * cups-debuginfo-2.2.7-150000.3.80.1 * libcups2-2.2.7-150000.3.80.1 * libcups2-debuginfo-2.2.7-150000.3.80.1 * cups-debugsource-2.2.7-150000.3.80.1 ## References: * https://www.suse.com/security/cve/CVE-2025-58436.html * https://bugzilla.suse.com/show_bug.cgi?id=1254353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 4 21:50:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 04 Dec 2025 21:50:09 -0000 Subject: SUSE-SU-2025:4320-1: important: Security update for the Linux Kernel Message-ID: <176488500987.32295.8945660821453001812@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:4320-1 Release Date: 2025-12-04T10:04:36Z Rating: important References: * bsc#1065729 * bsc#1205128 * bsc#1206843 * bsc#1206893 * bsc#1207612 * bsc#1207619 * bsc#1210763 * bsc#1211162 * bsc#1211692 * bsc#1213098 * bsc#1213114 * bsc#1213747 * bsc#1214754 * bsc#1214954 * bsc#1214992 * bsc#1215148 * bsc#1217366 * bsc#1236104 * bsc#1242960 * bsc#1245498 * bsc#1245499 * bsc#1246211 * bsc#1247317 * bsc#1248754 * bsc#1249479 * bsc#1249608 * bsc#1249857 * bsc#1249859 * bsc#1249988 * bsc#1250237 * bsc#1250742 * bsc#1250816 * bsc#1250946 * bsc#1251027 * bsc#1251032 * bsc#1251034 * bsc#1251035 * bsc#1251037 * bsc#1251040 * bsc#1251043 * bsc#1251045 * bsc#1251046 * bsc#1251047 * bsc#1251052 * bsc#1251054 * bsc#1251057 * bsc#1251059 * bsc#1251060 * bsc#1251061 * bsc#1251063 * bsc#1251065 * bsc#1251066 * bsc#1251068 * bsc#1251072 * bsc#1251079 * bsc#1251080 * bsc#1251082 * bsc#1251086 * bsc#1251087 * bsc#1251088 * bsc#1251091 * bsc#1251092 * bsc#1251093 * bsc#1251097 * bsc#1251099 * bsc#1251101 * bsc#1251104 * bsc#1251105 * bsc#1251106 * bsc#1251110 * bsc#1251113 * bsc#1251115 * bsc#1251123 * bsc#1251128 * bsc#1251129 * bsc#1251133 * bsc#1251136 * bsc#1251147 * bsc#1251149 * bsc#1251153 * bsc#1251154 * bsc#1251159 * bsc#1251162 * bsc#1251164 * bsc#1251166 * bsc#1251167 * bsc#1251169 * bsc#1251170 * bsc#1251173 * bsc#1251174 * bsc#1251178 * bsc#1251180 * bsc#1251182 * bsc#1251197 * bsc#1251200 * bsc#1251201 * bsc#1251202 * bsc#1251208 * bsc#1251210 * bsc#1251215 * bsc#1251218 * bsc#1251221 * bsc#1251222 * bsc#1251223 * bsc#1251230 * bsc#1251247 * bsc#1251268 * bsc#1251281 * bsc#1251282 * bsc#1251283 * bsc#1251284 * bsc#1251285 * bsc#1251286 * bsc#1251292 * bsc#1251294 * bsc#1251295 * bsc#1251296 * bsc#1251298 * bsc#1251299 * bsc#1251300 * bsc#1251301 * bsc#1251302 * bsc#1251303 * bsc#1251306 * bsc#1251307 * bsc#1251310 * bsc#1251312 * bsc#1251315 * bsc#1251322 * bsc#1251324 * bsc#1251325 * bsc#1251326 * bsc#1251327 * bsc#1251329 * bsc#1251330 * bsc#1251331 * bsc#1251519 * bsc#1251521 * bsc#1251522 * bsc#1251527 * bsc#1251529 * bsc#1251550 * bsc#1251723 * bsc#1251725 * bsc#1251728 * bsc#1251730 * bsc#1251736 * bsc#1251737 * bsc#1251738 * bsc#1251741 * bsc#1251743 * bsc#1251750 * bsc#1251753 * bsc#1251759 * bsc#1251761 * bsc#1251762 * bsc#1251763 * bsc#1251764 * bsc#1251767 * bsc#1251769 * bsc#1251772 * bsc#1251775 * bsc#1251777 * bsc#1251785 * bsc#1251823 * bsc#1251930 * bsc#1251967 * bsc#1252033 * bsc#1252035 * bsc#1252047 * bsc#1252060 * bsc#1252069 * bsc#1252265 * bsc#1252473 * bsc#1252474 * bsc#1252475 * bsc#1252476 * bsc#1252480 * bsc#1252484 * bsc#1252486 * bsc#1252489 * bsc#1252490 * bsc#1252492 * bsc#1252494 * bsc#1252495 * bsc#1252497 * bsc#1252499 * bsc#1252501 * bsc#1252508 * bsc#1252509 * bsc#1252513 * bsc#1252515 * bsc#1252516 * bsc#1252519 * bsc#1252521 * bsc#1252522 * bsc#1252523 * bsc#1252526 * bsc#1252528 * bsc#1252529 * bsc#1252532 * bsc#1252534 * bsc#1252535 * bsc#1252536 * bsc#1252537 * bsc#1252538 * bsc#1252539 * bsc#1252542 * bsc#1252545 * bsc#1252549 * bsc#1252554 * bsc#1252560 * bsc#1252564 * bsc#1252565 * bsc#1252568 * bsc#1252632 * bsc#1252634 * bsc#1252688 * bsc#1252785 * bsc#1252893 * jsc#PED-1166 * jsc#PED-1168 * jsc#PED-1170 * jsc#PED-1218 * jsc#PED-1220 * jsc#PED-1222 * jsc#PED-1223 * jsc#PED-1225 * jsc#PED-1549 * jsc#PED-2849 * jsc#PED-4593 * jsc#PED-568 Cross-References: * CVE-2022-43945 * CVE-2022-50327 * CVE-2022-50334 * CVE-2022-50470 * CVE-2022-50471 * CVE-2022-50472 * CVE-2022-50475 * CVE-2022-50478 * CVE-2022-50479 * CVE-2022-50480 * CVE-2022-50482 * CVE-2022-50484 * CVE-2022-50485 * CVE-2022-50487 * CVE-2022-50488 * CVE-2022-50489 * CVE-2022-50490 * CVE-2022-50492 * CVE-2022-50493 * CVE-2022-50494 * CVE-2022-50496 * CVE-2022-50497 * CVE-2022-50498 * CVE-2022-50499 * CVE-2022-50501 * CVE-2022-50503 * CVE-2022-50504 * CVE-2022-50505 * CVE-2022-50509 * CVE-2022-50511 * CVE-2022-50512 * CVE-2022-50513 * CVE-2022-50514 * CVE-2022-50515 * CVE-2022-50516 * CVE-2022-50519 * CVE-2022-50520 * CVE-2022-50521 * CVE-2022-50523 * CVE-2022-50524 * CVE-2022-50525 * CVE-2022-50526 * CVE-2022-50527 * CVE-2022-50528 * CVE-2022-50529 * CVE-2022-50530 * CVE-2022-50532 * CVE-2022-50534 * CVE-2022-50535 * CVE-2022-50537 * CVE-2022-50541 * CVE-2022-50542 * CVE-2022-50543 * CVE-2022-50544 * CVE-2022-50545 * CVE-2022-50546 * CVE-2022-50549 * CVE-2022-50551 * CVE-2022-50553 * CVE-2022-50556 * CVE-2022-50559 * CVE-2022-50560 * CVE-2022-50561 * CVE-2022-50562 * CVE-2022-50563 * CVE-2022-50564 * CVE-2022-50566 * CVE-2022-50567 * CVE-2022-50568 * CVE-2022-50570 * CVE-2022-50572 * CVE-2022-50574 * CVE-2022-50575 * CVE-2022-50576 * CVE-2022-50577 * CVE-2022-50578 * CVE-2022-50579 * CVE-2022-50580 * CVE-2022-50581 * CVE-2022-50582 * CVE-2023-52923 * CVE-2023-53365 * CVE-2023-53500 * CVE-2023-53533 * CVE-2023-53534 * CVE-2023-53539 * CVE-2023-53541 * CVE-2023-53542 * CVE-2023-53546 * CVE-2023-53547 * CVE-2023-53548 * CVE-2023-53551 * CVE-2023-53552 * CVE-2023-53553 * CVE-2023-53554 * CVE-2023-53556 * CVE-2023-53557 * CVE-2023-53559 * CVE-2023-53560 * CVE-2023-53562 * CVE-2023-53564 * CVE-2023-53566 * CVE-2023-53567 * CVE-2023-53568 * CVE-2023-53571 * CVE-2023-53572 * CVE-2023-53574 * CVE-2023-53578 * CVE-2023-53579 * CVE-2023-53580 * CVE-2023-53581 * CVE-2023-53582 * CVE-2023-53587 * CVE-2023-53589 * CVE-2023-53591 * CVE-2023-53592 * CVE-2023-53594 * CVE-2023-53597 * CVE-2023-53598 * CVE-2023-53601 * CVE-2023-53603 * CVE-2023-53604 * CVE-2023-53605 * CVE-2023-53607 * CVE-2023-53608 * CVE-2023-53611 * CVE-2023-53612 * CVE-2023-53615 * CVE-2023-53616 * CVE-2023-53617 * CVE-2023-53619 * CVE-2023-53622 * CVE-2023-53625 * CVE-2023-53626 * CVE-2023-53631 * CVE-2023-53637 * CVE-2023-53639 * CVE-2023-53640 * CVE-2023-53641 * CVE-2023-53644 * CVE-2023-53648 * CVE-2023-53650 * CVE-2023-53651 * CVE-2023-53658 * CVE-2023-53659 * CVE-2023-53662 * CVE-2023-53667 * CVE-2023-53668 * CVE-2023-53670 * CVE-2023-53673 * CVE-2023-53674 * CVE-2023-53675 * CVE-2023-53679 * CVE-2023-53680 * CVE-2023-53681 * CVE-2023-53683 * CVE-2023-53687 * CVE-2023-53692 * CVE-2023-53693 * CVE-2023-53695 * CVE-2023-53696 * CVE-2023-53697 * CVE-2023-53700 * CVE-2023-53704 * CVE-2023-53705 * CVE-2023-53707 * CVE-2023-53708 * CVE-2023-53709 * CVE-2023-53711 * CVE-2023-53715 * CVE-2023-53716 * CVE-2023-53717 * CVE-2023-53718 * CVE-2023-53719 * CVE-2023-53722 * CVE-2023-53723 * CVE-2023-53724 * CVE-2023-53725 * CVE-2023-53726 * CVE-2023-53730 * CVE-2023-7324 * CVE-2025-37885 * CVE-2025-38084 * CVE-2025-38085 * CVE-2025-38476 * CVE-2025-39742 * CVE-2025-39797 * CVE-2025-39945 * CVE-2025-39965 * CVE-2025-39967 * CVE-2025-39968 * CVE-2025-39973 * CVE-2025-39978 * CVE-2025-39981 * CVE-2025-40018 * CVE-2025-40044 CVSS scores: * CVE-2022-43945 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50334 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50334 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50334 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50470 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50470 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50471 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50472 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50475 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50478 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50479 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50479 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50480 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50480 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50482 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50482 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50484 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50485 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50485 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50487 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50487 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50488 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50488 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50489 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50492 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50492 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50493 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50493 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50494 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50496 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50496 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50497 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50497 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50498 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50498 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50499 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50499 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50504 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50512 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50513 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50513 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50519 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50519 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-50520 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50527 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50528 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50534 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50541 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-50541 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2022-50542 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50542 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50544 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50545 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50546 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50551 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50556 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50559 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50560 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50561 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50561 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50563 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50563 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50564 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50566 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50566 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50567 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50567 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50570 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50570 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-50572 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50575 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-50575 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-50576 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50576 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50577 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50577 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50578 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50578 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50579 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50579 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50580 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50580 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50581 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50581 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50582 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50582 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53500 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53533 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53534 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53539 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53539 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53541 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53541 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53542 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53546 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53547 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53547 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53564 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53571 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53572 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53574 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53574 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53580 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53580 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53581 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53581 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53582 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53587 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53587 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53589 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2023-53591 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53592 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53592 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53598 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53604 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53604 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53605 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53605 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53608 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53608 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53612 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53612 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53616 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53616 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53619 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53619 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53622 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53622 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53625 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53626 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53626 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-53631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53639 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53639 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53640 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53640 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53641 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53644 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53650 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53651 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53651 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53659 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53659 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53662 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53662 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53667 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53667 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53668 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-53670 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53670 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53673 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53674 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53674 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53680 ( SUSE ): 5.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53680 ( SUSE ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53681 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53681 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53683 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53683 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53687 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53687 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53695 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53695 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-53696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53697 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53697 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53704 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53704 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53705 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53705 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2023-53707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53708 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53708 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53711 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2023-53711 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-53715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53716 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53717 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53718 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53718 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53719 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53719 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53722 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53722 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53723 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53723 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53724 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53724 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53725 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53725 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53730 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7324 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-7324 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38084 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38084 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38085 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38085 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39742 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39945 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39965 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39965 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39967 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39968 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39968 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39973 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39978 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39981 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39981 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40018 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40044 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 196 vulnerabilities, contains 12 features and has 24 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859). * CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251164). * CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741). * CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988). * CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816). * CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052). * CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222). * CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743). * CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763). * CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554). * CVE-2025-37885: KVM: x86: Reset IRTE to host control if _new_ route isn't postable (bsc#1242960). * CVE-2025-38084: hugetlb: unshare some PMDs when splitting VMAs (bsc#1245498). * CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245499). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1247317). * CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (bsc#1249479). * CVE-2025-39797: xfrm: Duplicate SPI Handling (bsc#1249608). * CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230). * CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033). * CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047). * CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035). * CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069). * CVE-2025-39981: Bluetooth: MGMT: Fix possible UAFs (bsc#1252060). * CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688). * CVE-2025-40044: fs: udf: fix OOB read in lengthAllocDescs handling (bsc#1252785). The following non security issues were fixed: * NFS: remove revoked delegation from server's delegation list (bsc#1246211). * NFSv4: Allow FREE_STATEID to clean up delegations (bsc#1246211). * fbcon: Fix OOB access in font allocation (bsc#1252033) * kabi fix for NFSv4: Allow FREE_STATEID to clean up delegations (bsc#1246211). * kernel-subpackage-spec: Do not doubly-sign modules (bsc#1251930). * mm: avoid unnecessary page fault retires on shared memory types (bsc#1251823). * net: hv_netvsc: fix loss of early receive events from host during channel open (bsc#1252265). * net: mana: Switch to page pool for jumbo frames (bsc#1248754). * net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency (bsc#1248754). * netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237). * rpm/check-for-config-changes: ignore CONFIG_SCHED_PROXY_EXEC, too (bsc#1250946) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4320=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4320=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4320=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4320=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4320=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-4320=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4320=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.127.1 * kernel-default-debuginfo-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * kernel-macros-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * gfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1 * dlm-kmp-default-5.14.21-150500.55.127.1 * kernel-obs-build-debugsource-5.14.21-150500.55.127.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-default-devel-5.14.21-150500.55.127.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.127.1 * kernel-syms-5.14.21-150500.55.127.1 * kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1 * kernel-obs-build-5.14.21-150500.55.127.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-default-debugsource-5.14.21-150500.55.127.1 * kernel-default-debuginfo-5.14.21-150500.55.127.1 * ocfs2-kmp-default-5.14.21-150500.55.127.1 * gfs2-kmp-default-5.14.21-150500.55.127.1 * cluster-md-kmp-default-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150500.55.127.1 * kernel-64kb-devel-5.14.21-150500.55.127.1 * kernel-64kb-debugsource-5.14.21-150500.55.127.1 * kernel-64kb-debuginfo-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * kernel-devel-5.14.21-150500.55.127.1 * kernel-source-5.14.21-150500.55.127.1 * kernel-macros-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * gfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1 * dlm-kmp-default-5.14.21-150500.55.127.1 * kernel-obs-build-debugsource-5.14.21-150500.55.127.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-default-devel-5.14.21-150500.55.127.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.127.1 * kernel-syms-5.14.21-150500.55.127.1 * kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1 * kernel-obs-build-5.14.21-150500.55.127.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-default-debugsource-5.14.21-150500.55.127.1 * kernel-default-debuginfo-5.14.21-150500.55.127.1 * ocfs2-kmp-default-5.14.21-150500.55.127.1 * gfs2-kmp-default-5.14.21-150500.55.127.1 * cluster-md-kmp-default-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150500.55.127.1 * kernel-64kb-devel-5.14.21-150500.55.127.1 * kernel-64kb-debugsource-5.14.21-150500.55.127.1 * kernel-64kb-debuginfo-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * kernel-devel-5.14.21-150500.55.127.1 * kernel-source-5.14.21-150500.55.127.1 * kernel-macros-5.14.21-150500.55.127.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1 * reiserfs-kmp-default-5.14.21-150500.55.127.1 * dlm-kmp-default-5.14.21-150500.55.127.1 * kernel-obs-build-debugsource-5.14.21-150500.55.127.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-default-devel-5.14.21-150500.55.127.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.127.1 * kernel-syms-5.14.21-150500.55.127.1 * kernel-obs-build-5.14.21-150500.55.127.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-default-debugsource-5.14.21-150500.55.127.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-default-debuginfo-5.14.21-150500.55.127.1 * ocfs2-kmp-default-5.14.21-150500.55.127.1 * gfs2-kmp-default-5.14.21-150500.55.127.1 * cluster-md-kmp-default-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150500.55.127.1 * kernel-64kb-devel-5.14.21-150500.55.127.1 * kernel-64kb-debugsource-5.14.21-150500.55.127.1 * kernel-64kb-debuginfo-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * kernel-devel-5.14.21-150500.55.127.1 * kernel-source-5.14.21-150500.55.127.1 * kernel-macros-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc) * kernel-docs-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.127.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * gfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1 * reiserfs-kmp-default-5.14.21-150500.55.127.1 * dlm-kmp-default-5.14.21-150500.55.127.1 * kernel-obs-build-debugsource-5.14.21-150500.55.127.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-default-devel-5.14.21-150500.55.127.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.127.1 * kernel-syms-5.14.21-150500.55.127.1 * kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1 * kernel-obs-build-5.14.21-150500.55.127.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-default-debugsource-5.14.21-150500.55.127.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-default-debuginfo-5.14.21-150500.55.127.1 * ocfs2-kmp-default-5.14.21-150500.55.127.1 * gfs2-kmp-default-5.14.21-150500.55.127.1 * cluster-md-kmp-default-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * kernel-devel-5.14.21-150500.55.127.1 * kernel-source-5.14.21-150500.55.127.1 * kernel-macros-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.127.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_32-debugsource-1-150500.11.3.1 * kernel-default-livepatch-5.14.21-150500.55.127.1 * kernel-default-debugsource-5.14.21-150500.55.127.1 * kernel-default-livepatch-devel-5.14.21-150500.55.127.1 * kernel-livepatch-5_14_21-150500_55_127-default-1-150500.11.3.1 * kernel-default-debuginfo-5.14.21-150500.55.127.1 * kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-1-150500.11.3.1 * openSUSE Leap 15.5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.127.1 * openSUSE Leap 15.5 (noarch) * kernel-macros-5.14.21-150500.55.127.1 * kernel-devel-5.14.21-150500.55.127.1 * kernel-source-vanilla-5.14.21-150500.55.127.1 * kernel-docs-html-5.14.21-150500.55.127.1 * kernel-source-5.14.21-150500.55.127.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1 * kernel-default-base-rebuild-5.14.21-150500.55.127.1.150500.6.61.1 * kernel-kvmsmall-debuginfo-5.14.21-150500.55.127.1 * kernel-kvmsmall-devel-5.14.21-150500.55.127.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.127.1 * kernel-kvmsmall-debugsource-5.14.21-150500.55.127.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-5.14.21-150500.55.127.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kselftests-kmp-default-5.14.21-150500.55.127.1 * kernel-obs-build-5.14.21-150500.55.127.1 * kernel-default-extra-debuginfo-5.14.21-150500.55.127.1 * kernel-default-optional-debuginfo-5.14.21-150500.55.127.1 * ocfs2-kmp-default-5.14.21-150500.55.127.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1 * dlm-kmp-default-5.14.21-150500.55.127.1 * kernel-default-livepatch-5.14.21-150500.55.127.1 * kernel-default-debugsource-5.14.21-150500.55.127.1 * kernel-default-extra-5.14.21-150500.55.127.1 * gfs2-kmp-default-5.14.21-150500.55.127.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.127.1 * kernel-default-optional-5.14.21-150500.55.127.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-default-debuginfo-5.14.21-150500.55.127.1 * cluster-md-kmp-default-5.14.21-150500.55.127.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-obs-build-debugsource-5.14.21-150500.55.127.1 * kernel-syms-5.14.21-150500.55.127.1 * kernel-default-devel-5.14.21-150500.55.127.1 * kselftests-kmp-default-debuginfo-5.14.21-150500.55.127.1 * kernel-obs-qa-5.14.21-150500.55.127.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.127.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.127.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-1-150500.11.3.1 * kernel-default-livepatch-devel-5.14.21-150500.55.127.1 * kernel-livepatch-SLE15-SP5_Update_32-debugsource-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_55_127-default-1-150500.11.3.1 * openSUSE Leap 15.5 (x86_64) * kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.127.1 * kernel-kvmsmall-vdso-5.14.21-150500.55.127.1 * kernel-default-vdso-5.14.21-150500.55.127.1 * kernel-default-vdso-debuginfo-5.14.21-150500.55.127.1 * openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150500.55.127.1 * openSUSE Leap 15.5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.127.1 * openSUSE Leap 15.5 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.127.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.127.1 * openSUSE Leap 15.5 (nosrc) * dtb-aarch64-5.14.21-150500.55.127.1 * openSUSE Leap 15.5 (aarch64) * dtb-hisilicon-5.14.21-150500.55.127.1 * dtb-amd-5.14.21-150500.55.127.1 * dtb-renesas-5.14.21-150500.55.127.1 * dtb-lg-5.14.21-150500.55.127.1 * kernel-64kb-optional-5.14.21-150500.55.127.1 * dtb-sprd-5.14.21-150500.55.127.1 * kernel-64kb-extra-5.14.21-150500.55.127.1 * dtb-freescale-5.14.21-150500.55.127.1 * cluster-md-kmp-64kb-5.14.21-150500.55.127.1 * kernel-64kb-optional-debuginfo-5.14.21-150500.55.127.1 * dtb-cavium-5.14.21-150500.55.127.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.127.1 * dtb-qcom-5.14.21-150500.55.127.1 * dtb-arm-5.14.21-150500.55.127.1 * reiserfs-kmp-64kb-5.14.21-150500.55.127.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.127.1 * dtb-exynos-5.14.21-150500.55.127.1 * dtb-mediatek-5.14.21-150500.55.127.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.127.1 * kernel-64kb-extra-debuginfo-5.14.21-150500.55.127.1 * kernel-64kb-debugsource-5.14.21-150500.55.127.1 * ocfs2-kmp-64kb-5.14.21-150500.55.127.1 * dtb-altera-5.14.21-150500.55.127.1 * dtb-amazon-5.14.21-150500.55.127.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.127.1 * dtb-apple-5.14.21-150500.55.127.1 * dlm-kmp-64kb-debuginfo-5.14.21-150500.55.127.1 * kernel-64kb-debuginfo-5.14.21-150500.55.127.1 * kselftests-kmp-64kb-5.14.21-150500.55.127.1 * dtb-marvell-5.14.21-150500.55.127.1 * kernel-64kb-devel-5.14.21-150500.55.127.1 * dtb-xilinx-5.14.21-150500.55.127.1 * dtb-rockchip-5.14.21-150500.55.127.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.127.1 * gfs2-kmp-64kb-5.14.21-150500.55.127.1 * dtb-broadcom-5.14.21-150500.55.127.1 * dtb-amlogic-5.14.21-150500.55.127.1 * dlm-kmp-64kb-5.14.21-150500.55.127.1 * dtb-allwinner-5.14.21-150500.55.127.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.127.1 * dtb-socionext-5.14.21-150500.55.127.1 * dtb-nvidia-5.14.21-150500.55.127.1 * dtb-apm-5.14.21-150500.55.127.1 * openSUSE Leap 15.5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.127.1 ## References: * https://www.suse.com/security/cve/CVE-2022-43945.html * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50334.html * https://www.suse.com/security/cve/CVE-2022-50470.html * https://www.suse.com/security/cve/CVE-2022-50471.html * https://www.suse.com/security/cve/CVE-2022-50472.html * https://www.suse.com/security/cve/CVE-2022-50475.html * https://www.suse.com/security/cve/CVE-2022-50478.html * https://www.suse.com/security/cve/CVE-2022-50479.html * https://www.suse.com/security/cve/CVE-2022-50480.html * https://www.suse.com/security/cve/CVE-2022-50482.html * https://www.suse.com/security/cve/CVE-2022-50484.html * https://www.suse.com/security/cve/CVE-2022-50485.html * https://www.suse.com/security/cve/CVE-2022-50487.html * https://www.suse.com/security/cve/CVE-2022-50488.html * https://www.suse.com/security/cve/CVE-2022-50489.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2022-50492.html * https://www.suse.com/security/cve/CVE-2022-50493.html * https://www.suse.com/security/cve/CVE-2022-50494.html * https://www.suse.com/security/cve/CVE-2022-50496.html * https://www.suse.com/security/cve/CVE-2022-50497.html * https://www.suse.com/security/cve/CVE-2022-50498.html * https://www.suse.com/security/cve/CVE-2022-50499.html * https://www.suse.com/security/cve/CVE-2022-50501.html * https://www.suse.com/security/cve/CVE-2022-50503.html * https://www.suse.com/security/cve/CVE-2022-50504.html * https://www.suse.com/security/cve/CVE-2022-50505.html * https://www.suse.com/security/cve/CVE-2022-50509.html * https://www.suse.com/security/cve/CVE-2022-50511.html * https://www.suse.com/security/cve/CVE-2022-50512.html * https://www.suse.com/security/cve/CVE-2022-50513.html * https://www.suse.com/security/cve/CVE-2022-50514.html * https://www.suse.com/security/cve/CVE-2022-50515.html * https://www.suse.com/security/cve/CVE-2022-50516.html * https://www.suse.com/security/cve/CVE-2022-50519.html * https://www.suse.com/security/cve/CVE-2022-50520.html * https://www.suse.com/security/cve/CVE-2022-50521.html * https://www.suse.com/security/cve/CVE-2022-50523.html * https://www.suse.com/security/cve/CVE-2022-50524.html * https://www.suse.com/security/cve/CVE-2022-50525.html * https://www.suse.com/security/cve/CVE-2022-50526.html * https://www.suse.com/security/cve/CVE-2022-50527.html * https://www.suse.com/security/cve/CVE-2022-50528.html * https://www.suse.com/security/cve/CVE-2022-50529.html * https://www.suse.com/security/cve/CVE-2022-50530.html * https://www.suse.com/security/cve/CVE-2022-50532.html * https://www.suse.com/security/cve/CVE-2022-50534.html * https://www.suse.com/security/cve/CVE-2022-50535.html * https://www.suse.com/security/cve/CVE-2022-50537.html * https://www.suse.com/security/cve/CVE-2022-50541.html * https://www.suse.com/security/cve/CVE-2022-50542.html * https://www.suse.com/security/cve/CVE-2022-50543.html * https://www.suse.com/security/cve/CVE-2022-50544.html * https://www.suse.com/security/cve/CVE-2022-50545.html * https://www.suse.com/security/cve/CVE-2022-50546.html * https://www.suse.com/security/cve/CVE-2022-50549.html * https://www.suse.com/security/cve/CVE-2022-50551.html * https://www.suse.com/security/cve/CVE-2022-50553.html * https://www.suse.com/security/cve/CVE-2022-50556.html * https://www.suse.com/security/cve/CVE-2022-50559.html * https://www.suse.com/security/cve/CVE-2022-50560.html * https://www.suse.com/security/cve/CVE-2022-50561.html * https://www.suse.com/security/cve/CVE-2022-50562.html * https://www.suse.com/security/cve/CVE-2022-50563.html * https://www.suse.com/security/cve/CVE-2022-50564.html * https://www.suse.com/security/cve/CVE-2022-50566.html * https://www.suse.com/security/cve/CVE-2022-50567.html * https://www.suse.com/security/cve/CVE-2022-50568.html * https://www.suse.com/security/cve/CVE-2022-50570.html * https://www.suse.com/security/cve/CVE-2022-50572.html * https://www.suse.com/security/cve/CVE-2022-50574.html * https://www.suse.com/security/cve/CVE-2022-50575.html * https://www.suse.com/security/cve/CVE-2022-50576.html * https://www.suse.com/security/cve/CVE-2022-50577.html * https://www.suse.com/security/cve/CVE-2022-50578.html * https://www.suse.com/security/cve/CVE-2022-50579.html * https://www.suse.com/security/cve/CVE-2022-50580.html * https://www.suse.com/security/cve/CVE-2022-50581.html * https://www.suse.com/security/cve/CVE-2022-50582.html * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2023-53365.html * https://www.suse.com/security/cve/CVE-2023-53500.html * https://www.suse.com/security/cve/CVE-2023-53533.html * https://www.suse.com/security/cve/CVE-2023-53534.html * https://www.suse.com/security/cve/CVE-2023-53539.html * https://www.suse.com/security/cve/CVE-2023-53541.html * https://www.suse.com/security/cve/CVE-2023-53542.html * https://www.suse.com/security/cve/CVE-2023-53546.html * https://www.suse.com/security/cve/CVE-2023-53547.html * https://www.suse.com/security/cve/CVE-2023-53548.html * https://www.suse.com/security/cve/CVE-2023-53551.html * https://www.suse.com/security/cve/CVE-2023-53552.html * https://www.suse.com/security/cve/CVE-2023-53553.html * https://www.suse.com/security/cve/CVE-2023-53554.html * https://www.suse.com/security/cve/CVE-2023-53556.html * https://www.suse.com/security/cve/CVE-2023-53557.html * https://www.suse.com/security/cve/CVE-2023-53559.html * https://www.suse.com/security/cve/CVE-2023-53560.html * https://www.suse.com/security/cve/CVE-2023-53562.html * https://www.suse.com/security/cve/CVE-2023-53564.html * https://www.suse.com/security/cve/CVE-2023-53566.html * https://www.suse.com/security/cve/CVE-2023-53567.html * https://www.suse.com/security/cve/CVE-2023-53568.html * https://www.suse.com/security/cve/CVE-2023-53571.html * https://www.suse.com/security/cve/CVE-2023-53572.html * https://www.suse.com/security/cve/CVE-2023-53574.html * https://www.suse.com/security/cve/CVE-2023-53578.html * https://www.suse.com/security/cve/CVE-2023-53579.html * https://www.suse.com/security/cve/CVE-2023-53580.html * https://www.suse.com/security/cve/CVE-2023-53581.html * https://www.suse.com/security/cve/CVE-2023-53582.html * https://www.suse.com/security/cve/CVE-2023-53587.html * https://www.suse.com/security/cve/CVE-2023-53589.html * https://www.suse.com/security/cve/CVE-2023-53591.html * https://www.suse.com/security/cve/CVE-2023-53592.html * https://www.suse.com/security/cve/CVE-2023-53594.html * https://www.suse.com/security/cve/CVE-2023-53597.html * https://www.suse.com/security/cve/CVE-2023-53598.html * https://www.suse.com/security/cve/CVE-2023-53601.html * https://www.suse.com/security/cve/CVE-2023-53603.html * https://www.suse.com/security/cve/CVE-2023-53604.html * https://www.suse.com/security/cve/CVE-2023-53605.html * https://www.suse.com/security/cve/CVE-2023-53607.html * https://www.suse.com/security/cve/CVE-2023-53608.html * https://www.suse.com/security/cve/CVE-2023-53611.html * https://www.suse.com/security/cve/CVE-2023-53612.html * https://www.suse.com/security/cve/CVE-2023-53615.html * https://www.suse.com/security/cve/CVE-2023-53616.html * https://www.suse.com/security/cve/CVE-2023-53617.html * https://www.suse.com/security/cve/CVE-2023-53619.html * https://www.suse.com/security/cve/CVE-2023-53622.html * https://www.suse.com/security/cve/CVE-2023-53625.html * https://www.suse.com/security/cve/CVE-2023-53626.html * https://www.suse.com/security/cve/CVE-2023-53631.html * https://www.suse.com/security/cve/CVE-2023-53637.html * https://www.suse.com/security/cve/CVE-2023-53639.html * https://www.suse.com/security/cve/CVE-2023-53640.html * https://www.suse.com/security/cve/CVE-2023-53641.html * https://www.suse.com/security/cve/CVE-2023-53644.html * https://www.suse.com/security/cve/CVE-2023-53648.html * https://www.suse.com/security/cve/CVE-2023-53650.html * https://www.suse.com/security/cve/CVE-2023-53651.html * https://www.suse.com/security/cve/CVE-2023-53658.html * https://www.suse.com/security/cve/CVE-2023-53659.html * https://www.suse.com/security/cve/CVE-2023-53662.html * https://www.suse.com/security/cve/CVE-2023-53667.html * https://www.suse.com/security/cve/CVE-2023-53668.html * https://www.suse.com/security/cve/CVE-2023-53670.html * https://www.suse.com/security/cve/CVE-2023-53673.html * https://www.suse.com/security/cve/CVE-2023-53674.html * https://www.suse.com/security/cve/CVE-2023-53675.html * https://www.suse.com/security/cve/CVE-2023-53679.html * https://www.suse.com/security/cve/CVE-2023-53680.html * https://www.suse.com/security/cve/CVE-2023-53681.html * https://www.suse.com/security/cve/CVE-2023-53683.html * https://www.suse.com/security/cve/CVE-2023-53687.html * https://www.suse.com/security/cve/CVE-2023-53692.html * https://www.suse.com/security/cve/CVE-2023-53693.html * https://www.suse.com/security/cve/CVE-2023-53695.html * https://www.suse.com/security/cve/CVE-2023-53696.html * https://www.suse.com/security/cve/CVE-2023-53697.html * https://www.suse.com/security/cve/CVE-2023-53700.html * https://www.suse.com/security/cve/CVE-2023-53704.html * https://www.suse.com/security/cve/CVE-2023-53705.html * https://www.suse.com/security/cve/CVE-2023-53707.html * https://www.suse.com/security/cve/CVE-2023-53708.html * https://www.suse.com/security/cve/CVE-2023-53709.html * https://www.suse.com/security/cve/CVE-2023-53711.html * https://www.suse.com/security/cve/CVE-2023-53715.html * https://www.suse.com/security/cve/CVE-2023-53716.html * https://www.suse.com/security/cve/CVE-2023-53717.html * https://www.suse.com/security/cve/CVE-2023-53718.html * https://www.suse.com/security/cve/CVE-2023-53719.html * https://www.suse.com/security/cve/CVE-2023-53722.html * https://www.suse.com/security/cve/CVE-2023-53723.html * https://www.suse.com/security/cve/CVE-2023-53724.html * https://www.suse.com/security/cve/CVE-2023-53725.html * https://www.suse.com/security/cve/CVE-2023-53726.html * https://www.suse.com/security/cve/CVE-2023-53730.html * https://www.suse.com/security/cve/CVE-2023-7324.html * https://www.suse.com/security/cve/CVE-2025-37885.html * https://www.suse.com/security/cve/CVE-2025-38084.html * https://www.suse.com/security/cve/CVE-2025-38085.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-39742.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39945.html * https://www.suse.com/security/cve/CVE-2025-39965.html * https://www.suse.com/security/cve/CVE-2025-39967.html * https://www.suse.com/security/cve/CVE-2025-39968.html * https://www.suse.com/security/cve/CVE-2025-39973.html * https://www.suse.com/security/cve/CVE-2025-39978.html * https://www.suse.com/security/cve/CVE-2025-39981.html * https://www.suse.com/security/cve/CVE-2025-40018.html * https://www.suse.com/security/cve/CVE-2025-40044.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1205128 * https://bugzilla.suse.com/show_bug.cgi?id=1206843 * https://bugzilla.suse.com/show_bug.cgi?id=1206893 * https://bugzilla.suse.com/show_bug.cgi?id=1207612 * https://bugzilla.suse.com/show_bug.cgi?id=1207619 * https://bugzilla.suse.com/show_bug.cgi?id=1210763 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211692 * https://bugzilla.suse.com/show_bug.cgi?id=1213098 * https://bugzilla.suse.com/show_bug.cgi?id=1213114 * https://bugzilla.suse.com/show_bug.cgi?id=1213747 * https://bugzilla.suse.com/show_bug.cgi?id=1214754 * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1214992 * https://bugzilla.suse.com/show_bug.cgi?id=1215148 * https://bugzilla.suse.com/show_bug.cgi?id=1217366 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1242960 * https://bugzilla.suse.com/show_bug.cgi?id=1245498 * https://bugzilla.suse.com/show_bug.cgi?id=1245499 * https://bugzilla.suse.com/show_bug.cgi?id=1246211 * https://bugzilla.suse.com/show_bug.cgi?id=1247317 * https://bugzilla.suse.com/show_bug.cgi?id=1248754 * https://bugzilla.suse.com/show_bug.cgi?id=1249479 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249857 * https://bugzilla.suse.com/show_bug.cgi?id=1249859 * https://bugzilla.suse.com/show_bug.cgi?id=1249988 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250742 * https://bugzilla.suse.com/show_bug.cgi?id=1250816 * https://bugzilla.suse.com/show_bug.cgi?id=1250946 * https://bugzilla.suse.com/show_bug.cgi?id=1251027 * https://bugzilla.suse.com/show_bug.cgi?id=1251032 * https://bugzilla.suse.com/show_bug.cgi?id=1251034 * https://bugzilla.suse.com/show_bug.cgi?id=1251035 * https://bugzilla.suse.com/show_bug.cgi?id=1251037 * https://bugzilla.suse.com/show_bug.cgi?id=1251040 * https://bugzilla.suse.com/show_bug.cgi?id=1251043 * https://bugzilla.suse.com/show_bug.cgi?id=1251045 * https://bugzilla.suse.com/show_bug.cgi?id=1251046 * https://bugzilla.suse.com/show_bug.cgi?id=1251047 * https://bugzilla.suse.com/show_bug.cgi?id=1251052 * https://bugzilla.suse.com/show_bug.cgi?id=1251054 * https://bugzilla.suse.com/show_bug.cgi?id=1251057 * https://bugzilla.suse.com/show_bug.cgi?id=1251059 * https://bugzilla.suse.com/show_bug.cgi?id=1251060 * https://bugzilla.suse.com/show_bug.cgi?id=1251061 * https://bugzilla.suse.com/show_bug.cgi?id=1251063 * https://bugzilla.suse.com/show_bug.cgi?id=1251065 * https://bugzilla.suse.com/show_bug.cgi?id=1251066 * https://bugzilla.suse.com/show_bug.cgi?id=1251068 * https://bugzilla.suse.com/show_bug.cgi?id=1251072 * https://bugzilla.suse.com/show_bug.cgi?id=1251079 * https://bugzilla.suse.com/show_bug.cgi?id=1251080 * https://bugzilla.suse.com/show_bug.cgi?id=1251082 * https://bugzilla.suse.com/show_bug.cgi?id=1251086 * https://bugzilla.suse.com/show_bug.cgi?id=1251087 * https://bugzilla.suse.com/show_bug.cgi?id=1251088 * https://bugzilla.suse.com/show_bug.cgi?id=1251091 * https://bugzilla.suse.com/show_bug.cgi?id=1251092 * https://bugzilla.suse.com/show_bug.cgi?id=1251093 * https://bugzilla.suse.com/show_bug.cgi?id=1251097 * https://bugzilla.suse.com/show_bug.cgi?id=1251099 * https://bugzilla.suse.com/show_bug.cgi?id=1251101 * https://bugzilla.suse.com/show_bug.cgi?id=1251104 * https://bugzilla.suse.com/show_bug.cgi?id=1251105 * https://bugzilla.suse.com/show_bug.cgi?id=1251106 * https://bugzilla.suse.com/show_bug.cgi?id=1251110 * https://bugzilla.suse.com/show_bug.cgi?id=1251113 * https://bugzilla.suse.com/show_bug.cgi?id=1251115 * https://bugzilla.suse.com/show_bug.cgi?id=1251123 * https://bugzilla.suse.com/show_bug.cgi?id=1251128 * https://bugzilla.suse.com/show_bug.cgi?id=1251129 * https://bugzilla.suse.com/show_bug.cgi?id=1251133 * https://bugzilla.suse.com/show_bug.cgi?id=1251136 * https://bugzilla.suse.com/show_bug.cgi?id=1251147 * https://bugzilla.suse.com/show_bug.cgi?id=1251149 * https://bugzilla.suse.com/show_bug.cgi?id=1251153 * https://bugzilla.suse.com/show_bug.cgi?id=1251154 * https://bugzilla.suse.com/show_bug.cgi?id=1251159 * https://bugzilla.suse.com/show_bug.cgi?id=1251162 * https://bugzilla.suse.com/show_bug.cgi?id=1251164 * https://bugzilla.suse.com/show_bug.cgi?id=1251166 * https://bugzilla.suse.com/show_bug.cgi?id=1251167 * https://bugzilla.suse.com/show_bug.cgi?id=1251169 * https://bugzilla.suse.com/show_bug.cgi?id=1251170 * https://bugzilla.suse.com/show_bug.cgi?id=1251173 * https://bugzilla.suse.com/show_bug.cgi?id=1251174 * https://bugzilla.suse.com/show_bug.cgi?id=1251178 * https://bugzilla.suse.com/show_bug.cgi?id=1251180 * https://bugzilla.suse.com/show_bug.cgi?id=1251182 * https://bugzilla.suse.com/show_bug.cgi?id=1251197 * https://bugzilla.suse.com/show_bug.cgi?id=1251200 * https://bugzilla.suse.com/show_bug.cgi?id=1251201 * https://bugzilla.suse.com/show_bug.cgi?id=1251202 * https://bugzilla.suse.com/show_bug.cgi?id=1251208 * https://bugzilla.suse.com/show_bug.cgi?id=1251210 * https://bugzilla.suse.com/show_bug.cgi?id=1251215 * https://bugzilla.suse.com/show_bug.cgi?id=1251218 * https://bugzilla.suse.com/show_bug.cgi?id=1251221 * https://bugzilla.suse.com/show_bug.cgi?id=1251222 * https://bugzilla.suse.com/show_bug.cgi?id=1251223 * https://bugzilla.suse.com/show_bug.cgi?id=1251230 * https://bugzilla.suse.com/show_bug.cgi?id=1251247 * https://bugzilla.suse.com/show_bug.cgi?id=1251268 * https://bugzilla.suse.com/show_bug.cgi?id=1251281 * https://bugzilla.suse.com/show_bug.cgi?id=1251282 * https://bugzilla.suse.com/show_bug.cgi?id=1251283 * https://bugzilla.suse.com/show_bug.cgi?id=1251284 * https://bugzilla.suse.com/show_bug.cgi?id=1251285 * https://bugzilla.suse.com/show_bug.cgi?id=1251286 * https://bugzilla.suse.com/show_bug.cgi?id=1251292 * https://bugzilla.suse.com/show_bug.cgi?id=1251294 * https://bugzilla.suse.com/show_bug.cgi?id=1251295 * https://bugzilla.suse.com/show_bug.cgi?id=1251296 * https://bugzilla.suse.com/show_bug.cgi?id=1251298 * https://bugzilla.suse.com/show_bug.cgi?id=1251299 * https://bugzilla.suse.com/show_bug.cgi?id=1251300 * https://bugzilla.suse.com/show_bug.cgi?id=1251301 * https://bugzilla.suse.com/show_bug.cgi?id=1251302 * https://bugzilla.suse.com/show_bug.cgi?id=1251303 * https://bugzilla.suse.com/show_bug.cgi?id=1251306 * https://bugzilla.suse.com/show_bug.cgi?id=1251307 * https://bugzilla.suse.com/show_bug.cgi?id=1251310 * https://bugzilla.suse.com/show_bug.cgi?id=1251312 * https://bugzilla.suse.com/show_bug.cgi?id=1251315 * https://bugzilla.suse.com/show_bug.cgi?id=1251322 * https://bugzilla.suse.com/show_bug.cgi?id=1251324 * https://bugzilla.suse.com/show_bug.cgi?id=1251325 * https://bugzilla.suse.com/show_bug.cgi?id=1251326 * https://bugzilla.suse.com/show_bug.cgi?id=1251327 * https://bugzilla.suse.com/show_bug.cgi?id=1251329 * https://bugzilla.suse.com/show_bug.cgi?id=1251330 * https://bugzilla.suse.com/show_bug.cgi?id=1251331 * https://bugzilla.suse.com/show_bug.cgi?id=1251519 * https://bugzilla.suse.com/show_bug.cgi?id=1251521 * https://bugzilla.suse.com/show_bug.cgi?id=1251522 * https://bugzilla.suse.com/show_bug.cgi?id=1251527 * https://bugzilla.suse.com/show_bug.cgi?id=1251529 * https://bugzilla.suse.com/show_bug.cgi?id=1251550 * https://bugzilla.suse.com/show_bug.cgi?id=1251723 * https://bugzilla.suse.com/show_bug.cgi?id=1251725 * https://bugzilla.suse.com/show_bug.cgi?id=1251728 * https://bugzilla.suse.com/show_bug.cgi?id=1251730 * https://bugzilla.suse.com/show_bug.cgi?id=1251736 * https://bugzilla.suse.com/show_bug.cgi?id=1251737 * https://bugzilla.suse.com/show_bug.cgi?id=1251738 * https://bugzilla.suse.com/show_bug.cgi?id=1251741 * https://bugzilla.suse.com/show_bug.cgi?id=1251743 * https://bugzilla.suse.com/show_bug.cgi?id=1251750 * https://bugzilla.suse.com/show_bug.cgi?id=1251753 * https://bugzilla.suse.com/show_bug.cgi?id=1251759 * https://bugzilla.suse.com/show_bug.cgi?id=1251761 * https://bugzilla.suse.com/show_bug.cgi?id=1251762 * https://bugzilla.suse.com/show_bug.cgi?id=1251763 * https://bugzilla.suse.com/show_bug.cgi?id=1251764 * https://bugzilla.suse.com/show_bug.cgi?id=1251767 * https://bugzilla.suse.com/show_bug.cgi?id=1251769 * https://bugzilla.suse.com/show_bug.cgi?id=1251772 * https://bugzilla.suse.com/show_bug.cgi?id=1251775 * https://bugzilla.suse.com/show_bug.cgi?id=1251777 * https://bugzilla.suse.com/show_bug.cgi?id=1251785 * https://bugzilla.suse.com/show_bug.cgi?id=1251823 * https://bugzilla.suse.com/show_bug.cgi?id=1251930 * https://bugzilla.suse.com/show_bug.cgi?id=1251967 * https://bugzilla.suse.com/show_bug.cgi?id=1252033 * https://bugzilla.suse.com/show_bug.cgi?id=1252035 * https://bugzilla.suse.com/show_bug.cgi?id=1252047 * https://bugzilla.suse.com/show_bug.cgi?id=1252060 * https://bugzilla.suse.com/show_bug.cgi?id=1252069 * https://bugzilla.suse.com/show_bug.cgi?id=1252265 * https://bugzilla.suse.com/show_bug.cgi?id=1252473 * https://bugzilla.suse.com/show_bug.cgi?id=1252474 * https://bugzilla.suse.com/show_bug.cgi?id=1252475 * https://bugzilla.suse.com/show_bug.cgi?id=1252476 * https://bugzilla.suse.com/show_bug.cgi?id=1252480 * https://bugzilla.suse.com/show_bug.cgi?id=1252484 * https://bugzilla.suse.com/show_bug.cgi?id=1252486 * https://bugzilla.suse.com/show_bug.cgi?id=1252489 * https://bugzilla.suse.com/show_bug.cgi?id=1252490 * https://bugzilla.suse.com/show_bug.cgi?id=1252492 * https://bugzilla.suse.com/show_bug.cgi?id=1252494 * https://bugzilla.suse.com/show_bug.cgi?id=1252495 * https://bugzilla.suse.com/show_bug.cgi?id=1252497 * https://bugzilla.suse.com/show_bug.cgi?id=1252499 * https://bugzilla.suse.com/show_bug.cgi?id=1252501 * https://bugzilla.suse.com/show_bug.cgi?id=1252508 * https://bugzilla.suse.com/show_bug.cgi?id=1252509 * https://bugzilla.suse.com/show_bug.cgi?id=1252513 * https://bugzilla.suse.com/show_bug.cgi?id=1252515 * https://bugzilla.suse.com/show_bug.cgi?id=1252516 * https://bugzilla.suse.com/show_bug.cgi?id=1252519 * https://bugzilla.suse.com/show_bug.cgi?id=1252521 * https://bugzilla.suse.com/show_bug.cgi?id=1252522 * https://bugzilla.suse.com/show_bug.cgi?id=1252523 * https://bugzilla.suse.com/show_bug.cgi?id=1252526 * https://bugzilla.suse.com/show_bug.cgi?id=1252528 * https://bugzilla.suse.com/show_bug.cgi?id=1252529 * https://bugzilla.suse.com/show_bug.cgi?id=1252532 * https://bugzilla.suse.com/show_bug.cgi?id=1252534 * https://bugzilla.suse.com/show_bug.cgi?id=1252535 * https://bugzilla.suse.com/show_bug.cgi?id=1252536 * https://bugzilla.suse.com/show_bug.cgi?id=1252537 * https://bugzilla.suse.com/show_bug.cgi?id=1252538 * https://bugzilla.suse.com/show_bug.cgi?id=1252539 * https://bugzilla.suse.com/show_bug.cgi?id=1252542 * https://bugzilla.suse.com/show_bug.cgi?id=1252545 * https://bugzilla.suse.com/show_bug.cgi?id=1252549 * https://bugzilla.suse.com/show_bug.cgi?id=1252554 * https://bugzilla.suse.com/show_bug.cgi?id=1252560 * https://bugzilla.suse.com/show_bug.cgi?id=1252564 * https://bugzilla.suse.com/show_bug.cgi?id=1252565 * https://bugzilla.suse.com/show_bug.cgi?id=1252568 * https://bugzilla.suse.com/show_bug.cgi?id=1252632 * https://bugzilla.suse.com/show_bug.cgi?id=1252634 * https://bugzilla.suse.com/show_bug.cgi?id=1252688 * https://bugzilla.suse.com/show_bug.cgi?id=1252785 * https://bugzilla.suse.com/show_bug.cgi?id=1252893 * https://jira.suse.com/browse/PED-1166 * https://jira.suse.com/browse/PED-1168 * https://jira.suse.com/browse/PED-1170 * https://jira.suse.com/browse/PED-1218 * https://jira.suse.com/browse/PED-1220 * https://jira.suse.com/browse/PED-1222 * https://jira.suse.com/browse/PED-1223 * https://jira.suse.com/browse/PED-1225 * https://jira.suse.com/browse/PED-1549 * https://jira.suse.com/browse/PED-2849 * https://jira.suse.com/browse/PED-4593 * https://jira.suse.com/browse/PED-568 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 08:55:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 08:55:14 -0000 Subject: SUSE-SU-2025:4325-1: important: Security update for postgresql13 Message-ID: <176527051419.17931.14579363735064399091@smelt2.prg2.suse.org> # Security update for postgresql13 Announcement ID: SUSE-SU-2025:4325-1 Release Date: 2025-12-08T18:19:59Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql13 fixes the following issues: Upgraded to 13.23: * CVE-2025-12817: Fixed missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332) * CVE-2025-12818: Fixed integer overflow in allocation-size calculations within libpq (bsc#1253333) Other fixes: * Use %product_libs_llvm_ver to determine the LLVM version. * Remove conditionals for obsolete PostgreSQL releases. * Sync spec file from version 18. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4325=1 SUSE-2025-4325=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * postgresql13-server-13.23-150600.14.14.1 * postgresql13-plperl-13.23-150600.14.14.1 * postgresql13-devel-debuginfo-13.23-150600.14.14.1 * postgresql13-debuginfo-13.23-150600.14.14.1 * postgresql13-server-debuginfo-13.23-150600.14.14.1 * postgresql13-contrib-debuginfo-13.23-150600.14.14.1 * postgresql13-llvmjit-13.23-150600.14.14.1 * postgresql13-llvmjit-devel-13.23-150600.14.14.1 * postgresql13-pltcl-debuginfo-13.23-150600.14.14.1 * postgresql13-plpython-13.23-150600.14.14.1 * postgresql13-server-devel-debuginfo-13.23-150600.14.14.1 * postgresql13-plpython-debuginfo-13.23-150600.14.14.1 * postgresql13-llvmjit-debuginfo-13.23-150600.14.14.1 * postgresql13-devel-13.23-150600.14.14.1 * postgresql13-13.23-150600.14.14.1 * postgresql13-test-13.23-150600.14.14.1 * postgresql13-contrib-13.23-150600.14.14.1 * postgresql13-pltcl-13.23-150600.14.14.1 * postgresql13-server-devel-13.23-150600.14.14.1 * postgresql13-plperl-debuginfo-13.23-150600.14.14.1 * postgresql13-debugsource-13.23-150600.14.14.1 * openSUSE Leap 15.6 (noarch) * postgresql13-docs-13.23-150600.14.14.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 08:55:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 08:55:17 -0000 Subject: SUSE-SU-2025:4324-1: important: Security update for gimp Message-ID: <176527051702.17931.10156269183388648170@smelt2.prg2.suse.org> # Security update for gimp Announcement ID: SUSE-SU-2025:4324-1 Release Date: 2025-12-08T18:18:21Z Rating: important References: * bsc#1250497 Cross-References: * CVE-2025-10922 CVSS scores: * CVE-2025-10922 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-10922 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-10922 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for gimp fixes the following issues: * CVE-2025-10922: Fixed GIMP DCM file parsing heap-based buffer overflow remote code execution vulnerability. (bsc#1250497) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4324=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4324=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4324=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4324=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-4324=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-4324=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libgimp-2_0-0-debuginfo-2.10.30-150400.3.32.1 * libgimpui-2_0-0-2.10.30-150400.3.32.1 * gimp-devel-debuginfo-2.10.30-150400.3.32.1 * gimp-devel-2.10.30-150400.3.32.1 * gimp-plugin-aa-2.10.30-150400.3.32.1 * gimp-2.10.30-150400.3.32.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.32.1 * gimp-plugin-aa-debuginfo-2.10.30-150400.3.32.1 * libgimp-2_0-0-2.10.30-150400.3.32.1 * gimp-debugsource-2.10.30-150400.3.32.1 * gimp-debuginfo-2.10.30-150400.3.32.1 * openSUSE Leap 15.4 (noarch) * gimp-lang-2.10.30-150400.3.32.1 * openSUSE Leap 15.4 (x86_64) * libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.32.1 * libgimpui-2_0-0-32bit-2.10.30-150400.3.32.1 * libgimp-2_0-0-32bit-2.10.30-150400.3.32.1 * libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.32.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libgimp-2_0-0-64bit-debuginfo-2.10.30-150400.3.32.1 * libgimp-2_0-0-64bit-2.10.30-150400.3.32.1 * libgimpui-2_0-0-64bit-debuginfo-2.10.30-150400.3.32.1 * libgimpui-2_0-0-64bit-2.10.30-150400.3.32.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libgimp-2_0-0-debuginfo-2.10.30-150400.3.32.1 * libgimpui-2_0-0-2.10.30-150400.3.32.1 * gimp-devel-debuginfo-2.10.30-150400.3.32.1 * gimp-devel-2.10.30-150400.3.32.1 * gimp-plugin-aa-2.10.30-150400.3.32.1 * gimp-2.10.30-150400.3.32.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.32.1 * gimp-plugin-aa-debuginfo-2.10.30-150400.3.32.1 * libgimp-2_0-0-2.10.30-150400.3.32.1 * gimp-debugsource-2.10.30-150400.3.32.1 * gimp-debuginfo-2.10.30-150400.3.32.1 * openSUSE Leap 15.6 (noarch) * gimp-lang-2.10.30-150400.3.32.1 * openSUSE Leap 15.6 (x86_64) * libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.32.1 * libgimpui-2_0-0-32bit-2.10.30-150400.3.32.1 * libgimp-2_0-0-32bit-2.10.30-150400.3.32.1 * libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.32.1 * SUSE Package Hub 15 15-SP6 (aarch64) * gimp-devel-debuginfo-2.10.30-150400.3.32.1 * gimp-devel-2.10.30-150400.3.32.1 * gimp-plugin-aa-2.10.30-150400.3.32.1 * gimp-2.10.30-150400.3.32.1 * gimp-plugin-aa-debuginfo-2.10.30-150400.3.32.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * libgimp-2_0-0-debuginfo-2.10.30-150400.3.32.1 * libgimpui-2_0-0-2.10.30-150400.3.32.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.32.1 * libgimp-2_0-0-2.10.30-150400.3.32.1 * gimp-debugsource-2.10.30-150400.3.32.1 * gimp-debuginfo-2.10.30-150400.3.32.1 * SUSE Package Hub 15 15-SP6 (noarch) * gimp-lang-2.10.30-150400.3.32.1 * SUSE Package Hub 15 15-SP7 (aarch64) * gimp-devel-debuginfo-2.10.30-150400.3.32.1 * gimp-devel-2.10.30-150400.3.32.1 * gimp-plugin-aa-2.10.30-150400.3.32.1 * gimp-2.10.30-150400.3.32.1 * gimp-plugin-aa-debuginfo-2.10.30-150400.3.32.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * libgimp-2_0-0-debuginfo-2.10.30-150400.3.32.1 * libgimpui-2_0-0-2.10.30-150400.3.32.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.32.1 * libgimp-2_0-0-2.10.30-150400.3.32.1 * gimp-debugsource-2.10.30-150400.3.32.1 * gimp-debuginfo-2.10.30-150400.3.32.1 * SUSE Package Hub 15 15-SP7 (noarch) * gimp-lang-2.10.30-150400.3.32.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * libgimp-2_0-0-debuginfo-2.10.30-150400.3.32.1 * libgimpui-2_0-0-2.10.30-150400.3.32.1 * gimp-devel-debuginfo-2.10.30-150400.3.32.1 * gimp-devel-2.10.30-150400.3.32.1 * gimp-2.10.30-150400.3.32.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.32.1 * libgimp-2_0-0-2.10.30-150400.3.32.1 * gimp-debugsource-2.10.30-150400.3.32.1 * gimp-debuginfo-2.10.30-150400.3.32.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (noarch) * gimp-lang-2.10.30-150400.3.32.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * libgimp-2_0-0-debuginfo-2.10.30-150400.3.32.1 * libgimpui-2_0-0-2.10.30-150400.3.32.1 * gimp-devel-debuginfo-2.10.30-150400.3.32.1 * gimp-devel-2.10.30-150400.3.32.1 * gimp-2.10.30-150400.3.32.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.32.1 * libgimp-2_0-0-2.10.30-150400.3.32.1 * gimp-debugsource-2.10.30-150400.3.32.1 * gimp-debuginfo-2.10.30-150400.3.32.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch) * gimp-lang-2.10.30-150400.3.32.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10922.html * https://bugzilla.suse.com/show_bug.cgi?id=1250497 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 08:55:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 08:55:20 -0000 Subject: SUSE-SU-2025:4323-1: moderate: Security update for gnutls Message-ID: <176527052037.17931.305586561586471038@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2025:4323-1 Release Date: 2025-12-08T18:14:27Z Rating: moderate References: * bsc#1254132 Cross-References: * CVE-2025-9820 CVSS scores: * CVE-2025-9820 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2025-9820: Fixed buffer overflow in gnutls_pkcs11_token_init. (bsc#1254132) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4323=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4323=1 openSUSE-SLE-15.6-2025-4323=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4323=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libgnutls-devel-3.8.3-150600.4.12.1 * gnutls-3.8.3-150600.4.12.1 * libgnutlsxx30-3.8.3-150600.4.12.1 * libgnutls30-debuginfo-3.8.3-150600.4.12.1 * libgnutlsxx-devel-3.8.3-150600.4.12.1 * libgnutls30-3.8.3-150600.4.12.1 * gnutls-debugsource-3.8.3-150600.4.12.1 * gnutls-debuginfo-3.8.3-150600.4.12.1 * libgnutlsxx30-debuginfo-3.8.3-150600.4.12.1 * Basesystem Module 15-SP7 (x86_64) * libgnutls30-32bit-debuginfo-3.8.3-150600.4.12.1 * libgnutls30-32bit-3.8.3-150600.4.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgnutls-devel-3.8.3-150600.4.12.1 * gnutls-3.8.3-150600.4.12.1 * libgnutlsxx30-3.8.3-150600.4.12.1 * libgnutls30-debuginfo-3.8.3-150600.4.12.1 * libgnutlsxx-devel-3.8.3-150600.4.12.1 * libgnutls30-3.8.3-150600.4.12.1 * gnutls-debugsource-3.8.3-150600.4.12.1 * gnutls-debuginfo-3.8.3-150600.4.12.1 * libgnutlsxx30-debuginfo-3.8.3-150600.4.12.1 * openSUSE Leap 15.6 (x86_64) * libgnutls-devel-32bit-3.8.3-150600.4.12.1 * libgnutls30-32bit-3.8.3-150600.4.12.1 * libgnutls30-32bit-debuginfo-3.8.3-150600.4.12.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgnutls30-64bit-debuginfo-3.8.3-150600.4.12.1 * libgnutls-devel-64bit-3.8.3-150600.4.12.1 * libgnutls30-64bit-3.8.3-150600.4.12.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libgnutls-devel-3.8.3-150600.4.12.1 * gnutls-3.8.3-150600.4.12.1 * libgnutlsxx30-3.8.3-150600.4.12.1 * libgnutls30-debuginfo-3.8.3-150600.4.12.1 * libgnutlsxx-devel-3.8.3-150600.4.12.1 * libgnutls30-3.8.3-150600.4.12.1 * gnutls-debugsource-3.8.3-150600.4.12.1 * gnutls-debuginfo-3.8.3-150600.4.12.1 * libgnutlsxx30-debuginfo-3.8.3-150600.4.12.1 * Basesystem Module 15-SP6 (x86_64) * libgnutls30-32bit-debuginfo-3.8.3-150600.4.12.1 * libgnutls30-32bit-3.8.3-150600.4.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9820.html * https://bugzilla.suse.com/show_bug.cgi?id=1254132 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 12:56:53 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 12:56:53 -0000 Subject: SUSE-SU-2025:4330-1: important: Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t Message-ID: <176528501385.26913.11419792302725603597@smelt2.prg2.suse.org> # Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t Announcement ID: SUSE-SU-2025:4330-1 Release Date: 2025-12-09T11:34:00Z Rating: important References: * bsc#1241772 * bsc#1250683 * bsc#1253181 * bsc#1253185 * bsc#1253186 * bsc#1253194 * bsc#1253384 * bsc#1253748 Cross-References: * CVE-2025-22872 * CVE-2025-64324 * CVE-2025-64432 * CVE-2025-64433 * CVE-2025-64434 * CVE-2025-64437 CVSS scores: * CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-64324 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-64324 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-64324 ( NVD ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-64324 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-64432 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-64432 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-64432 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64432 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64433 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-64433 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-64433 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-64434 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-64434 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-64434 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64434 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-64437 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-64437 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2025-64437 ( NVD ): 5.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L Affected Products: * Containers Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves six vulnerabilities and has two security fixes can now be installed. ## Description: This update for kubevirt, virt-api-container, virt-controller-container, virt- exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator- container, virt-pr-helper-container fixes the following issues: Updated kubevirt to version 1.6.3: * CVE-2025-22872: Fixed incorrect interpretation of tags leading content to be placed wrong scope during DOM construction in golang.org/x/net/html (bsc#1241772) * CVE-2025-64432: Fixed bypass of RBAC controls due to incorrect validation of certain fields in the client TLS certificate (bsc#1253181) * CVE-2025-64433: Fixed arbitrary files read via improper symlink handling (bsc#1253185) * CVE-2025-64434: Fixed privilege escalation via virt-api impersonification due to compromise virt-handler instance (bsc#1253186) * CVE-2025-64437: Fixed mishandling of symlinks (bsc#1253194) * CVE-2025-64324: Fixed a logic bug that allows an attacker to read and write arbitrary files owned by more privileged users (bsc#1253748) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-4330=1 ## Package List: * Containers Module 15-SP7 (aarch64 x86_64) * kubevirt-virtctl-debuginfo-1.6.3-150700.3.13.1 * kubevirt-virtctl-1.6.3-150700.3.13.1 * kubevirt-manifests-1.6.3-150700.3.13.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22872.html * https://www.suse.com/security/cve/CVE-2025-64324.html * https://www.suse.com/security/cve/CVE-2025-64432.html * https://www.suse.com/security/cve/CVE-2025-64433.html * https://www.suse.com/security/cve/CVE-2025-64434.html * https://www.suse.com/security/cve/CVE-2025-64437.html * https://bugzilla.suse.com/show_bug.cgi?id=1241772 * https://bugzilla.suse.com/show_bug.cgi?id=1250683 * https://bugzilla.suse.com/show_bug.cgi?id=1253181 * https://bugzilla.suse.com/show_bug.cgi?id=1253185 * https://bugzilla.suse.com/show_bug.cgi?id=1253186 * https://bugzilla.suse.com/show_bug.cgi?id=1253194 * https://bugzilla.suse.com/show_bug.cgi?id=1253384 * https://bugzilla.suse.com/show_bug.cgi?id=1253748 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 16:30:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 16:30:23 -0000 Subject: SUSE-SU-2025:4333-1: important: Security update for gegl Message-ID: <176529782309.2568.11165330306963574212@smelt2.prg2.suse.org> # Security update for gegl Announcement ID: SUSE-SU-2025:4333-1 Release Date: 2025-12-09T14:42:11Z Rating: important References: * bsc#1250496 Cross-References: * CVE-2025-10921 CVSS scores: * CVE-2025-10921 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-10921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-10921 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for gegl fixes the following issues: * CVE-2025-10921: Fixed HDR file parsing heap-based buffer overflow that can lead to remote code execution. (bsc#1250496) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-4333=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-4333=1 ## Package List: * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * gegl-debuginfo-0.3.34-150000.3.6.1 * gegl-debugsource-0.3.34-150000.3.6.1 * libgegl-0_3-0-0.3.34-150000.3.6.1 * gegl-0_3-0.3.34-150000.3.6.1 * gegl-0_3-debuginfo-0.3.34-150000.3.6.1 * typelib-1_0-Gegl-0_3-0.3.34-150000.3.6.1 * libgegl-0_3-0-debuginfo-0.3.34-150000.3.6.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * gegl-debuginfo-0.3.34-150000.3.6.1 * gegl-debugsource-0.3.34-150000.3.6.1 * libgegl-0_3-0-0.3.34-150000.3.6.1 * gegl-0_3-0.3.34-150000.3.6.1 * gegl-0_3-debuginfo-0.3.34-150000.3.6.1 * typelib-1_0-Gegl-0_3-0.3.34-150000.3.6.1 * libgegl-0_3-0-debuginfo-0.3.34-150000.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10921.html * https://bugzilla.suse.com/show_bug.cgi?id=1250496 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 20:47:58 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 20:47:58 -0000 Subject: SUSE-SU-2025:4335-1: important: Security update for gegl Message-ID: <176531327870.4823.17900498441773946337@smelt2.prg2.suse.org> # Security update for gegl Announcement ID: SUSE-SU-2025:4335-1 Release Date: 2025-12-09T18:19:59Z Rating: important References: * bsc#1250496 Cross-References: * CVE-2025-10921 CVSS scores: * CVE-2025-10921 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-10921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-10921 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for gegl fixes the following issues: * CVE-2025-10921: lack of proper validation of user-supplied data when parsing HDR files can lead to RCE (bsc#1250496). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4335=1 SUSE-2025-4335=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4335=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4335=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-4335=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-4335=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * gegl-debugsource-0.4.46-150600.4.3.1 * libgegl-0_4-0-0.4.46-150600.4.3.1 * gegl-doc-0.4.46-150600.4.3.1 * gegl-0_4-0.4.46-150600.4.3.1 * libgegl-0_4-0-debuginfo-0.4.46-150600.4.3.1 * gegl-0.4.46-150600.4.3.1 * typelib-1_0-Gegl-0_4-0.4.46-150600.4.3.1 * gegl-devel-0.4.46-150600.4.3.1 * gegl-debuginfo-0.4.46-150600.4.3.1 * gegl-0_4-debuginfo-0.4.46-150600.4.3.1 * openSUSE Leap 15.6 (noarch) * gegl-0_4-lang-0.4.46-150600.4.3.1 * openSUSE Leap 15.6 (x86_64) * libgegl-0_4-0-32bit-debuginfo-0.4.46-150600.4.3.1 * libgegl-0_4-0-32bit-0.4.46-150600.4.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgegl-0_4-0-64bit-debuginfo-0.4.46-150600.4.3.1 * libgegl-0_4-0-64bit-0.4.46-150600.4.3.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * gegl-debugsource-0.4.46-150600.4.3.1 * libgegl-0_4-0-0.4.46-150600.4.3.1 * gegl-doc-0.4.46-150600.4.3.1 * gegl-0_4-0.4.46-150600.4.3.1 * libgegl-0_4-0-debuginfo-0.4.46-150600.4.3.1 * gegl-0.4.46-150600.4.3.1 * typelib-1_0-Gegl-0_4-0.4.46-150600.4.3.1 * gegl-devel-0.4.46-150600.4.3.1 * gegl-debuginfo-0.4.46-150600.4.3.1 * gegl-0_4-debuginfo-0.4.46-150600.4.3.1 * SUSE Package Hub 15 15-SP6 (noarch) * gegl-0_4-lang-0.4.46-150600.4.3.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * gegl-debugsource-0.4.46-150600.4.3.1 * libgegl-0_4-0-0.4.46-150600.4.3.1 * gegl-doc-0.4.46-150600.4.3.1 * gegl-0_4-0.4.46-150600.4.3.1 * libgegl-0_4-0-debuginfo-0.4.46-150600.4.3.1 * gegl-0.4.46-150600.4.3.1 * typelib-1_0-Gegl-0_4-0.4.46-150600.4.3.1 * gegl-devel-0.4.46-150600.4.3.1 * gegl-debuginfo-0.4.46-150600.4.3.1 * gegl-0_4-debuginfo-0.4.46-150600.4.3.1 * SUSE Package Hub 15 15-SP7 (noarch) * gegl-0_4-lang-0.4.46-150600.4.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * gegl-debugsource-0.4.46-150600.4.3.1 * libgegl-0_4-0-0.4.46-150600.4.3.1 * gegl-0_4-0.4.46-150600.4.3.1 * libgegl-0_4-0-debuginfo-0.4.46-150600.4.3.1 * typelib-1_0-Gegl-0_4-0.4.46-150600.4.3.1 * gegl-devel-0.4.46-150600.4.3.1 * gegl-debuginfo-0.4.46-150600.4.3.1 * gegl-0_4-debuginfo-0.4.46-150600.4.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (noarch) * gegl-0_4-lang-0.4.46-150600.4.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * gegl-debugsource-0.4.46-150600.4.3.1 * libgegl-0_4-0-0.4.46-150600.4.3.1 * gegl-0_4-0.4.46-150600.4.3.1 * libgegl-0_4-0-debuginfo-0.4.46-150600.4.3.1 * typelib-1_0-Gegl-0_4-0.4.46-150600.4.3.1 * gegl-devel-0.4.46-150600.4.3.1 * gegl-debuginfo-0.4.46-150600.4.3.1 * gegl-0_4-debuginfo-0.4.46-150600.4.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch) * gegl-0_4-lang-0.4.46-150600.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10921.html * https://bugzilla.suse.com/show_bug.cgi?id=1250496 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 20:48:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 20:48:04 -0000 Subject: SUSE-SU-2025:4334-1: important: Security update for postgresql13 Message-ID: <176531328406.4823.6542640648542827774@smelt2.prg2.suse.org> # Security update for postgresql13 Announcement ID: SUSE-SU-2025:4334-1 Release Date: 2025-12-09T18:17:26Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql13 fixes the following issues: Upgraded to 13.23: * CVE-2025-12817: Fixed missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332) * CVE-2025-12818: Fixed integer overflow in allocation-size calculations within libpq (bsc#1253333) Other fixes: * Use %product_libs_llvm_ver to determine the LLVM version. * Remove conditionals for obsolete PostgreSQL releases. * Sync spec file from version 18. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4334=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4334=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql13-13.23-3.69.1 * postgresql13-contrib-13.23-3.69.1 * postgresql13-devel-13.23-3.69.1 * postgresql13-plperl-13.23-3.69.1 * postgresql13-server-13.23-3.69.1 * postgresql13-server-debuginfo-13.23-3.69.1 * postgresql13-devel-debuginfo-13.23-3.69.1 * postgresql13-plpython-13.23-3.69.1 * postgresql13-debuginfo-13.23-3.69.1 * postgresql13-plperl-debuginfo-13.23-3.69.1 * postgresql13-contrib-debuginfo-13.23-3.69.1 * postgresql13-pltcl-13.23-3.69.1 * postgresql13-plpython-debuginfo-13.23-3.69.1 * postgresql13-pltcl-debuginfo-13.23-3.69.1 * postgresql13-debugsource-13.23-3.69.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * postgresql13-docs-13.23-3.69.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64) * postgresql13-server-devel-13.23-3.69.1 * postgresql13-server-devel-debuginfo-13.23-3.69.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * postgresql13-server-devel-debuginfo-13.23-3.69.1 * postgresql13-13.23-3.69.1 * postgresql13-contrib-13.23-3.69.1 * postgresql13-devel-13.23-3.69.1 * postgresql13-plperl-13.23-3.69.1 * postgresql13-server-13.23-3.69.1 * postgresql13-server-debuginfo-13.23-3.69.1 * postgresql13-devel-debuginfo-13.23-3.69.1 * postgresql13-server-devel-13.23-3.69.1 * postgresql13-plpython-13.23-3.69.1 * postgresql13-debuginfo-13.23-3.69.1 * postgresql13-plperl-debuginfo-13.23-3.69.1 * postgresql13-contrib-debuginfo-13.23-3.69.1 * postgresql13-pltcl-13.23-3.69.1 * postgresql13-plpython-debuginfo-13.23-3.69.1 * postgresql13-pltcl-debuginfo-13.23-3.69.1 * postgresql13-debugsource-13.23-3.69.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * postgresql13-docs-13.23-3.69.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:20:59 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:20:59 -0000 Subject: SUSE-SU-2025:21124-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 Message-ID: <176532245986.2568.16269125048751158605@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 Announcement ID: SUSE-SU-2025:21124-1 Release Date: 2025-11-28T08:21:31Z Rating: important References: * bsc#1249537 Cross-References: * CVE-2025-38616 CVSS scores: * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_12 fixes the following issues: * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-217=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_12-debugsource-3-1.1 * kernel-livepatch-6_4_0-36-rt-3-1.1 * kernel-livepatch-6_4_0-36-rt-debuginfo-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:03 -0000 Subject: SUSE-SU-2025:21123-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 Message-ID: <176532246398.2568.2454878508498467365@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 Announcement ID: SUSE-SU-2025:21123-1 Release Date: 2025-11-28T08:21:31Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_11 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-216=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_11-debugsource-4-1.1 * kernel-livepatch-6_4_0-35-rt-4-1.1 * kernel-livepatch-6_4_0-35-rt-debuginfo-4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:07 -0000 Subject: SUSE-SU-2025:21122-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Message-ID: <176532246736.2568.8126979636422474682@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Announcement ID: SUSE-SU-2025:21122-1 Release Date: 2025-11-28T08:21:02Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_10 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-215=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-34-rt-8-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_10-debugsource-8-1.1 * kernel-livepatch-6_4_0-34-rt-debuginfo-8-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:10 -0000 Subject: SUSE-SU-2025:21121-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Message-ID: <176532247028.2568.8849196377089806001@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Announcement ID: SUSE-SU-2025:21121-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_9 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-214=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-33-rt-8-1.2 * kernel-livepatch-6_4_0-33-rt-debuginfo-8-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_9-debugsource-8-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:14 -0000 Subject: SUSE-SU-2025:21120-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Message-ID: <176532247401.2568.7138032893291196011@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Announcement ID: SUSE-SU-2025:21120-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_8 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-213=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_8-debugsource-9-1.2 * kernel-livepatch-6_4_0-31-rt-debuginfo-9-1.2 * kernel-livepatch-6_4_0-31-rt-9-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:17 -0000 Subject: SUSE-SU-2025:21119-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Message-ID: <176532247758.2568.2292604990776588896@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Announcement ID: SUSE-SU-2025:21119-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1242882 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_7 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-212=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-30-rt-debuginfo-10-1.3 * kernel-livepatch-MICRO-6-0-RT_Update_7-debugsource-10-1.3 * kernel-livepatch-6_4_0-30-rt-10-1.3 ## References: * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:21 -0000 Subject: SUSE-SU-2025:21118-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Message-ID: <176532248106.2568.11714764738594675684@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Announcement ID: SUSE-SU-2025:21118-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1242882 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_6 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-211=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-28-rt-10-3.1 * kernel-livepatch-6_4_0-28-rt-debuginfo-10-3.1 * kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-10-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:24 -0000 Subject: SUSE-SU-2025:21117-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Message-ID: <176532248443.2568.17565194078209207799@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Announcement ID: SUSE-SU-2025:21117-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1242882 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_5 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-210=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-12-1.1 * kernel-livepatch-6_4_0-25-rt-debuginfo-12-1.1 * kernel-livepatch-6_4_0-25-rt-12-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:28 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:28 -0000 Subject: SUSE-SU-2025:21116-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Message-ID: <176532248854.2568.11740255548635355929@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Announcement ID: SUSE-SU-2025:21116-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1242882 * bsc#1245778 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2024-53141 * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2024-53141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_4 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1245778) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-209=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-22-rt-13-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-13-1.1 * kernel-livepatch-6_4_0-22-rt-debuginfo-13-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1245778 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:30 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:30 -0000 Subject: SUSE-SU-2025:21115-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_12 Message-ID: <176532249068.2568.12069513342372041160@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_12 Announcement ID: SUSE-SU-2025:21115-1 Release Date: 2025-11-28T08:20:42Z Rating: important References: * bsc#1249537 Cross-References: * CVE-2025-38616 CVSS scores: * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_12 fixes the following issues: * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-227=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_12-debugsource-3-1.1 * kernel-livepatch-6_4_0-35-default-3-1.1 * kernel-livepatch-6_4_0-35-default-debuginfo-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:33 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:33 -0000 Subject: SUSE-SU-2025:21114-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_10 Message-ID: <176532249358.2568.2322463166695382075@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_10 Announcement ID: SUSE-SU-2025:21114-1 Release Date: 2025-11-28T08:20:28Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_10 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-225=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_10-debugsource-4-1.1 * kernel-livepatch-6_4_0-32-default-debuginfo-4-1.1 * kernel-livepatch-6_4_0-32-default-4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:35 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:35 -0000 Subject: SUSE-SU-2025:21113-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_11 Message-ID: <176532249565.2568.15412862264008649699@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_11 Announcement ID: SUSE-SU-2025:21113-1 Release Date: 2025-11-28T08:20:11Z Rating: important References: * bsc#1249537 Cross-References: * CVE-2025-38616 CVSS scores: * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_11 fixes the following issues: * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-226=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_11-debugsource-3-1.1 * kernel-livepatch-6_4_0-34-default-debuginfo-3-1.1 * kernel-livepatch-6_4_0-34-default-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:38 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:38 -0000 Subject: SUSE-SU-2025:21112-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_9 Message-ID: <176532249819.2568.5362512709487907889@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_9 Announcement ID: SUSE-SU-2025:21112-1 Release Date: 2025-11-28T08:19:28Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_9 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-224=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-31-default-9-1.2 * kernel-livepatch-6_4_0-31-default-debuginfo-9-1.2 * kernel-livepatch-MICRO-6-0_Update_9-debugsource-9-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:40 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:40 -0000 Subject: SUSE-SU-2025:21111-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_8 Message-ID: <176532250097.2568.10269705642427842837@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_8 Announcement ID: SUSE-SU-2025:21111-1 Release Date: 2025-11-28T08:19:28Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_8 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-223=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-30-default-debuginfo-9-1.2 * kernel-livepatch-6_4_0-30-default-9-1.2 * kernel-livepatch-MICRO-6-0_Update_8-debugsource-9-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:44 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:44 -0000 Subject: SUSE-SU-2025:21110-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_7 Message-ID: <176532250413.2568.18334604749321518972@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_7 Announcement ID: SUSE-SU-2025:21110-1 Release Date: 2025-11-28T08:19:28Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_7 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-222=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-29-default-debuginfo-9-1.2 * kernel-livepatch-MICRO-6-0_Update_7-debugsource-9-1.2 * kernel-livepatch-6_4_0-29-default-9-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:47 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:47 -0000 Subject: SUSE-SU-2025:21109-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_6 Message-ID: <176532250766.2568.14938912371474176674@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_6 Announcement ID: SUSE-SU-2025:21109-1 Release Date: 2025-11-28T08:19:28Z Rating: important References: * bsc#1242882 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_6 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-221=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_6-debugsource-10-3.1 * kernel-livepatch-6_4_0-28-default-10-3.1 * kernel-livepatch-6_4_0-28-default-debuginfo-10-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:51 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:51 -0000 Subject: SUSE-SU-2025:21108-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_5 Message-ID: <176532251106.2568.17355564165538268418@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_5 Announcement ID: SUSE-SU-2025:21108-1 Release Date: 2025-11-28T08:19:28Z Rating: important References: * bsc#1242882 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_5 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-220=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-25-default-debuginfo-12-1.2 * kernel-livepatch-6_4_0-25-default-12-1.2 * kernel-livepatch-MICRO-6-0_Update_5-debugsource-12-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:21:55 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:21:55 -0000 Subject: SUSE-SU-2025:21107-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <176532251515.2568.17078279124718599553@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:21107-1 Release Date: 2025-11-28T08:19:28Z Rating: important References: * bsc#1242882 * bsc#1245778 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2024-53141 * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2024-53141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1245778) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-219=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-24-default-14-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-14-1.2 * kernel-livepatch-MICRO-6-0_Update_4-debugsource-14-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1245778 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:02 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:02 -0000 Subject: SUSE-SU-2025:21104-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 Message-ID: <176532252208.2568.5299620232686949279@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 Announcement ID: SUSE-SU-2025:21104-1 Release Date: 2025-11-28T08:21:31Z Rating: important References: * bsc#1249537 Cross-References: * CVE-2025-38616 CVSS scores: * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_12 fixes the following issues: * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-217=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_12-debugsource-3-1.1 * kernel-livepatch-6_4_0-36-rt-3-1.1 * kernel-livepatch-6_4_0-36-rt-debuginfo-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:04 -0000 Subject: SUSE-SU-2025:21103-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 Message-ID: <176532252484.2568.11372785638048065593@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 Announcement ID: SUSE-SU-2025:21103-1 Release Date: 2025-11-28T08:21:31Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_11 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-216=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_11-debugsource-4-1.1 * kernel-livepatch-6_4_0-35-rt-4-1.1 * kernel-livepatch-6_4_0-35-rt-debuginfo-4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:06 -0000 Subject: SUSE-SU-2025:21102-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_12 Message-ID: <176532252685.2568.14364434278536628478@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_12 Announcement ID: SUSE-SU-2025:21102-1 Release Date: 2025-11-28T08:21:02Z Rating: important References: * bsc#1249537 Cross-References: * CVE-2025-38616 CVSS scores: * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_12 fixes the following issues: * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-227=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_12-debugsource-3-1.1 * kernel-livepatch-6_4_0-35-default-3-1.1 * kernel-livepatch-6_4_0-35-default-debuginfo-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:08 -0000 Subject: SUSE-SU-2025:21101-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_11 Message-ID: <176532252875.2568.6016176691286677932@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_11 Announcement ID: SUSE-SU-2025:21101-1 Release Date: 2025-11-28T08:21:02Z Rating: important References: * bsc#1249537 Cross-References: * CVE-2025-38616 CVSS scores: * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_11 fixes the following issues: * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-226=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_11-debugsource-3-1.1 * kernel-livepatch-6_4_0-34-default-debuginfo-3-1.1 * kernel-livepatch-6_4_0-34-default-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:11 -0000 Subject: SUSE-SU-2025:21100-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_10 Message-ID: <176532253168.2568.10046666513023490632@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_10 Announcement ID: SUSE-SU-2025:21100-1 Release Date: 2025-11-28T08:21:02Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_10 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-225=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_10-debugsource-4-1.1 * kernel-livepatch-6_4_0-32-default-debuginfo-4-1.1 * kernel-livepatch-6_4_0-32-default-4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:14 -0000 Subject: SUSE-SU-2025:21099-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Message-ID: <176532253442.2568.15532033755261674053@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Announcement ID: SUSE-SU-2025:21099-1 Release Date: 2025-11-28T08:21:02Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_10 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-215=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-34-rt-8-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_10-debugsource-8-1.1 * kernel-livepatch-6_4_0-34-rt-debuginfo-8-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:17 -0000 Subject: SUSE-SU-2025:21098-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_9 Message-ID: <176532253721.2568.5362613232676525904@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_9 Announcement ID: SUSE-SU-2025:21098-1 Release Date: 2025-11-28T08:19:30Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_9 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-224=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-31-default-9-1.2 * kernel-livepatch-6_4_0-31-default-debuginfo-9-1.2 * kernel-livepatch-MICRO-6-0_Update_9-debugsource-9-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:19 -0000 Subject: SUSE-SU-2025:21097-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_8 Message-ID: <176532253997.2568.2793441645009438434@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_8 Announcement ID: SUSE-SU-2025:21097-1 Release Date: 2025-11-28T08:19:30Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_8 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-223=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-30-default-debuginfo-9-1.2 * kernel-livepatch-6_4_0-30-default-9-1.2 * kernel-livepatch-MICRO-6-0_Update_8-debugsource-9-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:22 -0000 Subject: SUSE-SU-2025:21096-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_7 Message-ID: <176532254273.2568.18339613736250030745@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_7 Announcement ID: SUSE-SU-2025:21096-1 Release Date: 2025-11-28T08:19:30Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_7 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-222=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-29-default-debuginfo-9-1.2 * kernel-livepatch-MICRO-6-0_Update_7-debugsource-9-1.2 * kernel-livepatch-6_4_0-29-default-9-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:26 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:26 -0000 Subject: SUSE-SU-2025:21095-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_6 Message-ID: <176532254601.2568.589742763983376956@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_6 Announcement ID: SUSE-SU-2025:21095-1 Release Date: 2025-11-28T08:19:30Z Rating: important References: * bsc#1242882 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_6 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-221=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_6-debugsource-10-3.1 * kernel-livepatch-6_4_0-28-default-10-3.1 * kernel-livepatch-6_4_0-28-default-debuginfo-10-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:29 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:29 -0000 Subject: SUSE-SU-2025:21094-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_5 Message-ID: <176532254948.2568.12797566953275723672@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_5 Announcement ID: SUSE-SU-2025:21094-1 Release Date: 2025-11-28T08:19:30Z Rating: important References: * bsc#1242882 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_5 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-220=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-25-default-debuginfo-12-1.2 * kernel-livepatch-6_4_0-25-default-12-1.2 * kernel-livepatch-MICRO-6-0_Update_5-debugsource-12-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:33 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:33 -0000 Subject: SUSE-SU-2025:21093-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <176532255394.2568.1571695128274164302@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:21093-1 Release Date: 2025-11-28T08:19:30Z Rating: important References: * bsc#1242882 * bsc#1245778 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2024-53141 * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2024-53141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1245778) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-219=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-24-default-14-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-14-1.2 * kernel-livepatch-MICRO-6-0_Update_4-debugsource-14-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1245778 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:38 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:38 -0000 Subject: SUSE-SU-2025:21092-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_3 Message-ID: <176532255828.2568.1020140371059456750@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_3 Announcement ID: SUSE-SU-2025:21092-1 Release Date: 2025-11-28T08:19:30Z Rating: important References: * bsc#1242882 * bsc#1245778 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2024-53141 * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2024-53141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_3 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1245778) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-218=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-20-default-16-1.2 * kernel-livepatch-6_4_0-20-default-debuginfo-16-1.2 * kernel-livepatch-MICRO-6-0_Update_3-debugsource-16-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1245778 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:42 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:42 -0000 Subject: SUSE-SU-2025:21091-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Message-ID: <176532256239.2568.10696329883880213459@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Announcement ID: SUSE-SU-2025:21091-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_9 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-214=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-33-rt-8-1.2 * kernel-livepatch-6_4_0-33-rt-debuginfo-8-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_9-debugsource-8-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:45 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:45 -0000 Subject: SUSE-SU-2025:21090-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Message-ID: <176532256513.2568.1160526320670350920@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Announcement ID: SUSE-SU-2025:21090-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_8 fixes the following issues: * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-213=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_8-debugsource-9-1.2 * kernel-livepatch-6_4_0-31-rt-debuginfo-9-1.2 * kernel-livepatch-6_4_0-31-rt-9-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:48 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:48 -0000 Subject: SUSE-SU-2025:21089-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Message-ID: <176532256835.2568.17545960946457255411@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Announcement ID: SUSE-SU-2025:21089-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1242882 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_7 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-212=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-30-rt-debuginfo-10-1.3 * kernel-livepatch-MICRO-6-0-RT_Update_7-debugsource-10-1.3 * kernel-livepatch-6_4_0-30-rt-10-1.3 ## References: * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:51 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:51 -0000 Subject: SUSE-SU-2025:21088-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Message-ID: <176532257177.2568.14892291725072130810@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Announcement ID: SUSE-SU-2025:21088-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1242882 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_6 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-211=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-28-rt-10-3.1 * kernel-livepatch-6_4_0-28-rt-debuginfo-10-3.1 * kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-10-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:55 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:55 -0000 Subject: SUSE-SU-2025:21087-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Message-ID: <176532257511.2568.7505845573118265860@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Announcement ID: SUSE-SU-2025:21087-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1242882 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_5 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-210=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-12-1.1 * kernel-livepatch-6_4_0-25-rt-debuginfo-12-1.1 * kernel-livepatch-6_4_0-25-rt-12-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:22:59 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:22:59 -0000 Subject: SUSE-SU-2025:21086-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Message-ID: <176532257925.2568.7609480721115223615@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Announcement ID: SUSE-SU-2025:21086-1 Release Date: 2025-11-28T08:19:29Z Rating: important References: * bsc#1242882 * bsc#1245778 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2024-53141 * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2024-53141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_4 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1245778) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-209=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-22-rt-13-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-13-1.1 * kernel-livepatch-6_4_0-22-rt-debuginfo-13-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1245778 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:23:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:23:03 -0000 Subject: SUSE-SU-2025:21085-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Message-ID: <176532258370.2568.13059608669259792981@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Announcement ID: SUSE-SU-2025:21085-1 Release Date: 2025-11-28T08:14:04Z Rating: important References: * bsc#1242882 * bsc#1245778 * bsc#1248672 * bsc#1249537 Cross-References: * CVE-2024-53141 * CVE-2025-23145 * CVE-2025-38500 * CVE-2025-38616 CVSS scores: * CVE-2024-53141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_3 fixes the following issues: * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242882) * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1245778) * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672) * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-208=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_3-debugsource-16-1.2 * kernel-livepatch-6_4_0-11-rt-16-1.2 * kernel-livepatch-6_4_0-11-rt-debuginfo-16-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://bugzilla.suse.com/show_bug.cgi?id=1242882 * https://bugzilla.suse.com/show_bug.cgi?id=1245778 * https://bugzilla.suse.com/show_bug.cgi?id=1248672 * https://bugzilla.suse.com/show_bug.cgi?id=1249537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 9 23:23:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 09 Dec 2025 23:23:06 -0000 Subject: SUSE-SU-2025:21084-1: important: Security update for sssd Message-ID: <176532258634.2568.9000205194847599360@smelt2.prg2.suse.org> # Security update for sssd Announcement ID: SUSE-SU-2025:21084-1 Release Date: 2025-11-27T11:12:20Z Rating: important References: * bsc#1244325 * bsc#1251827 Cross-References: * CVE-2025-11561 CVSS scores: * CVE-2025-11561 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-11561 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-11561 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has one fix can now be installed. ## Description: This update for sssd fixes the following issues: * CVE-2025-11561: Fixed default Kerberos configuration allowing privilege escalation on AD-joined Linux systems (bsc#1251827) Other fixes: \- Install file in krb5.conf.d to include sssd krb5 config snippets (bsc#1244325) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-527=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * sssd-ad-debuginfo-2.8.2-7.1 * libsss_nss_idmap0-debuginfo-2.8.2-7.1 * libsss_idmap0-2.8.2-7.1 * sssd-krb5-debuginfo-2.8.2-7.1 * libsss_nss_idmap0-2.8.2-7.1 * python3-sssd-config-2.8.2-7.1 * sssd-ldap-debuginfo-2.8.2-7.1 * python3-sssd-config-debuginfo-2.8.2-7.1 * sssd-ad-2.8.2-7.1 * sssd-krb5-common-debuginfo-2.8.2-7.1 * sssd-dbus-debuginfo-2.8.2-7.1 * sssd-krb5-common-2.8.2-7.1 * libsss_certmap0-2.8.2-7.1 * libsss_idmap0-debuginfo-2.8.2-7.1 * sssd-krb5-2.8.2-7.1 * sssd-dbus-2.8.2-7.1 * libsss_certmap0-debuginfo-2.8.2-7.1 * sssd-debuginfo-2.8.2-7.1 * sssd-2.8.2-7.1 * sssd-debugsource-2.8.2-7.1 * sssd-ldap-2.8.2-7.1 * sssd-tools-2.8.2-7.1 * sssd-tools-debuginfo-2.8.2-7.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11561.html * https://bugzilla.suse.com/show_bug.cgi?id=1244325 * https://bugzilla.suse.com/show_bug.cgi?id=1251827 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 08:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 08:30:09 -0000 Subject: SUSE-SU-2025:4337-1: important: Security update for go1.24 Message-ID: <176535540925.2574.10907056550597154779@smelt2.prg2.suse.org> # Security update for go1.24 Announcement ID: SUSE-SU-2025:4337-1 Release Date: 2025-12-09T23:52:03Z Rating: important References: * bsc#1236217 * bsc#1245878 * bsc#1254430 * bsc#1254431 Cross-References: * CVE-2025-61727 * CVE-2025-61729 CVSS scores: * CVE-2025-61727 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-61729 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61729 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61729 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities and has two security fixes can now be installed. ## Description: This update for go1.24 fixes the following issues: go1.24.11 (released 2025-12-02) includes two security fixes to the crypto/x509 package, as well as bug fixes to the runtime. (bsc#1236217) CVE-2025-61727 CVE-2025-61729: * go#76460 go#76445 bsc#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation * go#76463 go#76442 bsc#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores * Packaging: Migrate from update-alternatives to libalternatives (bsc#1245878) * This is an optional migration controlled via prjconf definition with_libalternatives * If with_libalternatives is not defined packaging continues to use update- alternatives ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4337=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-4337=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-4337=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4337=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4337=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4337=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4337=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4337=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4337=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4337=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4337=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4337=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4337=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4337=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4337=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * go1.24-1.24.11-150000.1.50.1 * go1.24-race-1.24.11-150000.1.50.1 * go1.24-doc-1.24.11-150000.1.50.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61727.html * https://www.suse.com/security/cve/CVE-2025-61729.html * https://bugzilla.suse.com/show_bug.cgi?id=1236217 * https://bugzilla.suse.com/show_bug.cgi?id=1245878 * https://bugzilla.suse.com/show_bug.cgi?id=1254430 * https://bugzilla.suse.com/show_bug.cgi?id=1254431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 08:30:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 08:30:14 -0000 Subject: SUSE-SU-2025:4336-1: important: Security update for go1.25 Message-ID: <176535541438.2574.2059789548704978388@smelt2.prg2.suse.org> # Security update for go1.25 Announcement ID: SUSE-SU-2025:4336-1 Release Date: 2025-12-09T23:50:46Z Rating: important References: * bsc#1244485 * bsc#1245878 * bsc#1254227 * bsc#1254430 * bsc#1254431 Cross-References: * CVE-2025-61727 * CVE-2025-61729 CVSS scores: * CVE-2025-61727 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-61729 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61729 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61729 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities and has three security fixes can now be installed. ## Description: This update for go1.25 fixes the following issues: go1.25.5 (released 2025-12-02) includes two security fixes to the crypto/x509 package, as well as bug fixes to the mime and os packages. (bsc#1244485) CVE-2025-61729 CVE-2025-61727: * go#76461 go#76445 bsc#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation * go#76464 go#76442 bsc#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25 * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup * Packaging: Migrate from update-alternatives to libalternatives (bsc#1245878) * This is an optional migration controlled via prjconf definition with_libalternatives * If with_libalternatives is not defined packaging continues to use update- alternatives go1.25.4 (released 2025-11-05) includes fixes to the compiler, the runtime, and the crypto/subtle, encoding/pem, net/url, and os packages. (bsc#1244485) * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64 * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets * go#75952 encoding/pem: regression when decoding blocks with leading garbage * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should * go#76029 pem/encoding: malformed line endings can cause panics ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-4336=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4336=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4336=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4336=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4336=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4336=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4336=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4336=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4336=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4336=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4336=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4336=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4336=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4336=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-4336=1 ## Package List: * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.25-1.25.5-150000.1.23.1 * go1.25-doc-1.25.5-150000.1.23.1 * go1.25-race-1.25.5-150000.1.23.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61727.html * https://www.suse.com/security/cve/CVE-2025-61729.html * https://bugzilla.suse.com/show_bug.cgi?id=1244485 * https://bugzilla.suse.com/show_bug.cgi?id=1245878 * https://bugzilla.suse.com/show_bug.cgi?id=1254227 * https://bugzilla.suse.com/show_bug.cgi?id=1254430 * https://bugzilla.suse.com/show_bug.cgi?id=1254431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 12:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 12:30:05 -0000 Subject: SUSE-SU-2025:4346-1: moderate: Security update for gnutls Message-ID: <176536980565.30714.16103133187238018360@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2025:4346-1 Release Date: 2025-12-10T10:39:49Z Rating: moderate References: * bsc#1254132 Cross-References: * CVE-2025-9820 CVSS scores: * CVE-2025-9820 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2025-9820: Fixed buffer overflow in gnutls_pkcs11_token_init. (bsc#1254132) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4346=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libgnutls28-3.3.27-3.15.1 * libgnutls28-32bit-3.3.27-3.15.1 * libgnutls-openssl27-debuginfo-3.3.27-3.15.1 * libgnutls-openssl-devel-3.3.27-3.15.1 * libgnutls28-debuginfo-32bit-3.3.27-3.15.1 * gnutls-debuginfo-3.3.27-3.15.1 * libgnutls28-debuginfo-3.3.27-3.15.1 * gnutls-3.3.27-3.15.1 * libgnutlsxx-devel-3.3.27-3.15.1 * libgnutls-devel-3.3.27-3.15.1 * libgnutls-openssl27-3.3.27-3.15.1 * gnutls-debugsource-3.3.27-3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9820.html * https://bugzilla.suse.com/show_bug.cgi?id=1254132 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 12:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 12:30:07 -0000 Subject: SUSE-SU-2025:1004-2: moderate: Security update for python-Jinja2 Message-ID: <176536980793.30714.12729977596022786178@smelt2.prg2.suse.org> # Security update for python-Jinja2 Announcement ID: SUSE-SU-2025:1004-2 Release Date: 2025-12-10T10:34:51Z Rating: moderate References: * bsc#1238879 Cross-References: * CVE-2025-27516 CVSS scores: * CVE-2025-27516 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-27516 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-27516 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-27516 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-Jinja2 fixes the following issues: * CVE-2025-27516: Fixed sandbox breakout through attr filter selecting format method (bsc#1238879) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1004=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1004=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1004=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1004=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1004=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1004=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1004=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1004=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1004=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1004=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1004=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1004=1 ## Package List: * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 * SUSE Enterprise Storage 7.1 (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * python3-Jinja2-2.10.1-150000.3.21.1 ## References: * https://www.suse.com/security/cve/CVE-2025-27516.html * https://bugzilla.suse.com/show_bug.cgi?id=1238879 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 12:30:35 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 12:30:35 -0000 Subject: SUSE-SU-2025:21128-1: moderate: Security update for openssh Message-ID: <176536983583.30714.15110697625900458425@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:21128-1 Release Date: 2025-11-28T07:46:20Z Rating: moderate References: * bsc#1251198 * bsc#1251199 Cross-References: * CVE-2025-61984 * CVE-2025-61985 CVSS scores: * CVE-2025-61984 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61984 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-61985 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61985 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61985 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.2 An update that solves two vulnerabilities can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2025-61984: code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198). * CVE-2025-61985: code execution via '\0' character in ssh:// URI when a ProxyCommand is used (bsc#1251199). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-81=1 ## Package List: * SUSE Linux Micro 6.2 (ppc64le) * openssh-common-10.0p2-160000.3.1 * openssh-10.0p2-160000.3.1 * openssh-debugsource-10.0p2-160000.3.1 * openssh-common-debuginfo-10.0p2-160000.3.1 * openssh-server-10.0p2-160000.3.1 * openssh-clients-10.0p2-160000.3.1 * openssh-server-config-rootlogin-10.0p2-160000.3.1 * openssh-server-debuginfo-10.0p2-160000.3.1 * openssh-debuginfo-10.0p2-160000.3.1 * openssh-clients-debuginfo-10.0p2-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61984.html * https://www.suse.com/security/cve/CVE-2025-61985.html * https://bugzilla.suse.com/show_bug.cgi?id=1251198 * https://bugzilla.suse.com/show_bug.cgi?id=1251199 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:40:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:40:22 -0000 Subject: SUSE-SU-2025:4347-1: moderate: Security update for glib2 Message-ID: <176538482275.6931.5467315783165885788@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2025:4347-1 Release Date: 2025-12-10T13:02:35Z Rating: moderate References: * bsc#1249055 Cross-References: * CVE-2025-7039 CVSS scores: * CVE-2025-7039 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-7039 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7039 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2025-7039: Fixed buffer under-read on glib through glib/gfileutils.c via get_tmp_file() (bsc#1249055) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4347=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4347=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4347=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4347=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4347=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4347=1 ## Package List: * openSUSE Leap 15.4 (noarch) * gio-branding-upstream-2.70.5-150400.3.26.1 * glib2-lang-2.70.5-150400.3.26.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * glib2-tools-2.70.5-150400.3.26.1 * libgthread-2_0-0-2.70.5-150400.3.26.1 * glib2-doc-2.70.5-150400.3.26.1 * libglib-2_0-0-2.70.5-150400.3.26.1 * libgio-2_0-0-2.70.5-150400.3.26.1 * glib2-debugsource-2.70.5-150400.3.26.1 * libgthread-2_0-0-debuginfo-2.70.5-150400.3.26.1 * glib2-devel-2.70.5-150400.3.26.1 * glib2-devel-debuginfo-2.70.5-150400.3.26.1 * libgobject-2_0-0-2.70.5-150400.3.26.1 * glib2-tests-devel-2.70.5-150400.3.26.1 * libgobject-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgmodule-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgmodule-2_0-0-2.70.5-150400.3.26.1 * glib2-devel-static-2.70.5-150400.3.26.1 * libglib-2_0-0-debuginfo-2.70.5-150400.3.26.1 * glib2-tools-debuginfo-2.70.5-150400.3.26.1 * glib2-tests-devel-debuginfo-2.70.5-150400.3.26.1 * libgio-2_0-0-debuginfo-2.70.5-150400.3.26.1 * openSUSE Leap 15.4 (x86_64) * libgmodule-2_0-0-32bit-2.70.5-150400.3.26.1 * libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.26.1 * libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.26.1 * libgio-2_0-0-32bit-2.70.5-150400.3.26.1 * glib2-devel-32bit-debuginfo-2.70.5-150400.3.26.1 * libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.26.1 * libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.26.1 * libgobject-2_0-0-32bit-2.70.5-150400.3.26.1 * libgthread-2_0-0-32bit-debuginfo-2.70.5-150400.3.26.1 * libglib-2_0-0-32bit-2.70.5-150400.3.26.1 * glib2-tools-32bit-2.70.5-150400.3.26.1 * glib2-tools-32bit-debuginfo-2.70.5-150400.3.26.1 * libgthread-2_0-0-32bit-2.70.5-150400.3.26.1 * glib2-devel-32bit-2.70.5-150400.3.26.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libgmodule-2_0-0-64bit-debuginfo-2.70.5-150400.3.26.1 * libgthread-2_0-0-64bit-2.70.5-150400.3.26.1 * libgthread-2_0-0-64bit-debuginfo-2.70.5-150400.3.26.1 * libgio-2_0-0-64bit-debuginfo-2.70.5-150400.3.26.1 * libglib-2_0-0-64bit-2.70.5-150400.3.26.1 * libgmodule-2_0-0-64bit-2.70.5-150400.3.26.1 * glib2-devel-64bit-2.70.5-150400.3.26.1 * glib2-tools-64bit-2.70.5-150400.3.26.1 * libglib-2_0-0-64bit-debuginfo-2.70.5-150400.3.26.1 * libgobject-2_0-0-64bit-2.70.5-150400.3.26.1 * glib2-devel-64bit-debuginfo-2.70.5-150400.3.26.1 * libgobject-2_0-0-64bit-debuginfo-2.70.5-150400.3.26.1 * glib2-tools-64bit-debuginfo-2.70.5-150400.3.26.1 * libgio-2_0-0-64bit-2.70.5-150400.3.26.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * glib2-tools-2.70.5-150400.3.26.1 * libglib-2_0-0-2.70.5-150400.3.26.1 * libgio-2_0-0-2.70.5-150400.3.26.1 * glib2-debugsource-2.70.5-150400.3.26.1 * libgobject-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgobject-2_0-0-2.70.5-150400.3.26.1 * libgmodule-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgmodule-2_0-0-2.70.5-150400.3.26.1 * libglib-2_0-0-debuginfo-2.70.5-150400.3.26.1 * glib2-tools-debuginfo-2.70.5-150400.3.26.1 * libgio-2_0-0-debuginfo-2.70.5-150400.3.26.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * glib2-tools-2.70.5-150400.3.26.1 * libglib-2_0-0-2.70.5-150400.3.26.1 * libgio-2_0-0-2.70.5-150400.3.26.1 * glib2-debugsource-2.70.5-150400.3.26.1 * libgobject-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgobject-2_0-0-2.70.5-150400.3.26.1 * libgmodule-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgmodule-2_0-0-2.70.5-150400.3.26.1 * libglib-2_0-0-debuginfo-2.70.5-150400.3.26.1 * glib2-tools-debuginfo-2.70.5-150400.3.26.1 * libgio-2_0-0-debuginfo-2.70.5-150400.3.26.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * glib2-tools-2.70.5-150400.3.26.1 * libglib-2_0-0-2.70.5-150400.3.26.1 * libgio-2_0-0-2.70.5-150400.3.26.1 * glib2-debugsource-2.70.5-150400.3.26.1 * libgobject-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgobject-2_0-0-2.70.5-150400.3.26.1 * libgmodule-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgmodule-2_0-0-2.70.5-150400.3.26.1 * libglib-2_0-0-debuginfo-2.70.5-150400.3.26.1 * glib2-tools-debuginfo-2.70.5-150400.3.26.1 * libgio-2_0-0-debuginfo-2.70.5-150400.3.26.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * glib2-tools-2.70.5-150400.3.26.1 * libglib-2_0-0-2.70.5-150400.3.26.1 * libgio-2_0-0-2.70.5-150400.3.26.1 * glib2-debugsource-2.70.5-150400.3.26.1 * libgobject-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgobject-2_0-0-2.70.5-150400.3.26.1 * libgmodule-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgmodule-2_0-0-2.70.5-150400.3.26.1 * libglib-2_0-0-debuginfo-2.70.5-150400.3.26.1 * glib2-tools-debuginfo-2.70.5-150400.3.26.1 * libgio-2_0-0-debuginfo-2.70.5-150400.3.26.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * glib2-tools-2.70.5-150400.3.26.1 * libglib-2_0-0-2.70.5-150400.3.26.1 * libgio-2_0-0-2.70.5-150400.3.26.1 * glib2-debugsource-2.70.5-150400.3.26.1 * libgobject-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgobject-2_0-0-2.70.5-150400.3.26.1 * libgmodule-2_0-0-debuginfo-2.70.5-150400.3.26.1 * libgmodule-2_0-0-2.70.5-150400.3.26.1 * libglib-2_0-0-debuginfo-2.70.5-150400.3.26.1 * glib2-tools-debuginfo-2.70.5-150400.3.26.1 * libgio-2_0-0-debuginfo-2.70.5-150400.3.26.1 ## References: * https://www.suse.com/security/cve/CVE-2025-7039.html * https://bugzilla.suse.com/show_bug.cgi?id=1249055 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:41:59 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:41:59 -0000 Subject: SUSE-SU-2025:21180-1: important: Security update for the Linux Kernel Message-ID: <176538491973.6931.1484486684118195767@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:21180-1 Release Date: 2025-11-26T15:35:38Z Rating: important References: * bsc#1218644 * bsc#1238472 * bsc#1239206 * bsc#1241166 * bsc#1241637 * bsc#1247222 * bsc#1248630 * bsc#1249161 * bsc#1249226 * bsc#1249302 * bsc#1249317 * bsc#1249397 * bsc#1249398 * bsc#1249495 * bsc#1249512 * bsc#1249608 * bsc#1249735 * bsc#1250202 * bsc#1250379 * bsc#1250400 * bsc#1250455 * bsc#1250491 * bsc#1250704 * bsc#1250721 * bsc#1250749 * bsc#1250946 * bsc#1251176 * bsc#1251177 * bsc#1251232 * bsc#1251233 * bsc#1251804 * bsc#1251809 * bsc#1251819 * bsc#1251930 * bsc#1251967 * bsc#1252033 * bsc#1252035 * bsc#1252039 * bsc#1252044 * bsc#1252047 * bsc#1252051 * bsc#1252052 * bsc#1252056 * bsc#1252060 * bsc#1252062 * bsc#1252064 * bsc#1252065 * bsc#1252067 * bsc#1252069 * bsc#1252070 * bsc#1252072 * bsc#1252074 * bsc#1252075 * bsc#1252076 * bsc#1252078 * bsc#1252079 * bsc#1252081 * bsc#1252082 * bsc#1252083 * bsc#1252253 * bsc#1252265 * bsc#1252267 * bsc#1252270 * bsc#1252330 * bsc#1252333 * bsc#1252336 * bsc#1252346 * bsc#1252348 * bsc#1252349 * bsc#1252678 * bsc#1252679 * bsc#1252688 * bsc#1252725 * bsc#1252734 * bsc#1252772 * bsc#1252774 * bsc#1252780 * bsc#1252785 * bsc#1252787 * bsc#1252789 * bsc#1252797 * bsc#1252819 * bsc#1252822 * bsc#1252826 * bsc#1252841 * bsc#1252848 * bsc#1252849 * bsc#1252850 * bsc#1252851 * bsc#1252854 * bsc#1252858 * bsc#1252862 * bsc#1252865 * bsc#1252866 * bsc#1252873 * bsc#1252902 * bsc#1252909 * bsc#1252915 * bsc#1252918 * bsc#1252921 * bsc#1252939 * jsc#PED-348 * jsc#PED-4593 * jsc#PED-9891 Cross-References: * CVE-2025-21816 * CVE-2025-38653 * CVE-2025-38718 * CVE-2025-39676 * CVE-2025-39702 * CVE-2025-39756 * CVE-2025-39779 * CVE-2025-39797 * CVE-2025-39812 * CVE-2025-39866 * CVE-2025-39876 * CVE-2025-39881 * CVE-2025-39895 * CVE-2025-39903 * CVE-2025-39911 * CVE-2025-39947 * CVE-2025-39948 * CVE-2025-39949 * CVE-2025-39950 * CVE-2025-39955 * CVE-2025-39956 * CVE-2025-39963 * CVE-2025-39965 * CVE-2025-39967 * CVE-2025-39968 * CVE-2025-39969 * CVE-2025-39970 * CVE-2025-39971 * CVE-2025-39972 * CVE-2025-39973 * CVE-2025-39978 * CVE-2025-39979 * CVE-2025-39981 * CVE-2025-39982 * CVE-2025-39984 * CVE-2025-39985 * CVE-2025-39986 * CVE-2025-39987 * CVE-2025-39988 * CVE-2025-39991 * CVE-2025-39992 * CVE-2025-39993 * CVE-2025-39994 * CVE-2025-39995 * CVE-2025-39996 * CVE-2025-39997 * CVE-2025-40000 * CVE-2025-40005 * CVE-2025-40009 * CVE-2025-40011 * CVE-2025-40012 * CVE-2025-40013 * CVE-2025-40016 * CVE-2025-40018 * CVE-2025-40019 * CVE-2025-40020 * CVE-2025-40029 * CVE-2025-40032 * CVE-2025-40035 * CVE-2025-40036 * CVE-2025-40037 * CVE-2025-40040 * CVE-2025-40043 * CVE-2025-40044 * CVE-2025-40048 * CVE-2025-40049 * CVE-2025-40051 * CVE-2025-40052 * CVE-2025-40056 * CVE-2025-40058 * CVE-2025-40060 * CVE-2025-40061 * CVE-2025-40062 * CVE-2025-40071 * CVE-2025-40078 * CVE-2025-40080 * CVE-2025-40085 * CVE-2025-40087 * CVE-2025-40091 * CVE-2025-40096 * CVE-2025-40100 * CVE-2025-40104 * CVE-2025-40364 CVSS scores: * CVE-2025-21816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38653 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38653 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39812 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39866 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39866 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39903 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39903 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39947 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39947 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39948 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39948 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39949 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39949 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39950 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39950 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39955 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39955 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39956 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39956 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39963 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39963 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39965 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39965 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39967 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39968 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39968 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39969 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39969 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39970 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39970 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39971 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39971 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39972 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39972 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39973 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39978 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39979 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39979 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39981 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39981 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40005 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40012 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40012 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40016 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40016 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40018 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40019 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40020 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40029 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40032 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40032 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40037 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40043 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40043 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40044 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40049 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40049 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-40051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40056 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40056 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40085 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40085 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40091 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40091 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40096 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40100 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40104 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40104 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-40364 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40364 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40364 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that solves 83 vulnerabilities, contains three features and has 18 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2025-21816: hrtimers: Force migrate away hrtimers queued after (bsc#1238472). * CVE-2025-38653: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al (bsc#1248630). * CVE-2025-38718: sctp: linearize cloned gso packets in sctp_rcv (bsc#1249161). * CVE-2025-39676: scsi: qla4xxx: Prevent a potential error pointer dereference (bsc#1249302). * CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time (bsc#1249317). * CVE-2025-39756: fs: Prevent file descriptor table allocations exceeding INT_MAX (bsc#1249512). * CVE-2025-39779: btrfs: subpage: keep TOWRITE tag until folio is cleaned (bsc#1249495). * CVE-2025-39812: sctp: initialize more fields in sctp_v6_from_sk() (bsc#1250202). * CVE-2025-39866: fs: writeback: fix use-after-free in __mark_inode_dirty() (bsc#1250455). * CVE-2025-39876: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() (bsc#1250400). * CVE-2025-39881: kernfs: Fix UAF in polling when open file is released (bsc#1250379). * CVE-2025-39895: sched: Fix sched_numa_find_nth_cpu() if mask offline (bsc#1250721). * CVE-2025-39903: of_numa: fix uninitialized memory nodes causing kernel panic (bsc#1250749). * CVE-2025-39911: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path (bsc#1250704). * CVE-2025-39947: net/mlx5e: Harden uplink netdev access against device unbind (bsc#1251232). * CVE-2025-39948: ice: fix Rx page leak on multi-buffer frames (bsc#1251233). * CVE-2025-39949: qed: Don't collect too many protection override GRC elements (bsc#1251177). * CVE-2025-39950: net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR (bsc#1251176). * CVE-2025-39955: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() (bsc#1251804). * CVE-2025-39956: igc: don't fail igc_probe() on LED setup error (bsc#1251809). * CVE-2025-39963: io_uring: fix incorrect io_kiocb reference in io_link_skb (bsc#1251819). * CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047). * CVE-2025-39969: i40e: fix validation of VF state in get resources (bsc#1252044). * CVE-2025-39970: i40e: fix input validation logic for action_meta (bsc#1252051). * CVE-2025-39971: i40e: fix idx validation in config queues msg (bsc#1252052). * CVE-2025-39972: i40e: fix idx validation in i40e_validate_queue_map (bsc#1252039). * CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035). * CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069). * CVE-2025-39979: net/mlx5: fs, add API for sharing HWS action by refcount (bsc#1252067). * CVE-2025-39984: net: tun: Update napi->skb after XDP process (bsc#1252081). * CVE-2025-39992: mm: swap: check for stable address space before operating on the VMA (bsc#1252076). * CVE-2025-40000: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() (bsc#1252062). * CVE-2025-40005: spi: cadence-quadspi: Implement refcount to handle unbind during busy (bsc#1252349). * CVE-2025-40012: net/smc: fix warning in smc_rx_splice() when calling get_page() (bsc#1252330). * CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688). * CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780). * CVE-2025-40051: vhost: vringh: Modify the return value check (bsc#1252858). * CVE-2025-40056: vhost: vringh: Fix copy_to_iter return value check (bsc#1252826). * CVE-2025-40060: coresight: trbe: Return NULL pointer for allocation failures (bsc#1252848). * CVE-2025-40078: bpf: Explicitly check accesses to bpf_sock_addr (bsc#1252789). * CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774). * CVE-2025-40100: btrfs: do not assert we found block group item when creating free space tree (bsc#1252918). The following non security issues were fixed: * add bug reference to existing hv_netvsc change (bsc#1252265) * amd-pstate-ut: Reset amd-pstate driver mode after running selftests (bsc#1249226). * cgroup/cpuset: Remove remote_partition_check() & make update_cpumasks_hier() handle remote partition (bsc#1241166). * cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166). * cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166). * doc/README.SUSE: Correct the character used for TAINT_NO_SUPPORT The character was previously 'N', but upstream used it for TAINT_TEST, which prompted the change of TAINT_NO_SUPPORT to 'n'. * dpll: zl3073x: Add firmware loading functionality (bsc#1252253). * dpll: zl3073x: Add functions to access hardware registers (bsc#1252253). * dpll: zl3073x: Add low-level flash functions (bsc#1252253). * dpll: zl3073x: Add support to get fractional frequency offset (bsc#1252253). * dpll: zl3073x: Add support to get phase offset on connected input pin (bsc#1252253). * dpll: zl3073x: Add support to get/set esync on pins (bsc#1252253). * dpll: zl3073x: Fix double free in zl3073x_devlink_flash_update() (bsc#1252253). * dpll: zl3073x: Handle missing or corrupted flash configuration (bsc#1252253). * dpll: zl3073x: Implement devlink flash callback (bsc#1252253). * dpll: zl3073x: Increase maximum size of flash utility (bsc#1252253). * dpll: zl3073x: Refactor DPLL initialization (bsc#1252253). * drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table() (git-fixes). * drm/xe/guc: Prepare GuC register list and update ADS size for error capture (stable-fixes). * ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd (bsc#1247222). * ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation (bsc#1247222). * ixgbevf: fix getting link speed data for E610 devices (bsc#1247222). * ixgbevf: fix mailbox API compatibility by negotiating supported features (bsc#1247222). * kbuild/modfinal: Link livepatches with module-common.o (bsc#1218644, bsc#1252270). * kdb: Replace deprecated strcpy() with memmove() in vkdb_printf() (bsc#1252939). * kernel-subpackage-spec: Do not doubly-sign modules (bsc#1251930). * nvme-auth: update sc_c in host response (git-fixes bsc#1249397). * perf hwmon_pmu: Fix uninitialized variable warning (perf- sle16-v6.13-userspace-update, git-fixes). * phy: cadence: cdns-dphy: Update calibration wait time for startup state machine (git-fixes). * powerpc/fadump: skip parameter area allocation when fadump is disabled (jsc#PED-9891 git-fixes). * proc: fix missing pde_set_flags() for net proc files (bsc#1248630) * proc: fix type confusion in pde_set_flags() (bsc#1248630) * rpm/check-for-config-changes: ignore CONFIG_SCHED_PROXY_EXEC, too (bsc#1250946) * scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267). * x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1252725). * x86/resctrl: Fix miscount of bandwidth event when reactivating previously unavailable RMID (bsc#1252734). * x86/resctrl: Refactor resctrl_arch_rmid_read() (bsc#1252734). * x86/virt/tdx: Mark memory cache state incoherent when making SEAMCALL (jsc#PED-348). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-HA-16.0-58=1 ## Package List: * SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x x86_64) * gfs2-kmp-default-debuginfo-6.12.0-160000.7.1 * kernel-default-debugsource-6.12.0-160000.7.1 * dlm-kmp-default-debuginfo-6.12.0-160000.7.1 * dlm-kmp-default-6.12.0-160000.7.1 * kernel-default-debuginfo-6.12.0-160000.7.1 * cluster-md-kmp-default-6.12.0-160000.7.1 * gfs2-kmp-default-6.12.0-160000.7.1 * cluster-md-kmp-default-debuginfo-6.12.0-160000.7.1 * SUSE Linux Enterprise Server High Availability Extension 16.0 (nosrc) * kernel-default-6.12.0-160000.7.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21816.html * https://www.suse.com/security/cve/CVE-2025-38653.html * https://www.suse.com/security/cve/CVE-2025-38718.html * https://www.suse.com/security/cve/CVE-2025-39676.html * https://www.suse.com/security/cve/CVE-2025-39702.html * https://www.suse.com/security/cve/CVE-2025-39756.html * https://www.suse.com/security/cve/CVE-2025-39779.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39812.html * https://www.suse.com/security/cve/CVE-2025-39866.html * https://www.suse.com/security/cve/CVE-2025-39876.html * https://www.suse.com/security/cve/CVE-2025-39881.html * https://www.suse.com/security/cve/CVE-2025-39895.html * https://www.suse.com/security/cve/CVE-2025-39903.html * https://www.suse.com/security/cve/CVE-2025-39911.html * https://www.suse.com/security/cve/CVE-2025-39947.html * https://www.suse.com/security/cve/CVE-2025-39948.html * https://www.suse.com/security/cve/CVE-2025-39949.html * https://www.suse.com/security/cve/CVE-2025-39950.html * https://www.suse.com/security/cve/CVE-2025-39955.html * https://www.suse.com/security/cve/CVE-2025-39956.html * https://www.suse.com/security/cve/CVE-2025-39963.html * https://www.suse.com/security/cve/CVE-2025-39965.html * https://www.suse.com/security/cve/CVE-2025-39967.html * https://www.suse.com/security/cve/CVE-2025-39968.html * https://www.suse.com/security/cve/CVE-2025-39969.html * https://www.suse.com/security/cve/CVE-2025-39970.html * https://www.suse.com/security/cve/CVE-2025-39971.html * https://www.suse.com/security/cve/CVE-2025-39972.html * https://www.suse.com/security/cve/CVE-2025-39973.html * https://www.suse.com/security/cve/CVE-2025-39978.html * https://www.suse.com/security/cve/CVE-2025-39979.html * https://www.suse.com/security/cve/CVE-2025-39981.html * https://www.suse.com/security/cve/CVE-2025-39982.html * https://www.suse.com/security/cve/CVE-2025-39984.html * https://www.suse.com/security/cve/CVE-2025-39985.html * https://www.suse.com/security/cve/CVE-2025-39986.html * https://www.suse.com/security/cve/CVE-2025-39987.html * https://www.suse.com/security/cve/CVE-2025-39988.html * https://www.suse.com/security/cve/CVE-2025-39991.html * https://www.suse.com/security/cve/CVE-2025-39992.html * https://www.suse.com/security/cve/CVE-2025-39993.html * https://www.suse.com/security/cve/CVE-2025-39994.html * https://www.suse.com/security/cve/CVE-2025-39995.html * https://www.suse.com/security/cve/CVE-2025-39996.html * https://www.suse.com/security/cve/CVE-2025-39997.html * https://www.suse.com/security/cve/CVE-2025-40000.html * https://www.suse.com/security/cve/CVE-2025-40005.html * https://www.suse.com/security/cve/CVE-2025-40009.html * https://www.suse.com/security/cve/CVE-2025-40011.html * https://www.suse.com/security/cve/CVE-2025-40012.html * https://www.suse.com/security/cve/CVE-2025-40013.html * https://www.suse.com/security/cve/CVE-2025-40016.html * https://www.suse.com/security/cve/CVE-2025-40018.html * https://www.suse.com/security/cve/CVE-2025-40019.html * https://www.suse.com/security/cve/CVE-2025-40020.html * https://www.suse.com/security/cve/CVE-2025-40029.html * https://www.suse.com/security/cve/CVE-2025-40032.html * https://www.suse.com/security/cve/CVE-2025-40035.html * https://www.suse.com/security/cve/CVE-2025-40036.html * https://www.suse.com/security/cve/CVE-2025-40037.html * https://www.suse.com/security/cve/CVE-2025-40040.html * https://www.suse.com/security/cve/CVE-2025-40043.html * https://www.suse.com/security/cve/CVE-2025-40044.html * https://www.suse.com/security/cve/CVE-2025-40048.html * https://www.suse.com/security/cve/CVE-2025-40049.html * https://www.suse.com/security/cve/CVE-2025-40051.html * https://www.suse.com/security/cve/CVE-2025-40052.html * https://www.suse.com/security/cve/CVE-2025-40056.html * https://www.suse.com/security/cve/CVE-2025-40058.html * https://www.suse.com/security/cve/CVE-2025-40060.html * https://www.suse.com/security/cve/CVE-2025-40061.html * https://www.suse.com/security/cve/CVE-2025-40062.html * https://www.suse.com/security/cve/CVE-2025-40071.html * https://www.suse.com/security/cve/CVE-2025-40078.html * https://www.suse.com/security/cve/CVE-2025-40080.html * https://www.suse.com/security/cve/CVE-2025-40085.html * https://www.suse.com/security/cve/CVE-2025-40087.html * https://www.suse.com/security/cve/CVE-2025-40091.html * https://www.suse.com/security/cve/CVE-2025-40096.html * https://www.suse.com/security/cve/CVE-2025-40100.html * https://www.suse.com/security/cve/CVE-2025-40104.html * https://www.suse.com/security/cve/CVE-2025-40364.html * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1238472 * https://bugzilla.suse.com/show_bug.cgi?id=1239206 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241637 * https://bugzilla.suse.com/show_bug.cgi?id=1247222 * https://bugzilla.suse.com/show_bug.cgi?id=1248630 * https://bugzilla.suse.com/show_bug.cgi?id=1249161 * https://bugzilla.suse.com/show_bug.cgi?id=1249226 * https://bugzilla.suse.com/show_bug.cgi?id=1249302 * https://bugzilla.suse.com/show_bug.cgi?id=1249317 * https://bugzilla.suse.com/show_bug.cgi?id=1249397 * https://bugzilla.suse.com/show_bug.cgi?id=1249398 * https://bugzilla.suse.com/show_bug.cgi?id=1249495 * https://bugzilla.suse.com/show_bug.cgi?id=1249512 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249735 * https://bugzilla.suse.com/show_bug.cgi?id=1250202 * https://bugzilla.suse.com/show_bug.cgi?id=1250379 * https://bugzilla.suse.com/show_bug.cgi?id=1250400 * https://bugzilla.suse.com/show_bug.cgi?id=1250455 * https://bugzilla.suse.com/show_bug.cgi?id=1250491 * https://bugzilla.suse.com/show_bug.cgi?id=1250704 * https://bugzilla.suse.com/show_bug.cgi?id=1250721 * https://bugzilla.suse.com/show_bug.cgi?id=1250749 * https://bugzilla.suse.com/show_bug.cgi?id=1250946 * https://bugzilla.suse.com/show_bug.cgi?id=1251176 * https://bugzilla.suse.com/show_bug.cgi?id=1251177 * https://bugzilla.suse.com/show_bug.cgi?id=1251232 * https://bugzilla.suse.com/show_bug.cgi?id=1251233 * https://bugzilla.suse.com/show_bug.cgi?id=1251804 * https://bugzilla.suse.com/show_bug.cgi?id=1251809 * https://bugzilla.suse.com/show_bug.cgi?id=1251819 * https://bugzilla.suse.com/show_bug.cgi?id=1251930 * https://bugzilla.suse.com/show_bug.cgi?id=1251967 * https://bugzilla.suse.com/show_bug.cgi?id=1252033 * https://bugzilla.suse.com/show_bug.cgi?id=1252035 * https://bugzilla.suse.com/show_bug.cgi?id=1252039 * https://bugzilla.suse.com/show_bug.cgi?id=1252044 * https://bugzilla.suse.com/show_bug.cgi?id=1252047 * https://bugzilla.suse.com/show_bug.cgi?id=1252051 * https://bugzilla.suse.com/show_bug.cgi?id=1252052 * https://bugzilla.suse.com/show_bug.cgi?id=1252056 * https://bugzilla.suse.com/show_bug.cgi?id=1252060 * https://bugzilla.suse.com/show_bug.cgi?id=1252062 * https://bugzilla.suse.com/show_bug.cgi?id=1252064 * https://bugzilla.suse.com/show_bug.cgi?id=1252065 * https://bugzilla.suse.com/show_bug.cgi?id=1252067 * https://bugzilla.suse.com/show_bug.cgi?id=1252069 * https://bugzilla.suse.com/show_bug.cgi?id=1252070 * https://bugzilla.suse.com/show_bug.cgi?id=1252072 * https://bugzilla.suse.com/show_bug.cgi?id=1252074 * https://bugzilla.suse.com/show_bug.cgi?id=1252075 * https://bugzilla.suse.com/show_bug.cgi?id=1252076 * https://bugzilla.suse.com/show_bug.cgi?id=1252078 * https://bugzilla.suse.com/show_bug.cgi?id=1252079 * https://bugzilla.suse.com/show_bug.cgi?id=1252081 * https://bugzilla.suse.com/show_bug.cgi?id=1252082 * https://bugzilla.suse.com/show_bug.cgi?id=1252083 * https://bugzilla.suse.com/show_bug.cgi?id=1252253 * https://bugzilla.suse.com/show_bug.cgi?id=1252265 * https://bugzilla.suse.com/show_bug.cgi?id=1252267 * https://bugzilla.suse.com/show_bug.cgi?id=1252270 * https://bugzilla.suse.com/show_bug.cgi?id=1252330 * https://bugzilla.suse.com/show_bug.cgi?id=1252333 * https://bugzilla.suse.com/show_bug.cgi?id=1252336 * https://bugzilla.suse.com/show_bug.cgi?id=1252346 * https://bugzilla.suse.com/show_bug.cgi?id=1252348 * https://bugzilla.suse.com/show_bug.cgi?id=1252349 * https://bugzilla.suse.com/show_bug.cgi?id=1252678 * https://bugzilla.suse.com/show_bug.cgi?id=1252679 * https://bugzilla.suse.com/show_bug.cgi?id=1252688 * https://bugzilla.suse.com/show_bug.cgi?id=1252725 * https://bugzilla.suse.com/show_bug.cgi?id=1252734 * https://bugzilla.suse.com/show_bug.cgi?id=1252772 * https://bugzilla.suse.com/show_bug.cgi?id=1252774 * https://bugzilla.suse.com/show_bug.cgi?id=1252780 * https://bugzilla.suse.com/show_bug.cgi?id=1252785 * https://bugzilla.suse.com/show_bug.cgi?id=1252787 * https://bugzilla.suse.com/show_bug.cgi?id=1252789 * https://bugzilla.suse.com/show_bug.cgi?id=1252797 * https://bugzilla.suse.com/show_bug.cgi?id=1252819 * https://bugzilla.suse.com/show_bug.cgi?id=1252822 * https://bugzilla.suse.com/show_bug.cgi?id=1252826 * https://bugzilla.suse.com/show_bug.cgi?id=1252841 * https://bugzilla.suse.com/show_bug.cgi?id=1252848 * https://bugzilla.suse.com/show_bug.cgi?id=1252849 * https://bugzilla.suse.com/show_bug.cgi?id=1252850 * https://bugzilla.suse.com/show_bug.cgi?id=1252851 * https://bugzilla.suse.com/show_bug.cgi?id=1252854 * https://bugzilla.suse.com/show_bug.cgi?id=1252858 * https://bugzilla.suse.com/show_bug.cgi?id=1252862 * https://bugzilla.suse.com/show_bug.cgi?id=1252865 * https://bugzilla.suse.com/show_bug.cgi?id=1252866 * https://bugzilla.suse.com/show_bug.cgi?id=1252873 * https://bugzilla.suse.com/show_bug.cgi?id=1252902 * https://bugzilla.suse.com/show_bug.cgi?id=1252909 * https://bugzilla.suse.com/show_bug.cgi?id=1252915 * https://bugzilla.suse.com/show_bug.cgi?id=1252918 * https://bugzilla.suse.com/show_bug.cgi?id=1252921 * https://bugzilla.suse.com/show_bug.cgi?id=1252939 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-4593 * https://jira.suse.com/browse/PED-9891 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:50:27 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:50:27 -0000 Subject: SUSE-SU-2025:21179-1: important: Security update for the Linux Kernel Message-ID: <176538542787.6931.13401590174390074900@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:21179-1 Release Date: 2025-11-25T07:34:55Z Rating: important References: * bsc#1215199 * bsc#1218644 * bsc#1230062 * bsc#1234634 * bsc#1234693 * bsc#1234863 * bsc#1235953 * bsc#1236897 * bsc#1237108 * bsc#1237131 * bsc#1237542 * bsc#1237776 * bsc#1238972 * bsc#1239206 * bsc#1240324 * bsc#1240696 * bsc#1240966 * bsc#1240998 * bsc#1241166 * bsc#1241353 * bsc#1241403 * bsc#1241435 * bsc#1242034 * bsc#1242086 * bsc#1242414 * bsc#1242782 * bsc#1242864 * bsc#1242965 * bsc#1242995 * bsc#1243000 * bsc#1243055 * bsc#1243068 * bsc#1243100 * bsc#1243112 * bsc#1243774 * bsc#1244309 * bsc#1244723 * bsc#1244734 * bsc#1244749 * bsc#1244792 * bsc#1244812 * bsc#1244930 * bsc#1244939 * bsc#1245000 * bsc#1245151 * bsc#1245193 * bsc#1245206 * bsc#1245216 * bsc#1245260 * bsc#1245410 * bsc#1245457 * bsc#1245504 * bsc#1245506 * bsc#1245508 * bsc#1245510 * bsc#1245596 * bsc#1245621 * bsc#1245630 * bsc#1245654 * bsc#1245657 * bsc#1245658 * bsc#1245659 * bsc#1245663 * bsc#1245664 * bsc#1245665 * bsc#1245666 * bsc#1245668 * bsc#1245669 * bsc#1245670 * bsc#1245671 * bsc#1245675 * bsc#1245676 * bsc#1245678 * bsc#1245683 * bsc#1245684 * bsc#1245686 * bsc#1245688 * bsc#1245690 * bsc#1245691 * bsc#1245695 * bsc#1245700 * bsc#1245703 * bsc#1245705 * bsc#1245710 * bsc#1245711 * bsc#1245713 * bsc#1245714 * bsc#1245715 * bsc#1245717 * bsc#1245719 * bsc#1245721 * bsc#1245723 * bsc#1245726 * bsc#1245728 * bsc#1245729 * bsc#1245730 * bsc#1245731 * bsc#1245735 * bsc#1245737 * bsc#1245744 * bsc#1245745 * bsc#1245746 * bsc#1245747 * bsc#1245748 * bsc#1245749 * bsc#1245751 * bsc#1245757 * bsc#1245763 * bsc#1245765 * bsc#1245767 * bsc#1245769 * bsc#1245777 * bsc#1245780 * bsc#1245781 * bsc#1245784 * bsc#1245785 * bsc#1245787 * bsc#1245812 * bsc#1245814 * bsc#1245815 * bsc#1245937 * bsc#1245945 * bsc#1245952 * bsc#1245955 * bsc#1245956 * bsc#1245963 * bsc#1245966 * bsc#1245970 * bsc#1245973 * bsc#1245976 * bsc#1245977 * bsc#1245986 * bsc#1246000 * bsc#1246002 * bsc#1246005 * bsc#1246008 * bsc#1246012 * bsc#1246022 * bsc#1246023 * bsc#1246031 * bsc#1246034 * bsc#1246037 * bsc#1246041 * bsc#1246042 * bsc#1246047 * bsc#1246049 * bsc#1246050 * bsc#1246053 * bsc#1246054 * bsc#1246055 * bsc#1246057 * bsc#1246098 * bsc#1246109 * bsc#1246125 * bsc#1246166 * bsc#1246171 * bsc#1246176 * bsc#1246181 * bsc#1246183 * bsc#1246185 * bsc#1246186 * bsc#1246188 * bsc#1246190 * bsc#1246192 * bsc#1246193 * bsc#1246195 * bsc#1246220 * bsc#1246234 * bsc#1246236 * bsc#1246240 * bsc#1246243 * bsc#1246244 * bsc#1246245 * bsc#1246246 * bsc#1246248 * bsc#1246250 * bsc#1246252 * bsc#1246253 * bsc#1246255 * bsc#1246258 * bsc#1246259 * bsc#1246260 * bsc#1246262 * bsc#1246266 * bsc#1246268 * bsc#1246283 * bsc#1246285 * bsc#1246286 * bsc#1246287 * bsc#1246290 * bsc#1246292 * bsc#1246293 * bsc#1246295 * bsc#1246297 * bsc#1246333 * bsc#1246334 * bsc#1246337 * bsc#1246342 * bsc#1246349 * bsc#1246351 * bsc#1246353 * bsc#1246354 * bsc#1246358 * bsc#1246364 * bsc#1246366 * bsc#1246370 * bsc#1246375 * bsc#1246376 * bsc#1246385 * bsc#1246386 * bsc#1246387 * bsc#1246438 * bsc#1246443 * bsc#1246444 * bsc#1246447 * bsc#1246450 * bsc#1246453 * bsc#1246473 * bsc#1246490 * bsc#1246509 * bsc#1246547 * bsc#1246631 * bsc#1246651 * bsc#1246688 * bsc#1246777 * bsc#1246781 * bsc#1246782 * bsc#1246868 * bsc#1246896 * bsc#1246911 * bsc#1246979 * bsc#1247018 * bsc#1247020 * bsc#1247022 * bsc#1247023 * bsc#1247024 * bsc#1247027 * bsc#1247028 * bsc#1247031 * bsc#1247033 * bsc#1247035 * bsc#1247061 * bsc#1247062 * bsc#1247064 * bsc#1247076 * bsc#1247078 * bsc#1247079 * bsc#1247088 * bsc#1247089 * bsc#1247091 * bsc#1247097 * bsc#1247098 * bsc#1247099 * bsc#1247101 * bsc#1247102 * bsc#1247103 * bsc#1247104 * bsc#1247112 * bsc#1247113 * bsc#1247116 * bsc#1247118 * bsc#1247119 * bsc#1247123 * bsc#1247125 * bsc#1247126 * bsc#1247128 * bsc#1247130 * bsc#1247131 * bsc#1247132 * bsc#1247136 * bsc#1247137 * bsc#1247138 * bsc#1247141 * bsc#1247143 * bsc#1247145 * bsc#1247146 * bsc#1247147 * bsc#1247149 * bsc#1247150 * bsc#1247151 * bsc#1247152 * bsc#1247153 * bsc#1247154 * bsc#1247155 * bsc#1247156 * bsc#1247157 * bsc#1247160 * bsc#1247162 * bsc#1247163 * bsc#1247164 * bsc#1247167 * bsc#1247169 * bsc#1247170 * bsc#1247171 * bsc#1247174 * bsc#1247176 * bsc#1247177 * bsc#1247178 * bsc#1247181 * bsc#1247209 * bsc#1247210 * bsc#1247220 * bsc#1247223 * bsc#1247227 * bsc#1247229 * bsc#1247231 * bsc#1247233 * bsc#1247234 * bsc#1247235 * bsc#1247236 * bsc#1247238 * bsc#1247239 * bsc#1247241 * bsc#1247243 * bsc#1247250 * bsc#1247251 * bsc#1247252 * bsc#1247253 * bsc#1247255 * bsc#1247262 * bsc#1247265 * bsc#1247270 * bsc#1247271 * bsc#1247273 * bsc#1247274 * bsc#1247276 * bsc#1247277 * bsc#1247278 * bsc#1247279 * bsc#1247280 * bsc#1247282 * bsc#1247283 * bsc#1247284 * bsc#1247285 * bsc#1247288 * bsc#1247289 * bsc#1247290 * bsc#1247293 * bsc#1247308 * bsc#1247311 * bsc#1247313 * bsc#1247314 * bsc#1247317 * bsc#1247325 * bsc#1247347 * bsc#1247348 * bsc#1247349 * bsc#1247366 * bsc#1247372 * bsc#1247376 * bsc#1247426 * bsc#1247437 * bsc#1247442 * bsc#1247483 * bsc#1247500 * bsc#1247712 * bsc#1247837 * bsc#1247838 * bsc#1247935 * bsc#1247936 * bsc#1247949 * bsc#1247950 * bsc#1247963 * bsc#1247976 * bsc#1248088 * bsc#1248111 * bsc#1248121 * bsc#1248183 * bsc#1248186 * bsc#1248190 * bsc#1248192 * bsc#1248194 * bsc#1248198 * bsc#1248199 * bsc#1248200 * bsc#1248202 * bsc#1248205 * bsc#1248211 * bsc#1248223 * bsc#1248224 * bsc#1248225 * bsc#1248230 * bsc#1248235 * bsc#1248255 * bsc#1248296 * bsc#1248297 * bsc#1248299 * bsc#1248302 * bsc#1248304 * bsc#1248306 * bsc#1248312 * bsc#1248333 * bsc#1248334 * bsc#1248337 * bsc#1248338 * bsc#1248340 * bsc#1248341 * bsc#1248343 * bsc#1248345 * bsc#1248349 * bsc#1248350 * bsc#1248354 * bsc#1248355 * bsc#1248357 * bsc#1248359 * bsc#1248361 * bsc#1248363 * bsc#1248365 * bsc#1248367 * bsc#1248368 * bsc#1248374 * bsc#1248377 * bsc#1248378 * bsc#1248380 * bsc#1248386 * bsc#1248390 * bsc#1248392 * bsc#1248395 * bsc#1248396 * bsc#1248399 * bsc#1248401 * bsc#1248511 * bsc#1248512 * bsc#1248573 * bsc#1248575 * bsc#1248577 * bsc#1248609 * bsc#1248610 * bsc#1248616 * bsc#1248617 * bsc#1248619 * bsc#1248621 * bsc#1248622 * bsc#1248624 * bsc#1248627 * bsc#1248628 * bsc#1248634 * bsc#1248635 * bsc#1248639 * bsc#1248643 * bsc#1248647 * bsc#1248648 * bsc#1248652 * bsc#1248655 * bsc#1248662 * bsc#1248664 * bsc#1248666 * bsc#1248669 * bsc#1248674 * bsc#1248681 * bsc#1248727 * bsc#1248728 * bsc#1248748 * bsc#1248754 * bsc#1248775 * bsc#1249022 * bsc#1249038 * bsc#1249060 * bsc#1249061 * bsc#1249062 * bsc#1249064 * bsc#1249065 * bsc#1249066 * bsc#1249126 * bsc#1249143 * bsc#1249156 * bsc#1249159 * bsc#1249160 * bsc#1249163 * bsc#1249164 * bsc#1249166 * bsc#1249167 * bsc#1249169 * bsc#1249170 * bsc#1249172 * bsc#1249176 * bsc#1249177 * bsc#1249182 * bsc#1249186 * bsc#1249190 * bsc#1249193 * bsc#1249195 * bsc#1249199 * bsc#1249201 * bsc#1249202 * bsc#1249203 * bsc#1249204 * bsc#1249206 * bsc#1249215 * bsc#1249220 * bsc#1249221 * bsc#1249254 * bsc#1249258 * bsc#1249262 * bsc#1249263 * bsc#1249265 * bsc#1249266 * bsc#1249269 * bsc#1249271 * bsc#1249272 * bsc#1249273 * bsc#1249274 * bsc#1249278 * bsc#1249279 * bsc#1249281 * bsc#1249282 * bsc#1249284 * bsc#1249285 * bsc#1249286 * bsc#1249288 * bsc#1249290 * bsc#1249292 * bsc#1249295 * bsc#1249296 * bsc#1249297 * bsc#1249299 * bsc#1249300 * bsc#1249301 * bsc#1249303 * bsc#1249304 * bsc#1249305 * bsc#1249306 * bsc#1249308 * bsc#1249309 * bsc#1249312 * bsc#1249313 * bsc#1249314 * bsc#1249315 * bsc#1249316 * bsc#1249318 * bsc#1249319 * bsc#1249320 * bsc#1249321 * bsc#1249322 * bsc#1249323 * bsc#1249324 * bsc#1249333 * bsc#1249334 * bsc#1249338 * bsc#1249346 * bsc#1249374 * bsc#1249413 * bsc#1249477 * bsc#1249478 * bsc#1249479 * bsc#1249486 * bsc#1249490 * bsc#1249494 * bsc#1249500 * bsc#1249504 * bsc#1249506 * bsc#1249508 * bsc#1249509 * bsc#1249510 * bsc#1249513 * bsc#1249515 * bsc#1249516 * bsc#1249522 * bsc#1249523 * bsc#1249524 * bsc#1249526 * bsc#1249533 * bsc#1249538 * bsc#1249540 * bsc#1249542 * bsc#1249545 * bsc#1249547 * bsc#1249548 * bsc#1249550 * bsc#1249552 * bsc#1249554 * bsc#1249562 * bsc#1249566 * bsc#1249587 * bsc#1249598 * bsc#1249604 * bsc#1249608 * bsc#1249615 * bsc#1249618 * bsc#1249774 * bsc#1249833 * bsc#1249887 * bsc#1249888 * bsc#1249901 * bsc#1249904 * bsc#1249906 * bsc#1249915 * bsc#1249974 * bsc#1249975 * bsc#1250002 * bsc#1250007 * bsc#1250021 * bsc#1250025 * bsc#1250028 * bsc#1250032 * bsc#1250087 * bsc#1250088 * bsc#1250119 * bsc#1250123 * bsc#1250124 * bsc#1250177 * bsc#1250179 * bsc#1250203 * bsc#1250204 * bsc#1250205 * bsc#1250237 * bsc#1250242 * bsc#1250247 * bsc#1250249 * bsc#1250251 * bsc#1250258 * bsc#1250262 * bsc#1250266 * bsc#1250267 * bsc#1250268 * bsc#1250275 * bsc#1250276 * bsc#1250281 * bsc#1250291 * bsc#1250292 * bsc#1250294 * bsc#1250296 * bsc#1250297 * bsc#1250298 * bsc#1250334 * bsc#1250344 * bsc#1250365 * bsc#1250371 * bsc#1250377 * bsc#1250386 * bsc#1250389 * bsc#1250398 * bsc#1250402 * bsc#1250406 * bsc#1250407 * bsc#1250408 * bsc#1250450 * bsc#1250491 * bsc#1250519 * bsc#1250522 * bsc#1250650 * bsc#1250655 * bsc#1250671 * bsc#1250702 * bsc#1250711 * bsc#1250712 * bsc#1250713 * bsc#1250716 * bsc#1250719 * bsc#1250722 * bsc#1250729 * bsc#1250736 * bsc#1250737 * bsc#1250739 * bsc#1250741 * bsc#1250742 * bsc#1250758 * bsc#1250952 * bsc#1251100 * bsc#1251114 * bsc#1251134 * bsc#1251135 * bsc#1251143 * bsc#1251146 * bsc#1251186 * bsc#1251216 * bsc#1251230 * bsc#1251810 * bsc#1252084 * jsc#PED-10909 * jsc#PED-12405 * jsc#PED-12745 * jsc#PED-12882 * jsc#PED-13113 * jsc#PED-13256 * jsc#PED-13302 * jsc#PED-13331 * jsc#PED-13343 * jsc#PED-13345 * jsc#PED-13631 * jsc#PED-13704 * jsc#PED-13728 * jsc#PED-13762 * jsc#PED-13815 * jsc#PED-348 * jsc#PED-7249 Cross-References: * CVE-2024-53164 * CVE-2024-57891 * CVE-2024-57951 * CVE-2024-57952 * CVE-2024-58090 * CVE-2025-22034 * CVE-2025-22077 * CVE-2025-23141 * CVE-2025-37798 * CVE-2025-37821 * CVE-2025-37849 * CVE-2025-37856 * CVE-2025-37861 * CVE-2025-37864 * CVE-2025-38006 * CVE-2025-38008 * CVE-2025-38019 * CVE-2025-38034 * CVE-2025-38038 * CVE-2025-38052 * CVE-2025-38058 * CVE-2025-38062 * CVE-2025-38075 * CVE-2025-38087 * CVE-2025-38088 * CVE-2025-38089 * CVE-2025-38090 * CVE-2025-38091 * CVE-2025-38095 * CVE-2025-38096 * CVE-2025-38098 * CVE-2025-38099 * CVE-2025-38101 * CVE-2025-38102 * CVE-2025-38103 * CVE-2025-38106 * CVE-2025-38107 * CVE-2025-38108 * CVE-2025-38109 * CVE-2025-38110 * CVE-2025-38111 * CVE-2025-38112 * CVE-2025-38113 * CVE-2025-38114 * CVE-2025-38117 * CVE-2025-38118 * CVE-2025-38119 * CVE-2025-38120 * CVE-2025-38122 * CVE-2025-38123 * CVE-2025-38124 * CVE-2025-38125 * CVE-2025-38127 * CVE-2025-38128 * CVE-2025-38129 * CVE-2025-38134 * CVE-2025-38135 * CVE-2025-38136 * CVE-2025-38137 * CVE-2025-38138 * CVE-2025-38140 * CVE-2025-38141 * CVE-2025-38142 * CVE-2025-38143 * CVE-2025-38145 * CVE-2025-38146 * CVE-2025-38148 * CVE-2025-38149 * CVE-2025-38151 * CVE-2025-38153 * CVE-2025-38154 * CVE-2025-38155 * CVE-2025-38156 * CVE-2025-38157 * CVE-2025-38159 * CVE-2025-38160 * CVE-2025-38161 * CVE-2025-38165 * CVE-2025-38168 * CVE-2025-38169 * CVE-2025-38170 * CVE-2025-38172 * CVE-2025-38173 * CVE-2025-38174 * CVE-2025-38177 * CVE-2025-38180 * CVE-2025-38181 * CVE-2025-38182 * CVE-2025-38184 * CVE-2025-38185 * CVE-2025-38186 * CVE-2025-38188 * CVE-2025-38189 * CVE-2025-38190 * CVE-2025-38193 * CVE-2025-38197 * CVE-2025-38198 * CVE-2025-38201 * CVE-2025-38205 * CVE-2025-38208 * CVE-2025-38209 * CVE-2025-38211 * CVE-2025-38213 * CVE-2025-38214 * CVE-2025-38215 * CVE-2025-38216 * CVE-2025-38217 * CVE-2025-38220 * CVE-2025-38222 * CVE-2025-38224 * CVE-2025-38225 * CVE-2025-38226 * CVE-2025-38227 * CVE-2025-38228 * CVE-2025-38229 * CVE-2025-38231 * CVE-2025-38232 * CVE-2025-38233 * CVE-2025-38234 * CVE-2025-38242 * CVE-2025-38244 * CVE-2025-38245 * CVE-2025-38246 * CVE-2025-38249 * CVE-2025-38251 * CVE-2025-38253 * CVE-2025-38255 * CVE-2025-38256 * CVE-2025-38257 * CVE-2025-38258 * CVE-2025-38259 * CVE-2025-38263 * CVE-2025-38265 * CVE-2025-38267 * CVE-2025-38268 * CVE-2025-38270 * CVE-2025-38272 * CVE-2025-38273 * CVE-2025-38274 * CVE-2025-38275 * CVE-2025-38277 * CVE-2025-38278 * CVE-2025-38286 * CVE-2025-38287 * CVE-2025-38288 * CVE-2025-38289 * CVE-2025-38290 * CVE-2025-38291 * CVE-2025-38292 * CVE-2025-38293 * CVE-2025-38299 * CVE-2025-38300 * CVE-2025-38301 * CVE-2025-38302 * CVE-2025-38303 * CVE-2025-38304 * CVE-2025-38305 * CVE-2025-38306 * CVE-2025-38307 * CVE-2025-38311 * CVE-2025-38312 * CVE-2025-38313 * CVE-2025-38315 * CVE-2025-38317 * CVE-2025-38318 * CVE-2025-38319 * CVE-2025-38322 * CVE-2025-38323 * CVE-2025-38326 * CVE-2025-38332 * CVE-2025-38335 * CVE-2025-38336 * CVE-2025-38337 * CVE-2025-38338 * CVE-2025-38339 * CVE-2025-38341 * CVE-2025-38342 * CVE-2025-38343 * CVE-2025-38344 * CVE-2025-38345 * CVE-2025-38348 * CVE-2025-38349 * CVE-2025-38350 * CVE-2025-38351 * CVE-2025-38352 * CVE-2025-38353 * CVE-2025-38354 * CVE-2025-38355 * CVE-2025-38356 * CVE-2025-38359 * CVE-2025-38360 * CVE-2025-38361 * CVE-2025-38362 * CVE-2025-38363 * CVE-2025-38364 * CVE-2025-38365 * CVE-2025-38368 * CVE-2025-38369 * CVE-2025-38371 * CVE-2025-38372 * CVE-2025-38373 * CVE-2025-38374 * CVE-2025-38375 * CVE-2025-38376 * CVE-2025-38377 * CVE-2025-38380 * CVE-2025-38381 * CVE-2025-38382 * CVE-2025-38383 * CVE-2025-38384 * CVE-2025-38385 * CVE-2025-38386 * CVE-2025-38387 * CVE-2025-38389 * CVE-2025-38390 * CVE-2025-38391 * CVE-2025-38392 * CVE-2025-38393 * CVE-2025-38395 * CVE-2025-38396 * CVE-2025-38397 * CVE-2025-38399 * CVE-2025-38400 * CVE-2025-38401 * CVE-2025-38402 * CVE-2025-38403 * CVE-2025-38404 * CVE-2025-38405 * CVE-2025-38406 * CVE-2025-38408 * CVE-2025-38409 * CVE-2025-38410 * CVE-2025-38412 * CVE-2025-38413 * CVE-2025-38414 * CVE-2025-38415 * CVE-2025-38416 * CVE-2025-38417 * CVE-2025-38418 * CVE-2025-38419 * CVE-2025-38420 * CVE-2025-38421 * CVE-2025-38424 * CVE-2025-38425 * CVE-2025-38426 * CVE-2025-38427 * CVE-2025-38428 * CVE-2025-38429 * CVE-2025-38430 * CVE-2025-38436 * CVE-2025-38438 * CVE-2025-38439 * CVE-2025-38440 * CVE-2025-38441 * CVE-2025-38443 * CVE-2025-38444 * CVE-2025-38445 * CVE-2025-38446 * CVE-2025-38448 * CVE-2025-38449 * CVE-2025-38450 * CVE-2025-38451 * CVE-2025-38453 * CVE-2025-38454 * CVE-2025-38455 * CVE-2025-38456 * CVE-2025-38457 * CVE-2025-38458 * CVE-2025-38459 * CVE-2025-38460 * CVE-2025-38461 * CVE-2025-38462 * CVE-2025-38463 * CVE-2025-38464 * CVE-2025-38465 * CVE-2025-38466 * CVE-2025-38467 * CVE-2025-38468 * CVE-2025-38470 * CVE-2025-38472 * CVE-2025-38473 * CVE-2025-38474 * CVE-2025-38475 * CVE-2025-38476 * CVE-2025-38477 * CVE-2025-38478 * CVE-2025-38480 * CVE-2025-38481 * CVE-2025-38482 * CVE-2025-38483 * CVE-2025-38484 * CVE-2025-38485 * CVE-2025-38487 * CVE-2025-38488 * CVE-2025-38489 * CVE-2025-38490 * CVE-2025-38491 * CVE-2025-38493 * CVE-2025-38494 * CVE-2025-38495 * CVE-2025-38496 * CVE-2025-38497 * CVE-2025-38499 * CVE-2025-38500 * CVE-2025-38503 * CVE-2025-38506 * CVE-2025-38508 * CVE-2025-38514 * CVE-2025-38524 * CVE-2025-38526 * CVE-2025-38527 * CVE-2025-38528 * CVE-2025-38531 * CVE-2025-38533 * CVE-2025-38539 * CVE-2025-38544 * CVE-2025-38545 * CVE-2025-38546 * CVE-2025-38549 * CVE-2025-38552 * CVE-2025-38553 * CVE-2025-38554 * CVE-2025-38555 * CVE-2025-38556 * CVE-2025-38557 * CVE-2025-38559 * CVE-2025-38560 * CVE-2025-38563 * CVE-2025-38564 * CVE-2025-38565 * CVE-2025-38566 * CVE-2025-38568 * CVE-2025-38571 * CVE-2025-38572 * CVE-2025-38573 * CVE-2025-38574 * CVE-2025-38576 * CVE-2025-38581 * CVE-2025-38582 * CVE-2025-38583 * CVE-2025-38584 * CVE-2025-38585 * CVE-2025-38586 * CVE-2025-38587 * CVE-2025-38588 * CVE-2025-38591 * CVE-2025-38593 * CVE-2025-38595 * CVE-2025-38597 * CVE-2025-38601 * CVE-2025-38602 * CVE-2025-38604 * CVE-2025-38605 * CVE-2025-38608 * CVE-2025-38609 * CVE-2025-38610 * CVE-2025-38612 * CVE-2025-38614 * CVE-2025-38616 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38619 * CVE-2025-38621 * CVE-2025-38622 * CVE-2025-38623 * CVE-2025-38624 * CVE-2025-38628 * CVE-2025-38630 * CVE-2025-38631 * CVE-2025-38632 * CVE-2025-38634 * CVE-2025-38635 * CVE-2025-38639 * CVE-2025-38640 * CVE-2025-38643 * CVE-2025-38644 * CVE-2025-38646 * CVE-2025-38648 * CVE-2025-38656 * CVE-2025-38658 * CVE-2025-38659 * CVE-2025-38660 * CVE-2025-38662 * CVE-2025-38664 * CVE-2025-38665 * CVE-2025-38668 * CVE-2025-38670 * CVE-2025-38671 * CVE-2025-38676 * CVE-2025-38678 * CVE-2025-38679 * CVE-2025-38680 * CVE-2025-38681 * CVE-2025-38683 * CVE-2025-38684 * CVE-2025-38685 * CVE-2025-38686 * CVE-2025-38687 * CVE-2025-38691 * CVE-2025-38692 * CVE-2025-38693 * CVE-2025-38694 * CVE-2025-38695 * CVE-2025-38700 * CVE-2025-38701 * CVE-2025-38702 * CVE-2025-38703 * CVE-2025-38705 * CVE-2025-38706 * CVE-2025-38709 * CVE-2025-38710 * CVE-2025-38717 * CVE-2025-38721 * CVE-2025-38722 * CVE-2025-38724 * CVE-2025-38725 * CVE-2025-38727 * CVE-2025-38729 * CVE-2025-38730 * CVE-2025-38732 * CVE-2025-38733 * CVE-2025-38734 * CVE-2025-38735 * CVE-2025-38736 * CVE-2025-39673 * CVE-2025-39675 * CVE-2025-39677 * CVE-2025-39678 * CVE-2025-39679 * CVE-2025-39681 * CVE-2025-39682 * CVE-2025-39683 * CVE-2025-39684 * CVE-2025-39685 * CVE-2025-39686 * CVE-2025-39687 * CVE-2025-39691 * CVE-2025-39693 * CVE-2025-39694 * CVE-2025-39695 * CVE-2025-39697 * CVE-2025-39698 * CVE-2025-39700 * CVE-2025-39701 * CVE-2025-39703 * CVE-2025-39705 * CVE-2025-39706 * CVE-2025-39707 * CVE-2025-39709 * CVE-2025-39710 * CVE-2025-39711 * CVE-2025-39712 * CVE-2025-39713 * CVE-2025-39714 * CVE-2025-39718 * CVE-2025-39719 * CVE-2025-39721 * CVE-2025-39722 * CVE-2025-39723 * CVE-2025-39724 * CVE-2025-39726 * CVE-2025-39727 * CVE-2025-39730 * CVE-2025-39732 * CVE-2025-39738 * CVE-2025-39739 * CVE-2025-39742 * CVE-2025-39744 * CVE-2025-39746 * CVE-2025-39747 * CVE-2025-39748 * CVE-2025-39749 * CVE-2025-39750 * CVE-2025-39751 * CVE-2025-39754 * CVE-2025-39757 * CVE-2025-39758 * CVE-2025-39759 * CVE-2025-39760 * CVE-2025-39761 * CVE-2025-39763 * CVE-2025-39764 * CVE-2025-39765 * CVE-2025-39766 * CVE-2025-39770 * CVE-2025-39772 * CVE-2025-39773 * CVE-2025-39775 * CVE-2025-39782 * CVE-2025-39783 * CVE-2025-39787 * CVE-2025-39788 * CVE-2025-39790 * CVE-2025-39791 * CVE-2025-39792 * CVE-2025-39797 * CVE-2025-39798 * CVE-2025-39800 * CVE-2025-39801 * CVE-2025-39806 * CVE-2025-39807 * CVE-2025-39808 * CVE-2025-39810 * CVE-2025-39811 * CVE-2025-39813 * CVE-2025-39816 * CVE-2025-39823 * CVE-2025-39824 * CVE-2025-39825 * CVE-2025-39826 * CVE-2025-39827 * CVE-2025-39828 * CVE-2025-39830 * CVE-2025-39832 * CVE-2025-39833 * CVE-2025-39834 * CVE-2025-39835 * CVE-2025-39836 * CVE-2025-39838 * CVE-2025-39839 * CVE-2025-39841 * CVE-2025-39842 * CVE-2025-39844 * CVE-2025-39845 * CVE-2025-39847 * CVE-2025-39848 * CVE-2025-39849 * CVE-2025-39850 * CVE-2025-39851 * CVE-2025-39852 * CVE-2025-39853 * CVE-2025-39854 * CVE-2025-39857 * CVE-2025-39860 * CVE-2025-39861 * CVE-2025-39863 * CVE-2025-39864 * CVE-2025-39865 * CVE-2025-39869 * CVE-2025-39870 * CVE-2025-39871 * CVE-2025-39873 * CVE-2025-39875 * CVE-2025-39877 * CVE-2025-39882 * CVE-2025-39884 * CVE-2025-39885 * CVE-2025-39889 * CVE-2025-39890 * CVE-2025-39891 * CVE-2025-39896 * CVE-2025-39898 * CVE-2025-39899 * CVE-2025-39900 * CVE-2025-39902 * CVE-2025-39907 * CVE-2025-39909 * CVE-2025-39916 * CVE-2025-39918 * CVE-2025-39922 * CVE-2025-39923 * CVE-2025-39925 * CVE-2025-39926 * CVE-2025-39931 * CVE-2025-39934 * CVE-2025-39937 * CVE-2025-39938 * CVE-2025-39945 * CVE-2025-39946 * CVE-2025-39952 * CVE-2025-39957 * CVE-2025-40300 * CVE-2026-38264 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57952 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22034 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22034 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22077 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37856 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37856 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37861 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37861 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37861 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38006 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38006 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38008 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38008 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38008 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38019 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38019 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38019 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38034 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38034 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38038 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38038 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38058 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38058 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38062 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38062 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38087 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38088 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38088 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38090 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38090 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38091 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38096 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38098 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38098 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38099 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38099 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38101 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38101 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38101 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38102 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38102 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38103 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38103 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38106 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38106 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38107 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38107 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38108 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38108 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38109 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38109 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38109 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38110 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38110 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38110 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38111 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38112 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38113 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38114 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38114 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38117 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38117 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38117 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38118 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38118 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38120 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-38120 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-38122 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38123 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38125 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38125 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38128 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38128 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38128 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38129 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38134 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38135 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38137 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38137 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38137 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38140 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38142 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38143 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38146 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38146 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38148 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38149 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38149 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38149 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38153 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38154 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38154 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38155 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38156 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38157 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38157 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38159 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38159 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38160 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38161 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38165 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38168 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38168 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38168 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38169 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38169 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38170 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38170 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38172 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38172 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38172 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38173 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38173 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38174 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38174 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38181 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38181 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38182 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38186 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38186 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38189 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38190 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38193 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38193 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38197 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38197 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38201 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38209 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38209 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38211 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38211 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38213 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38213 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38214 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38215 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38216 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38217 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38217 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38217 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38220 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38220 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38220 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38222 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-38222 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2025-38224 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38224 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38225 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38226 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38226 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38227 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38227 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38228 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38228 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38228 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38229 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38229 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38231 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38231 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38232 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38232 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38232 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38233 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38234 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38242 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38242 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38242 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38244 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38244 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38245 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38249 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38249 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38253 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38253 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38256 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38256 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38257 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38258 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38259 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38265 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38267 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38267 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38268 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38268 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38270 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38270 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38270 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38272 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38273 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38273 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38274 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38274 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38274 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38275 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38277 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38278 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38278 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38286 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38286 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38287 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38289 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38289 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38289 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38290 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38290 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38290 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38291 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38291 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38291 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38292 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38292 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38292 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38293 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38293 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38300 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38300 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38301 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38301 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38302 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38302 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38303 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38303 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38303 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38306 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38306 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38306 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38311 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38311 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38312 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38315 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38315 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38317 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38317 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38317 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38318 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38318 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38318 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38322 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-38322 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-38323 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38336 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38337 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38338 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38338 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38338 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38339 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-38339 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-38339 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38341 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38341 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38342 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38343 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38344 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38345 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38345 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38348 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38349 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38349 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-38349 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38350 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38350 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-38351 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38351 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38352 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38352 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38352 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38353 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38353 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38354 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38355 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38355 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38355 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38356 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38356 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38356 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38359 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38359 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38360 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38362 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38363 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38364 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38365 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38365 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38368 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38369 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38371 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38372 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38372 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38372 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38373 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38373 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38373 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38374 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38375 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38375 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38376 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38377 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38377 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38380 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38380 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38381 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38381 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38382 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38382 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38383 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38383 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38384 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38384 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38385 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38385 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38386 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38387 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38387 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38389 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38390 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38390 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38391 ( SUSE ): 5.2 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38391 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38392 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38392 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38393 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38393 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38395 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38395 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38396 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38396 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38397 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38397 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38399 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38400 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38400 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38401 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38401 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38402 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38402 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38403 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38403 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38404 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38404 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38405 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38405 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38406 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38408 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38408 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38408 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38409 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38409 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38410 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38412 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38413 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38413 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38413 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38414 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38414 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38415 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38415 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38416 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38416 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38417 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38417 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38417 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38418 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38420 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38421 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38421 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38421 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38424 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38425 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38425 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38426 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38426 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38427 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38427 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38428 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38428 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38429 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38429 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38429 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38430 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38436 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38436 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38436 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38438 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38438 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38439 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38439 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38440 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38440 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38440 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38441 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38441 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38443 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38443 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38444 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38445 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38446 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38446 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38446 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38448 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38448 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38449 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38449 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38449 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38450 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38450 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38451 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38453 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38453 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38454 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38454 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38455 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38455 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38457 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38458 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38460 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38460 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38461 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38461 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38462 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38462 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38463 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38463 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38463 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38464 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38464 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38465 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38466 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2025-38467 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38467 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38468 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38470 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38472 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38472 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38473 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38473 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38474 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38475 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38475 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38475 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38478 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38478 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38480 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38480 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38481 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38481 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38482 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38482 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38483 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38483 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38484 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38484 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38485 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38485 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38487 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38489 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38489 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38490 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38491 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38491 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38493 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-38493 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2025-38493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38494 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38495 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38495 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38496 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38496 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38496 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38497 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38497 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38499 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H * CVE-2025-38499 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38503 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38506 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38508 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38508 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38514 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38524 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38527 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38528 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38528 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38531 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38531 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38531 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38533 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38533 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38533 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38544 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38544 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38545 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38545 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38545 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38546 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38546 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38549 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38549 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38552 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38552 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38554 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38554 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38554 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38555 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38555 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38556 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38556 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38556 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38559 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38560 ( SUSE ): 5.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2025-38560 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38564 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38564 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38565 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38566 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38566 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38568 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38568 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38571 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38571 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38571 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38573 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38573 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38573 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38574 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38576 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38576 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38581 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38582 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38583 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38584 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38584 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38584 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38585 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38585 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38585 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38586 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38586 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38587 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38591 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38591 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38591 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38593 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38593 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38595 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38595 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38597 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38601 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38602 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38604 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38604 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38605 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38605 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38609 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38610 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38612 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38614 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38619 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38619 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38619 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38621 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38621 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38623 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38624 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38628 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38628 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38628 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38630 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38631 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38631 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38634 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38639 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38640 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38644 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38644 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38646 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38646 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38646 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38648 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38648 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38656 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38658 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38662 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38662 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38668 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38680 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38692 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38692 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38695 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38700 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38700 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38701 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38702 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38703 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38703 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38706 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38706 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38709 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38709 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38710 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38710 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38717 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38732 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38732 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38733 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38734 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39679 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39695 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39698 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39698 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-39700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39700 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39707 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39707 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39711 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39723 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39738 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39739 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39739 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39742 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39744 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39747 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39750 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39750 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39754 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39759 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N * CVE-2025-39759 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39760 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39761 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39761 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39763 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39787 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39787 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39790 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39790 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39791 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39791 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39792 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39792 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39792 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39798 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39798 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39801 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39801 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39810 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39825 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39825 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-39826 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39826 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39827 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39827 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39828 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-39828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-39830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39830 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39838 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39838 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39848 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39848 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39890 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39891 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39896 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39896 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39898 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39918 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-39918 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-39922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39922 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39923 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39926 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39926 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2025-39931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39945 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39952 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39952 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39957 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40300 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that solves 573 vulnerabilities, contains 17 features and has 96 fixes can now be installed. ## Description: The SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-57891: sched_ext: Fix invalid irq restore in scx_ops_bypass() (bsc#1235953). * CVE-2024-57951: hrtimers: Handle CPU state correctly on hotplug (bsc#1237108). * CVE-2024-57952: Revert "libfs: fix infinite directory reads for offset dir" (bsc#1237131). * CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are disabled (bsc#1240324). * CVE-2025-22034: mm/rmap: avoid -EBUSY from make_device_exclusive() (bsc#1241435). * CVE-2025-22077: Revert "smb: client: fix TCP timers deadlock after rmmod" (bsc#1241403). * CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782). * CVE-2025-37821: sched/eevdf: Fix se->slice being set to U64_MAX and resulting (bsc#1242864). * CVE-2025-37849: KVM: arm64: Tear down vGIC on failed vCPU creation (bsc#1243000). * CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races (bsc#1243068). * CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055). * CVE-2025-37864: net: dsa: clean up FDB, MDB, VLAN entries on unbind (bsc#1242965). * CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930). * CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory handling (bsc#1244939). * CVE-2025-38019: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices (bsc#1245000). * CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref (bsc#1244792). * CVE-2025-38038: cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost (bsc#1244812). * CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (bsc#1245151). * CVE-2025-38062: kABI: restore layout of struct msi_desc (bsc#1245216). * CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734). * CVE-2025-38101: ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set() (bsc#1245659). * CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663). * CVE-2025-38106: io_uring/sqpoll: do not put task_struct on tctx setup failure (bsc#1245664). * CVE-2025-38117: hci_dev centralize extra lock (bsc#1245695). * CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler (bsc#1245700). * CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710). * CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767). * CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780). * CVE-2025-38168: perf: arm-ni: Unregister PMUs on probe failure (bsc#1245763). * CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970). * CVE-2025-38182: ublk: santizize the arguments from userspace when adding a device (bsc#1245937). * CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956). * CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012). * CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973). * CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977). * CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005). * CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815). * CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased devices (bsc#1245963). * CVE-2025-38220: ext4: only dirty folios when data journaling regular files (bsc#1245966). * CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data (bsc#1245976). * CVE-2025-38242: mm: userfaultfd: fix race of userfaultfd_move and swap cache (bsc#1246176). * CVE-2025-38244: smb: client: fix potential deadlock when reconnecting channels (bsc#1246183). * CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193). * CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181). * CVE-2025-38256: io_uring/rsrc: fix folio unpinning (bsc#1246188). * CVE-2025-38258: mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter->memcg_path on write (bsc#1246185). * CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248). * CVE-2025-38267: ring-buffer: Do not trigger WARN_ON() due to a commit_overrun (bsc#1246245). * CVE-2025-38270: net: drv: netdevsim: do not napi_complete() from netpoll (bsc#1246252). * CVE-2025-38272: net: dsa: b53: do not enable EEE on bcm63xx (bsc#1246268). * CVE-2025-38301: nvmem: zynqmp_nvmem: unbreak driver after cleanup (bsc#1246351). * CVE-2025-38306: fs/fhandle.c: fix a race in call of has_locked_children() (bsc#1246366). * CVE-2025-38311: iavf: get rid of the crit lock (bsc#1246376). * CVE-2025-38318: perf: arm-ni: Fix missing platform_set_drvdata() (bsc#1246444). * CVE-2025-38322: perf/x86/intel: Fix crash in icl_update_topdown_event() (bsc#1246447). * CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473). * CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (bsc#1246253). * CVE-2025-38341: eth: fbnic: avoid double free when failing to DMA-map FW msg (bsc#1246260). * CVE-2025-38349: eventpoll: do not decrement ep refcount while still holding the ep mutex (bsc#1246777). * CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781). * CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (bsc#1246782). * CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911). * CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076). * CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078). * CVE-2025-38365: btrfs: fix a race between renames and directory logging (bsc#1247023). * CVE-2025-38374: optee: ffa: fix sleep in atomic context (bsc#1247024). * CVE-2025-38382: btrfs: fix iteration of extrefs during log replay (bsc#1247031). * CVE-2025-38383: mm/vmalloc: fix data race in show_numa_info() (bsc#1247250). * CVE-2025-38392: idpf: convert control queue mutex to a spinlock (bsc#1247169). * CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (bsc#1247156). * CVE-2025-38399: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() (bsc#1247097). * CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262). * CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126). * CVE-2025-38418: remoteproc: core: Release rproc->clean_table after rproc_attach() fails (bsc#1247137). * CVE-2025-38419: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() (bsc#1247136). * CVE-2025-38426: drm/amdgpu: Add basic validation for RAS header (bsc#1247252). * CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155). * CVE-2025-38440: net/mlx5e: Fix race between DIM disable and net_dim() (bsc#1247290). * CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167). * CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162). * CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229). * CVE-2025-38451: md/md-bitmap: fix GPF in bitmap_get_stats() (bsc#1247102). * CVE-2025-38453: kABI: io_uring: msg_ring ensure io_kiocb freeing is deferred (bsc#1247234). * CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099). * CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not exist (bsc#1247098). * CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116). * CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119). * CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143). * CVE-2025-38463: tcp: Correct signedness in skb remaining space calculation (bsc#1247113). * CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112). * CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (bsc#1247288). * CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313). * CVE-2025-38475: smc: Fix various oops due to inet_sock type confusion (bsc#1247308). * CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239). * CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page() (bsc#1247243). * CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280). * CVE-2025-38493: tracing/osnoise: Fix crash in timerlat_dump_stack() (bsc#1247283). * CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347). * CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976). * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088). * CVE-2025-38508: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (bsc#1248190). * CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202). * CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194). * CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192). * CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199). * CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200). * CVE-2025-38539: tracing: Add down_write(trace_event_sem) when adding trace event (bsc#1248211). * CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225). * CVE-2025-38545: net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info (bsc#1248224). * CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223). * CVE-2025-38549: efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths (bsc#1248235). * CVE-2025-38554: mm: fix a UAF when vma->mm is freed after vma->vm_refcnt got dropped (bsc#1248299). * CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296). * CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312). * CVE-2025-38566: sunrpc: fix handling of server side tls alerts (bsc#1248374). * CVE-2025-38571: sunrpc: fix client side handling of tls alerts (bsc#1248401). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399). * CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365). * CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1248368). * CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357). * CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338). * CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392). * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1248512). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511). * CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619). * CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610). * CVE-2025-38628: vdpa/mlx5: Fix release of uninitialized resources on error path (bsc#1248616). * CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null- terminated (bsc#1248674). * CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622). * CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681). * CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748). * CVE-2025-38659: gfs2: No more self recovery (bsc#1248639). * CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628). * CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775). * CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126). * CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused classes (bsc#1249156). * CVE-2025-38686: userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry (bsc#1249160). * CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (bsc#1249182). * CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258). * CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199). * CVE-2025-38710: gfs2: Validate i_depth for exhash directories (bsc#1249201). * CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172). * CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324). * CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path (bsc#1249320). * CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal (bsc#1249300). * CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (bsc#1249303). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284). * CVE-2025-39683: tracing: Limit access to parser->buffer when trace_get_user failed (bsc#1249286). * CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374). * CVE-2025-39698: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (bsc#1249322). * CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315). * CVE-2025-39723: kABI: netfs: handle new netfs_io_stream flag (bsc#1249314). * CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work (bsc#1249494). * CVE-2025-39749: rcu: Protect ->defer_qs_iw_pending from data race (bsc#1249533). * CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration (bsc#1249524). * CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (bsc#1249510). * CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM (bsc#1249508). * CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504). * CVE-2025-39775: mm/mremap: fix WARN with uffd that has remap events disabled (bsc#1249500). * CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526). * CVE-2025-39791: dm: dm-crypt: Do not partially accept write BIOs with zoned targets (bsc#1249550). * CVE-2025-39792: dm: Always split write BIOs to zoned device limits (bsc#1249618). * CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608). * CVE-2025-39813: ftrace: Also allocate and copy hash for reading of filter files (bsc#1250032). * CVE-2025-39816: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths (bsc#1249906). * CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002). * CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2) (bsc#1250179). * CVE-2025-39828: kABI workaround for struct atmdev_ops extension (bsc#1250205). * CVE-2025-39830: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path (bsc#1249974). * CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion (bsc#1250365). * CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown (bsc#1250267). * CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292). * CVE-2025-39850: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects (bsc#1250276). * CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object (bsc#1250296). * CVE-2025-39852: net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6 (bsc#1250258). * CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty (bsc#1250275). * CVE-2025-39854: ice: fix NULL access of tx->in_use in ice_ll_ts_intr (bsc#1250297). * CVE-2025-39857: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() (bsc#1250251). * CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put (bsc#1250294). * CVE-2025-39875: igb: Fix NULL pointer dereference in ethtool loopback test (bsc#1250398). * CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call (bsc#1250407). * CVE-2025-39898: e1000e: fix heap overflow in e1000_set_eeprom (bsc#1250742). * CVE-2025-39900: net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y (bsc#1250758). * CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in object_err() (bsc#1250702). * CVE-2025-39922: ixgbe: fix incorrect map used in eee linkmode (bsc#1250722). * CVE-2025-39926: genetlink: fix genl_bind() invoking bind() after -EPERM (bsc#1250737). * CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230). * CVE-2025-39946: tls: make sure to abort the stream if headers are bogus (bsc#1251114). * CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483). * CVE-2026-38264: nvme-tcp: sanitize request list handling (bsc#1246387). The following non-security bugs were fixed: * ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes). * ACPI/processor_idle: Add FFH state handling (jsc#PED-13815). * ACPI/processor_idle: Export acpi_processor_ffh_play_dead() (jsc#PED-13815). * ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path (stable-fixes). * ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered (stable-fixes). * ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes). * ACPI: LPSS: Remove AudioDSP related ID (git-fixes). * ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message (git- fixes). * ACPI: RISC-V: Fix FFH_CPPC_CSR error handling (git-fixes). * ACPI: Return -ENODEV from acpi_parse_spcr() when SPCR support is disabled (stable-fixes). * ACPI: Suppress misleading SPCR console message when SPCR table is absent (stable-fixes). * ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT (git-fixes). * ACPI: battery: Add synchronization between interface updates (git-fixes). * ACPI: debug: fix signedness issues in read/write helpers (git-fixes). * ACPI: pfr_update: Fix the driver update version check (git-fixes). * ACPI: processor: Rescan "dead" SMT siblings during initialization (jsc#PED-13815). * ACPI: processor: fix acpi_object initialization (stable-fixes). * ACPI: processor: idle: Fix memory leak when register cpuidle device failed (git-fixes). * ACPI: processor: perflib: Fix initial _PPC limit application (git-fixes). * ACPI: processor: perflib: Move problematic pr->performance check (git- fixes). * ACPI: property: Fix buffer properties extraction for subnodes (git-fixes). * ACPICA: Fix largest possible resource descriptor index (git-fixes). * ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported (stable-fixes). * ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes). * ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out() (git-fixes). * ALSA: hda/cs35l56: Workaround bad dev-index on Lenovo Yoga Book 9i GenX (stable-fixes). * ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable- fixes). * ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx (stable- fixes). * ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx (stable- fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-d1xxx (MB 8A26) (stable- fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx (stable-fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-r1xxx (stable-fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-s0xxx (stable-fixes). * ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks (stable-fixes). * ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS (stable-fixes). * ALSA: hda/realtek: Add support for ASUS NUC using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook 830 G6 (stable-fixes). * ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again (git-fixes). * ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes). * ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes). * ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes). * ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop (git-fixes). * ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx (stable-fixes). * ALSA: hda/realtek: add LG gram 16Z90R-A to alc269 fixup table (stable- fixes). * ALSA: hda: Disable jack polling at shutdown (stable-fixes). * ALSA: hda: Handle the jack polling always via a work (stable-fixes). * ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git- fixes). * ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable- fixes). * ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() (git- fixes). * ALSA: lx_core: use int type to store negative error codes (git-fixes). * ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT (git-fixes). * ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable- fixes). * ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes). * ALSA: timer: fix ida_free call while not allocated (git-fixes). * ALSA: usb-audio: Add DSD support for Comtrue USB Audio device (stable- fixes). * ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 (stable-fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on more devices (stable- fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable- fixes). * ALSA: usb-audio: Allow Focusrite devices to use low samplerates (git-fixes). * ALSA: usb-audio: Avoid multiple assignments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable- fixes). * ALSA: usb-audio: Convert comma to semicolon (git-fixes). * ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks (stable- fixes). * ALSA: usb-audio: Fix block comments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes). * ALSA: usb-audio: Fix code alignment in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes). * ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks (stable-fixes). * ALSA: usb-audio: Simplify NULL comparison in mixer_quirks (stable-fixes). * ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git- fixes). * ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes). * ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes). * ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (git-fixes). * ALSA: usb-audio: move mixer_quirks' min_mute into common quirk (stable- fixes). * ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes). * ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: catpt: Expose correct bit depth to userspace (git-fixes). * ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes). * ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback (git-fixes). * ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel (git- fixes). * ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead of buffer time (git-fixes). * ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message (git-fixes). * ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations in resume context (git-fixes). * ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down (git-fixes). * ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer size (git-fixes). * ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size (git- fixes). * ASoC: SOF: topology: Parse the dapm_widget_tokens in case of DSPless mode (stable-fixes). * ASoC: amd: acp: Adjust pdm gain value (stable-fixes). * ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes). * ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes). * ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes). * ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes). * ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes). * ASoC: codecs: wcd9375: Fix double free of regulator supplies (git-fixes). * ASoC: codecs: wcd937x: Drop unused buck_supply (git-fixes). * ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable- fixes). * ASoC: fsl_sai: replace regmap_write with regmap_update_bits (git-fixes). * ASoC: fsl_xcvr: get channel status data when PHY is not exists (git-fixes). * ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable- fixes). * ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes). * ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv (git-fixes). * ASoC: mediatek: use reserved memory or enable buffer pre-allocation (git- fixes). * ASoC: ops: dynamically allocate struct snd_ctl_elem_value (git-fixes). * ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface (git-fixes). * ASoC: qcom: audioreach: fix potential null pointer dereference (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git- fixes). * ASoC: qcom: use drvdata instead of component to keep id (stable-fixes). * ASoC: rt5682s: Adjust SAR ADC button mode to fix noise issue (stable-fixes). * ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() (git- fixes). * ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was successed (stable-fixes). * ASoC: tas2781: Fix the wrong step for TLV on tas2781 (git-fixes). * ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data() (git-fixes). * ASoC: wm8940: Correct PLL rate rounding (git-fixes). * ASoC: wm8940: Correct typo in control name (git-fixes). * ASoC: wm8974: Correct PLL rate rounding (git-fixes). * Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes). * Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes). * Bluetooth: ISO: do not leak skb in ISO_CONT RX (git-fixes). * Bluetooth: ISO: free rx_skb if not consumed (git-fixes). * Bluetooth: MGMT: Fix not exposing debug UUID on MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes). * Bluetooth: MGMT: Fix possible UAFs (git-fixes). * Bluetooth: btmtk: Fix wait_on_bit_timeout interruption during shutdown (git- fixes). * Bluetooth: btusb: Add USB ID 2001:332a for D-Link AX9U rev. A1 (stable- fixes). * Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e14e for MT7925 (stable-fixes). * Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git- fixes). * Bluetooth: hci_core: Fix using {cis,bis}_capable for current settings (git- fixes). * Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git- fixes). * Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (git-fixes). * Bluetooth: hci_event: Mark connection as closed during suspend disconnect (git-fixes). * Bluetooth: hci_event: Mask data status from LE ext adv reports (git-fixes). * Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git- fixes). * Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes). * Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable- fixes). * Bluetooth: hci_sync: Avoid adding default advertising on startup (stable- fixes). * Bluetooth: hci_sync: Fix hci_resume_advertising_sync (git-fixes). * Bluetooth: hci_sync: Fix scan state after PA Sync has been established (git- fixes). * Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements (git-fixes). * Bluetooth: hci_sync: Prevent unintended PA sync when SID is 0xFF (git- fixes). * Bluetooth: hci_sync: fix set_local_name race condition (git-fixes). * Bluetooth: vhci: Prevent use-after-free by removing debugfs files early (git-fixes). * CONFIG & no reference -> OK temporarily, must be resolved eventually * Disable CET before shutdown by tboot (bsc#1247950). * Docs/ABI: Fix sysfs-kernel-address_bits path (git-fixes). * Documentation/x86: Document new attack vector controls (git-fixes). * Documentation: ACPI: Fix parent device references (git-fixes). * Documentation: KVM: Fix unexpected unindent warning (git-fixes). * Documentation: KVM: Fix unexpected unindent warnings (git-fixes). * Documentation: usb: gadget: Wrap remaining usage snippets in literal code block (git-fixes). * Drop ath12k patch that was reverted in the upstream (git-fixes) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * Enable CONFIG_CMA_SYSFS This is a generally useful feature for anyone using CMA or investigating CMA issues, with a small and simple code base and no runtime overhead. * Enable MT7925 WiFi drivers for openSUSE Leap 16.0 (bsc#1247325) * Enable SMC_LO (a.k.a SMC-D) (jsc#PED-13256). * Fix bogus i915 patch backport (bsc#1238972) It's been already cherry-picked in 6.12 kernel itself. * Fix dma_unmap_sg() nents value (git-fixes) * HID: amd_sfh: Add sync across amd sfh work functions (git-fixes). * HID: apple: avoid setting up battery timer for devices without battery (git- fixes). * HID: apple: validate feature-report field count to prevent NULL pointer dereference (git-fixes). * HID: asus: add support for missing PX series fn keys (stable-fixes). * HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes). * HID: core: do not bypass hid_hw_raw_request (stable-fixes). * HID: core: ensure the allocated report buffer can contain the reserved report ID (stable-fixes). * HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (stable-fixes). * HID: hidraw: tighten ioctl command parsing (git-fixes). * HID: input: rename hidinput_set_battery_charge_status() (stable-fixes). * HID: input: report battery status changes immediately (git-fixes). * HID: intel-ish-ipc: Remove redundant ready check after timeout function (git-fixes). * HID: logitech: Add ids for G PRO 2 LIGHTSPEED (stable-fixes). * HID: magicmouse: avoid setting up battery timer when not needed (git-fixes). * HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git- fixes). * HID: quirks: add support for Legion Go dual dinput modes (stable-fixes). * HID: wacom: Add a new Art Pen 2 (stable-fixes). * IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes) * IB/sa: Fix sa_local_svc_timeout_ms read race (git-fixes) * Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table (stable-fixes). * Input: iqs7222 - avoid enabling unused interrupts (stable-fixes). * Input: psxpad-spi - add a check for the return value of spi_setup() (git- fixes). * Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (git-fixes). * KEYS: X.509: Fix Basic Constraints CA flag parsing (git-fixes). * KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes). * KVM: Allow CPU to reschedule while setting per-page memory attributes (git- fixes). * KVM: Bail from the dirty ring reset flow if a signal is pending (git-fixes). * KVM: Bound the number of dirty ring entries in a single reset at INT_MAX (git-fixes). * KVM: Conditionally reschedule when resetting the dirty ring (git-fixes). * KVM: PPC: Fix misleading interrupts comment in kvmppc_prepare_to_enter() (bsc#1215199). * KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest (git-fixes). * KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes). * KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight (git-fixes). * KVM: TDX: Add new TDVMCALL status code for unsupported subfuncs (jsc#PED-13302). * KVM: TDX: Do not report base TDVMCALLs (git-fixes). * KVM: TDX: Exit to userspace for GetTdVmCallInfo (jsc#PED-13302). * KVM: TDX: Exit to userspace for SetupEventNotifyInterrupt (jsc#PED-13302). * KVM: TDX: Handle TDG.VP.VMCALL<GetQuote> (jsc#PED-13302). * KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities (jsc#PED-13302). * KVM: TDX: Use kvm_arch_vcpu.host_debugctl to restore the host's DEBUGCTL (git-fixes). * KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * KVM: VMX: Ensure unused kvm_tdx_capabilities fields are zeroed out (jsc#PED-13302). * KVM: arm64: Adjust range correctly during host stage-2 faults (git-fixes). * KVM: arm64: Do not free hyp pages with pKVM on GICv2 (git-fixes). * KVM: arm64: Fix error path in init_hyp_mode() (git-fixes). * KVM: arm64: Mark freed S2 MMUs as invalid (git-fixes). * KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes). * KVM: s390: Fix access to unavailable adapter indicator pages during postcopy (git-fixes bsc#1250124). * KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes bsc#1250123). * KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes). * KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table (git-fixes). * KVM: x86: Avoid calling kvm_is_mmio_pfn() when kvm_x86_ops.get_mt_mask is NULL (git-fixes). * KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting MP_STATE (git-fixes). * KVM: x86: Reject KVM_SET_TSC_KHZ vCPU ioctl for TSC protected guest (git- fixes). * KVM: x86: avoid underflow when scaling TSC frequency (git-fixes). * Limit patch filenames to 100 characters (bsc#1249604). * Move upstreamed SPI patch into sorted section * NFS: Fix a race when updating an existing write (git-fixes). * NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (git-fixes). * NFS: Fix the setting of capabilities when automounting a new filesystem (git-fixes). * NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (git- fixes). * NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY (git-fixes). * NFS: nfs_invalidate_folio() must observe the offset and size arguments (git- fixes). * NFSD: Define a proc_layoutcommit for the FlexFiles layout type (git-fixes). * NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul() (git-fixes). * NFSD: detect mismatch of file handle and delegation stateid in OPEN op (git- fixes). * NFSv4.1: fix backchannel max_resp_sz verification check (git-fixes). * NFSv4.2: another fix for listxattr (git-fixes). * NFSv4/flexfiles: Fix layout merge mirror check (git-fixes). * NFSv4: Clear NFS_CAP_OPEN_XOR and NFS_CAP_DELEGTIME if not supported (git- fixes). * NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes). * NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git- fixes). * NFSv4: Do not clear capabilities that won't be reset (git-fixes). * Octeontx2-af: Skip overlap check for SPI field (git-fixes). * PCI/ACPI: Fix pci_acpi_preserve_config() memory leak (git-fixes). * PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * PCI/AER: Fix missing uevent on recovery when a reset is requested (git- fixes). * PCI/ERR: Fix uevent on failure to recover (git-fixes). * PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (git- fixes). * PCI/MSI: Export pci_msix_prepare_desc() for dynamic MSI-X allocations (bsc#1245457). * PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes). * PCI/pwrctrl: Fix device leak at registration (git-fixes). * PCI/sysfs: Ensure devices are powered for config reads (git-fixes). * PCI: Extend isolated function probing to LoongArch (git-fixes). * PCI: Rename PCIE_RESET_CONFIG_DEVICE_WAIT_MS to PCIE_RESET_CONFIG_WAIT_MS (git-fixes). * PCI: Support Immediate Readiness on devices without PM capabilities (git- fixes). * PCI: dw-rockchip: Replace PERST# sleep time with proper macro (git-fixes). * PCI: dw-rockchip: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git- fixes). * PCI: dwc: Ensure that dw_pcie_wait_for_link() waits 100 ms after link up (stable-fixes). * PCI: endpoint: Fix configfs group list head handling (git-fixes). * PCI: endpoint: Fix configfs group removal on driver teardown (git-fixes). * PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute (git-fixes). * PCI: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar() fails (git-fixes). * PCI: hv: Allow dynamic MSI-X vector allocation (bsc#1245457). * PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features (git-fixes). * PCI: imx6: Add IMX8MQ_EP third 64-bit BAR in epc_features (git-fixes). * PCI: imx6: Add i.MX8Q PCIe Endpoint (EP) support (git-fixes). * PCI: imx6: Delay link start until configfs 'start' written (git-fixes). * PCI: imx6: Remove apps_reset toggling from imx_pcie_{assert/deassert}_core_reset (git-fixes). * PCI: j721e: Fix incorrect error message in probe() (git-fixes). * PCI: j721e: Fix programming sequence of "strap" settings (git-fixes). * PCI: keystone: Use devm_request_irq() to free "ks-pcie-error-irq" on exit (git-fixes). * PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199). * PCI: pnv_php: Work around switches with broken presence detection (bsc#1215199). * PCI: qcom: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git-fixes). * PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion (git-fixes). * PCI: rcar-gen4: Assure reset occurs before DBI access (git-fixes). * PCI: rcar-gen4: Fix PHY initialization (git-fixes). * PCI: rcar-gen4: Fix inverted break condition in PHY initialization (git- fixes). * PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git- fixes). * PCI: rcar-host: Drop PMSR spinlock (git-fixes). * PCI: rockchip-host: Fix "Unexpected Completion" log message (git-fixes). * PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git- fixes). * PCI: rockchip: Use standard PCIe definitions (git-fixes). * PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq() (git-fixes). * PCI: tegra194: Fix duplicate PLL disable in pex_ep_event_pex_rst_assert() (git-fixes). * PCI: tegra194: Handle errors in BPMP response (git-fixes). * PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes). * PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock (git- fixes). * PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation (git-fixes). * PCI: xilinx-nwl: Fix ECAM programming (git-fixes). * PM / devfreq: Check governor before using governor->name (git-fixes). * PM / devfreq: Fix a index typo in trans_stat (git-fixes). * PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store() (stable-fixes). * PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() (git-fixes). * PM / devfreq: rockchip-dfi: double count on RK3588 (git-fixes). * PM: EM: use kfree_rcu() to simplify the code (stable-fixes). * PM: cpufreq: powernv/tracing: Move powernv_throttle trace event (git-fixes). * PM: hibernate: Add pm_hibernation_mode_is_suspend() (bsc#1243112). * PM: hibernate: Add stub for pm_hibernate_is_recovering() (bsc#1243112). * PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage (bsc#1243112). * PM: hibernate: add new api pm_hibernate_is_recovering() (bsc#1243112). * PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable- fixes). * PM: runtime: Take active children into account in pm_runtime_get_if_in_use() (git-fixes). * PM: sleep: console: Fix the black screen issue (stable-fixes). * PM: sleep: core: Clear power.must_resume in noirq suspend error path (git- fixes). * RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034). * RAS/AMD/FMPM: Get masked address (bsc#1242034). * RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes) * RDMA/bnxt_re: Fix size of uverbs_copy_to() in BNXT_RE_METHOD_GET_TOGGLE_MEM (git-fixes) * RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes) * RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes) * RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes) * RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes) * RDMA/core: Rate limit GID cache warning messages (git-fixes) * RDMA/core: Resolve MAC of next-hop device without ARP support (git-fixes) * RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes) * RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters (git-fixes) * RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes) * RDMA/hns: Drop GFP_NOWARN (git-fixes) * RDMA/hns: Fix -Wframe-larger-than issue (git-fixes) * RDMA/hns: Fix HW configurations not cleared in error flow (git-fixes) * RDMA/hns: Fix accessing uninitialized resources (git-fixes) * RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes) * RDMA/hns: Fix double destruction of rsv_qp (git-fixes) * RDMA/hns: Fix querying wrong SCC context for DIP algorithm (git-fixes) * RDMA/hns: Get message length of ack_req from FW (git-fixes) * RDMA/mana_ib: Add device statistics support (bsc#1246651). * RDMA/mana_ib: Drain send wrs of GSI QP (bsc#1251135). * RDMA/mana_ib: Extend modify QP (bsc#1251135). * RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes). * RDMA/mana_ib: add additional port counters (git-fixes). * RDMA/mana_ib: add support of multiple ports (git-fixes). * RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes) * RDMA/mlx5: Fix UMR modifying of mkey page size (git-fixes) * RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes) * RDMA/mlx5: Fix vport loopback forcing for MPV device (git-fixes) * RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes) * RDMA/rxe: Fix race in do_task() when draining (git-fixes) * RDMA/rxe: Flush delayed SKBs while releasing RXE resources (git-fixes) * RDMA/siw: Always report immediate post SQ errors (git-fixes) * RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages (git-fixes) * RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git- fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes) * RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes) * README.BRANCH: mfranc at suse.cz leaving SUSE * RISC-V: Add defines for the SBI nested acceleration extension (jsc#PED-348). * Reapply "wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()" (git-fixes). * Reapply "x86/smp: Eliminate mwait_play_dead_cpuid_hint()" (jsc#PED-13815). * Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes). * Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes). * Revert "drm/nouveau: check ioctl command codes better" (git-fixes). * Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes). * Revert "leds: trigger: netdev: Configure LED blink interval for HW offload" (git-fixes). * Revert "mac80211: Dynamically set CoDel parameters per station" (stable- fixes). * Revert "usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running" (git-fixes). * Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()" (stable-fixes). * Revert "wifi: mt76: mt7925: Update mt7925_mcu_uni_[tx,rx]_ba for MLO" (git- fixes). * SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes). * Squashfs: add additional inode sanity checking (git-fixes). * Squashfs: fix uninit-value in squashfs_get_parent (git-fixes). * Squashfs: reject negative file sizes in squashfs_read_inode() (git-fixes). * USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes). * USB: gadget: f_hid: Fix memory leak in hidg_bind error path (git-fixes). * USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI (stable-fixes). * USB: serial: option: add Foxconn T99W640 (stable-fixes). * USB: serial: option: add Foxconn T99W709 (stable-fixes). * USB: serial: option: add SIMCom 8230C compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition (stable- fixes). * USB: serial: option: add Telit Cinterion FN990A w/audio compositions (stable-fixes). * USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions (stable-fixes). * USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera (stable-fixes). * USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles (stable-fixes). * Update config files. (bsc#1249186) Enable where we define KABI refs + rely on Kconfig deps. * Update config files: revive pwc driver for Leap (bsc#1249060) * accel/habanalabs/gaudi2: Use kvfree() for memory allocated with kvcalloc() (git-fixes). * accel/ivpu: Correct DCT interrupt handling (git-fixes). * accel/ivpu: Fix reset_engine debugfs file logic (stable-fixes). * accel/ivpu: Fix warning in ivpu_gem_bo_free() (git-fixes). * accel/ivpu: Prevent recovery work from being queued during device removal (git-fixes). * amdgpu/amdgpu_discovery: increase timeout limit for IFWI init (stable- fixes). * aoe: defer rexmit timer downdev work to workqueue (git-fixes). * arch/powerpc: Remove .interp section in vmlinux (bsc#1215199). * arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes) * arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes) * arm64/mm: Check pmd_table() in pmd_trans_huge() (git-fixes) * arm64/mm: Close theoretical race where stale TLB entry remains valid (git- fixes) * arm64/mm: Drop wrong writes into TCR2_EL1 (git-fixes) * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64/sysreg: Add register fields for HDFGRTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HDFGWTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGITR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGRTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGWTR2_EL2 (git-fixes) * arm64/sysreg: Update register fields for ID_AA64MMFR0_EL1 (git-fixes) * arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes) * arm64: Handle KCOV __init vs inline mismatches (git-fixes) * arm64: Mark kernel as tainted on SAE and SError panic (git-fixes) * arm64: Restrict pagetable teardown to avoid false warning (git-fixes) * arm64: config: Make tpm_tis_spi module build-in (bsc#1246896) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: add big-endian property back into watchdog node (git-fixes) * arm64: dts: apple: Add ethernet0 alias for J375 template (git-fixes) * arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map (git-fixes) * arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes) * arm64: dts: exynos: gs101: Add 'local-timer-stop' to cpuidle nodes (git- fixes) * arm64: dts: exynos: gs101: ufs: add dma-coherent property (git-fixes) * arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes) * arm64: dts: freescale: imx93-tqma9352: Limit BUCK2 to 600mV (git-fixes) * arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mm-beacon: Set SAI5 MCLK direction to output for HDMI (git- fixes) * arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mn-beacon: Set SAI5 MCLK direction to output for HDMI (git- fixes) * arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes) * arm64: dts: imx8mp-venice-gw702x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-venice-gw71xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp: Correct thermal sensor index (git-fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git- fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes) * arm64: dts: imx93-kontron: Fix GPIO for panel regulator (git-fixes) * arm64: dts: imx93-kontron: Fix USB port assignment (git-fixes) * arm64: dts: imx95: Correct the DMA interrupter number of pcie0_ep (git- fixes) * arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid (git-fixes) * arm64: dts: marvell: cn9132-clearfog: disable eMMC high-speed modes (git- fixes) * arm64: dts: marvell: cn9132-clearfog: fix multi-lane pci x2 and x4 (git- fixes) * arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B (git- fixes). * arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5 (git- fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on rk3566-rock3c (git- fixes) * arm64: dts: rockchip: Fix Bluetooth interrupts flag on Neardi LBA3368 (git- fixes) * arm64: dts: rockchip: Fix the headphone detection on the orangepi 5 (git- fixes) * arm64: dts: rockchip: Move SHMEM memory to reserved memory on rk3588 (git- fixes) * arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git- fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399 Puma (git-fixes) * arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes) * arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git- fixes) * arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes) * arm64: dts: st: fix timer used for ticks (git-fixes) * arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git- fixes) * arm64: map [_text, _stext) virtual address range (git-fixes) * arm64: mte: Do not flag the zero page as PG_mte_tagged (git-fixes) * arm64: poe: Handle spurious Overlay faults (git-fixes) * arm64: rust: clean Rust 1.85.0 warning using softfloat target (git-fixes) * arm64: stacktrace: Check kretprobe_find_ret_addr() return value (git-fixes) * arm64: tegra: Add uartd serial alias for Jetson TX1 module (git-fixes) * arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes) * arm64: tegra: Resize aperture for the IGX PCIe C5 slot (git-fixes) * arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes) * arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes) * ata: ahci: Disable DIPM if host lacks support (stable-fixes). * ata: ahci: Disallow LPM policy control if not supported (stable-fixes). * ata: libata-sata: Add link_power_management_supported sysfs attribute (git- fixes). * ata: libata-sata: Disallow changing LPM state if not supported (stable- fixes). * ata: libata-scsi: Fix CDL control (git-fixes). * audit,module: restore audit logging in load failure case (git-fixes). * ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes). * batman-adv: fix OOB read/write in network-coding decode (git-fixes). * benet: fix BUG when creating VFs (git-fixes). * block: Introduce bio_needs_zone_write_plugging() (git-fixes). * block: Make REQ_OP_ZONE_FINISH a write operation (git-fixes, bsc#1249552). * block: ensure discard_granularity is zero when discard is not supported (git-fixes). * block: fix kobject leak in blk_unregister_queue (git-fixes). * block: mtip32xx: Fix usage of dma_map_sg() (git-fixes). * block: sanitize chunk_sectors for atomic write limits (git-fixes). * bnxt_en: Add a helper function to configure MRU and RSS (git-fixes). * bnxt_en: Adjust TX rings if reservation is less than requested (git-fixes). * bnxt_en: Fix DCB ETS validation (git-fixes). * bnxt_en: Fix memory corruption when FW resources change during ifdown (git- fixes). * bnxt_en: Fix stats context reservation logic (git-fixes). * bnxt_en: Flush FW trace before copying to the coredump (git-fixes). * bnxt_en: Update MRU and RSS table of RSS contexts on queue reset (git- fixes). * bnxt_en: eliminate the compile warning in bnxt_request_irq due to CONFIG_RFS_ACCEL (git-fixes). * bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free() (git- fixes) * bpf, arm64: Fix fp initialization for exception boundary (git-fixes) * bpf, docs: Fix broken link to renamed bpf_iter_task_vmas.c (git-fixes). * bpf, sockmap: Fix psock incorrectly pointing to sk (git-fixes). * bpf: Adjust free target to avoid global starvation of LRU map (git-fixes). * bpf: Allow XDP dev-bound programs to perform XDP_REDIRECT into maps (git- fixes). * bpf: Avoid RCU context warning when unpinning htab with internal structs (git-fixes). * bpf: Check link_create.flags parameter for multi_kprobe (git-fixes). * bpf: Check link_create.flags parameter for multi_uprobe (git-fixes). * bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} (git-fixes). * bpf: Fix uninitialized values in BPF_{CORE,PROBE}_READ (git-fixes). * bpf: Forget ranges when refining tnum after JSET (git-fixes). * bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes). * bpf: Only fails the busy counter check in bpf_cgrp_storage_get if it creates storage (git-fixes). * bpf: Reject %p% format string in bprintf-like helpers (git-fixes). * bpf: Reject attaching fexit/fmod_ret to __noreturn functions (git-fixes). * bpf: Reject narrower access to pointer ctx fields (git-fixes). * bpf: Return prog btf_id without capable check (git-fixes). * bpf: Use preempt_count() directly in bpf_send_signal_common() (git-fixes). * bpf: Use proper type to calculate bpf_raw_tp_null_args.mask index (git- fixes). * bpf: fix possible endless loop in BPF map iteration (git-fixes). * btrfs: abort transaction during log replay if walk_log_tree() failed (git- fixes). * btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (git-fixes). * btrfs: add assertions and comment about path expectations to btrfs_cross_ref_exist() (git-fixes). * btrfs: add debug build only WARN (bsc#1249038). * btrfs: add function comment for check_committed_ref() (git-fixes). * btrfs: always abort transaction on failure to add block group to free space tree (git-fixes). * btrfs: avoid load/store tearing races when checking if an inode was logged (git-fixes). * btrfs: avoid redundant call to get inline ref type at check_committed_ref() (git-fixes). * btrfs: avoid starting new transaction when cleaning qgroup during subvolume drop (git-fixes). * btrfs: clear dirty status from extent buffer on error at insert_new_root() (git-fixes). * btrfs: codify pattern for adding block_group to bg_list (git-fixes). * btrfs: convert ASSERT(0) with handled errors to DEBUG_WARN() (bsc#1249038). * btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling (git-fixes). * btrfs: correctly escape subvol in btrfs_show_options() (git-fixes). * btrfs: do not allow relocation of partially dropped subvolumes (bsc#1249540). * btrfs: do not ignore inode missing when replaying log tree (git-fixes). * btrfs: do not output error message if a qgroup has been already cleaned up (git-fixes). * btrfs: do not return VM_FAULT_SIGBUS on failure to set delalloc for mmap write (bsc#1247949). * btrfs: do not silently ignore unexpected extent type when replaying log (git-fixes). * btrfs: do not skip remaining extrefs if dir not found during log replay (git-fixes). * btrfs: enhance ASSERT() to take optional format string (bsc#1249038). * btrfs: error on missing block group when unaccounting log tree extent buffers (git-fixes). * btrfs: exit after state split error at set_extent_bit() (git-fixes). * btrfs: explicitly ref count block_group on new_bgs list (bsc#1243068) * btrfs: fix -ENOSPC mmap write failure on NOCOW files/extents (bsc#1247949). * btrfs: fix assertion when building free space tree (git-fixes). * btrfs: fix corruption reading compressed range when block size is smaller than page size (git-fixes). * btrfs: fix data overwriting bug during buffered write when block size < page size (git-fixes). * btrfs: fix data race when accessing the inode's disk_i_size at btrfs_drop_extents() (git-fixes). * btrfs: fix incorrect log message for nobarrier mount option (git-fixes). * btrfs: fix inode lookup error handling during log replay (git-fixes). * btrfs: fix invalid extref key setup when replaying dentry (git-fixes). * btrfs: fix invalid inode pointer after failure to create reloc inode (git- fixes). * btrfs: fix invalid inode pointer dereferences during log replay (git-fixes). * btrfs: fix iteration bug in __qgroup_excl_accounting() (git-fixes). * btrfs: fix log tree replay failure due to file with 0 links and extents (git-fixes). * btrfs: fix missing error handling when searching for inode refs during log replay (git-fixes). * btrfs: fix non-empty delayed iputs list on unmount due to async workers (git-fixes). * btrfs: fix printing of mount info messages for NODATACOW/NODATASUM (git- fixes). * btrfs: fix race between logging inode and checking if it was logged before (git-fixes). * btrfs: fix race between setting last_dir_index_offset and inode logging (git-fixes). * btrfs: fix squota compressed stats leak (git-fixes). * btrfs: fix ssd_spread overallocation (git-fixes). * btrfs: fix subvolume deletion lockup caused by inodes xarray race (git- fixes). * btrfs: fix the inode leak in btrfs_iget() (git-fixes). * btrfs: fix two misuses of folio_shift() (git-fixes). * btrfs: fix wrong length parameter for btrfs_cleanup_ordered_extents() (git- fixes). * btrfs: handle unaligned EOF truncation correctly for subpage cases (bsc#1249038). * btrfs: initialize inode::file_extent_tree after i_mode has been set (git- fixes). * btrfs: make btrfs_discard_workfn() block_group ref explicit (bsc#1243068) * btrfs: make btrfs_iget() return a btrfs inode instead (git-fixes). * btrfs: make btrfs_iget_path() return a btrfs inode instead (git-fixes). * btrfs: move transaction aborts to the error site in add_block_group_free_space() (git-fixes). * btrfs: pass a btrfs_inode to fixup_inode_link_count() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_defrag_file() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_double_mmap_lock() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_double_mmap_unlock() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_extent_same_range() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_fill_inode() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_iget_locked() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_inode_inherit_props() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_inode_type() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_load_inode_props() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_read_locked_inode() (git-fixes). * btrfs: pass struct btrfs_inode to can_nocow_extent() (git-fixes). * btrfs: pass struct btrfs_inode to clone_copy_inline_extent() (git-fixes). * btrfs: pass struct btrfs_inode to extent_range_clear_dirty_for_io() (git- fixes). * btrfs: pass struct btrfs_inode to fill_stack_inode_item() (git-fixes). * btrfs: pass struct btrfs_inode to new_simple_dir() (git-fixes). * btrfs: pass true to btrfs_delalloc_release_space() at btrfs_page_mkwrite() (bsc#1247949). * btrfs: propagate last_unlink_trans earlier when doing a rmdir (git-fixes). * btrfs: props: switch prop_handler::apply to struct btrfs_inode (git-fixes). * btrfs: props: switch prop_handler::extract to struct btrfs_inode (git- fixes). * btrfs: push cleanup into btrfs_read_locked_inode() (git-fixes). * btrfs: qgroup: fix qgroup create ioctl returning success after quotas disabled (git-fixes). * btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git- fixes). * btrfs: qgroup: remove no longer used fs_info->qgroup_ulist (git-fixes). * btrfs: qgroup: set quota enabled bit if quota disable fails flushing reservations (git-fixes). * btrfs: record new subvolume in parent dir earlier to avoid dir logging races (git-fixes). * btrfs: remove conditional path allocation in btrfs_read_locked_inode() (git- fixes). * btrfs: remove no longer needed strict argument from can_nocow_extent() (git- fixes). * btrfs: remove redundant path release when replaying a log tree (git-fixes). * btrfs: remove the snapshot check from check_committed_ref() (git-fixes). * btrfs: restore mount option info messages during mount (git-fixes). * btrfs: return a btrfs_inode from btrfs_iget_logging() (git-fixes). * btrfs: return a btrfs_inode from read_one_inode() (git-fixes). * btrfs: return any hit error from extent_writepage_io() (git-fixes). * btrfs: send: remove unnecessary inode lookup at send_encoded_inline_extent() (git-fixes). * btrfs: simplify arguments for btrfs_cross_ref_exist() (git-fixes). * btrfs: simplify early error checking in btrfs_page_mkwrite() (bsc#1247949). * btrfs: simplify error detection flow during log replay (git-fixes). * btrfs: simplify return logic at check_committed_ref() (git-fixes). * btrfs: subpage: fix the bitmap dump of the locked flags (git-fixes). * btrfs: tests: fix chunk map leak after failure to add it to the tree (git- fixes). * btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes). * btrfs: unfold transaction aborts when replaying log trees (git-fixes). * btrfs: unify ordering of btrfs_key initializations (git-fixes). * btrfs: update superblock's device bytes_used when dropping chunk (git- fixes). * btrfs: use a single variable to track return value at btrfs_page_mkwrite() (bsc#1247949). * btrfs: use btrfs_record_snapshot_destroy() during rmdir (git-fixes). * btrfs: use filemap_get_folio() helper (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_get_name() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_get_parent() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_remap_file_range() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_remap_file_range_prep() (git- fixes). * btrfs: use struct btrfs_inode inside create_pending_snapshot() (git-fixes). * btrfs: use verbose ASSERT() in volumes.c (bsc#1249038). * build_bug.h: Add KABI assert (bsc#1249186). * bus: firewall: Fix missing static inline annotations for stubs (git-fixes). * bus: fsl-mc: Check return value of platform_get_resource() (git-fixes). * bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint() (git-fixes). * bus: mhi: ep: Fix chained transfer handling in read path (git-fixes). * bus: mhi: host: Detect events pointing to unexpected TREs (git-fixes). * bus: mhi: host: Do not use uninitialized 'dev' pointer in mhi_init_irq_setup() (git-fixes). * bus: mhi: host: pci_generic: Fix the modem name of Foxconn T99W640 (git- fixes). * can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled (stable-fixes). * can: hi311x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes). * can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get() fails (git-fixes). * can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed (git-fixes). * can: kvaser_pciefd: Store device channel index (git-fixes). * can: kvaser_usb: Assign netdev.dev_port based on device channel index (git- fixes). * can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode (git-fixes). * can: peak_usb: fix USB FD devices potential malfunction (git-fixes). * can: peak_usb: fix shift-out-of-bounds issue (git-fixes). * can: rcar_can: rcar_can_resume(): fix s2ram with PSCI (stable-fixes). * can: rcar_canfd: Fix controller mode setting (stable-fixes). * can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB (git-fixes). * cdc-acm: fix race between initial clearing halt and open (git-fixes). * cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes). * cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes). * cgroup/cpuset: Fix a partition error with CPU hotplug (bsc#1241166). * cgroup/cpuset: Use static_branch_enable_cpuslocked() on cpusets_insane_config_key (bsc#1241166). * cgroup: Add compatibility option for content of /proc/cgroups (jsc#PED-12405). * cgroup: Print message when /proc/cgroups is read on v2-only system (jsc#PED-12405). * cgroup: llist: avoid memory tears for llist_node (bsc#1247963). * cgroup: make css_rstat_updated nmi safe (bsc#1247963). * cgroup: remove per-cpu per-subsystem locks (bsc#1247963). * cgroup: support to enable nmi-safe css_rstat_updated (bsc#1247963). * char: misc: Fix improper and inaccurate error code returned by misc_init() (stable-fixes). * clk: at91: peripheral: fix return value (git-fixes). * clk: at91: sam9x7: update pll clk ranges (git-fixes). * clk: clk-axi-clkgen: fix fpfd_max frequency for zynq (git-fixes). * clk: davinci: Add NULL check in davinci_lpsc_clk_register() (git-fixes). * clk: imx95-blk-ctl: Fix synchronous abort (git-fixes). * clk: mediatek: clk-mux: Do not pass flags to clk_mux_determine_rate_flags() (git-fixes). * clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m (git- fixes). * clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register() (git-fixes). * clk: qcom: gcc-ipq8074: fix broken freq table for nss_port6_tx_clk_src (git- fixes). * clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk (git- fixes). * clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init() (git- fixes). * clk: renesas: rzv2h: Fix missing CLK_SET_RATE_PARENT flag for ddiv clocks (git-fixes). * clk: samsung: exynos850: fix a comment (git-fixes). * clk: samsung: gs101: fix CLK_DOUT_CMU_G3D_BUSD (git-fixes). * clk: samsung: gs101: fix alternate mout_hsi0_usb20_ref parent clock (git- fixes). * clk: sunxi-ng: v3s: Fix de clock definition (git-fixes). * clk: tegra: do not overallocate memory for bpmp clocks (git-fixes). * clk: thead: th1520-ap: Correctly refer the parent of osc_12m (git-fixes). * clk: xilinx: vcu: unregister pll_post only if registered correctly (git- fixes). * comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() (git-fixes). * comedi: Make insn_rw_emulate_bits() do insn->n samples (git-fixes). * comedi: fix race between polling and detaching (git-fixes). * comedi: pcl726: Prevent invalid irq number (git-fixes). * compiler-clang.h: define **SANITIZE_*** macros only when undefined (stable- fixes). * compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes). * config.sh: SLFO 1.2 branched in IBS * config: arm64: default: enable mtu3 dual-role support for MediaTek platforms (bsc#1245206) * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cpu: Define attack vectors (git-fixes). * cpufreq/amd-pstate: Fix a regression leading to EPP 0 after resume (git- fixes). * cpufreq/amd-pstate: Fix setting of CPPC.min_perf in active mode for performance governor (git-fixes). * cpufreq/sched: Explicitly synchronize limits_changed flag (git-fixes) * cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS (git-fixes) * cpufreq: Add SM8650 to cpufreq-dt-platdev blocklist (stable-fixes). * cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay (stable- fixes). * cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes). * cpufreq: Exit governor when failed to start old governor (stable-fixes). * cpufreq: Init policy->rwsem before it may be possibly used (git-fixes). * cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes). * cpufreq: Initialize cpufreq-based invariance before subsys (git-fixes). * cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency (stable-fixes git-fixes). * cpufreq: Reference count policy in cpufreq_update_limits() (git-fixes). * cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table() (stable-fixes). * cpufreq: armada-8k: make both cpu masks static (git-fixes). * cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes). * cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git- fixes). * cpufreq: intel_pstate: Add Granite Rapids support in no-HWP mode (stable- fixes). * cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git- fixes). * cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (git-fixes). * cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes). * cpufreq: mediatek: fix device leak on probe failure (git-fixes). * cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus() (git- fixes). * cpufreq: scmi: Skip SCMI devices that are not used by the CPUs (stable- fixes). * cpufreq: scpi: compare kHz instead of Hz (git-fixes). * cpufreq: sun50i: prevent out-of-bounds access (git-fixes). * cpufreq: tegra186: Set target frequency for all cpus in policy (git-fixes). * cpufreq: tegra186: Share policy per cluster (stable-fixes). * cpupower: Fix a bug where the -t option of the set subcommand was not working (stable-fixes). * crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes). * crypto: arm/aes-neonbs - work around gcc-15 warning (git-fixes). * crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes). * crypto: atmel - Fix dma_unmap_sg() direction (git-fixes). * crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP (git-fixes). * crypto: ccp - Add missing bootloader info reg for pspv6 (stable-fixes). * crypto: ccp - Fix crash when rebind ccp device for ccp.ko (git-fixes). * crypto: ccp - Fix locking on alloc failure handling (git-fixes). * crypto: essiv - Check ssize for decryption and in-place encryption (git- fixes). * crypto: hisilicon - re-enable address prefetch after device resuming (git- fixes). * crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes). * crypto: hisilicon/qm - check whether the input function and PF are on the same device (git-fixes). * crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs (git-fixes). * crypto: hisilicon/zip - remove unnecessary validation for high-performance mode configurations (git-fixes). * crypto: img-hash - Fix dma_unmap_sg() nents value (git-fixes). * crypto: inside-secure - Fix `dma_unmap_sg()` nents value (git-fixes). * crypto: jitter - fix intermediary handling (stable-fixes). * crypto: keembay - Add missing check after sg_nents_for_len() (git-fixes). * crypto: keembay - Fix dma_unmap_sg() nents value (git-fixes). * crypto: marvell/cesa - Fix engine load inaccuracy (git-fixes). * crypto: octeontx2 - Call strscpy() with correct size argument (git-fixes). * crypto: octeontx2 - Fix address alignment issue on ucode loading (stable- fixes). * crypto: octeontx2 - Fix address alignment on CN10K A0/A1 and OcteonTX2 (stable-fixes). * crypto: octeontx2 - Fix address alignment on CN10KB and CN10KA-B0 (stable- fixes). * crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes). * crypto: qat - allow enabling VFs in the absence of IOMMU (git-fixes). * crypto: qat - disable ZUC-256 capability for QAT GEN5 (git-fixes). * crypto: qat - fix DMA direction for compression on GEN2 devices (git-fixes). * crypto: qat - fix seq_file position update in adf_ring_next() (git-fixes). * crypto: qat - fix state restore for banks with exceptions (git-fixes). * crypto: qat - flush misc workqueue during device shutdown (git-fixes). * crypto: qat - lower priority for skcipher and aead algorithms (stable- fixes). * crypto: qat - use unmanaged allocation for dc_data (git-fixes). * crypto: rng - Ensure set_ent is always present (git-fixes). * crypto: rockchip - Fix dma_unmap_sg() nents value (git-fixes). * crypto: sun8i-ce - fix nents passed to dma_unmap_sg() (git-fixes). * devlink: Add support for u64 parameters (jsc#PED-13331). * devlink: avoid param type value translations (jsc#PED-13331). * devlink: define enum for attr types of dynamic attributes (jsc#PED-13331). * devlink: introduce devlink_nl_put_u64() (jsc#PED-13331). * devlink: let driver opt out of automatic phys_port_name generation (git- fixes). * dm-mpath: do not print the "loaded" message if registering fails (git- fixes). * dm-stripe: limit chunk_sectors to the stripe size (git-fixes). * dm-table: fix checking for rq stackable devices (git-fixes). * dm: Check for forbidden splitting of zone write operations (git-fixes). * dm: split write BIOs on zone boundaries when zone append is not emulated (git-fixes). * dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes). * dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation (git-fixes). * dmaengine: dw-edma: Drop unused dchan2dev() and chan2dev() (git-fixes). * dmaengine: dw: dmamux: Fix device reference leak in rzn1_dmamux_route_allocate (git-fixes). * dmaengine: fsl-dpaa2-qdma: Drop unused mc_enc() (git-fixes). * dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes). * dmaengine: idxd: Fix refcount underflow on module unload (git-fixes). * dmaengine: idxd: Remove improper idxd_free (git-fixes). * dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() (git- fixes). * dmaengine: mmp: Fix again Wvoid-pointer-to-enum-cast warning (git-fixes). * dmaengine: mv_xor: Fix missing check after DMA map and missing unmap (git- fixes). * dmaengine: nbpfaxi: Add missing check after DMA map (git-fixes). * dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git- fixes). * dmaengine: qcom: gpi: Drop unused gpi_write_reg_field() (git-fixes). * dmaengine: stm32-dma: configure next sg only if there are more than 2 sgs (stable-fixes). * dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git- fixes). * docs: admin-guide: update to current minimum pipe size default (git-fixes). * dpll: Add basic Microchip ZL3073x support (jsc#PED-13331). * dpll: Make ZL3073X invisible (jsc#PED-13331). * dpll: zl3073x: Add support to get/set frequency on pins (jsc#PED-13331). * dpll: zl3073x: Add support to get/set priority on input pins (jsc#PED-13331). * dpll: zl3073x: Fetch invariants during probe (jsc#PED-13331). * dpll: zl3073x: Fix build failure (jsc#PED-13331). * dpll: zl3073x: Implement input pin selection in manual mode (jsc#PED-13331). * dpll: zl3073x: Implement input pin state setting in automatic mode (jsc#PED-13331). * dpll: zl3073x: Read DPLL types and pin properties from system firmware (jsc#PED-13331). * dpll: zl3073x: Register DPLL devices and pins (jsc#PED-13331). * dpll: zl3073x: ZL3073X_I2C and ZL3073X_SPI should depend on NET (jsc#PED-13331). * driver core/PM: Set power.no_callbacks along with power.no_pm (stable- fixes). * drivers/base/node: fix double free in register_one_node() (git-fixes). * drivers/base/node: handle error properly in register_one_node() (git-fixes). * drivers: base: handle module_kobject creation (git-fixes). * drm/amd : Update MES API header file for v11 & v12 (stable-fixes). * drm/amd/amdgpu: Declare isp firmware binary file (stable-fixes). * drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes). * drm/amd/amdgpu: Implement MES suspend/resume gang functionality for v12 (bsc#1243112). * drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on vf mode (stable- fixes). * drm/amd/display: Add NULL check for stream before dereference in 'dm_vupdate_high_irq' (bsc#1243112). * drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs (git-fixes). * drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() (git-fixes). * drm/amd/display: Add primary plane to commits for correct VRR handling (stable-fixes). * drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes). * drm/amd/display: Allow DCN301 to clear update flags (git-fixes). * drm/amd/display: Allow RX6xxx & RX7700 to invoke amdgpu_irq_get/put (git- fixes). * drm/amd/display: Avoid a NULL pointer dereference (stable-fixes). * drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported (stable-fixes). * drm/amd/display: Avoid trying AUX transactions on disconnected ports (stable-fixes). * drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out DPP PG (stable-fixes). * drm/amd/display: Default IPS to RCG_IN_ACTIVE_IPS2_IN_OFF (git-fixes). * drm/amd/display: Disable CRTC degamma LUT for DCN401 (stable-fixes). * drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121). * drm/amd/display: Disable dsc_power_gate for dcn314 by default (stable- fixes). * drm/amd/display: Disable scaling on DCE6 for now (git-fixes). * drm/amd/display: Do not check for NULL divisor in fixpt code (git-fixes). * drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes). * drm/amd/display: Do not overwrite dce60_clk_mgr (git-fixes). * drm/amd/display: Do not print errors for nonexistent connectors (git-fixes). * drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes). * drm/amd/display: Enable Dynamic DTBCLK Switch (bsc#1243112). * drm/amd/display: Fill display clock and vblank time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Find first CRTC and its line time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes). * drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes). * drm/amd/display: Fix Xorg desktop unresponsive on Replay panel (stable- fixes). * drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git- fixes). * drm/amd/display: Fix mismatch type comparison (stable-fixes). * drm/amd/display: Fix vupdate_offload_work doc (bsc#1243112). * drm/amd/display: Free memory allocation (stable-fixes). * drm/amd/display: Init DCN35 clocks from pre-os HW values (git-fixes). * drm/amd/display: Initialize mode_select to 0 (stable-fixes). * drm/amd/display: Only finalize atomic_obj if it was initialized (stable- fixes). * drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6 (git-fixes). * drm/amd/display: Properly disable scaling on DCE6 (git-fixes). * drm/amd/display: Remove redundant semicolons (git-fixes). * drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes). * drm/amd/display: Update DMCUB loading sequence for DCN3.5 (stable-fixes). * drm/amd/display: add workaround flag to link to force FFE preset (stable- fixes). * drm/amd/display: fix a Null pointer dereference vulnerability (stable- fixes). * drm/amd/display: fix dmub access race condition (bsc#1243112). * drm/amd/display: fix initial backlight brightness calculation (git-fixes). * drm/amd/display: limit clear_update_flags to dcn32 and above (stable-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (bsc#1243112). * drm/amd/display: remove output_tf_change flag (git-fixes). * drm/amd/display: use udelay rather than fsleep (git-fixes). * drm/amd/include : MES v11 and v12 API header update (stable-fixes). * drm/amd/include : Update MES v12 API for fence update (stable-fixes). * drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value (git- fixes). * drm/amd/pm: Adjust si_upload_smc_data register programming (v3) (git-fixes). * drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2) (git-fixes). * drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3) (git-fixes). * drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes). * drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes). * drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3) (git-fixes). * drm/amd/pm: fix null pointer access (stable-fixes). * drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual (stable-fixes). * drm/amd: Avoid evicting resources at S5 (bsc#1243112). * drm/amd: Check whether secure display TA loaded successfully (bsc#1243112). * drm/amd: Fix hybrid sleep (bsc#1243112). * drm/amd: Only restore cached manual clock settings in restore if OD enabled (bsc#1243112). * drm/amd: Restore cached manual clock settings during resume (bsc#1243112). * drm/amd: Restore cached power limit during resume (stable-fixes). * drm/amdgpu/discovery: fix fw based ip discovery (git-fixes). * drm/amdgpu/discovery: optionally use fw based ip discovery (stable-fixes). * drm/amdgpu/gfx10: fix KGQ reset sequence (git-fixes). * drm/amdgpu/gfx10: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/gfx9.4.3: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/gfx9: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/mes11: implement detect and reset callback (bsc#1243112). * drm/amdgpu/mes12: implement detect and reset callback (bsc#1243112). * drm/amdgpu/mes: add front end for detect and reset hung queue (bsc#1243112). * drm/amdgpu/mes: add missing locking in helper functions (stable-fixes). * drm/amdgpu/mes: enable compute pipes across all MEC (git-fixes). * drm/amdgpu/mes: optimize compute loop handling (stable-fixes). * drm/amdgpu/swm14: Update power limit logic (stable-fixes). * drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable- fixes). * drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time (stable-fixes). * drm/amdgpu/vcn: fix ref counting for ring based profile handling (git- fixes). * drm/amdgpu/vpe: cancel delayed work in hw_fini (bsc#1243112). * drm/amdgpu: Add additional DCE6 SCL registers (git-fixes). * drm/amdgpu: Avoid extra evict-restore process (stable-fixes). * drm/amdgpu: Avoid rma causes GPU duplicate reset (bsc#1243112). * drm/amdgpu: Enable MES lr_compute_wa by default (stable-fixes). * drm/amdgpu: Fix allocating extra dwords for rings (v2) (git-fixes). * drm/amdgpu: Fix for GPU reset being blocked by KIQ I/O (bsc#1243112). * drm/amdgpu: Increase reset counter only on success (stable-fixes). * drm/amdgpu: Initialize data to NULL in imu_v12_0_program_rlc_ram() (git- fixes). * drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes). * drm/amdgpu: Remove nbiov7.9 replay count reporting (git-fixes). * drm/amdgpu: Report individual reset error (bsc#1243112). * drm/amdgpu: Reset the clear flag in buddy during resume (git-fixes). * drm/amdgpu: Update external revid for GC v9.5.0 (stable-fixes). * drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause (stable- fixes). * drm/amdgpu: add kicker fws loading for gfx11/smu13/psp13 (stable-fixes). * drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities (stable-fixes). * drm/amdgpu: do not resume device in thaw for normal hibernation (bsc#1243112). * drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes). * drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes). * drm/amdgpu: fix incorrect vm flags to map bo (git-fixes). * drm/amdgpu: fix link error for !PM_SLEEP (bsc#1243112). * drm/amdgpu: fix task hang from failed job submission during process kill (git-fixes). * drm/amdgpu: fix vram reservation issue (git-fixes). * drm/amdgpu: remove the redeclaration of variable i (git-fixes). * drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes). * drm/amdgpu: update mmhub 4.1.0 client id mappings (stable-fixes). * drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes). * drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl() (git-fixes). * drm/amdkfd: Fix mmap write lock not release (bsc#1243112). * drm/ast: Use msleep instead of mdelay for edid read (git-fixes). * drm/bridge: fix OF node leak (git-fixes). * drm/bridge: it6505: select REGMAP_I2C (git-fixes). * drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe() (git-fixes). * drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes). * drm/cirrus-qemu: Fix pitch programming (git-fixes). * drm/connector: hdmi: Evaluate limited range after computing format (git- fixes). * drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121). * drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS (stable-fixes). * drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to TRAINING_PATTERN_SET (bsc#1248121). * drm/edid: Add support for quirks visible to DRM core and drivers (bsc#1248121). * drm/edid: Define the quirks in an enum list (bsc#1248121). * drm/format-helper: Add conversion from XRGB8888 to BGR888 (stable-fixes). * drm/gem: Internally test import_attach for imported objects (git-fixes). * drm/gem: Test for imported GEM buffers with helper (stable-fixes). * drm/gma500: Fix null dereference in hdmi teardown (git-fixes). * drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes). * drm/hisilicon/hibmc: fix the i2c device resource leak when vdac init failed (git-fixes). * drm/hisilicon/hibmc: refactored struct hibmc_drm_private (stable-fixes). * drm/i915/backlight: Return immediately when scale() finds invalid parameters (stable-fixes). * drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return type (stable-fixes). * drm/i915/ddi: gracefully handle errors from intel_ddi_init_hdmi_connector() (stable-fixes). * drm/i915/ddi: only call shutdown hooks for valid encoders (stable-fixes). * drm/i915/display: Fix dma_fence_wait_timeout() return value handling (git- fixes). * drm/i915/display: add intel_encoder_is_hdmi() (stable-fixes). * drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x (git-fixes). * drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes). * drm/i915/hdmi: add error handling in g4x_hdmi_init() (stable-fixes). * drm/i915/hdmi: propagate errors from intel_hdmi_init_connector() (stable- fixes). * drm/i915/icl+/tc: Cache the max lane count value (stable-fixes). * drm/i915/icl+/tc: Convert AUX powered WARN to a debug message (stable- fixes). * drm/i915/power: fix size for for_each_set_bit() in abox iteration (git- fixes). * drm/imagination: Clear runtime PM errors while resetting the GPU (stable- fixes). * drm/mediatek: Add error handling for old state CRTC in atomic_disable (git- fixes). * drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv (git-fixes). * drm/mediatek: fix potential OF node use-after-free (git-fixes). * drm/msm/dp: account for widebus and yuv420 during mode validation (git- fixes). * drm/msm/dpu: Fill in min_prefill_lines for SC8180X (git-fixes). * drm/msm/dpu: fix incorrect type for ret (git-fixes). * drm/msm/kms: move snapshot init earlier in KMS init (git-fixes). * drm/msm: Add error handling for krealloc in metadata setup (stable-fixes). * drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes). * drm/msm: update the high bitfield of certain DSI registers (git-fixes). * drm/msm: use trylock for debugfs (stable-fixes). * drm/nouveau/disp: Always accept linear modifier (git-fixes). * drm/nouveau/gsp: fix potential leak of memory used during acpi init (git- fixes). * drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes). * drm/nouveau: fix bad ret code in nouveau_bo_move_prep (git-fixes). * drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes). * drm/nouveau: fix typos in comments (git-fixes). * drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes). * drm/nouveau: remove unused memory target test (git-fixes). * drm/panel: novatek-nt35560: Fix invalid return value (git-fixes). * drm/panfrost: Fix panfrost device variable name in devfreq (git-fixes). * drm/panthor: Add missing explicit padding in drm_panthor_gpu_info (git- fixes). * drm/panthor: Defer scheduler entitiy destruction to queue release (git- fixes). * drm/panthor: Fix memory leak in panthor_ioctl_group_create() (git-fixes). * drm/panthor: validate group queue count (git-fixes). * drm/radeon/r600_cs: clean up of dead code in r600_cs (git-fixes). * drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes). * drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed (git-fixes). * drm/sched: Remove optimization that causes hang when killing dependent jobs (git-fixes). * drm/simpledrm: Do not upcast in release helpers (git-fixes). * drm/tests: Fix endian warning (git-fixes). * drm/ttm: Respect the shrinker core free target (stable-fixes). * drm/ttm: Should to return the evict error (stable-fixes). * drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel (git-fixes). * drm/vmwgfx: Fix Use-after-free in validation (git-fixes). * drm/vmwgfx: Fix a null-ptr access in the cursor snooper (git-fixes). * drm/vmwgfx: Fix copy-paste typo in validation (git-fixes). * drm/xe/bmg: Add new PCI IDs (stable-fixes). * drm/xe/bmg: Add one additional PCI ID (stable-fixes). * drm/xe/bmg: Update Wa_22019338487 (git-fixes). * drm/xe/gsc: do not flush the GSC worker from the reset path (git-fixes). * drm/xe/hw_engine_group: Fix double write lock release in error path (git- fixes). * drm/xe/mocs: Initialize MOCS index early (stable-fixes). * drm/xe/pf: Move VFs reprovisioning to worker (stable-fixes). * drm/xe/pf: Prepare to stop SR-IOV support prior GT reset (git-fixes). * drm/xe/pf: Sanitize VF scratch registers on FLR (stable-fixes). * drm/xe/tile: Release kobject for the failure path (git-fixes). * drm/xe/uapi: Correct sync type definition in comments (git-fixes). * drm/xe/uapi: loosen used tracking restriction (git-fixes). * drm/xe/vf: Disable CSC support on VF (git-fixes). * drm/xe/vm: Clear the scratch_pt pointer on error (git-fixes). * drm/xe/xe_query: Use separate iterator while filling GT list (stable-fixes). * drm/xe/xe_sync: avoid race during ufence signaling (git-fixes). * drm/xe: Allow dropping kunit dependency as built-in (git-fixes). * drm/xe: Attempt to bring bos back to VRAM after eviction (git-fixes). * drm/xe: Carve out wopcm portion from the stolen memory (git-fixes). * drm/xe: Do not trigger rebind on initial dma-buf validation (git-fixes). * drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change (git-fixes). * drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue() (git- fixes). * drm/xe: Fix build without debugfs (git-fixes). * drm/xe: Make dma-fences compliant with the safe access rules (stable-fixes). * drm/xe: Move page fault init after topology init (git-fixes). * drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git- fixes). * drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git- fixes). * drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range (stable-fixes). * dt-bindings: dpll: Add DPLL device and pin (jsc#PED-13331). * dt-bindings: dpll: Add support for Microchip Azurite chip family (jsc#PED-13331). * e1000e: disregard NVM checksum on tgp when valid checksum bit is not set (git-fixes). * e1000e: ignore uninitialized checksum word on tgp (git-fixes). * efi: stmm: Fix incorrect buffer allocation method (git-fixes). * erofs: avoid reading more for fragment maps (git-fixes). * erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git- fixes). * execmem: enforce allocation size aligment to PAGE_SIZE (git-fixes). * exfat: add cluster chain loop check for dir (git-fixes). * exfat: fdatasync flag should be same like generic_write_sync() (git-fixes). * ext4: fix checks for orphan inodes (bsc#1250119). * ext4: remove writable userspace mappings before truncating page cache (bsc#1247223). * fbcon: Fix OOB access in font allocation (git-fixes). * fbcon: Fix outdated registered_fb reference in comment (git-fixes). * fbcon: fix integer overflow in fbcon_do_set_font (git-fixes). * fbdev: Fix logic error in "offb" name match (git-fixes). * fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes). * fbdev: fix potential buffer overflow in do_register_framebuffer() (stable- fixes). * fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref (git-fixes). * fbdev: simplefb: Fix use after free in simplefb_detach_genpds() (git-fixes). * fgraph: Fix set_graph_notrace with setting TRACE_GRAPH_NOTRACE_BIT (git- fixes). * firewire: core: fix overlooked update of subsystem ABI version (git-fixes). * firewire: ohci: correct code comments about bus_reset tasklet (git-fixes). * firmware: arm_ffa: Change initcall level of ffa_init() to rootfs_initcall (stable-fixes). * firmware: arm_scmi: Convert to SYSTEM_SLEEP_PM_OPS (git-fixes). * firmware: arm_scmi: Fix up turbo frequencies selection (git-fixes). * firmware: arm_scmi: Mark VirtIO ready before registering scmi_virtio_driver (git-fixes). * firmware: arm_scmi: power_control: Ensure SCMI_SYSPOWER_IDLE is set early during resume (stable-fixes). * firmware: firmware: meson-sm: fix compile-test default (git-fixes). * firmware: meson_sm: fix device leak at probe (git-fixes). * firmware: tegra: Fix IVC dependency problems (stable-fixes). * flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read (git-fixes). * fs/nfs/io: make nfs_start_io_*() killable (git-fixes). * fs/proc/task_mmu: check p->vec_buf for NULL (git-fixes). * fs/proc: Use inode_get_dev() for device numbers in procmap_query References: bsc#1246450 * ftrace: Fix function profiler's filtering functionality (git-fixes). * ftrace: fix incorrect hash size in register_ftrace_direct() (git-fixes). * gfs2: Call gfs2_queue_verify_delete from gfs2_evict_inode (bsc#1247220). * gfs2: Clean up delete work processing (bsc#1247220). * gfs2: Faster gfs2_upgrade_iopen_glock wakeups (bsc#1247220). * gfs2: Initialize gl_no_formal_ino earlier (bsc#1247220). * gfs2: Minor delete_work_func cleanup (bsc#1247220). * gfs2: Only defer deletes when we have an iopen glock (bsc#1247220). * gfs2: Prevent inode creation race (2) (bsc#1247220). * gfs2: Prevent inode creation race (bsc#1247220). * gfs2: Randomize GLF_VERIFY_DELETE work delay (bsc#1247220). * gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE (bsc#1247220). * gfs2: Rename dinode_demise to evict_behavior (bsc#1247220). * gfs2: Replace GIF_DEFER_DELETE with GLF_DEFER_DELETE (bsc#1247220). * gfs2: Return enum evict_behavior from gfs2_upgrade_iopen_glock (bsc#1247220). * gfs2: Simplify DLM_LKF_QUECVT use (bsc#1247220). * gfs2: Update to the evict / remote delete documentation (bsc#1247220). * gfs2: Use mod_delayed_work in gfs2_queue_try_to_evict (bsc#1247220). * gfs2: gfs2_evict_inode clarification (bsc#1247220). * gfs2: minor evict fix (bsc#1247220). * gfs2: skip if we cannot defer delete (bsc#1247220). * gpio: mlxbf2: use platform_get_irq_optional() (git-fixes). * gpio: mlxbf3: use platform_get_irq_optional() (git-fixes). * gpio: tps65912: check the return value of regmap_update_bits() (stable- fixes). * gpio: virtio: Fix config space reading (git-fixes). * gpio: wcd934x: check the return value of regmap_update_bits() (stable- fixes). * gpio: wcd934x: mark the GPIO controller as sleeping (git-fixes). * gpiolib: Extend software-node support to support secondary software-nodes (git-fixes). * gve: Fix stuck TX queue for DQ queue format (git-fixes). * gve: prevent ethtool ops after shutdown (git-fixes). * habanalabs: fix UAF in export_dmabuf() (git-fixes). * hid: fix I2C read buffer overflow in raw_event() for mcp2221 (stable-fixes). * hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111). * hv_netvsc: Link queues to NAPIs (git-fixes). * hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal state (stable-fixes). * hwmon: (gsc-hwmon) fix fan pwm setpoint show functions (git-fixes). * hwmon: (mlxreg-fan) Separate methods of fan setting coming from different subsystems (git-fixes). * hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes). * hwrng: ks-sa - fix division by zero in ks_sa_rng_init (git-fixes). * hwrng: mtk - handle devm_pm_runtime_enable errors (git-fixes). * hwrng: nomadik - add ARM_AMBA dependency (git-fixes). * i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes). * i2c: designware: Add disabling clocks when probe fails (git-fixes). * i2c: designware: Add quirk for Intel Xe (stable-fixes). * i2c: designware: Fix clock issue when PM is disabled (git-fixes). * i2c: designware: Use temporary variable for struct device (stable-fixes). * i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes). * i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD (git-fixes). * i2c: muxes: mule: Fix an error handling path in mule_i2c_mux_probe() (git- fixes). * i2c: omap: Add support for setting mux (stable-fixes). * i2c: omap: Fix an error handling path in omap_i2c_probe() (git-fixes). * i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe() (git-fixes). * i2c: omap: fix deprecated of_property_read_bool() use (git-fixes). * i2c: qup: jump out of the loop in case of timeout (git-fixes). * i2c: riic: Allow setting frequencies lower than 50KHz (git-fixes). * i2c: tegra: Fix reset error handling with ACPI (git-fixes). * i2c: tegra: Use internal reset when reset property is not available (bsc#1249143) * i2c: virtio: Avoid hang by using interruptible completion wait (git-fixes). * i3c: Fix default I2C adapter timeout value (git-fixes). * i3c: add missing include to internal header (stable-fixes). * i3c: do not fail if GETHDRCAP is unsupported (stable-fixes). * i3c: fix module_i3c_i2c_driver() with I3C=n (git-fixes). * i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes). * i3c: master: svc: Recycle unused IBI slot (git-fixes). * i3c: master: svc: Use manual response for IBI events (git-fixes). * i40e: When removing VF MAC filters, only check PF-set MAC (git-fixes). * i40e: report VF tx_dropped with tx_errors instead of tx_discards (git- fixes). * ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof (git- fixes). * ice, irdma: fix an off by one in error handling code (bsc#1247712). * ice, irdma: move interrupts code to irdma (bsc#1247712). * ice/ptp: fix crosstimestamp reporting (git-fixes). * ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712). * ice: Replace ice specific DSCP mapping num with a kernel define (jsc#PED-13728 jsc#PED-13762). * ice: check correct pointer in fwlog debugfs (git-fixes). * ice: count combined queues using Rx/Tx count (bsc#1247712). * ice: devlink PF MSI-X max and min parameter (bsc#1247712). * ice: do not leave device non-functional if Tx scheduler config fails (git- fixes). * ice: enable_rdma devlink param (bsc#1247712). * ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset (jsc#PED-13728). * ice: fix incorrect counter for buffer allocation failures (git-fixes). * ice: get rid of num_lan_msix field (bsc#1247712). * ice: init flow director before RDMA (bsc#1247712). * ice: remove splitting MSI-X between features (bsc#1247712). * ice: simplify VF MSI-X managing (bsc#1247712). * ice: treat dyn_allowed only as suggestion (bsc#1247712). * ice: use fixed adapter index for E825C embedded devices (git-fixes). * idpf: add PTP clock configuration (jsc#PED-13728 jsc#PED-13762). * idpf: add Tx timestamp capabilities negotiation (jsc#PED-13728 jsc#PED-13762). * idpf: add Tx timestamp flows (jsc#PED-13728 jsc#PED-13762). * idpf: add cross timestamping (jsc#PED-13728). * idpf: add flow steering support (jsc#PED-13728). * idpf: add initial PTP support (jsc#PED-13728 jsc#PED-13762). * idpf: add mailbox access to read PTP clock time (jsc#PED-13728 jsc#PED-13762). * idpf: add support for Rx timestamping (jsc#PED-13728 jsc#PED-13762). * idpf: add support for Tx refillqs in flow scheduling mode (jsc#PED-13728). * idpf: assign extracted ptype to struct libeth_rqe_info field (jsc#PED-13728 jsc#PED-13762). * idpf: change the method for mailbox workqueue allocation (jsc#PED-13728 jsc#PED-13762). * idpf: fix UAF in RDMA core aux dev deinitialization (jsc#PED-13728). * idpf: implement IDC vport aux driver MTU change handler (jsc#PED-13728 jsc#PED-13762). * idpf: implement RDMA vport auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762). * idpf: implement core RDMA auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762). * idpf: implement get LAN MMIO memory regions (jsc#PED-13728 jsc#PED-13762). * idpf: implement remaining IDC RDMA core callbacks and handlers (jsc#PED-13728 jsc#PED-13762). * idpf: improve when to set RE bit logic (jsc#PED-13728). * idpf: move virtchnl structures to the header file (jsc#PED-13728 jsc#PED-13762). * idpf: negotiate PTP capabilities and get PTP clock (jsc#PED-13728 jsc#PED-13762). * idpf: preserve coalescing settings across resets (jsc#PED-13728). * idpf: remove obsolete stashing code (jsc#PED-13728). * idpf: remove unreachable code from setting mailbox (jsc#PED-13728 jsc#PED-13762). * idpf: replace flow scheduling buffer ring with buffer pool (jsc#PED-13728). * idpf: set mac type when adding and removing MAC filters (jsc#PED-13728). * idpf: simplify and fix splitq Tx packet rollback error path (jsc#PED-13728). * idpf: stop Tx if there are insufficient buffer resources (jsc#PED-13728). * idpf: use reserved RDMA vectors from control plane (jsc#PED-13728 jsc#PED-13762). * igb: xsk: solve negative overflow of nb_pkts in zerocopy mode (git-fixes). * igc: disable L1.2 PCI-E link substate to avoid performance issue (git- fixes). * igc: fix disabling L1.2 PCI-E link substate on I226 on init (git-fixes). * iidc/ice/irdma: Break iidc.h into two headers (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Rename IDC header file (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Rename to iidc_* convention (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Update IDC to support multiple consumers (jsc#PED-13728 jsc#PED-13762). * iio/adc/pac1934: fix channel disable configuration (git-fixes). * iio: accel: adxl355: Make timestamp 64-bit aligned using aligned_s64 (git- fixes). * iio: accel: fxls8962af: Fix temperature calculation (git-fixes). * iio: adc: ad7173: fix setting ODR in probe (git-fixes). * iio: adc: ad7266: Fix potential timestamp alignment issue (git-fixes). * iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable- fixes). * iio: adc: ad7768-1: Fix insufficient alignment of timestamp (git-fixes). * iio: adc: ad_sigma_delta: change to buffer predisable (git-fixes). * iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes). * iio: adc: dln2: Use aligned_s64 for timestamp (git-fixes). * iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] (stable-fixes). * iio: adc: max1363: Reorder mode_list[] entries (stable-fixes). * iio: chemical: pms7003: use aligned_s64 for timestamp (git-fixes). * iio: chemical: sps30: use aligned_s64 for timestamp (git-fixes). * iio: common: st_sensors: Fix use of uninitialize device structs (stable- fixes). * iio: consumers: Fix handling of negative channel scale in iio_convert_raw_to_processed() (git-fixes). * iio: consumers: Fix offset handling in iio_convert_raw_to_processed() (git- fixes). * iio: dac: ad5360: use int type to store negative error codes (git-fixes). * iio: dac: ad5421: use int type to store negative error codes (git-fixes). * iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE (git-fixes). * iio: frequency: adf4350: Fix prescaler usage (git-fixes). * iio: hid-sensor-prox: Fix incorrect OFFSET calculation (git-fixes). * iio: hid-sensor-prox: Restore lost scale assignments (git-fixes). * iio: imu: bno055: fix OOB access of hw_xlate array (git-fixes). * iio: imu: inv_icm42600: Convert to uXX and sXX integer types (stable-fixes). * iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in resume (git-fixes). * iio: imu: inv_icm42600: change invalid data error to -EBUSY (git-fixes). * iio: imu: inv_icm42600: fix spi burst write not supported (git-fixes). * iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to aligned_s64 (stable-fixes). * iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes). * iio: light: Use aligned_s64 instead of open coding alignment (stable-fixes). * iio: light: as73211: Ensure buffer holes are zeroed (git-fixes). * iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes). * iio: pressure: mprls0025pa: use aligned_s64 for timestamp (git-fixes). * iio: proximity: isl29501: fix buffered read on big-endian systems (git- fixes). * iio: temperature: maxim_thermocouple: use DMA-safe buffer for spi_read() (git-fixes). * iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes). * iio: xilinx-ams: Unmask interrupts after updating alarms (git-fixes). * integrity/platform_certs: Allow loading of keys in the static key management mode (jsc#PED-13345 jsc#PED-13343). * intel_idle: Provide the default enter_dead() handler (jsc#PED-13815). * intel_idle: Rescan "dead" SMT siblings during initialization (jsc#PED-13815). * intel_idle: Use subsys_initcall_sync() for initialization (jsc#PED-13815). * interconnect: qcom: sc8180x: specify num_nodes (git-fixes). * interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg (git- fixes). * io_uring/rw: do not mask in f_iocb_flags (jsc#PED-12882 bsc#1237542). Drop blacklisting. * io_uring: expose read/write attribute capability (jsc#PED-12882 bsc#1237542). * io_uring: fix potential page leak in io_sqe_buffer_register() (git-fixes). * iommu/amd: Enable PASID and ATS capabilities in the correct order (git- fixes). * iommu/amd: Fix alias device DTE setting (git-fixes). * iommu/amd: Fix geometry.aperture_end for V2 tables (git-fixes). * iommu/arm-smmu-qcom: Add SM6115 MDSS compatible (git-fixes). * iommu/arm-smmu-v3: Fix smmu_domain->nr_ats_masters decrement (git-fixes). * iommu/tegra241-cmdqv: Read SMMU IDR1.CMDQS instead of hardcoding (git- fixes). * iommu/vt-d: Disallow dirty tracking if incoherent page walk (git-fixes). * iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() (git- fixes). * iommu/vt-d: Fix missing PASID in dev TLB flush with cache_tag_flush_all (git-fixes). * iommu/vt-d: Fix possible circular locking dependency (git-fixes). * iommu/vt-d: Fix system hang on reboot -f (git-fixes). * iommu/vt-d: PRS isn't usable if PDS isn't supported (git-fixes). * iommu: Handle race with default domain setup (git-fixes). * iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes). * ipmi: Fix strcpy source and destination the same (stable-fixes). * ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable- fixes). * ipv6: annotate data-races around rt->fib6_nsiblings (git-fixes). * ipv6: fix possible infinite loop in fib6_info_uses_dev() (git-fixes). * ipv6: prevent infinite loop in rt6_nlmsg_size() (git-fixes). * ipv6: reject malicious packets in ipv6_gso_segment() (git-fixes). * ipvs: Fix clamp() of ip_vs_conn_tab on small memory systems (git-fixes). * irdma: free iwdev->rf after removing MSI-X (bsc#1247712). * isolcpus: add missing hunk back (bsc#1236897 bsc#1249206). * iwlwifi: Add missing check for alloc_ordered_workqueue (git-fixes). * ixgbe: fix ixgbe_orom_civd_info struct layout (bsc#1245410). * ixgbe: prevent from unwanted interface name changes (git-fixes). * ixgbe: xsk: resolve the negative overflow of budget in ixgbe_xmit_zc (git- fixes). * kABI fix after Add TDX support for vSphere (jsc#PED-13302). * kABI fix after KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes). * kABI fix after KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * kABI fix after KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * kABI fix after vhost: Reintroduce kthread API and add mode selection (git- fixes). * kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access probe" (bsc#1248121). * kABI workaround for amd_sfh (git-fixes). * kABI workaround for drm_gem.h (git-fixes). * kABI workaround for struct mtk_base_afe changes (git-fixes). * kABI: Fix the module::name type in audit_context (git-fixes). * kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes). * kABI: fix for struct devlink_port_attrs: move new member to the end (git- fixes). * kABI: netfilter: supress warnings for nft_set_ops (git-fixes). * kABI: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (git- fixes). * kabi/severities: ignore kABI compatibility in iio inv_icm42600 drivers They are used only locally * kabi/severities: ignore two unused/dropped symbols from MEI * kabi: Hide adding of u64 to devlink_param_type (jsc#PED-12745). * kabi: Restore layout of parallel_data (bsc1248343). * kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963). * kasan: use vmalloc_dump_obj() for vmalloc error reports (git-fixes). * kbuild/modpost: Continue processing all unresolved symbols when KLP_SYM_RELA is found (bsc#1218644, bsc#1250655). * kbuild: rust: add rustc-min-version support function (git-fixes) * kernel-binary: Another installation ordering fix (bsc#1241353). * kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346) * kernel: globalize lookup_or_create_module_kobject() (stable-fixes). * kernel: param: rename locate_module_kobject (stable-fixes). * leds: flash: leds-qcom-flash: Fix registry access after re-bind (git-fixes). * leds: flash: leds-qcom-flash: Update torch current clamp setting (git- fixes). * leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes). * leds: leds-lp55xx: Use correct address for memory programming (git-fixes). * lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly() (bsc#1236897). * libbpf: Add identical pointer detection to btf_dedup_is_equiv() (git-fixes). * libeth: move idpf_rx_csum_decoded and idpf_rx_extracted (jsc#PED-13728 jsc#PED-13762). * livepatch: Add stack_order sysfs attribute (poo#187320). * loop: use kiocb helpers to fix lockdep warning (git-fixes). * lpfc: do not use file->f_path.dentry for comparisons (bsc#1250519). * mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes). * mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes). * mailbox: Not protect module_put with spin_lock_irqsave (stable-fixes). * mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data() (git- fixes). * mailbox: pcc: Always clear the platform ack interrupt first (stable-fixes). * mailbox: pcc: Fix the possible race in updation of chan_in_use flag (stable- fixes). * mailbox: pcc: Use acpi_os_ioremap() instead of ioremap() (stable-fixes). * mailbox: zynqmp-ipi: Fix SGI cleanup on unbind (git-fixes). * mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop (git- fixes). * mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes (git- fixes). * mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call (git-fixes). * maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs (git-fixes). * maple_tree: fix status setup on restore to active (git-fixes). * maple_tree: fix testing for 32 bit builds (git-fixes). * mctp: no longer rely on net->dev_index_head (git-fixes). * md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes). * md: allow removing faulty rdev during resync (git-fixes). * md: dm-zoned-target: Initialize return variable r to avoid uninitialized use (git-fixes). * md: make rdev_addable usable for rcu mode (git-fixes). * media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove (git-fixes). * media: cec: extron-da-hd-4k-plus: drop external-module make commands (git- fixes). * media: cx18: Add missing check after DMA map (git-fixes). * media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() (stable-fixes). * media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes). * media: gspca: Add bounds checking to firmware parser (git-fixes). * media: hi556: Fix reset GPIO timings (stable-fixes). * media: hi556: correct the test pattern configuration (git-fixes). * media: i2c: mt9v111: fix incorrect type for ret (git-fixes). * media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe (git-fixes). * media: imx: fix a potential memory leak in imx_media_csc_scaler_device_init() (git-fixes). * media: ipu-bridge: Add _HID for OV5670 (stable-fixes). * media: ipu6: isys: Use correct pads for xlate_streams() (git-fixes). * media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls (git-fixes). * media: lirc: Fix error handling in lirc_register() (git-fixes). * media: mc: Fix MUST_CONNECT handling for pads with no links (git-fixes). * media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval (git- fixes). * media: ov2659: Fix memory leaks in ov2659_probe() (git-fixes). * media: pci: ivtv: Add missing check after DMA map (git-fixes). * media: pci: mg4b: fix uninitialized iio scan data (git-fixes). * media: pisp_be: Fix pm_runtime underrun in probe (git-fixes). * media: qcom: camss: cleanup media device allocated resource on error path (git-fixes). * media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() (git- fixes). * media: rc: fix races with imon_disconnect() (git-fixes). * media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes). * media: s5p-mfc: remove an unused/uninitialized variable (git-fixes). * media: st-delta: avoid excessive stack usage (git-fixes). * media: tc358743: Check I2C succeeded during probe (stable-fixes). * media: tc358743: Increase FIFO trigger level to 374 (stable-fixes). * media: tc358743: Return an appropriate colorspace from tc358743_set_fmt (stable-fixes). * media: ti: j721e-csi2rx: Fix source subdev link creation (git-fixes). * media: ti: j721e-csi2rx: Use devm_of_platform_populate (git-fixes). * media: ti: j721e-csi2rx: fix list_del corruption (git-fixes). * media: tuner: xc5000: Fix use-after-free in xc5000_release (git-fixes). * media: usb: hdpvr: disable zero-length read messages (stable-fixes). * media: usbtv: Lock resolution while streaming (git-fixes). * media: uvcvideo: Add quirk for HP Webcam HD 2300 (stable-fixes). * media: uvcvideo: Do not mark valid metadata as invalid (git-fixes). * media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (git- fixes). * media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes). * media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID (git- fixes). * media: uvcvideo: Rollback non processed entities on error (git-fixes). * media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control (stable-fixes). * media: v4l2-ctrls: Do not reset handler's error in v4l2_ctrl_handler_free() (git-fixes). * media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check (git-fixes). * media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() (git-fixes). * media: v4l2: Add support for NV12M tiled variants to v4l2_format_info() (git-fixes). * media: venus: Add a check for packet size after reading from shared memory (git-fixes). * media: venus: Fix MSM8998 frequency table (git-fixes). * media: venus: Fix OOB read due to missing payload bound check (git-fixes). * media: venus: firmware: Use correct reset sequence for IRIS2 (git-fixes). * media: venus: hfi: explicitly release IRQ during teardown (git-fixes). * media: venus: protect against spurious interrupts during probe (git-fixes). * media: venus: vdec: Clamp param smaller than 1fps and bigger than 240 (git- fixes). * media: venus: venc: Clamp param smaller than 1fps and bigger than 240 (git- fixes). * media: verisilicon: Fix AV1 decoder clock frequency (git-fixes). * media: vivid: fix wrong pixel_array control size (git-fixes). * media: zoran: Remove zoran_fh structure (git-fixes). * mei: bus: Check for still connected devices in mei_cl_bus_dev_release() (stable-fixes). * mei: vsc: Destroy mutex after freeing the IRQ (git-fixes). * mei: vsc: Do not re-init VSC from mei_vsc_hw_reset() on stop (git-fixes). * mei: vsc: Drop unused vsc_tp_request_irq() and vsc_tp_free_irq() (stable- fixes). * mei: vsc: Event notifier fixes (git-fixes). * mei: vsc: Fix "BUG: Invalid wait context" lockdep error (git-fixes). * mei: vsc: Run event callback from a workqueue (git-fixes). * mei: vsc: Unset the event callback on remove and probe errors (git-fixes). * memory: mtk-smi: Add ostd setting for mt8186 (git-fixes). * memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe (git- fixes). * memstick: Fix deadlock by moving removing flag earlier (git-fixes). * mfd: axp20x: Set explicit ID for AXP313 regulator (stable-fixes). * mfd: cros_ec: Separate charge-control probing from USB-PD (git-fixes). * mfd: exynos-lpass: Fix another error handling path in exynos_lpass_probe() (git-fixes). * mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes). * mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data() (git-fixes). * microchip: lan865x: Fix LAN8651 autoloading (git-fixes). * microchip: lan865x: Fix module autoloading (git-fixes). * microchip: lan865x: fix missing Timer Increment config for Rev.B0/B1 (git- fixes). * microchip: lan865x: fix missing netif_start_queue() call on device open (git-fixes). * misc: fastrpc: Fix fastrpc_map_lookup operation (git-fixes). * misc: fastrpc: Save actual DMA size in fastrpc_map structure (git-fixes). * misc: fastrpc: Skip reference for DMA handles (git-fixes). * misc: fastrpc: fix possible map leak in fastrpc_put_args (git-fixes). * misc: genwqe: Fix incorrect cmd field being reported in error (git-fixes). * misc: pci_endpoint_test: Fix 'irq_type' to convey the correct type (git- fixes). * misc: pci_endpoint_test: Give disabled BARs a distinct error code (stable- fixes). * misc: rtsx: usb: Ensure mmc child device is active when card is present (git-fixes). * mm/damon/core: avoid destroyed target reference from DAMOS quota (git- fixes). * mm/damon/core: prevent unnecessary overflow in damos_set_effective_quota() (git-fixes). * mm/damon/core: set quota->charged_from to jiffies at first charge window (git-fixes). * mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() (git-fixes). * mm/damon/ops-common: ignore migration request to invalid nodes (git-fixes). * mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() (git-fixes). * mm/damon/sysfs: fix use-after-free in state_show() (git-fixes). * mm/memory-failure: fix redundant updates for already poisoned pages (bsc#1250087). * mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes) * mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE (git-fixes). * mm: close theoretical race where stale TLB entries could linger (git-fixes). * mm: fault in complete folios instead of individual pages for tmpfs (git- fixes). * mm: fix the inaccurate memory statistics issue for users (bsc#1244723). * mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes). * mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma (git- fixes). * mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting (bsc#1245630). * mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting - kabi (bsc#1245630). * mm: move page table sync declarations to linux/pgtable.h (git-fixes). * mm: swap: fix potential buffer overflow in setup_clusters() (git-fixes). * mmc: core: Fix variable shadowing in mmc_route_rpmb_frames() (git-fixes). * mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes). * mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes). * mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes). * mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable- fixes). * mmc: sdhci-of-arasan: Ensure CD logic stabilization before power-up (stable- fixes). * mmc: sdhci-of-arasan: Support for emmc hardware reset (stable-fixes). * mmc: sdhci-pci-gli: Add a new function to simplify the code (git-fixes). * mmc: sdhci-pci-gli: GL9763e: Mask the replay timer timeout of AER (git- fixes). * mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency (git-fixes). * mmc: sdhci_am654: Disable HS400 for AM62P SR1.0 and SR1.1 (git-fixes). * module: Fix memory deallocation on error path in move_module() (git-fixes). * module: Prevent silent truncation of module name in delete_module(2) (git- fixes). * module: Remove unnecessary +1 from last_unloaded_module::name size (git- fixes). * module: Restore the moduleparam prefix length check (git-fixes). * most: core: Drop device reference after usage in get_channel() (git-fixes). * mptcp: fix spurious wake-up on under memory pressure (git-fixes). * mtd: fix possible integer overflow in erase_xfer() (git-fixes). * mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes). * mtd: rawnand: atmel: Fix dma_mapping_error() address (git-fixes). * mtd: rawnand: atmel: Fix error handling path in atmel_nand_controller_add_nands (git-fixes). * mtd: rawnand: atmel: set pmecc data setup time (git-fixes). * mtd: rawnand: fsmc: Add missing check after DMA map (git-fixes). * mtd: rawnand: omap2: fix device leak on probe failure (git-fixes). * mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec() (git-fixes). * mtd: rawnand: renesas: Add missing check after DMA map (git-fixes). * mtd: rawnand: rockchip: Add missing check after DMA map (git-fixes). * mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git- fixes). * mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes). * mtd: spi-nor: Fix spi_nor_try_unlock_all() (git-fixes). * mtd: spi-nor: spansion: Fixup params->set_4byte_addr_mode for SEMPER (git- fixes). * mtd: spinand: propagate spinand_wait() errors from spinand_write_page() (git-fixes). * mwl8k: Add missing check after DMA map (git-fixes). * neighbour: Fix null-ptr-deref in neigh_flush_dev() (git-fixes). * net/mlx5: Base ECVF devlink port attrs from 0 (git-fixes). * net/mlx5: CT: Use the correct counter offset (git-fixes). * net/mlx5: Check device memory pointer before usage (git-fixes). * net/mlx5: Correctly set gso_segs when LRO is used (git-fixes). * net/mlx5: Correctly set gso_size when LRO is used (git-fixes). * net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch (git-fixes). * net/mlx5: Fix lockdep assertion on sync reset unload event (git-fixes). * net/mlx5: Fix memory leak in cmd_exec() (git-fixes). * net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow (git-fixes). * net/mlx5: HWS, Fix pattern destruction in mlx5hws_pat_get_pattern error path (git-fixes). * net/mlx5: HWS, fix bad parameter in CQ creation (git-fixes). * net/mlx5: Nack sync reset when SFs are present (git-fixes). * net/mlx5: Prevent flow steering mode changes in switchdev mode (git-fixes). * net/mlx5: Reload auxiliary drivers on fw_activate (git-fixes). * net/mlx5e: Add new prio for promiscuous mode (git-fixes). * net/mlx5e: Clear Read-Only port buffer size in PBMC before update (git- fixes). * net/mlx5e: Preserve shared buffer capacity during headroom updates (git- fixes). * net/mlx5e: Remove skb secpath if xfrm state is not found (git-fixes). * net/mlx5e: Set local Xoff after FW update (git-fixes). * net/mlx5e: Update and set Xon/Xoff upon MTU set (git-fixes). * net/mlx5e: Update and set Xon/Xoff upon port speed set (git-fixes). * net/packet: fix a race in packet_set_ring() and packet_notifier() (git- fixes). * net/sched: Restrict conditions for adding duplicating netems to qdisc tree (git-fixes). * net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (git- fixes). * net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (git-fixes). * net/sched: taprio: enforce minimum value for picos_per_byte (git-fixes). * net/smc: check sndbuf_space again after NOSPACE flag is set in smc_poll (git-fixes). * net: 802: LLC+SNAP OID:PID lookup on start of skb data (git-fixes). * net: dsa: restore dsa_software_vlan_untag() ability to operate on VLAN- untagged traffic (git-fixes). * net: dsa: tag_ocelot_8021q: fix broken reception (git-fixes). * net: hsr: fix fill_frame_info() regression vs VLAN packets (git-fixes). * net: hsr: fix hsr_init_sk() vs network/transport headers (git-fixes). * net: hv_netvsc: fix loss of early receive events from host during channel open (git-fixes). * net: ieee8021q: fix insufficient table-size assertion (stable-fixes). * net: llc: reset skb->transport_header (git-fixes). * net: mana: Add handler for hardware servicing events (bsc#1245730). * net: mana: Add speed support in mana_get_link_ksettings (bsc#1245726). * net: mana: Add support for net_shaper_ops (bsc#1245726). * net: mana: Allocate MSI-X vectors dynamically (bsc#1245457). * net: mana: Allow irq_setup() to skip cpus for affinity (bsc#1245457). * net: mana: Expose additional hardware counters for drop and TC via ethtool (bsc#1245729). * net: mana: Fix build errors when CONFIG_NET_SHAPER is disabled (gix-fixes). * net: mana: Fix potential deadlocks in mana napi ops (bsc#1245726). * net: mana: Handle Reset Request from MANA NIC (bsc#1245728). * net: mana: Handle unsupported HWC commands (bsc#1245726). * net: mana: Set tx_packets to post gso processing packet count (bsc#1245731). * net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency (bsc#1248754). * net: mana: explain irq_setup() algorithm (bsc#1245457). * net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes). * net: mctp: handle skb cleanup on sock_queue failures (git-fixes). * net: mdio: mdio-bcm-unimac: Correct rate fallback logic (git-fixes). * net: nfc: nci: Add parameter validation for packet data (git-fixes). * net: page_pool: allow enabling recycling late, fix false positive warning (git-fixes). * net: phy: bcm54811: PHY initialization (stable-fixes). * net: phy: fix phy_uses_state_machine() (git-fixes). * net: phy: micrel: Add ksz9131_resume() (stable-fixes). * net: phy: micrel: fix KSZ8081/KSZ8091 cable test (git-fixes). * net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes). * net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer (git-fixes). * net: rose: convert 'use' field to refcount_t (git-fixes). * net: rose: fix a typo in rose_clear_routes() (git-fixes). * net: rose: include node references in rose_neigh refcount (git-fixes). * net: rose: split remove and free operations in rose_remove_neigh() (stable- fixes). * net: thunderbolt: Enable end-to-end flow control also in transmit (stable- fixes). * net: thunderbolt: Fix the parameter passing of tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes). * net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (git- fixes). * net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock (git- fixes). * net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization (git-fixes). * net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes). * net: usb: cdc-ncm: check for filtering capability (git-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990A w/audio composition (stable- fixes). * net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git- fixes). * net: usb: qmi_wwan: fix Telit Cinterion FE990A name (stable-fixes). * net: usb: qmi_wwan: fix Telit Cinterion FN990A name (stable-fixes). * net: usbnet: Avoid potential RCU stall on LINK_CHANGE event (git-fixes). * net: usbnet: Fix the wrong netif_carrier_on() call (git-fixes). * netfilter: ctnetlink: fix refcount leak on table dump (git-fixes). * netfilter: ctnetlink: remove refcounting in expectation dumpers (git-fixes). * netfilter: nf_conncount: garbage collection is not skipped when jiffies wrap around (git-fixes). * netfilter: nf_nat: also check reverse tuple to obtain clashing entry (git- fixes). * netfilter: nf_reject: do not leak dst refcount for loopback packets (git- fixes). * netfilter: nf_tables: Drop dead code from fill_*_info routines (git-fixes). * netfilter: nf_tables: adjust lockdep assertions handling (git-fixes). * netfilter: nf_tables: fix set size with rbtree backend (git-fixes). * netfilter: nf_tables: imbalance in flowtable binding (git-fixes). * netfilter: nft_ct: Use __refcount_inc() for per-CPU nft_ct_pcpu_template (git-fixes). * netfilter: nft_flow_offload: update tcp state flags under lock (git-fixes). * netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237). * netfilter: nft_set_hash: skip duplicated elements pending gc run (git- fixes). * netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext (git- fixes). * netfilter: nft_set_pipapo: prefer kvmalloc for scratch maps (git-fixes). * netfilter: nft_tunnel: fix geneve_opt dump (git-fixes). * netfilter: xtables: support arpt_mark and ipv6 optstrip for iptables-nft only builds (git-fixes). * netlink: fix policy dump for int with validation callback (jsc#PED-13331). * netlink: specs: devlink: replace underscores with dashes in names (jsc#PED-13331). * netpoll: prevent hanging NAPI when netcons gets enabled (git-fixes). * nfs/localio: add direct IO enablement with sync and async IO support (git- fixes). * nfs/localio: remove extra indirect nfs_to call to check {read,write}_iter (git-fixes). * nfsd: Fix NFSD_MAY_BYPASS_GSS and NFSD_MAY_BYPASS_GSS_ON_ROOT (git-fixes). * nfsd: fix access checking for NLM under XPRTSEC policies (git-fixes). * nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (git-fixes). * nouveau: fix disabling the nonstall irq due to storm code (git-fixes). * nvme-auth: update bi_directional flag (git-fixes). * nvme-fc: use lock accessing port_state and rport state (bsc#1245193 bsc#1247500). * nvme-pci: try function level reset on init failure (git-fixes). * nvme-tcp: log TLS handshake failures at error level (git-fixes). * nvme-tcp: send only permitted commands for secure concat (git-fixes). * nvme: fix PI insert on write (git-fixes). * nvme: fix endianness of command word prints in nvme_log_err_passthru() (git- fixes). * nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list() (git-fixes). * nvme: fix misaccounting of nvme-mpath inflight I/O (git-fixes). * nvmet-fc: avoid scheduling association deletion twice (bsc#1245193 bsc#1247500). * nvmet-fc: move lsop put work to nvmet_fc_ls_req_op (bsc#1245193 bsc#1247500). * nvmet-fcloop: call done callback even when remote port is gone (bsc#1245193 bsc#1247500). * nvmet-tcp: fix callback lock for TLS handshake (git-fixes). * nvmet: exit debugfs after discovery subsystem exits (git-fixes). * nvmet: initialize discovery subsys after debugfs is initialized (git-fixes). * nvmet: pci-epf: Do not complete commands twice if nvmet_req_init() fails (git-fixes). * objtool, ASoC: codecs: wcd934x: Remove potential undefined behavior in wcd934x_slim_irq_handler() (stable-fixes). * objtool, lkdtm: Obfuscate the do_nothing() pointer (stable-fixes). * objtool, regulator: rk808: Remove potential undefined behavior in rk806_set_mode_dcdc() (stable-fixes). * of: dynamic: Fix memleak when of_pci_add_properties() failed (git-fixes). * of: dynamic: Fix use after free in of_changeset_add_prop_helper() (git- fixes). * of: resolver: Fix device node refcount leakage in of_resolve_phandles() (git-fixes). * of: resolver: Simplify of_resolve_phandles() using __free() (stable-fixes). * of: unittest: Fix device reference count leak in of_unittest_pci_node_verify (git-fixes). * of: unittest: Unlock on error in unittest_data_add() (git-fixes). * pNFS/flexfiles: do not attempt pnfs on fatal DS errors (git-fixes). * pNFS: Fix disk addr range check in block/scsi layout (git-fixes). * pNFS: Fix stripe mapping in block/scsi layout (git-fixes). * pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes). * pNFS: Handle RPC size limit for layoutcommits (git-fixes). * percpu: fix race on alloc failed warning limit (git-fixes). * perf bpf-event: Fix use-after-free in synthesis (git-fixes). * perf bpf-utils: Constify bpil_array_desc (git-fixes). * perf bpf-utils: Harden get_bpf_prog_info_linear (git-fixes). * perf dso: Add missed dso__put to dso__load_kcore (git-fixes). * perf hwmon_pmu: Avoid shortening hwmon PMU name (git-fixes). * perf parse-events: Set default GH modifier properly (git-fixes). * perf record: Cache build-ID of hit DSOs only (git-fixes). * perf sched: Fix memory leaks for evsel->priv in timehist (git-fixes). * perf sched: Fix memory leaks in 'perf sched latency' (git-fixes). * perf sched: Fix memory leaks in 'perf sched map' (git-fixes). * perf sched: Fix thread leaks in 'perf sched timehist' (git-fixes). * perf sched: Free thread->priv using priv_destructor (git-fixes). * perf sched: Make sure it frees the usage string (git-fixes). * perf sched: Use RC_CHK_EQUAL() to compare pointers (git-fixes). * perf symbol-minimal: Fix ehdr reading in filename__read_build_id (git- fixes). * perf test: Fix a build error in x86 topdown test (git-fixes). * perf tests bp_account: Fix leaked file descriptor (git-fixes). * perf tools: Remove libtraceevent in .gitignore (git-fixes). * perf topdown: Use attribute to see an event is a topdown metic or slots (git-fixes). * perf trace: Remove --map-dump documentation (git-fixes). * phy: fsl-imx8mq-usb: fix phy_tx_vboost_level_from_property() (git-fixes). * phy: mscc: Fix parsing of unicast frames (git-fixes). * phy: mscc: Fix timestamping for vsc8584 (git-fixes). * phy: qcom: phy-qcom-m31: Update IPQ5332 M31 USB phy initialization sequence (git-fixes). * phy: qualcomm: phy-qcom-eusb2-repeater: Do not zero-out registers (git- fixes). * phy: qualcomm: phy-qcom-eusb2-repeater: fix override properties (git-fixes). * phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable- fixes). * phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568 (git-fixes). * phy: rockchip: samsung-hdptx: Do no set rk_hdptx_phy->rate in case of errors (git-fixes). * phy: rockchip: samsung-hdptx: Fix clock ratio setup (git-fixes). * phy: tegra: xusb: fix device and OF node leak at probe (git-fixes). * phy: ti-pipe3: fix device leak at unbind (git-fixes). * phy: ti: omap-usb2: fix device leak at unbind (git-fixes). * pidfs: Fix memory leak in pidfd_info() (jsc#PED-13113). * pidfs: raise SB_I_NODEV and SB_I_NOEXEC (bsc#1249562). * pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes). * pinctrl: berlin: fix memory leak in berlin_pinctrl_build_state() (git- fixes). * pinctrl: equilibrium: Remove redundant semicolons (git-fixes). * pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes). * pinctrl: renesas: Use int type to store negative error codes (git-fixes). * pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read() (git-fixes). * pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes). * pinctrl: stm32: Manage irq affinity settings (stable-fixes). * pinctrl: sunxi: Fix memory leak on krealloc failure (git-fixes). * pinmux: fix race causing mux_owner NULL with active mux_usecount (git- fixes). * platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() (git- fixes). * platform/chrome: cros_ec_sensorhub: Retries when a sensor is not ready (stable-fixes). * platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable- fixes). * platform/mellanox: mlxbf-pmc: Remove newline char from event name input (git-fixes). * platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input (git- fixes). * platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes). * platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL (git-fixes). * platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042 list (stable-fixes). * platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd/pmf: Support new ACPI ID AMDI0108 (stable-fixes). * platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable- fixes). * platform/x86/intel-uncore-freq: Check write blocked for ELC (git-fixes). * platform/x86/intel: power-domains: Use topology_logical_package_id() for package ID (git-fixes). * platform/x86: Fix initialization order for firmware_attributes_class (git- fixes). * platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA (stable-fixes). * platform/x86: asus-wmi: Fix ROG button mapping, tablet mode on ASUS ROG Z13 (stable-fixes). * platform/x86: asus-wmi: Re-add extra keys to ignore_key_wlan quirk (git- fixes). * platform/x86: asus-wmi: Remove extra keys from ignore_key_wlan quirk (git- fixes). * platform/x86: ideapad-laptop: Fix FnLock not remembered among boots (git- fixes). * platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots (git-fixes). * platform/x86: lg-laptop: Fix WMAB call in fan_mode_store() (git-fixes). * pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop() (stable-fixes). * pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable- fixes). * power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery (git-fixes). * power: supply: bq27xxx: restrict no-battery detection to bq27000 (git- fixes). * power: supply: cpcap-charger: Fix null check for power_supply_get_by_name (git-fixes). * power: supply: cw2015: Fix a alignment coding style issue (git-fixes). * power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set (git- fixes). * power: supply: max77976_charger: fix constant current reporting (git-fixes). * power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes). * powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() (git- fixes). * powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199). * powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199). * powerpc/ftrace: ensure ftrace record ops are always set for NOPs (git- fixes). * powerpc/ftrace: ensure ftrace record ops are always set for NOPs (jsc#PED-10909 git-fixes). * powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199). * powerpc/kvm: Fix ifdef to remove build warning (bsc#1215199). * powerpc/powernv/pci: Fix underflow and leak issue (bsc#1215199). * powerpc/pseries/msi: Fix potential underflow and leak issue (bsc#1215199). * powerpc/pseries: Correct secvar format representation for static key management (jsc#PED-13345 jsc#PED-13343). * powerpc/secvar: Expose secvars relevant to the key management mode (jsc#PED-13345 jsc#PED-13343). * powerpc64/modules: correctly iterate over stubs in setup_ftrace_ool_stubs (jsc#PED-10909 git-fixes). * powerpc: do not build ppc_save_regs.o always (bsc#1215199). * powerpc: floppy: Add missing checks after DMA map (bsc#1215199). * pptp: fix pptp_xmit() error path (git-fixes). * printk: nbcon: Allow reacquire during panic (bsc#1246688). * psample: adjust size if rate_as_probability is set (git-fixes). * ptp: fix breakage after ptp_vclock_in_use() rework (git-fixes). * pwm: berlin: Fix wrong register in suspend/resume (git-fixes). * pwm: imx-tpm: Reset counter if CMOD is 0 (git-fixes). * pwm: mediatek: Fix duty and period setting (git-fixes). * pwm: mediatek: Handle hardware enable and clock enable separately (stable- fixes). * pwm: rockchip: Round period/duty down on apply, up on get (git-fixes). * pwm: tiehrpwm: Do not drop runtime PM reference in .free() (git-fixes). * pwm: tiehrpwm: Fix corner case in clock divisor calculation (git-fixes). * pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation (git- fixes). * pwm: tiehrpwm: Make code comment in .free() more useful (git-fixes). * r8169: add support for RTL8125D (stable-fixes). * r8169: disable RTL8126 ZRX-DC timeout (stable-fixes). * r8169: do not scan PHY addresses > 0 (stable-fixes). * rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes) * regmap: Remove superfluous check for !config in __regmap_init() (git-fixes). * regulator: core: fix NULL dereference on unbind due to stale coupling data (stable-fixes). * regulator: scmi: Use int type to store negative error codes (git-fixes). * regulator: sy7636a: fix lifecycle of power good gpio (git-fixes). * reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes). * reset: eyeq: fix OF node leak (git-fixes). * resource: Add resource set range and size helpers (jsc#PED-13728 jsc#PED-13762). * resource: fix false warning in __request_region() (git-fixes). * ring-buffer: Do not allow events in NMI with generic atomic64 cmpxchg() (git-fixes). * ring-buffer: Make reading page consistent with the code logic (git-fixes). * rpm/config.sh: SLFO 1.2 is now synced to OBS as well * rtc: ds1307: fix incorrect maximum clock rate handling (git-fixes). * rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes). * rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable- fixes). * rtc: hym8563: fix incorrect maximum clock rate handling (git-fixes). * rtc: nct3018y: fix incorrect maximum clock rate handling (git-fixes). * rtc: optee: fix memory leak on driver removal (git-fixes). * rtc: pcf85063: fix incorrect maximum clock rate handling (git-fixes). * rtc: pcf8563: fix incorrect maximum clock rate handling (git-fixes). * rtc: rv3028: fix incorrect maximum clock rate handling (git-fixes). * rtc: x1205: Fix Xicor X1205 vendor prefix (git-fixes). * s390/ap: Unmask SLCF bit in card and queue ap functions sysfs (git-fixes bsc#1247837). * s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again (git-fixes bsc#1246868). * s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes bsc#1249477). * s390/early: Copy last breaking event address to pt_regs (git-fixes bsc#1249061). * s390/hypfs: Avoid unnecessary ioctl registration in debugfs (bsc#1248727 git-fixes). * s390/hypfs: Enable limited access during lockdown (bsc#1248727 git-fixes). * s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1247372). * s390/mm: Allocate page table with PAGE_SIZE granularity (git-fixes bsc#1247838). * s390/mm: Do not map lowcore with identity mapping (git-fixes bsc#1249066). * s390/mm: Remove possible false-positive warning in pte_free_defer() (git- fixes bsc#1247366). * s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249478). * s390/pci: Allow automatic recovery with minimal driver support (bsc#1248728 git-fixes). * s390/sclp: Fix SCCB present check (git-fixes bsc#1249065). * s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249062). * s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249064). * samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora (git-fixes). * samples: mei: Fix building on musl libc (git-fixes). * sched/deadline: Always stop dl-server before changing parameters (bsc#1247936). * sched/deadline: Do not count nr_running for dl_server proxy tasks (git- fixes, bsc#1247936). * sched/deadline: Fix RT task potential starvation when expiry time passed (git-fixes, bsc#1247936). * sched/deadline: Fix dl_server_stopped() (bsc#1247936). * sched/deadline: Initialize dl_servers after SMP (git-fixes) * sched_ext, sched/core: Do not call scx_group_set_weight() (git-fixes) * scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes). * scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes). * scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes). * scsi: fc: Avoid -Wflex-array-member-not-at-end warnings (bsc#1250519). * scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes). * scsi: isci: Fix dma_unmap_sg() nents value (git-fixes). * scsi: lpfc: Abort outstanding ELS WQEs regardless of if rmmod is in progress (bsc#1250519). * scsi: lpfc: Check return status of lpfc_reset_flush_io_context during TGT_RESET (bsc#1250519). * scsi: lpfc: Clean up allocated queues when queue setup mbox commands fail (bsc#1250519). * scsi: lpfc: Clean up extraneous phba dentries (bsc#1250519). * scsi: lpfc: Convert debugfs directory counts from atomic to unsigned int (bsc#1250519). * scsi: lpfc: Copyright updates for 14.4.0.11 patches (bsc#1250519). * scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted (bsc#1250519). * scsi: lpfc: Define size of debugfs entry for xri rebalancing (bsc#1250519). * scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point topology (bsc#1250519). * scsi: lpfc: Fix buffer free/clear order in deferred receive path (bsc#1250519). * scsi: lpfc: Fix wrong function reference in a comment (bsc#1250519). * scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in lpfc_cleanup (bsc#1250519). * scsi: lpfc: Remove redundant assignment to avoid memory leak (bsc#1250519). * scsi: lpfc: Remove unused member variables in struct lpfc_hba and lpfc_vport (bsc#1250519). * scsi: lpfc: Update lpfc version to 14.4.0.11 (bsc#1250519). * scsi: lpfc: Use int type to store negative error codes (bsc#1250519). * scsi: lpfc: Use switch case statements in DIF debugfs handlers (bsc#1250519). * scsi: lpfc: use min() to improve code (bsc#1250519). * scsi: mpi3mr: Event processing debug improvement (bsc#1251186). * scsi: mpi3mr: Fix I/O failures during controller reset (bsc#1251186). * scsi: mpi3mr: Fix controller init failure on fault during queue creation (bsc#1251186). * scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link speed (bsc#1251186). * scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes). * scsi: mpi3mr: Fix premature TM timeouts on virtual drives (bsc#1251186). * scsi: mpi3mr: Fix race between config read submit and interrupt completion (git-fixes). * scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git- fixes). * scsi: mpi3mr: Update MPI headers to revision 37 (bsc#1251186). * scsi: mpi3mr: Update driver version to 8.15.0.5.50 (bsc#1251186). * scsi: mpt3sas: Fix a fw_event memory leak (git-fixes). * scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes). * scsi: qla2xxx: Avoid stack frame size warning in qla_dfs (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES() (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp() (git-fixes). * scsi: qla2xxx: Remove firmware URL (git-fixes). * scsi: qla2xxx: Use secs_to_jiffies() instead of msecs_to_jiffies() (git- fixes). * scsi: qla2xxx: edif: Fix incorrect sign of error code (git-fixes). * scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes). * scsi: smartpqi: Enhance WWID logging logic (bsc#1246631). * scsi: smartpqi: Take drives offline when controller is offline (bsc#1246631). * scsi: smartpqi: Update driver version to 2.1.34-035 (bsc#1246631). * scsi: ufs: Fix toggling of clk_gating.state when clock gating is not allowed (git-fixes). * scsi: ufs: Introduce quirk to extend PA_HIBERN8TIME for UFS devices (git- fixes). * scsi: ufs: bsg: Delete bsg_dev when setting up bsg fails (git-fixes). * scsi: ufs: core: Add missing post notify for power mode change (git-fixes). * scsi: ufs: core: Add ufshcd_send_bsg_uic_cmd() for UFS BSG (git-fixes). * scsi: ufs: core: Always initialize the UIC done completion (git-fixes). * scsi: ufs: core: Do not perform UFS clkscaling during host async scan (git- fixes). * scsi: ufs: core: Fix clk scaling to be conditional in reset and restore (git-fixes). * scsi: ufs: core: Fix error return with query response (git-fixes). * scsi: ufs: core: Fix spelling of a sysfs attribute name (git-fixes). * scsi: ufs: core: Fix ufshcd_is_ufs_dev_busy() and ufshcd_eh_timed_out() (git-fixes). * scsi: ufs: core: Honor runtime/system PM levels if set by host controller drivers (git-fixes). * scsi: ufs: core: Improve ufshcd_mcq_sq_cleanup() (git-fixes). * scsi: ufs: core: Introduce ufshcd_has_pending_tasks() (git-fixes). * scsi: ufs: core: Prepare to introduce a new clock_gating lock (git-fixes). * scsi: ufs: core: Remove redundant query_complete trace (git-fixes). * scsi: ufs: core: Set default runtime/system PM levels before ufshcd_hba_init() (git-fixes). * scsi: ufs: core: Update compl_time_stamp_local_clock after completing a cqe (git-fixes). * scsi: ufs: core: Use link recovery when h8 exit fails during runtime resume (git-fixes). * scsi: ufs: exynos: Add check inside exynos_ufs_config_smu() (git-fixes). * scsi: ufs: exynos: Add gs101_ufs_drv_init() hook and enable WriteBooster (git-fixes). * scsi: ufs: exynos: Enable PRDT pre-fetching with UFSHCD_CAP_CRYPTO (git- fixes). * scsi: ufs: exynos: Ensure consistent phy reference counts (git-fixes). * scsi: ufs: exynos: Ensure pre_link() executes before exynos_ufs_phy_init() (git-fixes). * scsi: ufs: exynos: Fix hibern8 notify callbacks (git-fixes). * scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (git-fixes). * scsi: ufs: exynos: Move UFS shareability value to drvdata (git-fixes). * scsi: ufs: exynos: Move phy calls to .exit() callback (git-fixes). * scsi: ufs: exynos: Remove empty drv_init method (git-fixes). * scsi: ufs: exynos: Remove superfluous function parameter (git-fixes). * scsi: ufs: exynos: gs101: Put UFS device in reset on .suspend() (git-fixes). * scsi: ufs: mcq: Delete ufshcd_release_scsi_cmd() in ufshcd_mcq_abort() (git- fixes). * scsi: ufs: pltfrm: Disable runtime PM during removal of glue drivers (git- fixes). * scsi: ufs: pltfrm: Drop PM runtime reference count after ufshcd_remove() (git-fixes). * scsi: ufs: qcom: Fix crypto key eviction (git-fixes). * scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get (git- fixes). * scsi: ufs: ufs-pci: Fix default runtime and system PM levels (git-fixes). * scsi: ufs: ufs-pci: Fix hibernate state transition for Intel MTL-like host controllers (git-fixes). * seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too fast (git-fixes bsc#1250671). * selftest/livepatch: Only run test-kprobe with CONFIG_KPROBES_ON_FTRACE (poo#187320). * selftests/cpufreq: Fix cpufreq basic read and update testcases (bsc#1250344). * selftests/livepatch: Ignore NO_SUPPORT line in dmesg (poo#187320). * selftests/livepatch: Replace hardcoded module name with variable in test- callbacks.sh (poo#187320). * selftests/run_kselftest.sh: Fix help string for --per-test-log (poo#187320). * selftests/run_kselftest.sh: Use readlink if realpath is not available (poo#187320). * selftests/tracing: Fix false failure of subsystem event test (git-fixes). * selftests: ALSA: fix memory leak in utimer test (git-fixes). * selftests: livepatch: add new ftrace helpers functions (poo#187320). * selftests: livepatch: add test cases of stack_order sysfs interface (poo#187320). * selftests: livepatch: handle PRINTK_CALLER in check_result() (poo#187320). * selftests: livepatch: rename KLP_SYSFS_DIR to SYSFS_KLP_DIR (poo#187320). * selftests: livepatch: save and restore kprobe state (poo#187320). * selftests: livepatch: test if ftrace can trace a livepatched function (poo#187320). * selftests: livepatch: test livepatching a kprobed function (poo#187320). * selftests: ncdevmem: Move ncdevmem under drivers/net/hw (poo#187443). * selinux: change security_compute_sid to return the ssid or tsid on match (git-fixes). * selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len (stable- fixes). * serial: 8250: Touch watchdogs in write_atomic() (bsc#1246688). * serial: 8250: fix panic due to PSLVERR (git-fixes). * serial: max310x: Add error checking in probe() (git-fixes). * serial: sc16is7xx: fix bug in flow control levels init (git-fixes). * skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650). * slab: Decouple slab_debug and no_hash_pointers (bsc#1249022). * smb: client: fix crypto buffers in non-linear memory (bsc#1250491, boo#1239206). * smb: client: fix netns refcount leak after net_passive changes (git-fixes). * soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS (git-fixes). * soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes). * soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure (git- fixes). * soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure (git- fixes). * soc: qcom: QMI encoding/decoding for big endian (git-fixes). * soc: qcom: fix endianness for QMI header (git-fixes). * soc: qcom: mdt_loader: Actually use the e_phoff (stable-fixes). * soc: qcom: mdt_loader: Deal with zero e_shentsize (git-fixes). * soc: qcom: mdt_loader: Ensure we do not read past the ELF header (git- fixes). * soc: qcom: mdt_loader: Fix error return values in mdt_header_valid() (git- fixes). * soc: qcom: pmic_glink: fix OF node leak (git-fixes). * soc: qcom: rpmh-rsc: Add RSC version 4 support (stable-fixes). * soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS (git-fixes). * soundwire: Move handle_nested_irq outside of sdw_dev_lock (stable-fixes). * soundwire: amd: cancel pending slave status handling workqueue during remove sequence (stable-fixes). * soundwire: amd: fix for handling slave alerts after link is down (git- fixes). * soundwire: amd: serialize amd manager resume sequence during pm_prepare (stable-fixes). * soundwire: stream: restore params when prepare ports fail (git-fixes). * spi: bcm2835: Remove redundant semicolons (git-fixes). * spi: cadence-quadspi: Fix cqspi_setup_flash() (git-fixes). * spi: cadence-quadspi: Flush posted register writes before DAC access (git- fixes). * spi: cadence-quadspi: Flush posted register writes before INDAC access (git- fixes). * spi: cadence-quadspi: fix cleanup of rx_chan on failure paths (stable- fixes). * spi: cs42l43: Property entry should be a null-terminated array (bsc#1246979). * spi: fix return code when spi device has too many chipselects (git-fixes). * spi: mtk-snfi: Remove redundant semicolons (git-fixes). * spi: spi-fsl-lpspi: Clamp too high speed_hz (git-fixes). * spi: spi-fsl-lpspi: Clear status register after disabling the module (git- fixes). * spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes). * spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git- fixes). * spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes). * spi: stm32: Check for cfg availability in stm32_spi_probe (git-fixes). * sprintf.h requires stdarg.h (git-fixes). * sprintf.h: mask additional include (git-fixes). * squashfs: fix memory leak in squashfs_fill_super (git-fixes). * staging: axis-fifo: fix TX handling on copy_from_user() failure (git-fixes). * staging: axis-fifo: fix maximum TX packet length check (git-fixes). * staging: axis-fifo: flush RX FIFO on read errors (git-fixes). * staging: axis-fifo: remove sysfs interface (git-fixes). * staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() (git- fixes). * staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (git-fixes). * staging: nvec: Fix incorrect null termination of battery manufacturer (git- fixes). * staging: vchiq_arm: Make vchiq_shutdown never fail (git-fixes). * struct cdc_ncm_ctx: move new member to end (git-fixes). * sunrpc: fix client side handling of tls alerts (git-fixes). * sunrpc: fix handling of server side tls alerts (git-fixes). * sunrpc: fix null pointer dereference on zero-length checksum (git-fixes). * sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes). * supported.conf: Mark ZL3073X modules supported * supported.conf: mark hyperv_drm as external * tcp: call tcp_measure_rcv_mss() for ooo packets (git-fixes). * tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650). * thermal/drivers/mediatek/lvts_thermal: Add lvts commands and their sizes to driver data (stable-fixes). * thermal/drivers/mediatek/lvts_thermal: Add mt7988 lvts commands (stable- fixes). * thermal/drivers/mediatek/lvts_thermal: Change lvts commands array to static const (stable-fixes). * thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required (stable-fixes). * thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes). * thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes). * thunderbolt: Compare HMAC values in constant time (git-fixes). * thunderbolt: Fix copy+paste error in match_service_id() (git-fixes). * tools/power turbostat: Clustered Uncore MHz counters should honor show/hide options (stable-fixes). * tools/power turbostat: Fix bogus SysWatt for forked program (git-fixes). * tools/power turbostat: Fix build with musl (stable-fixes). * tools/power turbostat: Handle cap_get_proc() ENOSYS (stable-fixes). * tools/power turbostat: Handle non-root legacy-uncore sysfs permissions (stable-fixes). * tools/resolve_btfids: Fix build when cross compiling kernel with clang (git- fixes). * tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single (git-fixes). * trace/fgraph: Fix error handling (git-fixes). * trace/ring-buffer: Do not use TP_printk() formatting for boot mapped buffers (git-fixes). * tracepoint: Print the function symbol when tracepoint_debug is set (jsc#PED-13631). * tracing/kprobe: Make trace_kprobe's module callback called after jump_label update (git-fixes). * tracing/kprobes: Fix to free objects when failed to copy a symbol (git- fixes). * tracing: Correct the refcount if the hist/hist_debug file fails to open (git-fixes). * tracing: Fix filter string testing (git-fixes). * tracing: Fix using ret variable in tracing_set_tracer() (git-fixes). * tracing: Remove unneeded goto out logic (bsc#1249286). * tracing: Switch trace.c code over to use guard() (git-fixes). * tracing: Switch trace_events_hist.c code over to use guard() (git-fixes). * tracing: fprobe events: Fix possible UAF on modules (git-fixes). * tracing: tprobe-events: Fix leakage of module refcount (git-fixes). * tty: hvc_console: Call hvc_kick in hvc_write unconditionally (bsc#1230062). * tty: n_gsm: Do not block input queue by waiting MSC (git-fixes). * tty: serial: fix print format specifiers (stable-fixes). * ublk: sanity check add_dev input for underflow (git-fixes). * ublk: use vmalloc for ublk_device's __queues (git-fixes). * ucount: fix atomic_long_inc_below() argument type (git-fixes). * uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes). * usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init() (git-fixes). * usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call (git- fixes). * usb: core: Add 0x prefix to quirks debug output (stable-fixes). * usb: core: config: Prevent OOB read in SS endpoint companion parsing (stable-fixes). * usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE test (git-fixes). * usb: core: usb_submit_urb: downgrade type check (stable-fixes). * usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git- fixes). * usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable- fixes). * usb: dwc3: imx8mp: fix device leak at unbind (git-fixes). * usb: dwc3: meson-g12a: fix device leaks at unbind (git-fixes). * usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes). * usb: dwc3: qcom: Do not leave BCR asserted (git-fixes). * usb: early: xhci-dbc: Fix early_ioremap leak (git-fixes). * usb: gadget : fix use-after-free in composite_dev_cleanup() (git-fixes). * usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes). * usb: gadget: midi2: Fix MIDI2 IN EP max packet size (git-fixes). * usb: gadget: midi2: Fix missing UMP group attributes initialization (git- fixes). * usb: gadget: udc: renesas_usb3: fix device leak at unbind (git-fixes). * usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup (git- fixes). * usb: host: xhci-plat: fix incorrect type for of_match variable in xhci_plat_probe() (git-fixes). * usb: misc: apple-mfi-fastcharge: Make power supply names unique (git-fixes). * usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls (git- fixes). * usb: musb: omap2430: fix device leak at unbind (git-fixes). * usb: phy: twl6030: Fix incorrect type for ret (git-fixes). * usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive (stable-fixes). * usb: renesas-xhci: Fix External ROM access timeouts (git-fixes). * usb: storage: realtek_cr: Use correct byte order for bcs->Residue (git- fixes). * usb: typec: fusb302: cache PD RX state (git-fixes). * usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable- fixes). * usb: typec: maxim_contaminant: disable low power mode when reading comparator values (git-fixes). * usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is clean (git-fixes). * usb: typec: tcpm/tcpci_maxim: fix irq wake usage (stable-fixes). * usb: typec: tcpm: allow switching to mode accessory to mux properly (stable- fixes). * usb: typec: tcpm: allow to use sink in accessory mode (stable-fixes). * usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach (git- fixes). * usb: typec: tcpm: properly deliver cable vdms to altmode drivers (git- fixes). * usb: typec: tipd: Clear interrupts first (git-fixes). * usb: typec: ucsi: Update power_supply on power role change (git-fixes). * usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default (stable-fixes). * usb: typec: ucsi: yoga-c630: fix error and remove paths (git-fixes). * usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes). * usb: xhci: Avoid showing errors during surprise removal (stable-fixes). * usb: xhci: Avoid showing warnings for dying controller (stable-fixes). * usb: xhci: Fix slot_id resource race conflict (git-fixes). * usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command (stable-fixes). * usb: xhci: print xhci->xhc_state when queue_command failed (stable-fixes). * use uniform permission checks for all mount propagation changes (git-fixes). * vdpa/mlx5: Fix needs_teardown flag calculation (git-fixes). * vdpa: Fix IDR memory leak in VDUSE module exit (git-fixes). * vhost-scsi: Fix log flooding with target does not exist errors (git-fixes). * vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() (git- fixes). * vhost/vsock: Avoid allocating arbitrarily-sized SKBs (git-fixes). * vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER (git-fixes). * vhost: Reintroduce kthread API and add mode selection (git-fixes). * vhost: fail early when __vhost_add_used() fails (git-fixes). * virtchnl2: add flow steering support (jsc#PED-13728). * virtchnl2: rename enum virtchnl2_cap_rss (jsc#PED-13728). * virtchnl: add PTP virtchnl definitions (jsc#PED-13728 jsc#PED-13762). * virtio_net: Enforce minimum TX ring size for reliability (git-fixes). * virtio_ring: Fix error reporting in virtqueue_resize (git-fixes). * vmci: Prevent the dispatching of uninitialized payloads (git-fixes). * vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page (git-fixes). * vsock/virtio: Validate length in packet header before skb_put() (git-fixes). * vt: defkeymap: Map keycodes above 127 to K_HOLE (git-fixes). * vt: keyboard: Do not process Unicode characters in K_OFF mode (git-fixes). * watchdog: dw_wdt: Fix default timeout (stable-fixes). * watchdog: iTCO_wdt: Report error if timeout configuration fails (stable- fixes). * watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the watchdog (git-fixes). * watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race condition (stable-fixes). * watchdog: ziirave_wdt: check record length in ziirave_firm_verify() (git- fixes). * wifi: ath10k: avoid unnecessary wait for service ready message (git-fixes). * wifi: ath10k: shutdown driver when hardware is unreliable (stable-fixes). * wifi: ath11k: HAL SRNG: do not deinitialize and re-initialize again (git- fixes). * wifi: ath11k: clear initialized flag for deinit-ed srng lists (git-fixes). * wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() (git-fixes). * wifi: ath11k: fix dest ring-buffer corruption (git-fixes). * wifi: ath11k: fix dest ring-buffer corruption when ring is full (git-fixes). * wifi: ath11k: fix group data packet drops during rekey (git-fixes). * wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() (git-fixes). * wifi: ath11k: fix source ring-buffer corruption (git-fixes). * wifi: ath11k: fix suspend use-after-free after probe failure (git-fixes). * wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952). * wifi: ath12k: Add memset and update default rate value in wmi tx completion (stable-fixes). * wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes). * wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable- fixes). * wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0 (stable-fixes). * wifi: ath12k: Fix station association with MBSSID Non-TX BSS (stable-fixes). * wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() (git-fixes). * wifi: ath12k: fix dest ring-buffer corruption (git-fixes). * wifi: ath12k: fix dest ring-buffer corruption when ring is full (git-fixes). * wifi: ath12k: fix endianness handling while accessing wmi service bit (git- fixes). * wifi: ath12k: fix memory leak in ath12k_pci_remove() (stable-fixes). * wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (git-fixes). * wifi: ath12k: fix source ring-buffer corruption (git-fixes). * wifi: ath12k: fix the fetching of combined rssi (git-fixes). * wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes). * wifi: ath12k: fix wrong logging ID used for CE (git-fixes). * wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE (git-fixes). * wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work (git-fixes). * wifi: brcmsmac: Remove const from tbl_ptr parameter in wlc_lcnphy_common_read_table() (git-fixes). * wifi: cfg80211: Fix interface type validation (stable-fixes). * wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes). * wifi: cfg80211: reject HTC bit for management frames (stable-fixes). * wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git- fixes). * wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes). * wifi: iwlegacy: Check rate_idx range after addition (stable-fixes). * wifi: iwlwifi: Add missing firmware info for bz-b0-* models (bsc#1252084). * wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (git-fixes). * wifi: iwlwifi: Fix memory leak in iwl_mvm_init() (git-fixes). * wifi: iwlwifi: Remove redundant header files (git-fixes). * wifi: iwlwifi: config: unify fw/pnvm MODULE_FIRMWARE (bsc#1252084). * wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable- fixes). * wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable- fixes). * wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn (stable-fixes). * wifi: iwlwifi: mvm: fix scan request validation (stable-fixes). * wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes). * wifi: iwlwifi: return ERR_PTR from opmode start() (stable-fixes). * wifi: iwlwifi: uefi: check DSM item validity (git-fixes). * wifi: libertas: cap SSID len in lbs_associate() (git-fixes). * wifi: mac80211: Check 802.11 encaps offloading in ieee80211_tx_h_select_key() (git-fixes). * wifi: mac80211: Do not call fq_flow_idx() for management frames (git-fixes). * wifi: mac80211: Do not schedule stopped TXQs (git-fixes). * wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon() (git-fixes). * wifi: mac80211: avoid weird state in error path (stable-fixes). * wifi: mac80211: do not complete management TX on SAE commit (stable-fixes). * wifi: mac80211: do not unreserve never reserved chanctx (stable-fixes). * wifi: mac80211: fix Rx packet handling when pubsta information is not available (git-fixes). * wifi: mac80211: fix incorrect type for ret (stable-fixes). * wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes). * wifi: mac80211: increase scan_ies_len for S1G (stable-fixes). * wifi: mac80211: reject TDLS operations when station is not associated (git- fixes). * wifi: mac80211: update radar_required in channel context after channel switch (stable-fixes). * wifi: mt76: fix linked list corruption (git-fixes). * wifi: mt76: fix potential memory leak in mt76_wmac_probe() (git-fixes). * wifi: mt76: free pending offchannel tx frames on wcid cleanup (git-fixes). * wifi: mt76: mt7915: fix mt7981 pre-calibration (git-fixes). * wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes). * wifi: mt76: mt7925: adjust rm BSS flow to prevent next connection failure (git-fixes). * wifi: mt76: mt7925: fix locking in mt7925_change_vif_links() (git-fixes). * wifi: mt76: mt7925: fix the wrong bss cleanup for SAP (git-fixes). * wifi: mt76: mt7925u: use connac3 tx aggr check in tx complete (git-fixes). * wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE (git-fixes). * wifi: mt76: mt7996: Fix RX packets configuration for primary WED device (git-fixes). * wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git- fixes). * wifi: mt76: prevent non-offchannel mgmt tx during scan/roc (git-fixes). * wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes). * wifi: mwifiex: send world regulatory domain to driver (git-fixes). * wifi: nl80211: Set num_sub_specs before looping through sub_specs (git- fixes). * wifi: plfxlc: Fix error handling in usb driver probe (git-fixes). * wifi: rtl818x: Kill URBs before clearing tx status queue (git-fixes). * wifi: rtl8xxxu: Do not claim USB ID 07b8:8188 (stable-fixes). * wifi: rtl8xxxu: Fix RX skb size for aggregation disabled (git-fixes). * wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc() (stable-fixes). * wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()` (stable-fixes). * wifi: rtlwifi: rtl8192cu: Do not claim USB ID 07b8:8188 (stable-fixes). * wifi: rtw88: Fix macid assigned to TDLS station (git-fixes). * wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes). * wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable- fixes). * wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band (git-fixes). * wifi: rtw89: avoid circular locking dependency in ser_state_run() (git- fixes). * wifi: rtw89: scan abort when assign/unassign_vif (stable-fixes). * wifi: rtw89: wow: Add Basic Rate IE to probe request in scheduled scan mode (stable-fixes). * wifi: virt_wifi: Fix page fault on connect (stable-fixes). * wifi: wilc1000: avoid buffer overflow in WID string configuration (stable- fixes). * writeback: Avoid contention on wb->list_lock when switching inodes (bsc#1237776). * writeback: Avoid contention on wb->list_lock when switching inodes (kABI fixup) (bsc#1237776). * writeback: Avoid excessively long inode switching times (bsc#1237776). * writeback: Avoid softlockup when switching many inodes (bsc#1237776). * x86/CPU/AMD: Add CPUID faulting support (jsc#PED-13704). * x86/Kconfig: Add arch attack vector support (git-fixes). * x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes). * x86/boot: Sanitize boot params before parsing command line (git-fixes). * x86/bugs: Add SRSO_MITIGATION_NOSMT (git-fixes). * x86/bugs: Add attack vector controls for BHI (git-fixes). * x86/bugs: Add attack vector controls for GDS (git-fixes). * x86/bugs: Add attack vector controls for ITS (git-fixes). * x86/bugs: Add attack vector controls for L1TF (git-fixes). * x86/bugs: Add attack vector controls for MDS (git-fixes). * x86/bugs: Add attack vector controls for MMIO (git-fixes). * x86/bugs: Add attack vector controls for RFDS (git-fixes). * x86/bugs: Add attack vector controls for SRBDS (git-fixes). * x86/bugs: Add attack vector controls for SRSO (git-fixes). * x86/bugs: Add attack vector controls for SSB (git-fixes). * x86/bugs: Add attack vector controls for TAA (git-fixes). * x86/bugs: Add attack vector controls for TSA (git-fixes). * x86/bugs: Add attack vector controls for retbleed (git-fixes). * x86/bugs: Add attack vector controls for spectre_v1 (git-fixes). * x86/bugs: Add attack vector controls for spectre_v2 (git-fixes). * x86/bugs: Add attack vector controls for spectre_v2_user (git-fixes). * x86/bugs: Allow ITS stuffing in eIBRS+retpoline mode also (git-fixes). * x86/bugs: Avoid AUTO after the select step in the retbleed mitigation (git- fixes). * x86/bugs: Avoid warning when overriding return thunk (git-fixes). * x86/bugs: Clean up SRSO microcode handling (git-fixes). * x86/bugs: Define attack vectors relevant for each bug (git-fixes). * x86/bugs: Fix GDS mitigation selecting when mitigation is off (git-fixes). * x86/bugs: Introduce cdt_possible() (git-fixes). * x86/bugs: Print enabled attack vectors (git-fixes). * x86/bugs: Remove its=stuff dependency on retbleed (git-fixes). * x86/bugs: Select best SRSO mitigation (git-fixes). * x86/bugs: Simplify the retbleed=stuff checks (git-fixes). * x86/bugs: Use IBPB for retbleed if used by SRSO (git-fixes). * x86/bugs: Use switch/case in its_apply_mitigation() (git-fixes). * x86/cacheinfo: Properly parse CPUID(0x80000005) L1d/L1i associativity (git- fixes). * x86/cacheinfo: Properly parse CPUID(0x80000006) L2/L3 associativity (git- fixes). * x86/cpu: Sanitize CPUID(0x80000000) output (git-fixes). * x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes). * x86/fpu/xstate: Fix inconsistencies in guest FPU xfeatures (git-fixes). * x86/fpu: Avoid copying dynamic FP state from init_task in arch_dup_task_struct() (git-fixes). * x86/fpu: Delay instruction pointer fixup until after warning (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/fpu: Fully optimize out WARN_ON_FPU() (git-fixes). * x86/fpu: Refactor xfeature bitmask update code for sigframe XSAVE (git- fixes). * x86/fred/signal: Prevent immediate repeat of single step trap on return from SIGTRAP handler (git-fixes). * x86/headers: Replace **ASSEMBLY** with **ASSEMBLER** in UAPI headers (git- fixes). * x86/locking: Use ALT_OUTPUT_SP() for percpu_{,try_}cmpxchg{64,128}_op() (git-fixes). * x86/mce/amd: Add default names for MCA banks and blocks (git-fixes). * x86/mce: Do not remove sysfs if thresholding sysfs init fails (git-fixes). * x86/mce: Ensure user polling settings are honored when restarting timer (git-fixes). * x86/mce: Make sure CMCI banks are cleared during shutdown on Intel (git- fixes). * x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes). * x86/microcode: Consolidate the loader enablement checking (git-fixes). * x86/microcode: Update the Intel processor flag scan check (git-fixes). * x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() (git-fixes). * x86/mm/pat: do not collapse pages without PSE set (git-fixes). * x86/nmi: Add an emergency handler in nmi_desc & use it in nmi_shootdown_cpus() (git-fixes). * x86/percpu: Disable named address spaces for UBSAN_BOOL with KASAN for GCC < 14.2 (git-fixes). * x86/pkeys: Simplify PKRU update in signal frame (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/pti: Add attack vector controls for PTI (git-fixes). * x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes). * x86/smp: Allow calling mwait_play_dead with an arbitrary hint (jsc#PED-13815). * x86/smp: Fix mwait_play_dead() and acpi_processor_ffh_play_dead() noreturn behavior (jsc#PED-13815). * x86/smp: PM/hibernate: Split arch_resume_nosmt() (jsc#PED-13815). * x86/smpboot: Fix INIT delay assignment for extended Intel Families (git- fixes). * x86/topology: Implement topology_is_core_online() to address SMT regression (jsc#PED-13815). * x86/traps: Initialize DR6 by writing its architectural reset value (git- fixes). * xen/gntdev: remove struct gntdev_copy_batch from stack (git-fixes). * xen/netfront: Fix TX response spurious interrupts (git-fixes). * xen: fix UAF in dmabuf_exp_from_pages() (git-fixes). * xfrm: replay: Fix the update of replay_esn->oseq_hi for GSO (git-fixes). * xfs: change xfs_xattr_class from a TRACE_EVENT() to DECLARE_EVENT_CLASS() (git-fixes). * xfs: do not propagate ENODATA disk errors into xattr code (git-fixes). * xfs: fix scrub trace with null pointer in quotacheck (git-fixes). * xfs: only create event xfs_file_compat_ioctl when CONFIG_COMPAT is configure (git-fixes). * xfs: remove unused event xfs_alloc_near_error (git-fixes). * xfs: remove unused event xfs_alloc_near_nominleft (git-fixes). * xfs: remove unused event xfs_attr_node_removename (git-fixes). * xfs: remove unused event xfs_ioctl_clone (git-fixes). * xfs: remove unused event xfs_pagecache_inval (git-fixes). * xfs: remove unused event xlog_iclog_want_sync (git-fixes). * xfs: remove unused trace event xfs_attr_remove_iter_return (git-fixes). * xfs: remove unused trace event xfs_attr_rmtval_set (git-fixes). * xfs: remove unused trace event xfs_discard_rtrelax (git-fixes). * xfs: remove unused trace event xfs_log_cil_return (git-fixes). * xfs: remove unused trace event xfs_reflink_cow_enospc (git-fixes). * xfs: remove unused xfs_attr events (git-fixes). * xfs: remove unused xfs_reflink_compare_extents events (git-fixes). * xfs: remove usused xfs_end_io_direct events (git-fixes). * xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes). * xhci: dbc: decouple endpoint allocation from initialization (git-fixes). * xhci: fix memory leak regression when freeing xhci vdev devices depth first (git-fixes). * xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes). * zram: permit only one post-processing operation at a time (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-HA-16.0-50=1 ## Package List: * SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x x86_64) * kernel-default-debuginfo-6.12.0-160000.6.1 * cluster-md-kmp-default-6.12.0-160000.6.1 * dlm-kmp-default-debuginfo-6.12.0-160000.6.1 * gfs2-kmp-default-6.12.0-160000.6.1 * kernel-default-debugsource-6.12.0-160000.6.1 * gfs2-kmp-default-debuginfo-6.12.0-160000.6.1 * dlm-kmp-default-6.12.0-160000.6.1 * cluster-md-kmp-default-debuginfo-6.12.0-160000.6.1 * SUSE Linux Enterprise Server High Availability Extension 16.0 (nosrc) * kernel-default-6.12.0-160000.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-57891.html * https://www.suse.com/security/cve/CVE-2024-57951.html * https://www.suse.com/security/cve/CVE-2024-57952.html * https://www.suse.com/security/cve/CVE-2024-58090.html * https://www.suse.com/security/cve/CVE-2025-22034.html * https://www.suse.com/security/cve/CVE-2025-22077.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37821.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37856.html * https://www.suse.com/security/cve/CVE-2025-37861.html * https://www.suse.com/security/cve/CVE-2025-37864.html * https://www.suse.com/security/cve/CVE-2025-38006.html * https://www.suse.com/security/cve/CVE-2025-38008.html * https://www.suse.com/security/cve/CVE-2025-38019.html * https://www.suse.com/security/cve/CVE-2025-38034.html * https://www.suse.com/security/cve/CVE-2025-38038.html * https://www.suse.com/security/cve/CVE-2025-38052.html * https://www.suse.com/security/cve/CVE-2025-38058.html * https://www.suse.com/security/cve/CVE-2025-38062.html * https://www.suse.com/security/cve/CVE-2025-38075.html * https://www.suse.com/security/cve/CVE-2025-38087.html * https://www.suse.com/security/cve/CVE-2025-38088.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38090.html * https://www.suse.com/security/cve/CVE-2025-38091.html * https://www.suse.com/security/cve/CVE-2025-38095.html * https://www.suse.com/security/cve/CVE-2025-38096.html * https://www.suse.com/security/cve/CVE-2025-38098.html * https://www.suse.com/security/cve/CVE-2025-38099.html * https://www.suse.com/security/cve/CVE-2025-38101.html * https://www.suse.com/security/cve/CVE-2025-38102.html * https://www.suse.com/security/cve/CVE-2025-38103.html * https://www.suse.com/security/cve/CVE-2025-38106.html * https://www.suse.com/security/cve/CVE-2025-38107.html * https://www.suse.com/security/cve/CVE-2025-38108.html * https://www.suse.com/security/cve/CVE-2025-38109.html * https://www.suse.com/security/cve/CVE-2025-38110.html * https://www.suse.com/security/cve/CVE-2025-38111.html * https://www.suse.com/security/cve/CVE-2025-38112.html * https://www.suse.com/security/cve/CVE-2025-38113.html * https://www.suse.com/security/cve/CVE-2025-38114.html * https://www.suse.com/security/cve/CVE-2025-38117.html * https://www.suse.com/security/cve/CVE-2025-38118.html * https://www.suse.com/security/cve/CVE-2025-38119.html * https://www.suse.com/security/cve/CVE-2025-38120.html * https://www.suse.com/security/cve/CVE-2025-38122.html * https://www.suse.com/security/cve/CVE-2025-38123.html * https://www.suse.com/security/cve/CVE-2025-38124.html * https://www.suse.com/security/cve/CVE-2025-38125.html * https://www.suse.com/security/cve/CVE-2025-38127.html * https://www.suse.com/security/cve/CVE-2025-38128.html * https://www.suse.com/security/cve/CVE-2025-38129.html * https://www.suse.com/security/cve/CVE-2025-38134.html * https://www.suse.com/security/cve/CVE-2025-38135.html * https://www.suse.com/security/cve/CVE-2025-38136.html * https://www.suse.com/security/cve/CVE-2025-38137.html * https://www.suse.com/security/cve/CVE-2025-38138.html * https://www.suse.com/security/cve/CVE-2025-38140.html * https://www.suse.com/security/cve/CVE-2025-38141.html * https://www.suse.com/security/cve/CVE-2025-38142.html * https://www.suse.com/security/cve/CVE-2025-38143.html * https://www.suse.com/security/cve/CVE-2025-38145.html * https://www.suse.com/security/cve/CVE-2025-38146.html * https://www.suse.com/security/cve/CVE-2025-38148.html * https://www.suse.com/security/cve/CVE-2025-38149.html * https://www.suse.com/security/cve/CVE-2025-38151.html * https://www.suse.com/security/cve/CVE-2025-38153.html * https://www.suse.com/security/cve/CVE-2025-38154.html * https://www.suse.com/security/cve/CVE-2025-38155.html * https://www.suse.com/security/cve/CVE-2025-38156.html * https://www.suse.com/security/cve/CVE-2025-38157.html * https://www.suse.com/security/cve/CVE-2025-38159.html * https://www.suse.com/security/cve/CVE-2025-38160.html * https://www.suse.com/security/cve/CVE-2025-38161.html * https://www.suse.com/security/cve/CVE-2025-38165.html * https://www.suse.com/security/cve/CVE-2025-38168.html * https://www.suse.com/security/cve/CVE-2025-38169.html * https://www.suse.com/security/cve/CVE-2025-38170.html * https://www.suse.com/security/cve/CVE-2025-38172.html * https://www.suse.com/security/cve/CVE-2025-38173.html * https://www.suse.com/security/cve/CVE-2025-38174.html * https://www.suse.com/security/cve/CVE-2025-38177.html * https://www.suse.com/security/cve/CVE-2025-38180.html * https://www.suse.com/security/cve/CVE-2025-38181.html * https://www.suse.com/security/cve/CVE-2025-38182.html * https://www.suse.com/security/cve/CVE-2025-38184.html * https://www.suse.com/security/cve/CVE-2025-38185.html * https://www.suse.com/security/cve/CVE-2025-38186.html * https://www.suse.com/security/cve/CVE-2025-38188.html * https://www.suse.com/security/cve/CVE-2025-38189.html * https://www.suse.com/security/cve/CVE-2025-38190.html * https://www.suse.com/security/cve/CVE-2025-38193.html * https://www.suse.com/security/cve/CVE-2025-38197.html * https://www.suse.com/security/cve/CVE-2025-38198.html * https://www.suse.com/security/cve/CVE-2025-38201.html * https://www.suse.com/security/cve/CVE-2025-38205.html * https://www.suse.com/security/cve/CVE-2025-38208.html * https://www.suse.com/security/cve/CVE-2025-38209.html * https://www.suse.com/security/cve/CVE-2025-38211.html * https://www.suse.com/security/cve/CVE-2025-38213.html * https://www.suse.com/security/cve/CVE-2025-38214.html * https://www.suse.com/security/cve/CVE-2025-38215.html * https://www.suse.com/security/cve/CVE-2025-38216.html * https://www.suse.com/security/cve/CVE-2025-38217.html * https://www.suse.com/security/cve/CVE-2025-38220.html * https://www.suse.com/security/cve/CVE-2025-38222.html * https://www.suse.com/security/cve/CVE-2025-38224.html * https://www.suse.com/security/cve/CVE-2025-38225.html * https://www.suse.com/security/cve/CVE-2025-38226.html * https://www.suse.com/security/cve/CVE-2025-38227.html * https://www.suse.com/security/cve/CVE-2025-38228.html * https://www.suse.com/security/cve/CVE-2025-38229.html * https://www.suse.com/security/cve/CVE-2025-38231.html * https://www.suse.com/security/cve/CVE-2025-38232.html * https://www.suse.com/security/cve/CVE-2025-38233.html * https://www.suse.com/security/cve/CVE-2025-38234.html * https://www.suse.com/security/cve/CVE-2025-38242.html * https://www.suse.com/security/cve/CVE-2025-38244.html * https://www.suse.com/security/cve/CVE-2025-38245.html * https://www.suse.com/security/cve/CVE-2025-38246.html * https://www.suse.com/security/cve/CVE-2025-38249.html * https://www.suse.com/security/cve/CVE-2025-38251.html * https://www.suse.com/security/cve/CVE-2025-38253.html * https://www.suse.com/security/cve/CVE-2025-38255.html * https://www.suse.com/security/cve/CVE-2025-38256.html * https://www.suse.com/security/cve/CVE-2025-38257.html * https://www.suse.com/security/cve/CVE-2025-38258.html * https://www.suse.com/security/cve/CVE-2025-38259.html * https://www.suse.com/security/cve/CVE-2025-38263.html * https://www.suse.com/security/cve/CVE-2025-38265.html * https://www.suse.com/security/cve/CVE-2025-38267.html * https://www.suse.com/security/cve/CVE-2025-38268.html * https://www.suse.com/security/cve/CVE-2025-38270.html * https://www.suse.com/security/cve/CVE-2025-38272.html * https://www.suse.com/security/cve/CVE-2025-38273.html * https://www.suse.com/security/cve/CVE-2025-38274.html * https://www.suse.com/security/cve/CVE-2025-38275.html * https://www.suse.com/security/cve/CVE-2025-38277.html * https://www.suse.com/security/cve/CVE-2025-38278.html * https://www.suse.com/security/cve/CVE-2025-38286.html * https://www.suse.com/security/cve/CVE-2025-38287.html * https://www.suse.com/security/cve/CVE-2025-38288.html * https://www.suse.com/security/cve/CVE-2025-38289.html * https://www.suse.com/security/cve/CVE-2025-38290.html * https://www.suse.com/security/cve/CVE-2025-38291.html * https://www.suse.com/security/cve/CVE-2025-38292.html * https://www.suse.com/security/cve/CVE-2025-38293.html * https://www.suse.com/security/cve/CVE-2025-38299.html * https://www.suse.com/security/cve/CVE-2025-38300.html * https://www.suse.com/security/cve/CVE-2025-38301.html * https://www.suse.com/security/cve/CVE-2025-38302.html * https://www.suse.com/security/cve/CVE-2025-38303.html * https://www.suse.com/security/cve/CVE-2025-38304.html * https://www.suse.com/security/cve/CVE-2025-38305.html * https://www.suse.com/security/cve/CVE-2025-38306.html * https://www.suse.com/security/cve/CVE-2025-38307.html * https://www.suse.com/security/cve/CVE-2025-38311.html * https://www.suse.com/security/cve/CVE-2025-38312.html * https://www.suse.com/security/cve/CVE-2025-38313.html * https://www.suse.com/security/cve/CVE-2025-38315.html * https://www.suse.com/security/cve/CVE-2025-38317.html * https://www.suse.com/security/cve/CVE-2025-38318.html * https://www.suse.com/security/cve/CVE-2025-38319.html * https://www.suse.com/security/cve/CVE-2025-38322.html * https://www.suse.com/security/cve/CVE-2025-38323.html * https://www.suse.com/security/cve/CVE-2025-38326.html * https://www.suse.com/security/cve/CVE-2025-38332.html * https://www.suse.com/security/cve/CVE-2025-38335.html * https://www.suse.com/security/cve/CVE-2025-38336.html * https://www.suse.com/security/cve/CVE-2025-38337.html * https://www.suse.com/security/cve/CVE-2025-38338.html * https://www.suse.com/security/cve/CVE-2025-38339.html * https://www.suse.com/security/cve/CVE-2025-38341.html * https://www.suse.com/security/cve/CVE-2025-38342.html * https://www.suse.com/security/cve/CVE-2025-38343.html * https://www.suse.com/security/cve/CVE-2025-38344.html * https://www.suse.com/security/cve/CVE-2025-38345.html * https://www.suse.com/security/cve/CVE-2025-38348.html * https://www.suse.com/security/cve/CVE-2025-38349.html * https://www.suse.com/security/cve/CVE-2025-38350.html * https://www.suse.com/security/cve/CVE-2025-38351.html * https://www.suse.com/security/cve/CVE-2025-38352.html * https://www.suse.com/security/cve/CVE-2025-38353.html * https://www.suse.com/security/cve/CVE-2025-38354.html * https://www.suse.com/security/cve/CVE-2025-38355.html * https://www.suse.com/security/cve/CVE-2025-38356.html * https://www.suse.com/security/cve/CVE-2025-38359.html * https://www.suse.com/security/cve/CVE-2025-38360.html * https://www.suse.com/security/cve/CVE-2025-38361.html * https://www.suse.com/security/cve/CVE-2025-38362.html * https://www.suse.com/security/cve/CVE-2025-38363.html * https://www.suse.com/security/cve/CVE-2025-38364.html * https://www.suse.com/security/cve/CVE-2025-38365.html * https://www.suse.com/security/cve/CVE-2025-38368.html * https://www.suse.com/security/cve/CVE-2025-38369.html * https://www.suse.com/security/cve/CVE-2025-38371.html * https://www.suse.com/security/cve/CVE-2025-38372.html * https://www.suse.com/security/cve/CVE-2025-38373.html * https://www.suse.com/security/cve/CVE-2025-38374.html * https://www.suse.com/security/cve/CVE-2025-38375.html * https://www.suse.com/security/cve/CVE-2025-38376.html * https://www.suse.com/security/cve/CVE-2025-38377.html * https://www.suse.com/security/cve/CVE-2025-38380.html * https://www.suse.com/security/cve/CVE-2025-38381.html * https://www.suse.com/security/cve/CVE-2025-38382.html * https://www.suse.com/security/cve/CVE-2025-38383.html * https://www.suse.com/security/cve/CVE-2025-38384.html * https://www.suse.com/security/cve/CVE-2025-38385.html * https://www.suse.com/security/cve/CVE-2025-38386.html * https://www.suse.com/security/cve/CVE-2025-38387.html * https://www.suse.com/security/cve/CVE-2025-38389.html * https://www.suse.com/security/cve/CVE-2025-38390.html * https://www.suse.com/security/cve/CVE-2025-38391.html * https://www.suse.com/security/cve/CVE-2025-38392.html * https://www.suse.com/security/cve/CVE-2025-38393.html * https://www.suse.com/security/cve/CVE-2025-38395.html * https://www.suse.com/security/cve/CVE-2025-38396.html * https://www.suse.com/security/cve/CVE-2025-38397.html * https://www.suse.com/security/cve/CVE-2025-38399.html * https://www.suse.com/security/cve/CVE-2025-38400.html * https://www.suse.com/security/cve/CVE-2025-38401.html * https://www.suse.com/security/cve/CVE-2025-38402.html * https://www.suse.com/security/cve/CVE-2025-38403.html * https://www.suse.com/security/cve/CVE-2025-38404.html * https://www.suse.com/security/cve/CVE-2025-38405.html * https://www.suse.com/security/cve/CVE-2025-38406.html * https://www.suse.com/security/cve/CVE-2025-38408.html * https://www.suse.com/security/cve/CVE-2025-38409.html * https://www.suse.com/security/cve/CVE-2025-38410.html * https://www.suse.com/security/cve/CVE-2025-38412.html * https://www.suse.com/security/cve/CVE-2025-38413.html * https://www.suse.com/security/cve/CVE-2025-38414.html * https://www.suse.com/security/cve/CVE-2025-38415.html * https://www.suse.com/security/cve/CVE-2025-38416.html * https://www.suse.com/security/cve/CVE-2025-38417.html * https://www.suse.com/security/cve/CVE-2025-38418.html * https://www.suse.com/security/cve/CVE-2025-38419.html * https://www.suse.com/security/cve/CVE-2025-38420.html * https://www.suse.com/security/cve/CVE-2025-38421.html * https://www.suse.com/security/cve/CVE-2025-38424.html * https://www.suse.com/security/cve/CVE-2025-38425.html * https://www.suse.com/security/cve/CVE-2025-38426.html * https://www.suse.com/security/cve/CVE-2025-38427.html * https://www.suse.com/security/cve/CVE-2025-38428.html * https://www.suse.com/security/cve/CVE-2025-38429.html * https://www.suse.com/security/cve/CVE-2025-38430.html * https://www.suse.com/security/cve/CVE-2025-38436.html * https://www.suse.com/security/cve/CVE-2025-38438.html * https://www.suse.com/security/cve/CVE-2025-38439.html * https://www.suse.com/security/cve/CVE-2025-38440.html * https://www.suse.com/security/cve/CVE-2025-38441.html * https://www.suse.com/security/cve/CVE-2025-38443.html * https://www.suse.com/security/cve/CVE-2025-38444.html * https://www.suse.com/security/cve/CVE-2025-38445.html * https://www.suse.com/security/cve/CVE-2025-38446.html * https://www.suse.com/security/cve/CVE-2025-38448.html * https://www.suse.com/security/cve/CVE-2025-38449.html * https://www.suse.com/security/cve/CVE-2025-38450.html * https://www.suse.com/security/cve/CVE-2025-38451.html * https://www.suse.com/security/cve/CVE-2025-38453.html * https://www.suse.com/security/cve/CVE-2025-38454.html * https://www.suse.com/security/cve/CVE-2025-38455.html * https://www.suse.com/security/cve/CVE-2025-38456.html * https://www.suse.com/security/cve/CVE-2025-38457.html * https://www.suse.com/security/cve/CVE-2025-38458.html * https://www.suse.com/security/cve/CVE-2025-38459.html * https://www.suse.com/security/cve/CVE-2025-38460.html * https://www.suse.com/security/cve/CVE-2025-38461.html * https://www.suse.com/security/cve/CVE-2025-38462.html * https://www.suse.com/security/cve/CVE-2025-38463.html * https://www.suse.com/security/cve/CVE-2025-38464.html * https://www.suse.com/security/cve/CVE-2025-38465.html * https://www.suse.com/security/cve/CVE-2025-38466.html * https://www.suse.com/security/cve/CVE-2025-38467.html * https://www.suse.com/security/cve/CVE-2025-38468.html * https://www.suse.com/security/cve/CVE-2025-38470.html * https://www.suse.com/security/cve/CVE-2025-38472.html * https://www.suse.com/security/cve/CVE-2025-38473.html * https://www.suse.com/security/cve/CVE-2025-38474.html * https://www.suse.com/security/cve/CVE-2025-38475.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://www.suse.com/security/cve/CVE-2025-38478.html * https://www.suse.com/security/cve/CVE-2025-38480.html * https://www.suse.com/security/cve/CVE-2025-38481.html * https://www.suse.com/security/cve/CVE-2025-38482.html * https://www.suse.com/security/cve/CVE-2025-38483.html * https://www.suse.com/security/cve/CVE-2025-38484.html * https://www.suse.com/security/cve/CVE-2025-38485.html * https://www.suse.com/security/cve/CVE-2025-38487.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38489.html * https://www.suse.com/security/cve/CVE-2025-38490.html * https://www.suse.com/security/cve/CVE-2025-38491.html * https://www.suse.com/security/cve/CVE-2025-38493.html * https://www.suse.com/security/cve/CVE-2025-38494.html * https://www.suse.com/security/cve/CVE-2025-38495.html * https://www.suse.com/security/cve/CVE-2025-38496.html * https://www.suse.com/security/cve/CVE-2025-38497.html * https://www.suse.com/security/cve/CVE-2025-38499.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38503.html * https://www.suse.com/security/cve/CVE-2025-38506.html * https://www.suse.com/security/cve/CVE-2025-38508.html * https://www.suse.com/security/cve/CVE-2025-38514.html * https://www.suse.com/security/cve/CVE-2025-38524.html * https://www.suse.com/security/cve/CVE-2025-38526.html * https://www.suse.com/security/cve/CVE-2025-38527.html * https://www.suse.com/security/cve/CVE-2025-38528.html * https://www.suse.com/security/cve/CVE-2025-38531.html * https://www.suse.com/security/cve/CVE-2025-38533.html * https://www.suse.com/security/cve/CVE-2025-38539.html * https://www.suse.com/security/cve/CVE-2025-38544.html * https://www.suse.com/security/cve/CVE-2025-38545.html * https://www.suse.com/security/cve/CVE-2025-38546.html * https://www.suse.com/security/cve/CVE-2025-38549.html * https://www.suse.com/security/cve/CVE-2025-38552.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38554.html * https://www.suse.com/security/cve/CVE-2025-38555.html * https://www.suse.com/security/cve/CVE-2025-38556.html * https://www.suse.com/security/cve/CVE-2025-38557.html * https://www.suse.com/security/cve/CVE-2025-38559.html * https://www.suse.com/security/cve/CVE-2025-38560.html * https://www.suse.com/security/cve/CVE-2025-38563.html * https://www.suse.com/security/cve/CVE-2025-38564.html * https://www.suse.com/security/cve/CVE-2025-38565.html * https://www.suse.com/security/cve/CVE-2025-38566.html * https://www.suse.com/security/cve/CVE-2025-38568.html * https://www.suse.com/security/cve/CVE-2025-38571.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38573.html * https://www.suse.com/security/cve/CVE-2025-38574.html * https://www.suse.com/security/cve/CVE-2025-38576.html * https://www.suse.com/security/cve/CVE-2025-38581.html * https://www.suse.com/security/cve/CVE-2025-38582.html * https://www.suse.com/security/cve/CVE-2025-38583.html * https://www.suse.com/security/cve/CVE-2025-38584.html * https://www.suse.com/security/cve/CVE-2025-38585.html * https://www.suse.com/security/cve/CVE-2025-38586.html * https://www.suse.com/security/cve/CVE-2025-38587.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38591.html * https://www.suse.com/security/cve/CVE-2025-38593.html * https://www.suse.com/security/cve/CVE-2025-38595.html * https://www.suse.com/security/cve/CVE-2025-38597.html * https://www.suse.com/security/cve/CVE-2025-38601.html * https://www.suse.com/security/cve/CVE-2025-38602.html * https://www.suse.com/security/cve/CVE-2025-38604.html * https://www.suse.com/security/cve/CVE-2025-38605.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-38609.html * https://www.suse.com/security/cve/CVE-2025-38610.html * https://www.suse.com/security/cve/CVE-2025-38612.html * https://www.suse.com/security/cve/CVE-2025-38614.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38619.html * https://www.suse.com/security/cve/CVE-2025-38621.html * https://www.suse.com/security/cve/CVE-2025-38622.html * https://www.suse.com/security/cve/CVE-2025-38623.html * https://www.suse.com/security/cve/CVE-2025-38624.html * https://www.suse.com/security/cve/CVE-2025-38628.html * https://www.suse.com/security/cve/CVE-2025-38630.html * https://www.suse.com/security/cve/CVE-2025-38631.html * https://www.suse.com/security/cve/CVE-2025-38632.html * https://www.suse.com/security/cve/CVE-2025-38634.html * https://www.suse.com/security/cve/CVE-2025-38635.html * https://www.suse.com/security/cve/CVE-2025-38639.html * https://www.suse.com/security/cve/CVE-2025-38640.html * https://www.suse.com/security/cve/CVE-2025-38643.html * https://www.suse.com/security/cve/CVE-2025-38644.html * https://www.suse.com/security/cve/CVE-2025-38646.html * https://www.suse.com/security/cve/CVE-2025-38648.html * https://www.suse.com/security/cve/CVE-2025-38656.html * https://www.suse.com/security/cve/CVE-2025-38658.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38660.html * https://www.suse.com/security/cve/CVE-2025-38662.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38665.html * https://www.suse.com/security/cve/CVE-2025-38668.html * https://www.suse.com/security/cve/CVE-2025-38670.html * https://www.suse.com/security/cve/CVE-2025-38671.html * https://www.suse.com/security/cve/CVE-2025-38676.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38679.html * https://www.suse.com/security/cve/CVE-2025-38680.html * https://www.suse.com/security/cve/CVE-2025-38681.html * https://www.suse.com/security/cve/CVE-2025-38683.html * https://www.suse.com/security/cve/CVE-2025-38684.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38686.html * https://www.suse.com/security/cve/CVE-2025-38687.html * https://www.suse.com/security/cve/CVE-2025-38691.html * https://www.suse.com/security/cve/CVE-2025-38692.html * https://www.suse.com/security/cve/CVE-2025-38693.html * https://www.suse.com/security/cve/CVE-2025-38694.html * https://www.suse.com/security/cve/CVE-2025-38695.html * https://www.suse.com/security/cve/CVE-2025-38700.html * https://www.suse.com/security/cve/CVE-2025-38701.html * https://www.suse.com/security/cve/CVE-2025-38702.html * https://www.suse.com/security/cve/CVE-2025-38703.html * https://www.suse.com/security/cve/CVE-2025-38705.html * https://www.suse.com/security/cve/CVE-2025-38706.html * https://www.suse.com/security/cve/CVE-2025-38709.html * https://www.suse.com/security/cve/CVE-2025-38710.html * https://www.suse.com/security/cve/CVE-2025-38717.html * https://www.suse.com/security/cve/CVE-2025-38721.html * https://www.suse.com/security/cve/CVE-2025-38722.html * https://www.suse.com/security/cve/CVE-2025-38724.html * https://www.suse.com/security/cve/CVE-2025-38725.html * https://www.suse.com/security/cve/CVE-2025-38727.html * https://www.suse.com/security/cve/CVE-2025-38729.html * https://www.suse.com/security/cve/CVE-2025-38730.html * https://www.suse.com/security/cve/CVE-2025-38732.html * https://www.suse.com/security/cve/CVE-2025-38733.html * https://www.suse.com/security/cve/CVE-2025-38734.html * https://www.suse.com/security/cve/CVE-2025-38735.html * https://www.suse.com/security/cve/CVE-2025-38736.html * https://www.suse.com/security/cve/CVE-2025-39673.html * https://www.suse.com/security/cve/CVE-2025-39675.html * https://www.suse.com/security/cve/CVE-2025-39677.html * https://www.suse.com/security/cve/CVE-2025-39678.html * https://www.suse.com/security/cve/CVE-2025-39679.html * https://www.suse.com/security/cve/CVE-2025-39681.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-39683.html * https://www.suse.com/security/cve/CVE-2025-39684.html * https://www.suse.com/security/cve/CVE-2025-39685.html * https://www.suse.com/security/cve/CVE-2025-39686.html * https://www.suse.com/security/cve/CVE-2025-39687.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39693.html * https://www.suse.com/security/cve/CVE-2025-39694.html * https://www.suse.com/security/cve/CVE-2025-39695.html * https://www.suse.com/security/cve/CVE-2025-39697.html * https://www.suse.com/security/cve/CVE-2025-39698.html * https://www.suse.com/security/cve/CVE-2025-39700.html * https://www.suse.com/security/cve/CVE-2025-39701.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39705.html * https://www.suse.com/security/cve/CVE-2025-39706.html * https://www.suse.com/security/cve/CVE-2025-39707.html * https://www.suse.com/security/cve/CVE-2025-39709.html * https://www.suse.com/security/cve/CVE-2025-39710.html * https://www.suse.com/security/cve/CVE-2025-39711.html * https://www.suse.com/security/cve/CVE-2025-39712.html * https://www.suse.com/security/cve/CVE-2025-39713.html * https://www.suse.com/security/cve/CVE-2025-39714.html * https://www.suse.com/security/cve/CVE-2025-39718.html * https://www.suse.com/security/cve/CVE-2025-39719.html * https://www.suse.com/security/cve/CVE-2025-39721.html * https://www.suse.com/security/cve/CVE-2025-39722.html * https://www.suse.com/security/cve/CVE-2025-39723.html * https://www.suse.com/security/cve/CVE-2025-39724.html * https://www.suse.com/security/cve/CVE-2025-39726.html * https://www.suse.com/security/cve/CVE-2025-39727.html * https://www.suse.com/security/cve/CVE-2025-39730.html * https://www.suse.com/security/cve/CVE-2025-39732.html * https://www.suse.com/security/cve/CVE-2025-39738.html * https://www.suse.com/security/cve/CVE-2025-39739.html * https://www.suse.com/security/cve/CVE-2025-39742.html * https://www.suse.com/security/cve/CVE-2025-39744.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39747.html * https://www.suse.com/security/cve/CVE-2025-39748.html * https://www.suse.com/security/cve/CVE-2025-39749.html * https://www.suse.com/security/cve/CVE-2025-39750.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39754.html * https://www.suse.com/security/cve/CVE-2025-39757.html * https://www.suse.com/security/cve/CVE-2025-39758.html * https://www.suse.com/security/cve/CVE-2025-39759.html * https://www.suse.com/security/cve/CVE-2025-39760.html * https://www.suse.com/security/cve/CVE-2025-39761.html * https://www.suse.com/security/cve/CVE-2025-39763.html * https://www.suse.com/security/cve/CVE-2025-39764.html * https://www.suse.com/security/cve/CVE-2025-39765.html * https://www.suse.com/security/cve/CVE-2025-39766.html * https://www.suse.com/security/cve/CVE-2025-39770.html * https://www.suse.com/security/cve/CVE-2025-39772.html * https://www.suse.com/security/cve/CVE-2025-39773.html * https://www.suse.com/security/cve/CVE-2025-39775.html * https://www.suse.com/security/cve/CVE-2025-39782.html * https://www.suse.com/security/cve/CVE-2025-39783.html * https://www.suse.com/security/cve/CVE-2025-39787.html * https://www.suse.com/security/cve/CVE-2025-39788.html * https://www.suse.com/security/cve/CVE-2025-39790.html * https://www.suse.com/security/cve/CVE-2025-39791.html * https://www.suse.com/security/cve/CVE-2025-39792.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39798.html * https://www.suse.com/security/cve/CVE-2025-39800.html * https://www.suse.com/security/cve/CVE-2025-39801.html * https://www.suse.com/security/cve/CVE-2025-39806.html * https://www.suse.com/security/cve/CVE-2025-39807.html * https://www.suse.com/security/cve/CVE-2025-39808.html * https://www.suse.com/security/cve/CVE-2025-39810.html * https://www.suse.com/security/cve/CVE-2025-39811.html * https://www.suse.com/security/cve/CVE-2025-39813.html * https://www.suse.com/security/cve/CVE-2025-39816.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://www.suse.com/security/cve/CVE-2025-39824.html * https://www.suse.com/security/cve/CVE-2025-39825.html * https://www.suse.com/security/cve/CVE-2025-39826.html * https://www.suse.com/security/cve/CVE-2025-39827.html * https://www.suse.com/security/cve/CVE-2025-39828.html * https://www.suse.com/security/cve/CVE-2025-39830.html * https://www.suse.com/security/cve/CVE-2025-39832.html * https://www.suse.com/security/cve/CVE-2025-39833.html * https://www.suse.com/security/cve/CVE-2025-39834.html * https://www.suse.com/security/cve/CVE-2025-39835.html * https://www.suse.com/security/cve/CVE-2025-39836.html * https://www.suse.com/security/cve/CVE-2025-39838.html * https://www.suse.com/security/cve/CVE-2025-39839.html * https://www.suse.com/security/cve/CVE-2025-39841.html * https://www.suse.com/security/cve/CVE-2025-39842.html * https://www.suse.com/security/cve/CVE-2025-39844.html * https://www.suse.com/security/cve/CVE-2025-39845.html * https://www.suse.com/security/cve/CVE-2025-39847.html * https://www.suse.com/security/cve/CVE-2025-39848.html * https://www.suse.com/security/cve/CVE-2025-39849.html * https://www.suse.com/security/cve/CVE-2025-39850.html * https://www.suse.com/security/cve/CVE-2025-39851.html * https://www.suse.com/security/cve/CVE-2025-39852.html * https://www.suse.com/security/cve/CVE-2025-39853.html * https://www.suse.com/security/cve/CVE-2025-39854.html * https://www.suse.com/security/cve/CVE-2025-39857.html * https://www.suse.com/security/cve/CVE-2025-39860.html * https://www.suse.com/security/cve/CVE-2025-39861.html * https://www.suse.com/security/cve/CVE-2025-39863.html * https://www.suse.com/security/cve/CVE-2025-39864.html * https://www.suse.com/security/cve/CVE-2025-39865.html * https://www.suse.com/security/cve/CVE-2025-39869.html * https://www.suse.com/security/cve/CVE-2025-39870.html * https://www.suse.com/security/cve/CVE-2025-39871.html * https://www.suse.com/security/cve/CVE-2025-39873.html * https://www.suse.com/security/cve/CVE-2025-39875.html * https://www.suse.com/security/cve/CVE-2025-39877.html * https://www.suse.com/security/cve/CVE-2025-39882.html * https://www.suse.com/security/cve/CVE-2025-39884.html * https://www.suse.com/security/cve/CVE-2025-39885.html * https://www.suse.com/security/cve/CVE-2025-39889.html * https://www.suse.com/security/cve/CVE-2025-39890.html * https://www.suse.com/security/cve/CVE-2025-39891.html * https://www.suse.com/security/cve/CVE-2025-39896.html * https://www.suse.com/security/cve/CVE-2025-39898.html * https://www.suse.com/security/cve/CVE-2025-39899.html * https://www.suse.com/security/cve/CVE-2025-39900.html * https://www.suse.com/security/cve/CVE-2025-39902.html * https://www.suse.com/security/cve/CVE-2025-39907.html * https://www.suse.com/security/cve/CVE-2025-39909.html * https://www.suse.com/security/cve/CVE-2025-39916.html * https://www.suse.com/security/cve/CVE-2025-39918.html * https://www.suse.com/security/cve/CVE-2025-39922.html * https://www.suse.com/security/cve/CVE-2025-39923.html * https://www.suse.com/security/cve/CVE-2025-39925.html * https://www.suse.com/security/cve/CVE-2025-39926.html * https://www.suse.com/security/cve/CVE-2025-39931.html * https://www.suse.com/security/cve/CVE-2025-39934.html * https://www.suse.com/security/cve/CVE-2025-39937.html * https://www.suse.com/security/cve/CVE-2025-39938.html * https://www.suse.com/security/cve/CVE-2025-39945.html * https://www.suse.com/security/cve/CVE-2025-39946.html * https://www.suse.com/security/cve/CVE-2025-39952.html * https://www.suse.com/security/cve/CVE-2025-39957.html * https://www.suse.com/security/cve/CVE-2025-40300.html * https://www.suse.com/security/cve/CVE-2026-38264.html * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1230062 * https://bugzilla.suse.com/show_bug.cgi?id=1234634 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1235953 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1237108 * https://bugzilla.suse.com/show_bug.cgi?id=1237131 * https://bugzilla.suse.com/show_bug.cgi?id=1237542 * https://bugzilla.suse.com/show_bug.cgi?id=1237776 * https://bugzilla.suse.com/show_bug.cgi?id=1238972 * https://bugzilla.suse.com/show_bug.cgi?id=1239206 * https://bugzilla.suse.com/show_bug.cgi?id=1240324 * https://bugzilla.suse.com/show_bug.cgi?id=1240696 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1240998 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1241403 * https://bugzilla.suse.com/show_bug.cgi?id=1241435 * https://bugzilla.suse.com/show_bug.cgi?id=1242034 * https://bugzilla.suse.com/show_bug.cgi?id=1242086 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242864 * https://bugzilla.suse.com/show_bug.cgi?id=1242965 * https://bugzilla.suse.com/show_bug.cgi?id=1242995 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243055 * https://bugzilla.suse.com/show_bug.cgi?id=1243068 * https://bugzilla.suse.com/show_bug.cgi?id=1243100 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1243774 * https://bugzilla.suse.com/show_bug.cgi?id=1244309 * https://bugzilla.suse.com/show_bug.cgi?id=1244723 * https://bugzilla.suse.com/show_bug.cgi?id=1244734 * https://bugzilla.suse.com/show_bug.cgi?id=1244749 * https://bugzilla.suse.com/show_bug.cgi?id=1244792 * https://bugzilla.suse.com/show_bug.cgi?id=1244812 * https://bugzilla.suse.com/show_bug.cgi?id=1244930 * https://bugzilla.suse.com/show_bug.cgi?id=1244939 * https://bugzilla.suse.com/show_bug.cgi?id=1245000 * https://bugzilla.suse.com/show_bug.cgi?id=1245151 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245206 * https://bugzilla.suse.com/show_bug.cgi?id=1245216 * https://bugzilla.suse.com/show_bug.cgi?id=1245260 * https://bugzilla.suse.com/show_bug.cgi?id=1245410 * https://bugzilla.suse.com/show_bug.cgi?id=1245457 * https://bugzilla.suse.com/show_bug.cgi?id=1245504 * https://bugzilla.suse.com/show_bug.cgi?id=1245506 * https://bugzilla.suse.com/show_bug.cgi?id=1245508 * https://bugzilla.suse.com/show_bug.cgi?id=1245510 * https://bugzilla.suse.com/show_bug.cgi?id=1245596 * https://bugzilla.suse.com/show_bug.cgi?id=1245621 * https://bugzilla.suse.com/show_bug.cgi?id=1245630 * https://bugzilla.suse.com/show_bug.cgi?id=1245654 * https://bugzilla.suse.com/show_bug.cgi?id=1245657 * https://bugzilla.suse.com/show_bug.cgi?id=1245658 * https://bugzilla.suse.com/show_bug.cgi?id=1245659 * https://bugzilla.suse.com/show_bug.cgi?id=1245663 * https://bugzilla.suse.com/show_bug.cgi?id=1245664 * https://bugzilla.suse.com/show_bug.cgi?id=1245665 * https://bugzilla.suse.com/show_bug.cgi?id=1245666 * https://bugzilla.suse.com/show_bug.cgi?id=1245668 * https://bugzilla.suse.com/show_bug.cgi?id=1245669 * https://bugzilla.suse.com/show_bug.cgi?id=1245670 * https://bugzilla.suse.com/show_bug.cgi?id=1245671 * https://bugzilla.suse.com/show_bug.cgi?id=1245675 * https://bugzilla.suse.com/show_bug.cgi?id=1245676 * https://bugzilla.suse.com/show_bug.cgi?id=1245678 * https://bugzilla.suse.com/show_bug.cgi?id=1245683 * https://bugzilla.suse.com/show_bug.cgi?id=1245684 * https://bugzilla.suse.com/show_bug.cgi?id=1245686 * https://bugzilla.suse.com/show_bug.cgi?id=1245688 * https://bugzilla.suse.com/show_bug.cgi?id=1245690 * https://bugzilla.suse.com/show_bug.cgi?id=1245691 * https://bugzilla.suse.com/show_bug.cgi?id=1245695 * https://bugzilla.suse.com/show_bug.cgi?id=1245700 * https://bugzilla.suse.com/show_bug.cgi?id=1245703 * https://bugzilla.suse.com/show_bug.cgi?id=1245705 * https://bugzilla.suse.com/show_bug.cgi?id=1245710 * https://bugzilla.suse.com/show_bug.cgi?id=1245711 * https://bugzilla.suse.com/show_bug.cgi?id=1245713 * https://bugzilla.suse.com/show_bug.cgi?id=1245714 * https://bugzilla.suse.com/show_bug.cgi?id=1245715 * https://bugzilla.suse.com/show_bug.cgi?id=1245717 * https://bugzilla.suse.com/show_bug.cgi?id=1245719 * https://bugzilla.suse.com/show_bug.cgi?id=1245721 * https://bugzilla.suse.com/show_bug.cgi?id=1245723 * https://bugzilla.suse.com/show_bug.cgi?id=1245726 * https://bugzilla.suse.com/show_bug.cgi?id=1245728 * https://bugzilla.suse.com/show_bug.cgi?id=1245729 * https://bugzilla.suse.com/show_bug.cgi?id=1245730 * https://bugzilla.suse.com/show_bug.cgi?id=1245731 * https://bugzilla.suse.com/show_bug.cgi?id=1245735 * https://bugzilla.suse.com/show_bug.cgi?id=1245737 * https://bugzilla.suse.com/show_bug.cgi?id=1245744 * https://bugzilla.suse.com/show_bug.cgi?id=1245745 * https://bugzilla.suse.com/show_bug.cgi?id=1245746 * https://bugzilla.suse.com/show_bug.cgi?id=1245747 * https://bugzilla.suse.com/show_bug.cgi?id=1245748 * https://bugzilla.suse.com/show_bug.cgi?id=1245749 * https://bugzilla.suse.com/show_bug.cgi?id=1245751 * https://bugzilla.suse.com/show_bug.cgi?id=1245757 * https://bugzilla.suse.com/show_bug.cgi?id=1245763 * https://bugzilla.suse.com/show_bug.cgi?id=1245765 * https://bugzilla.suse.com/show_bug.cgi?id=1245767 * https://bugzilla.suse.com/show_bug.cgi?id=1245769 * https://bugzilla.suse.com/show_bug.cgi?id=1245777 * https://bugzilla.suse.com/show_bug.cgi?id=1245780 * https://bugzilla.suse.com/show_bug.cgi?id=1245781 * https://bugzilla.suse.com/show_bug.cgi?id=1245784 * https://bugzilla.suse.com/show_bug.cgi?id=1245785 * https://bugzilla.suse.com/show_bug.cgi?id=1245787 * https://bugzilla.suse.com/show_bug.cgi?id=1245812 * https://bugzilla.suse.com/show_bug.cgi?id=1245814 * https://bugzilla.suse.com/show_bug.cgi?id=1245815 * https://bugzilla.suse.com/show_bug.cgi?id=1245937 * https://bugzilla.suse.com/show_bug.cgi?id=1245945 * https://bugzilla.suse.com/show_bug.cgi?id=1245952 * https://bugzilla.suse.com/show_bug.cgi?id=1245955 * https://bugzilla.suse.com/show_bug.cgi?id=1245956 * https://bugzilla.suse.com/show_bug.cgi?id=1245963 * https://bugzilla.suse.com/show_bug.cgi?id=1245966 * https://bugzilla.suse.com/show_bug.cgi?id=1245970 * https://bugzilla.suse.com/show_bug.cgi?id=1245973 * https://bugzilla.suse.com/show_bug.cgi?id=1245976 * https://bugzilla.suse.com/show_bug.cgi?id=1245977 * https://bugzilla.suse.com/show_bug.cgi?id=1245986 * https://bugzilla.suse.com/show_bug.cgi?id=1246000 * https://bugzilla.suse.com/show_bug.cgi?id=1246002 * https://bugzilla.suse.com/show_bug.cgi?id=1246005 * https://bugzilla.suse.com/show_bug.cgi?id=1246008 * https://bugzilla.suse.com/show_bug.cgi?id=1246012 * https://bugzilla.suse.com/show_bug.cgi?id=1246022 * https://bugzilla.suse.com/show_bug.cgi?id=1246023 * https://bugzilla.suse.com/show_bug.cgi?id=1246031 * https://bugzilla.suse.com/show_bug.cgi?id=1246034 * https://bugzilla.suse.com/show_bug.cgi?id=1246037 * https://bugzilla.suse.com/show_bug.cgi?id=1246041 * https://bugzilla.suse.com/show_bug.cgi?id=1246042 * https://bugzilla.suse.com/show_bug.cgi?id=1246047 * https://bugzilla.suse.com/show_bug.cgi?id=1246049 * https://bugzilla.suse.com/show_bug.cgi?id=1246050 * https://bugzilla.suse.com/show_bug.cgi?id=1246053 * https://bugzilla.suse.com/show_bug.cgi?id=1246054 * https://bugzilla.suse.com/show_bug.cgi?id=1246055 * https://bugzilla.suse.com/show_bug.cgi?id=1246057 * https://bugzilla.suse.com/show_bug.cgi?id=1246098 * https://bugzilla.suse.com/show_bug.cgi?id=1246109 * https://bugzilla.suse.com/show_bug.cgi?id=1246125 * https://bugzilla.suse.com/show_bug.cgi?id=1246166 * https://bugzilla.suse.com/show_bug.cgi?id=1246171 * https://bugzilla.suse.com/show_bug.cgi?id=1246176 * https://bugzilla.suse.com/show_bug.cgi?id=1246181 * https://bugzilla.suse.com/show_bug.cgi?id=1246183 * https://bugzilla.suse.com/show_bug.cgi?id=1246185 * https://bugzilla.suse.com/show_bug.cgi?id=1246186 * https://bugzilla.suse.com/show_bug.cgi?id=1246188 * https://bugzilla.suse.com/show_bug.cgi?id=1246190 * https://bugzilla.suse.com/show_bug.cgi?id=1246192 * https://bugzilla.suse.com/show_bug.cgi?id=1246193 * https://bugzilla.suse.com/show_bug.cgi?id=1246195 * https://bugzilla.suse.com/show_bug.cgi?id=1246220 * https://bugzilla.suse.com/show_bug.cgi?id=1246234 * https://bugzilla.suse.com/show_bug.cgi?id=1246236 * https://bugzilla.suse.com/show_bug.cgi?id=1246240 * https://bugzilla.suse.com/show_bug.cgi?id=1246243 * https://bugzilla.suse.com/show_bug.cgi?id=1246244 * https://bugzilla.suse.com/show_bug.cgi?id=1246245 * https://bugzilla.suse.com/show_bug.cgi?id=1246246 * https://bugzilla.suse.com/show_bug.cgi?id=1246248 * https://bugzilla.suse.com/show_bug.cgi?id=1246250 * https://bugzilla.suse.com/show_bug.cgi?id=1246252 * https://bugzilla.suse.com/show_bug.cgi?id=1246253 * https://bugzilla.suse.com/show_bug.cgi?id=1246255 * https://bugzilla.suse.com/show_bug.cgi?id=1246258 * https://bugzilla.suse.com/show_bug.cgi?id=1246259 * https://bugzilla.suse.com/show_bug.cgi?id=1246260 * https://bugzilla.suse.com/show_bug.cgi?id=1246262 * https://bugzilla.suse.com/show_bug.cgi?id=1246266 * https://bugzilla.suse.com/show_bug.cgi?id=1246268 * https://bugzilla.suse.com/show_bug.cgi?id=1246283 * https://bugzilla.suse.com/show_bug.cgi?id=1246285 * https://bugzilla.suse.com/show_bug.cgi?id=1246286 * https://bugzilla.suse.com/show_bug.cgi?id=1246287 * https://bugzilla.suse.com/show_bug.cgi?id=1246290 * https://bugzilla.suse.com/show_bug.cgi?id=1246292 * https://bugzilla.suse.com/show_bug.cgi?id=1246293 * https://bugzilla.suse.com/show_bug.cgi?id=1246295 * https://bugzilla.suse.com/show_bug.cgi?id=1246297 * https://bugzilla.suse.com/show_bug.cgi?id=1246333 * https://bugzilla.suse.com/show_bug.cgi?id=1246334 * https://bugzilla.suse.com/show_bug.cgi?id=1246337 * https://bugzilla.suse.com/show_bug.cgi?id=1246342 * https://bugzilla.suse.com/show_bug.cgi?id=1246349 * https://bugzilla.suse.com/show_bug.cgi?id=1246351 * https://bugzilla.suse.com/show_bug.cgi?id=1246353 * https://bugzilla.suse.com/show_bug.cgi?id=1246354 * https://bugzilla.suse.com/show_bug.cgi?id=1246358 * https://bugzilla.suse.com/show_bug.cgi?id=1246364 * https://bugzilla.suse.com/show_bug.cgi?id=1246366 * https://bugzilla.suse.com/show_bug.cgi?id=1246370 * https://bugzilla.suse.com/show_bug.cgi?id=1246375 * https://bugzilla.suse.com/show_bug.cgi?id=1246376 * https://bugzilla.suse.com/show_bug.cgi?id=1246385 * https://bugzilla.suse.com/show_bug.cgi?id=1246386 * https://bugzilla.suse.com/show_bug.cgi?id=1246387 * https://bugzilla.suse.com/show_bug.cgi?id=1246438 * https://bugzilla.suse.com/show_bug.cgi?id=1246443 * https://bugzilla.suse.com/show_bug.cgi?id=1246444 * https://bugzilla.suse.com/show_bug.cgi?id=1246447 * https://bugzilla.suse.com/show_bug.cgi?id=1246450 * https://bugzilla.suse.com/show_bug.cgi?id=1246453 * https://bugzilla.suse.com/show_bug.cgi?id=1246473 * https://bugzilla.suse.com/show_bug.cgi?id=1246490 * https://bugzilla.suse.com/show_bug.cgi?id=1246509 * https://bugzilla.suse.com/show_bug.cgi?id=1246547 * https://bugzilla.suse.com/show_bug.cgi?id=1246631 * https://bugzilla.suse.com/show_bug.cgi?id=1246651 * https://bugzilla.suse.com/show_bug.cgi?id=1246688 * https://bugzilla.suse.com/show_bug.cgi?id=1246777 * https://bugzilla.suse.com/show_bug.cgi?id=1246781 * https://bugzilla.suse.com/show_bug.cgi?id=1246782 * https://bugzilla.suse.com/show_bug.cgi?id=1246868 * https://bugzilla.suse.com/show_bug.cgi?id=1246896 * https://bugzilla.suse.com/show_bug.cgi?id=1246911 * https://bugzilla.suse.com/show_bug.cgi?id=1246979 * https://bugzilla.suse.com/show_bug.cgi?id=1247018 * https://bugzilla.suse.com/show_bug.cgi?id=1247020 * https://bugzilla.suse.com/show_bug.cgi?id=1247022 * https://bugzilla.suse.com/show_bug.cgi?id=1247023 * https://bugzilla.suse.com/show_bug.cgi?id=1247024 * https://bugzilla.suse.com/show_bug.cgi?id=1247027 * https://bugzilla.suse.com/show_bug.cgi?id=1247028 * https://bugzilla.suse.com/show_bug.cgi?id=1247031 * https://bugzilla.suse.com/show_bug.cgi?id=1247033 * https://bugzilla.suse.com/show_bug.cgi?id=1247035 * https://bugzilla.suse.com/show_bug.cgi?id=1247061 * https://bugzilla.suse.com/show_bug.cgi?id=1247062 * https://bugzilla.suse.com/show_bug.cgi?id=1247064 * https://bugzilla.suse.com/show_bug.cgi?id=1247076 * https://bugzilla.suse.com/show_bug.cgi?id=1247078 * https://bugzilla.suse.com/show_bug.cgi?id=1247079 * https://bugzilla.suse.com/show_bug.cgi?id=1247088 * https://bugzilla.suse.com/show_bug.cgi?id=1247089 * https://bugzilla.suse.com/show_bug.cgi?id=1247091 * https://bugzilla.suse.com/show_bug.cgi?id=1247097 * https://bugzilla.suse.com/show_bug.cgi?id=1247098 * https://bugzilla.suse.com/show_bug.cgi?id=1247099 * https://bugzilla.suse.com/show_bug.cgi?id=1247101 * https://bugzilla.suse.com/show_bug.cgi?id=1247102 * https://bugzilla.suse.com/show_bug.cgi?id=1247103 * https://bugzilla.suse.com/show_bug.cgi?id=1247104 * https://bugzilla.suse.com/show_bug.cgi?id=1247112 * https://bugzilla.suse.com/show_bug.cgi?id=1247113 * https://bugzilla.suse.com/show_bug.cgi?id=1247116 * https://bugzilla.suse.com/show_bug.cgi?id=1247118 * https://bugzilla.suse.com/show_bug.cgi?id=1247119 * https://bugzilla.suse.com/show_bug.cgi?id=1247123 * https://bugzilla.suse.com/show_bug.cgi?id=1247125 * https://bugzilla.suse.com/show_bug.cgi?id=1247126 * https://bugzilla.suse.com/show_bug.cgi?id=1247128 * https://bugzilla.suse.com/show_bug.cgi?id=1247130 * https://bugzilla.suse.com/show_bug.cgi?id=1247131 * https://bugzilla.suse.com/show_bug.cgi?id=1247132 * https://bugzilla.suse.com/show_bug.cgi?id=1247136 * https://bugzilla.suse.com/show_bug.cgi?id=1247137 * https://bugzilla.suse.com/show_bug.cgi?id=1247138 * https://bugzilla.suse.com/show_bug.cgi?id=1247141 * https://bugzilla.suse.com/show_bug.cgi?id=1247143 * https://bugzilla.suse.com/show_bug.cgi?id=1247145 * https://bugzilla.suse.com/show_bug.cgi?id=1247146 * https://bugzilla.suse.com/show_bug.cgi?id=1247147 * https://bugzilla.suse.com/show_bug.cgi?id=1247149 * https://bugzilla.suse.com/show_bug.cgi?id=1247150 * https://bugzilla.suse.com/show_bug.cgi?id=1247151 * https://bugzilla.suse.com/show_bug.cgi?id=1247152 * https://bugzilla.suse.com/show_bug.cgi?id=1247153 * https://bugzilla.suse.com/show_bug.cgi?id=1247154 * https://bugzilla.suse.com/show_bug.cgi?id=1247155 * https://bugzilla.suse.com/show_bug.cgi?id=1247156 * https://bugzilla.suse.com/show_bug.cgi?id=1247157 * https://bugzilla.suse.com/show_bug.cgi?id=1247160 * https://bugzilla.suse.com/show_bug.cgi?id=1247162 * https://bugzilla.suse.com/show_bug.cgi?id=1247163 * https://bugzilla.suse.com/show_bug.cgi?id=1247164 * https://bugzilla.suse.com/show_bug.cgi?id=1247167 * https://bugzilla.suse.com/show_bug.cgi?id=1247169 * https://bugzilla.suse.com/show_bug.cgi?id=1247170 * https://bugzilla.suse.com/show_bug.cgi?id=1247171 * https://bugzilla.suse.com/show_bug.cgi?id=1247174 * https://bugzilla.suse.com/show_bug.cgi?id=1247176 * https://bugzilla.suse.com/show_bug.cgi?id=1247177 * https://bugzilla.suse.com/show_bug.cgi?id=1247178 * https://bugzilla.suse.com/show_bug.cgi?id=1247181 * https://bugzilla.suse.com/show_bug.cgi?id=1247209 * https://bugzilla.suse.com/show_bug.cgi?id=1247210 * https://bugzilla.suse.com/show_bug.cgi?id=1247220 * https://bugzilla.suse.com/show_bug.cgi?id=1247223 * https://bugzilla.suse.com/show_bug.cgi?id=1247227 * https://bugzilla.suse.com/show_bug.cgi?id=1247229 * https://bugzilla.suse.com/show_bug.cgi?id=1247231 * https://bugzilla.suse.com/show_bug.cgi?id=1247233 * https://bugzilla.suse.com/show_bug.cgi?id=1247234 * https://bugzilla.suse.com/show_bug.cgi?id=1247235 * https://bugzilla.suse.com/show_bug.cgi?id=1247236 * https://bugzilla.suse.com/show_bug.cgi?id=1247238 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247241 * https://bugzilla.suse.com/show_bug.cgi?id=1247243 * https://bugzilla.suse.com/show_bug.cgi?id=1247250 * https://bugzilla.suse.com/show_bug.cgi?id=1247251 * https://bugzilla.suse.com/show_bug.cgi?id=1247252 * https://bugzilla.suse.com/show_bug.cgi?id=1247253 * https://bugzilla.suse.com/show_bug.cgi?id=1247255 * https://bugzilla.suse.com/show_bug.cgi?id=1247262 * https://bugzilla.suse.com/show_bug.cgi?id=1247265 * https://bugzilla.suse.com/show_bug.cgi?id=1247270 * https://bugzilla.suse.com/show_bug.cgi?id=1247271 * https://bugzilla.suse.com/show_bug.cgi?id=1247273 * https://bugzilla.suse.com/show_bug.cgi?id=1247274 * https://bugzilla.suse.com/show_bug.cgi?id=1247276 * https://bugzilla.suse.com/show_bug.cgi?id=1247277 * https://bugzilla.suse.com/show_bug.cgi?id=1247278 * https://bugzilla.suse.com/show_bug.cgi?id=1247279 * https://bugzilla.suse.com/show_bug.cgi?id=1247280 * https://bugzilla.suse.com/show_bug.cgi?id=1247282 * https://bugzilla.suse.com/show_bug.cgi?id=1247283 * https://bugzilla.suse.com/show_bug.cgi?id=1247284 * https://bugzilla.suse.com/show_bug.cgi?id=1247285 * https://bugzilla.suse.com/show_bug.cgi?id=1247288 * https://bugzilla.suse.com/show_bug.cgi?id=1247289 * https://bugzilla.suse.com/show_bug.cgi?id=1247290 * https://bugzilla.suse.com/show_bug.cgi?id=1247293 * https://bugzilla.suse.com/show_bug.cgi?id=1247308 * https://bugzilla.suse.com/show_bug.cgi?id=1247311 * https://bugzilla.suse.com/show_bug.cgi?id=1247313 * https://bugzilla.suse.com/show_bug.cgi?id=1247314 * https://bugzilla.suse.com/show_bug.cgi?id=1247317 * https://bugzilla.suse.com/show_bug.cgi?id=1247325 * https://bugzilla.suse.com/show_bug.cgi?id=1247347 * https://bugzilla.suse.com/show_bug.cgi?id=1247348 * https://bugzilla.suse.com/show_bug.cgi?id=1247349 * https://bugzilla.suse.com/show_bug.cgi?id=1247366 * https://bugzilla.suse.com/show_bug.cgi?id=1247372 * https://bugzilla.suse.com/show_bug.cgi?id=1247376 * https://bugzilla.suse.com/show_bug.cgi?id=1247426 * https://bugzilla.suse.com/show_bug.cgi?id=1247437 * https://bugzilla.suse.com/show_bug.cgi?id=1247442 * https://bugzilla.suse.com/show_bug.cgi?id=1247483 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1247712 * https://bugzilla.suse.com/show_bug.cgi?id=1247837 * https://bugzilla.suse.com/show_bug.cgi?id=1247838 * https://bugzilla.suse.com/show_bug.cgi?id=1247935 * https://bugzilla.suse.com/show_bug.cgi?id=1247936 * https://bugzilla.suse.com/show_bug.cgi?id=1247949 * https://bugzilla.suse.com/show_bug.cgi?id=1247950 * https://bugzilla.suse.com/show_bug.cgi?id=1247963 * https://bugzilla.suse.com/show_bug.cgi?id=1247976 * https://bugzilla.suse.com/show_bug.cgi?id=1248088 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248121 * https://bugzilla.suse.com/show_bug.cgi?id=1248183 * https://bugzilla.suse.com/show_bug.cgi?id=1248186 * https://bugzilla.suse.com/show_bug.cgi?id=1248190 * https://bugzilla.suse.com/show_bug.cgi?id=1248192 * https://bugzilla.suse.com/show_bug.cgi?id=1248194 * https://bugzilla.suse.com/show_bug.cgi?id=1248198 * https://bugzilla.suse.com/show_bug.cgi?id=1248199 * https://bugzilla.suse.com/show_bug.cgi?id=1248200 * https://bugzilla.suse.com/show_bug.cgi?id=1248202 * https://bugzilla.suse.com/show_bug.cgi?id=1248205 * https://bugzilla.suse.com/show_bug.cgi?id=1248211 * https://bugzilla.suse.com/show_bug.cgi?id=1248223 * https://bugzilla.suse.com/show_bug.cgi?id=1248224 * https://bugzilla.suse.com/show_bug.cgi?id=1248225 * https://bugzilla.suse.com/show_bug.cgi?id=1248230 * https://bugzilla.suse.com/show_bug.cgi?id=1248235 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248296 * https://bugzilla.suse.com/show_bug.cgi?id=1248297 * https://bugzilla.suse.com/show_bug.cgi?id=1248299 * https://bugzilla.suse.com/show_bug.cgi?id=1248302 * https://bugzilla.suse.com/show_bug.cgi?id=1248304 * https://bugzilla.suse.com/show_bug.cgi?id=1248306 * https://bugzilla.suse.com/show_bug.cgi?id=1248312 * https://bugzilla.suse.com/show_bug.cgi?id=1248333 * https://bugzilla.suse.com/show_bug.cgi?id=1248334 * https://bugzilla.suse.com/show_bug.cgi?id=1248337 * https://bugzilla.suse.com/show_bug.cgi?id=1248338 * https://bugzilla.suse.com/show_bug.cgi?id=1248340 * https://bugzilla.suse.com/show_bug.cgi?id=1248341 * https://bugzilla.suse.com/show_bug.cgi?id=1248343 * https://bugzilla.suse.com/show_bug.cgi?id=1248345 * https://bugzilla.suse.com/show_bug.cgi?id=1248349 * https://bugzilla.suse.com/show_bug.cgi?id=1248350 * https://bugzilla.suse.com/show_bug.cgi?id=1248354 * https://bugzilla.suse.com/show_bug.cgi?id=1248355 * https://bugzilla.suse.com/show_bug.cgi?id=1248357 * https://bugzilla.suse.com/show_bug.cgi?id=1248359 * https://bugzilla.suse.com/show_bug.cgi?id=1248361 * https://bugzilla.suse.com/show_bug.cgi?id=1248363 * https://bugzilla.suse.com/show_bug.cgi?id=1248365 * https://bugzilla.suse.com/show_bug.cgi?id=1248367 * https://bugzilla.suse.com/show_bug.cgi?id=1248368 * https://bugzilla.suse.com/show_bug.cgi?id=1248374 * https://bugzilla.suse.com/show_bug.cgi?id=1248377 * https://bugzilla.suse.com/show_bug.cgi?id=1248378 * https://bugzilla.suse.com/show_bug.cgi?id=1248380 * https://bugzilla.suse.com/show_bug.cgi?id=1248386 * https://bugzilla.suse.com/show_bug.cgi?id=1248390 * https://bugzilla.suse.com/show_bug.cgi?id=1248392 * https://bugzilla.suse.com/show_bug.cgi?id=1248395 * https://bugzilla.suse.com/show_bug.cgi?id=1248396 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248401 * https://bugzilla.suse.com/show_bug.cgi?id=1248511 * https://bugzilla.suse.com/show_bug.cgi?id=1248512 * https://bugzilla.suse.com/show_bug.cgi?id=1248573 * https://bugzilla.suse.com/show_bug.cgi?id=1248575 * https://bugzilla.suse.com/show_bug.cgi?id=1248577 * https://bugzilla.suse.com/show_bug.cgi?id=1248609 * https://bugzilla.suse.com/show_bug.cgi?id=1248610 * https://bugzilla.suse.com/show_bug.cgi?id=1248616 * https://bugzilla.suse.com/show_bug.cgi?id=1248617 * https://bugzilla.suse.com/show_bug.cgi?id=1248619 * https://bugzilla.suse.com/show_bug.cgi?id=1248621 * https://bugzilla.suse.com/show_bug.cgi?id=1248622 * https://bugzilla.suse.com/show_bug.cgi?id=1248624 * https://bugzilla.suse.com/show_bug.cgi?id=1248627 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248634 * https://bugzilla.suse.com/show_bug.cgi?id=1248635 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248643 * https://bugzilla.suse.com/show_bug.cgi?id=1248647 * https://bugzilla.suse.com/show_bug.cgi?id=1248648 * https://bugzilla.suse.com/show_bug.cgi?id=1248652 * https://bugzilla.suse.com/show_bug.cgi?id=1248655 * https://bugzilla.suse.com/show_bug.cgi?id=1248662 * https://bugzilla.suse.com/show_bug.cgi?id=1248664 * https://bugzilla.suse.com/show_bug.cgi?id=1248666 * https://bugzilla.suse.com/show_bug.cgi?id=1248669 * https://bugzilla.suse.com/show_bug.cgi?id=1248674 * https://bugzilla.suse.com/show_bug.cgi?id=1248681 * https://bugzilla.suse.com/show_bug.cgi?id=1248727 * https://bugzilla.suse.com/show_bug.cgi?id=1248728 * https://bugzilla.suse.com/show_bug.cgi?id=1248748 * https://bugzilla.suse.com/show_bug.cgi?id=1248754 * https://bugzilla.suse.com/show_bug.cgi?id=1248775 * https://bugzilla.suse.com/show_bug.cgi?id=1249022 * https://bugzilla.suse.com/show_bug.cgi?id=1249038 * https://bugzilla.suse.com/show_bug.cgi?id=1249060 * https://bugzilla.suse.com/show_bug.cgi?id=1249061 * https://bugzilla.suse.com/show_bug.cgi?id=1249062 * https://bugzilla.suse.com/show_bug.cgi?id=1249064 * https://bugzilla.suse.com/show_bug.cgi?id=1249065 * https://bugzilla.suse.com/show_bug.cgi?id=1249066 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249143 * https://bugzilla.suse.com/show_bug.cgi?id=1249156 * https://bugzilla.suse.com/show_bug.cgi?id=1249159 * https://bugzilla.suse.com/show_bug.cgi?id=1249160 * https://bugzilla.suse.com/show_bug.cgi?id=1249163 * https://bugzilla.suse.com/show_bug.cgi?id=1249164 * https://bugzilla.suse.com/show_bug.cgi?id=1249166 * https://bugzilla.suse.com/show_bug.cgi?id=1249167 * https://bugzilla.suse.com/show_bug.cgi?id=1249169 * https://bugzilla.suse.com/show_bug.cgi?id=1249170 * https://bugzilla.suse.com/show_bug.cgi?id=1249172 * https://bugzilla.suse.com/show_bug.cgi?id=1249176 * https://bugzilla.suse.com/show_bug.cgi?id=1249177 * https://bugzilla.suse.com/show_bug.cgi?id=1249182 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249190 * https://bugzilla.suse.com/show_bug.cgi?id=1249193 * https://bugzilla.suse.com/show_bug.cgi?id=1249195 * https://bugzilla.suse.com/show_bug.cgi?id=1249199 * https://bugzilla.suse.com/show_bug.cgi?id=1249201 * https://bugzilla.suse.com/show_bug.cgi?id=1249202 * https://bugzilla.suse.com/show_bug.cgi?id=1249203 * https://bugzilla.suse.com/show_bug.cgi?id=1249204 * https://bugzilla.suse.com/show_bug.cgi?id=1249206 * https://bugzilla.suse.com/show_bug.cgi?id=1249215 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249221 * https://bugzilla.suse.com/show_bug.cgi?id=1249254 * https://bugzilla.suse.com/show_bug.cgi?id=1249258 * https://bugzilla.suse.com/show_bug.cgi?id=1249262 * https://bugzilla.suse.com/show_bug.cgi?id=1249263 * https://bugzilla.suse.com/show_bug.cgi?id=1249265 * https://bugzilla.suse.com/show_bug.cgi?id=1249266 * https://bugzilla.suse.com/show_bug.cgi?id=1249269 * https://bugzilla.suse.com/show_bug.cgi?id=1249271 * https://bugzilla.suse.com/show_bug.cgi?id=1249272 * https://bugzilla.suse.com/show_bug.cgi?id=1249273 * https://bugzilla.suse.com/show_bug.cgi?id=1249274 * https://bugzilla.suse.com/show_bug.cgi?id=1249278 * https://bugzilla.suse.com/show_bug.cgi?id=1249279 * https://bugzilla.suse.com/show_bug.cgi?id=1249281 * https://bugzilla.suse.com/show_bug.cgi?id=1249282 * https://bugzilla.suse.com/show_bug.cgi?id=1249284 * https://bugzilla.suse.com/show_bug.cgi?id=1249285 * https://bugzilla.suse.com/show_bug.cgi?id=1249286 * https://bugzilla.suse.com/show_bug.cgi?id=1249288 * https://bugzilla.suse.com/show_bug.cgi?id=1249290 * https://bugzilla.suse.com/show_bug.cgi?id=1249292 * https://bugzilla.suse.com/show_bug.cgi?id=1249295 * https://bugzilla.suse.com/show_bug.cgi?id=1249296 * https://bugzilla.suse.com/show_bug.cgi?id=1249297 * https://bugzilla.suse.com/show_bug.cgi?id=1249299 * https://bugzilla.suse.com/show_bug.cgi?id=1249300 * https://bugzilla.suse.com/show_bug.cgi?id=1249301 * https://bugzilla.suse.com/show_bug.cgi?id=1249303 * https://bugzilla.suse.com/show_bug.cgi?id=1249304 * https://bugzilla.suse.com/show_bug.cgi?id=1249305 * https://bugzilla.suse.com/show_bug.cgi?id=1249306 * https://bugzilla.suse.com/show_bug.cgi?id=1249308 * https://bugzilla.suse.com/show_bug.cgi?id=1249309 * https://bugzilla.suse.com/show_bug.cgi?id=1249312 * https://bugzilla.suse.com/show_bug.cgi?id=1249313 * https://bugzilla.suse.com/show_bug.cgi?id=1249314 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249316 * https://bugzilla.suse.com/show_bug.cgi?id=1249318 * https://bugzilla.suse.com/show_bug.cgi?id=1249319 * https://bugzilla.suse.com/show_bug.cgi?id=1249320 * https://bugzilla.suse.com/show_bug.cgi?id=1249321 * https://bugzilla.suse.com/show_bug.cgi?id=1249322 * https://bugzilla.suse.com/show_bug.cgi?id=1249323 * https://bugzilla.suse.com/show_bug.cgi?id=1249324 * https://bugzilla.suse.com/show_bug.cgi?id=1249333 * https://bugzilla.suse.com/show_bug.cgi?id=1249334 * https://bugzilla.suse.com/show_bug.cgi?id=1249338 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249413 * https://bugzilla.suse.com/show_bug.cgi?id=1249477 * https://bugzilla.suse.com/show_bug.cgi?id=1249478 * https://bugzilla.suse.com/show_bug.cgi?id=1249479 * https://bugzilla.suse.com/show_bug.cgi?id=1249486 * https://bugzilla.suse.com/show_bug.cgi?id=1249490 * https://bugzilla.suse.com/show_bug.cgi?id=1249494 * https://bugzilla.suse.com/show_bug.cgi?id=1249500 * https://bugzilla.suse.com/show_bug.cgi?id=1249504 * https://bugzilla.suse.com/show_bug.cgi?id=1249506 * https://bugzilla.suse.com/show_bug.cgi?id=1249508 * https://bugzilla.suse.com/show_bug.cgi?id=1249509 * https://bugzilla.suse.com/show_bug.cgi?id=1249510 * https://bugzilla.suse.com/show_bug.cgi?id=1249513 * https://bugzilla.suse.com/show_bug.cgi?id=1249515 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249522 * https://bugzilla.suse.com/show_bug.cgi?id=1249523 * https://bugzilla.suse.com/show_bug.cgi?id=1249524 * https://bugzilla.suse.com/show_bug.cgi?id=1249526 * https://bugzilla.suse.com/show_bug.cgi?id=1249533 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249540 * https://bugzilla.suse.com/show_bug.cgi?id=1249542 * https://bugzilla.suse.com/show_bug.cgi?id=1249545 * https://bugzilla.suse.com/show_bug.cgi?id=1249547 * https://bugzilla.suse.com/show_bug.cgi?id=1249548 * https://bugzilla.suse.com/show_bug.cgi?id=1249550 * https://bugzilla.suse.com/show_bug.cgi?id=1249552 * https://bugzilla.suse.com/show_bug.cgi?id=1249554 * https://bugzilla.suse.com/show_bug.cgi?id=1249562 * https://bugzilla.suse.com/show_bug.cgi?id=1249566 * https://bugzilla.suse.com/show_bug.cgi?id=1249587 * https://bugzilla.suse.com/show_bug.cgi?id=1249598 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249615 * https://bugzilla.suse.com/show_bug.cgi?id=1249618 * https://bugzilla.suse.com/show_bug.cgi?id=1249774 * https://bugzilla.suse.com/show_bug.cgi?id=1249833 * https://bugzilla.suse.com/show_bug.cgi?id=1249887 * https://bugzilla.suse.com/show_bug.cgi?id=1249888 * https://bugzilla.suse.com/show_bug.cgi?id=1249901 * https://bugzilla.suse.com/show_bug.cgi?id=1249904 * https://bugzilla.suse.com/show_bug.cgi?id=1249906 * https://bugzilla.suse.com/show_bug.cgi?id=1249915 * https://bugzilla.suse.com/show_bug.cgi?id=1249974 * https://bugzilla.suse.com/show_bug.cgi?id=1249975 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250007 * https://bugzilla.suse.com/show_bug.cgi?id=1250021 * https://bugzilla.suse.com/show_bug.cgi?id=1250025 * https://bugzilla.suse.com/show_bug.cgi?id=1250028 * https://bugzilla.suse.com/show_bug.cgi?id=1250032 * https://bugzilla.suse.com/show_bug.cgi?id=1250087 * https://bugzilla.suse.com/show_bug.cgi?id=1250088 * https://bugzilla.suse.com/show_bug.cgi?id=1250119 * https://bugzilla.suse.com/show_bug.cgi?id=1250123 * https://bugzilla.suse.com/show_bug.cgi?id=1250124 * https://bugzilla.suse.com/show_bug.cgi?id=1250177 * https://bugzilla.suse.com/show_bug.cgi?id=1250179 * https://bugzilla.suse.com/show_bug.cgi?id=1250203 * https://bugzilla.suse.com/show_bug.cgi?id=1250204 * https://bugzilla.suse.com/show_bug.cgi?id=1250205 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250242 * https://bugzilla.suse.com/show_bug.cgi?id=1250247 * https://bugzilla.suse.com/show_bug.cgi?id=1250249 * https://bugzilla.suse.com/show_bug.cgi?id=1250251 * https://bugzilla.suse.com/show_bug.cgi?id=1250258 * https://bugzilla.suse.com/show_bug.cgi?id=1250262 * https://bugzilla.suse.com/show_bug.cgi?id=1250266 * https://bugzilla.suse.com/show_bug.cgi?id=1250267 * https://bugzilla.suse.com/show_bug.cgi?id=1250268 * https://bugzilla.suse.com/show_bug.cgi?id=1250275 * https://bugzilla.suse.com/show_bug.cgi?id=1250276 * https://bugzilla.suse.com/show_bug.cgi?id=1250281 * https://bugzilla.suse.com/show_bug.cgi?id=1250291 * https://bugzilla.suse.com/show_bug.cgi?id=1250292 * https://bugzilla.suse.com/show_bug.cgi?id=1250294 * https://bugzilla.suse.com/show_bug.cgi?id=1250296 * https://bugzilla.suse.com/show_bug.cgi?id=1250297 * https://bugzilla.suse.com/show_bug.cgi?id=1250298 * https://bugzilla.suse.com/show_bug.cgi?id=1250334 * https://bugzilla.suse.com/show_bug.cgi?id=1250344 * https://bugzilla.suse.com/show_bug.cgi?id=1250365 * https://bugzilla.suse.com/show_bug.cgi?id=1250371 * https://bugzilla.suse.com/show_bug.cgi?id=1250377 * https://bugzilla.suse.com/show_bug.cgi?id=1250386 * https://bugzilla.suse.com/show_bug.cgi?id=1250389 * https://bugzilla.suse.com/show_bug.cgi?id=1250398 * https://bugzilla.suse.com/show_bug.cgi?id=1250402 * https://bugzilla.suse.com/show_bug.cgi?id=1250406 * https://bugzilla.suse.com/show_bug.cgi?id=1250407 * https://bugzilla.suse.com/show_bug.cgi?id=1250408 * https://bugzilla.suse.com/show_bug.cgi?id=1250450 * https://bugzilla.suse.com/show_bug.cgi?id=1250491 * https://bugzilla.suse.com/show_bug.cgi?id=1250519 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250650 * https://bugzilla.suse.com/show_bug.cgi?id=1250655 * https://bugzilla.suse.com/show_bug.cgi?id=1250671 * https://bugzilla.suse.com/show_bug.cgi?id=1250702 * https://bugzilla.suse.com/show_bug.cgi?id=1250711 * https://bugzilla.suse.com/show_bug.cgi?id=1250712 * https://bugzilla.suse.com/show_bug.cgi?id=1250713 * https://bugzilla.suse.com/show_bug.cgi?id=1250716 * https://bugzilla.suse.com/show_bug.cgi?id=1250719 * https://bugzilla.suse.com/show_bug.cgi?id=1250722 * https://bugzilla.suse.com/show_bug.cgi?id=1250729 * https://bugzilla.suse.com/show_bug.cgi?id=1250736 * https://bugzilla.suse.com/show_bug.cgi?id=1250737 * https://bugzilla.suse.com/show_bug.cgi?id=1250739 * https://bugzilla.suse.com/show_bug.cgi?id=1250741 * https://bugzilla.suse.com/show_bug.cgi?id=1250742 * https://bugzilla.suse.com/show_bug.cgi?id=1250758 * https://bugzilla.suse.com/show_bug.cgi?id=1250952 * https://bugzilla.suse.com/show_bug.cgi?id=1251100 * https://bugzilla.suse.com/show_bug.cgi?id=1251114 * https://bugzilla.suse.com/show_bug.cgi?id=1251134 * https://bugzilla.suse.com/show_bug.cgi?id=1251135 * https://bugzilla.suse.com/show_bug.cgi?id=1251143 * https://bugzilla.suse.com/show_bug.cgi?id=1251146 * https://bugzilla.suse.com/show_bug.cgi?id=1251186 * https://bugzilla.suse.com/show_bug.cgi?id=1251216 * https://bugzilla.suse.com/show_bug.cgi?id=1251230 * https://bugzilla.suse.com/show_bug.cgi?id=1251810 * https://bugzilla.suse.com/show_bug.cgi?id=1252084 * https://jira.suse.com/browse/PED-10909 * https://jira.suse.com/browse/PED-12405 * https://jira.suse.com/browse/PED-12745 * https://jira.suse.com/browse/PED-12882 * https://jira.suse.com/browse/PED-13113 * https://jira.suse.com/browse/PED-13256 * https://jira.suse.com/browse/PED-13302 * https://jira.suse.com/browse/PED-13331 * https://jira.suse.com/browse/PED-13343 * https://jira.suse.com/browse/PED-13345 * https://jira.suse.com/browse/PED-13631 * https://jira.suse.com/browse/PED-13704 * https://jira.suse.com/browse/PED-13728 * https://jira.suse.com/browse/PED-13762 * https://jira.suse.com/browse/PED-13815 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7249 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:50:49 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:50:49 -0000 Subject: SUSE-SU-2025:21170-1: important: Security update for mozjs128 Message-ID: <176538544926.6931.10525466066463688284@smelt2.prg2.suse.org> # Security update for mozjs128 Announcement ID: SUSE-SU-2025:21170-1 Release Date: 2025-12-03T20:41:04Z Rating: important References: * bsc#1248162 Cross-References: * CVE-2025-5263 * CVE-2025-5264 * CVE-2025-5265 * CVE-2025-5266 * CVE-2025-5267 * CVE-2025-5268 * CVE-2025-5269 * CVE-2025-5283 * CVE-2025-6424 * CVE-2025-6425 * CVE-2025-6426 * CVE-2025-6429 * CVE-2025-6430 * CVE-2025-8027 * CVE-2025-8028 * CVE-2025-8029 * CVE-2025-8030 * CVE-2025-8031 * CVE-2025-8032 * CVE-2025-8033 * CVE-2025-8034 * CVE-2025-8035 * CVE-2025-9179 * CVE-2025-9180 * CVE-2025-9181 * CVE-2025-9185 CVSS scores: * CVE-2025-5263 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-5263 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-5264 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5264 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5265 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5265 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5266 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5266 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-5267 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-5267 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-5268 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5268 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-5269 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5269 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-5283 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-6424 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6424 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-6424 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-6425 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-6425 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-6425 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-6426 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L * CVE-2025-6426 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L * CVE-2025-6426 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-6429 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-6429 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-6429 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-6430 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-6430 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-6430 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-8027 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-8027 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L * CVE-2025-8027 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-8028 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-8028 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L * CVE-2025-8028 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-8029 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-8029 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-8029 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-8030 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-8030 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-8030 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-8031 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-8031 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-8031 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-8032 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-8032 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-8032 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-8033 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8033 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8033 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-8034 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-8034 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-8034 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-8035 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-8035 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-8035 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-9179 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-9179 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9180 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-9180 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-9181 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L * CVE-2025-9181 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-9185 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-9185 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9185 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves 26 vulnerabilities can now be installed. ## Description: This update for mozjs128 fixes the following issues: * Update to version 128.14.0 (bsc#1248162): * CVE-2025-9179: Sandbox escape due to invalid pointer in the Audio/Video: GMP component * CVE-2025-9180: Same-origin policy bypass in the Graphics: Canvas2D component * CVE-2025-9181: Uninitialized memory in the JavaScript Engine component * CVE-2025-9185: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 * Update to version 128.13.0: * CVE-2025-8027: JavaScript engine only wrote partial return value to stack * CVE-2025-8028: Large branch table could lead to truncated instruction * CVE-2025-8029: javascript: URLs executed on object and embed tags * CVE-2025-8030: Potential user-assisted code execution in ?Copy as cURL? command * CVE-2025-8031: Incorrect URL stripping in CSP reports * CVE-2025-8032: XSLT documents could bypass CSP * CVE-2025-8033: Incorrect JavaScript state machine for generators * CVE-2025-8034: Memory safety bugs fixed in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141 * CVE-2025-8035: Memory safety bugs fixed in Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141 * Update to version 128.12.0: * CVE-2025-6424: Use-after-free in FontFaceSet * CVE-2025-6425: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID * CVE-2025-6426: No warning when opening executable terminal files on macOS * CVE-2025-6429: Incorrect parsing of URLs could have allowed embedding of youtube.com * CVE-2025-6430: Content-Disposition header ignored when a file is included in an embed or object tag * Update to version 128.11.0: * CVE-2025-5283: Double-free in libvpx encoder * CVE-2025-5263: Error handling for script execution was incorrectly isolated from web content * CVE-2025-5264: Potential local code execution in ?Copy as cURL? command * CVE-2025-5265: Potential local code execution in ?Copy as cURL? command * CVE-2025-5266: Script element events leaked cross-origin resource status * CVE-2025-5267: Clickjacking vulnerability could have led to leaking saved payment card details * CVE-2025-5268: Memory safety bugs fixed in Firefox 139, Thunderbird 139, Firefox ESR 128.11, and Thunderbird 128.11 * CVE-2025-5269: Memory safety bug fixed in Firefox ESR 128.11 and Thunderbird 128.11 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-93=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-93=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * mozjs128-debugsource-128.14.0-160000.1.1 * libmozjs-128-0-128.14.0-160000.1.1 * mozjs128-debuginfo-128.14.0-160000.1.1 * mozjs128-devel-128.14.0-160000.1.1 * libmozjs-128-0-debuginfo-128.14.0-160000.1.1 * mozjs128-128.14.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * mozjs128-debugsource-128.14.0-160000.1.1 * libmozjs-128-0-128.14.0-160000.1.1 * mozjs128-debuginfo-128.14.0-160000.1.1 * mozjs128-devel-128.14.0-160000.1.1 * libmozjs-128-0-debuginfo-128.14.0-160000.1.1 * mozjs128-128.14.0-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-5263.html * https://www.suse.com/security/cve/CVE-2025-5264.html * https://www.suse.com/security/cve/CVE-2025-5265.html * https://www.suse.com/security/cve/CVE-2025-5266.html * https://www.suse.com/security/cve/CVE-2025-5267.html * https://www.suse.com/security/cve/CVE-2025-5268.html * https://www.suse.com/security/cve/CVE-2025-5269.html * https://www.suse.com/security/cve/CVE-2025-5283.html * https://www.suse.com/security/cve/CVE-2025-6424.html * https://www.suse.com/security/cve/CVE-2025-6425.html * https://www.suse.com/security/cve/CVE-2025-6426.html * https://www.suse.com/security/cve/CVE-2025-6429.html * https://www.suse.com/security/cve/CVE-2025-6430.html * https://www.suse.com/security/cve/CVE-2025-8027.html * https://www.suse.com/security/cve/CVE-2025-8028.html * https://www.suse.com/security/cve/CVE-2025-8029.html * https://www.suse.com/security/cve/CVE-2025-8030.html * https://www.suse.com/security/cve/CVE-2025-8031.html * https://www.suse.com/security/cve/CVE-2025-8032.html * https://www.suse.com/security/cve/CVE-2025-8033.html * https://www.suse.com/security/cve/CVE-2025-8034.html * https://www.suse.com/security/cve/CVE-2025-8035.html * https://www.suse.com/security/cve/CVE-2025-9179.html * https://www.suse.com/security/cve/CVE-2025-9180.html * https://www.suse.com/security/cve/CVE-2025-9181.html * https://www.suse.com/security/cve/CVE-2025-9185.html * https://bugzilla.suse.com/show_bug.cgi?id=1248162 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:50:54 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:50:54 -0000 Subject: SUSE-SU-2025:21168-1: important: Security update for python-cbor2 Message-ID: <176538545410.6931.741256931697739127@smelt2.prg2.suse.org> # Security update for python-cbor2 Announcement ID: SUSE-SU-2025:21168-1 Release Date: 2025-12-02T13:51:41Z Rating: important References: * bsc#1220096 * bsc#1253746 Cross-References: * CVE-2024-26134 * CVE-2025-64076 CVSS scores: * CVE-2024-26134 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26134 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64076 ( SUSE ): 5.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:H/SC:L/SI:N/SA:N * CVE-2025-64076 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:H * CVE-2025-64076 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-cbor2 fixes the following issues: * CVE-2025-64076: Fixed bug in decode_definite_long_string() that causes incorrect chunk length calculation (bsc#1253746). Already fixed in release 5.6.3: * CVE-2024-26134: Fixed potential crash when hashing a CBORTag (bsc#1220096). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-91=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-91=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * python-cbor2-debugsource-5.6.5-160000.3.1 * python313-cbor2-debuginfo-5.6.5-160000.3.1 * python313-cbor2-5.6.5-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * python-cbor2-debugsource-5.6.5-160000.3.1 * python313-cbor2-debuginfo-5.6.5-160000.3.1 * python313-cbor2-5.6.5-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26134.html * https://www.suse.com/security/cve/CVE-2025-64076.html * https://bugzilla.suse.com/show_bug.cgi?id=1220096 * https://bugzilla.suse.com/show_bug.cgi?id=1253746 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:50:56 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:50:56 -0000 Subject: SUSE-SU-2025:21167-1: important: Security update for strongswan Message-ID: <176538545626.6931.12074589578896842300@smelt2.prg2.suse.org> # Security update for strongswan Announcement ID: SUSE-SU-2025:21167-1 Release Date: 2025-12-02T13:11:59Z Rating: important References: * bsc#1251941 Cross-References: * CVE-2025-62291 CVSS scores: * CVE-2025-62291 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for strongswan fixes the following issues: * CVE-2025-62291: Fixed buffer overflow when handling EAP-MSCHAPv2 failure requests (bsc#1251941). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-90=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-90=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * strongswan-mysql-6.0.1-160000.3.1 * strongswan-6.0.1-160000.3.1 * strongswan-ipsec-6.0.1-160000.3.1 * strongswan-mysql-debuginfo-6.0.1-160000.3.1 * strongswan-sqlite-debuginfo-6.0.1-160000.3.1 * strongswan-debuginfo-6.0.1-160000.3.1 * strongswan-nm-debuginfo-6.0.1-160000.3.1 * strongswan-nm-6.0.1-160000.3.1 * strongswan-debugsource-6.0.1-160000.3.1 * strongswan-sqlite-6.0.1-160000.3.1 * strongswan-fips-6.0.1-160000.3.1 * strongswan-ipsec-debuginfo-6.0.1-160000.3.1 * SUSE Linux Enterprise Server 16.0 (noarch) * strongswan-doc-6.0.1-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * strongswan-mysql-6.0.1-160000.3.1 * strongswan-6.0.1-160000.3.1 * strongswan-ipsec-6.0.1-160000.3.1 * strongswan-mysql-debuginfo-6.0.1-160000.3.1 * strongswan-sqlite-debuginfo-6.0.1-160000.3.1 * strongswan-debuginfo-6.0.1-160000.3.1 * strongswan-nm-debuginfo-6.0.1-160000.3.1 * strongswan-nm-6.0.1-160000.3.1 * strongswan-debugsource-6.0.1-160000.3.1 * strongswan-sqlite-6.0.1-160000.3.1 * strongswan-fips-6.0.1-160000.3.1 * strongswan-ipsec-debuginfo-6.0.1-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * strongswan-doc-6.0.1-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62291.html * https://bugzilla.suse.com/show_bug.cgi?id=1251941 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:51:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:51:04 -0000 Subject: SUSE-SU-2025:21164-1: important: Security update for java-17-openjdk Message-ID: <176538546461.6931.1073454337974971943@smelt2.prg2.suse.org> # Security update for java-17-openjdk Announcement ID: SUSE-SU-2025:21164-1 Release Date: 2025-11-28T10:27:02Z Rating: important References: * bsc#1246806 * bsc#1252414 * bsc#1252417 Cross-References: * CVE-2025-53057 * CVE-2025-53066 CVSS scores: * CVE-2025-53057 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53066 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for java-17-openjdk fixes the following issues: Upgrade to upstream tag jdk-17.0.17+10 (October 2025 CPU): * CVE-2025-53066: Fixed enhance path factories (bsc#1252417). * CVE-2025-53057: Fixed enhance certificate handling (bsc#1252414). Other bug fixes: * Do not embed rebuild counter (bsc#1246806). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-84=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-84=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-jmods-17.0.17.0-160000.1.1 * java-17-openjdk-headless-17.0.17.0-160000.1.1 * java-17-openjdk-devel-debuginfo-17.0.17.0-160000.1.1 * java-17-openjdk-demo-17.0.17.0-160000.1.1 * java-17-openjdk-debuginfo-17.0.17.0-160000.1.1 * java-17-openjdk-headless-debuginfo-17.0.17.0-160000.1.1 * java-17-openjdk-src-17.0.17.0-160000.1.1 * java-17-openjdk-devel-17.0.17.0-160000.1.1 * java-17-openjdk-17.0.17.0-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * java-17-openjdk-javadoc-17.0.17.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * java-17-openjdk-jmods-17.0.17.0-160000.1.1 * java-17-openjdk-headless-17.0.17.0-160000.1.1 * java-17-openjdk-devel-debuginfo-17.0.17.0-160000.1.1 * java-17-openjdk-demo-17.0.17.0-160000.1.1 * java-17-openjdk-debuginfo-17.0.17.0-160000.1.1 * java-17-openjdk-headless-debuginfo-17.0.17.0-160000.1.1 * java-17-openjdk-src-17.0.17.0-160000.1.1 * java-17-openjdk-devel-17.0.17.0-160000.1.1 * java-17-openjdk-17.0.17.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * java-17-openjdk-javadoc-17.0.17.0-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-53057.html * https://www.suse.com/security/cve/CVE-2025-53066.html * https://bugzilla.suse.com/show_bug.cgi?id=1246806 * https://bugzilla.suse.com/show_bug.cgi?id=1252414 * https://bugzilla.suse.com/show_bug.cgi?id=1252417 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:51:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:51:10 -0000 Subject: SUSE-SU-2025:21162-1: important: Security update for java-21-openjdk Message-ID: <176538547099.6931.17775858440907843931@smelt2.prg2.suse.org> # Security update for java-21-openjdk Announcement ID: SUSE-SU-2025:21162-1 Release Date: 2025-11-28T09:35:08Z Rating: important References: * bsc#1246806 * bsc#1252414 * bsc#1252417 * bsc#1252418 Cross-References: * CVE-2025-53057 * CVE-2025-53066 * CVE-2025-61748 CVSS scores: * CVE-2025-53057 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53066 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-61748 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-61748 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-61748 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities and has one fix can now be installed. ## Description: This update for java-21-openjdk fixes the following issues: Update to upstream tag jdk-21.0.9+10 (October 2025 CPU): * CVE-2025-53066: Fixed enhance path factories (bsc#1252417). * CVE-2025-61748: Fixed enhance string handling (bsc#1252418). * CVE-2025-53057: Fixed enhance certificate handling (bsc#1252414). Other bug fixes: * Do not embed rebuild counter (bsc#1246806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-82=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-82=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * java-21-openjdk-21.0.9.0-160000.1.1 * java-21-openjdk-src-21.0.9.0-160000.1.1 * java-21-openjdk-devel-21.0.9.0-160000.1.1 * java-21-openjdk-devel-debuginfo-21.0.9.0-160000.1.1 * java-21-openjdk-debuginfo-21.0.9.0-160000.1.1 * java-21-openjdk-demo-21.0.9.0-160000.1.1 * java-21-openjdk-headless-debuginfo-21.0.9.0-160000.1.1 * java-21-openjdk-headless-21.0.9.0-160000.1.1 * java-21-openjdk-jmods-21.0.9.0-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * java-21-openjdk-javadoc-21.0.9.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * java-21-openjdk-21.0.9.0-160000.1.1 * java-21-openjdk-src-21.0.9.0-160000.1.1 * java-21-openjdk-devel-21.0.9.0-160000.1.1 * java-21-openjdk-devel-debuginfo-21.0.9.0-160000.1.1 * java-21-openjdk-debuginfo-21.0.9.0-160000.1.1 * java-21-openjdk-demo-21.0.9.0-160000.1.1 * java-21-openjdk-headless-debuginfo-21.0.9.0-160000.1.1 * java-21-openjdk-headless-21.0.9.0-160000.1.1 * java-21-openjdk-jmods-21.0.9.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * java-21-openjdk-javadoc-21.0.9.0-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-53057.html * https://www.suse.com/security/cve/CVE-2025-53066.html * https://www.suse.com/security/cve/CVE-2025-61748.html * https://bugzilla.suse.com/show_bug.cgi?id=1246806 * https://bugzilla.suse.com/show_bug.cgi?id=1252414 * https://bugzilla.suse.com/show_bug.cgi?id=1252417 * https://bugzilla.suse.com/show_bug.cgi?id=1252418 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:51:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:51:13 -0000 Subject: SUSE-SU-2025:21161-1: moderate: Security update for openssh Message-ID: <176538547365.6931.17286142340630392492@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:21161-1 Release Date: 2025-11-28T07:46:24Z Rating: moderate References: * bsc#1251198 * bsc#1251199 Cross-References: * CVE-2025-61984 * CVE-2025-61985 CVSS scores: * CVE-2025-61984 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61984 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-61985 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61985 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61985 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2025-61984: code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198). * CVE-2025-61985: code execution via '\0' character in ssh:// URI when a ProxyCommand is used (bsc#1251199). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-81=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-81=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-debugsource-10.0p2-160000.3.1 * openssh-askpass-gnome-debuginfo-10.0p2-160000.3.1 * openssh-clients-10.0p2-160000.3.1 * openssh-clients-debuginfo-10.0p2-160000.3.1 * openssh-common-10.0p2-160000.3.1 * openssh-helpers-10.0p2-160000.3.1 * openssh-common-debuginfo-10.0p2-160000.3.1 * openssh-10.0p2-160000.3.1 * openssh-debuginfo-10.0p2-160000.3.1 * openssh-debugsource-10.0p2-160000.3.1 * openssh-server-10.0p2-160000.3.1 * openssh-server-config-rootlogin-10.0p2-160000.3.1 * openssh-askpass-gnome-10.0p2-160000.3.1 * openssh-helpers-debuginfo-10.0p2-160000.3.1 * openssh-server-debuginfo-10.0p2-160000.3.1 * openssh-cavs-debuginfo-10.0p2-160000.3.1 * openssh-cavs-10.0p2-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * openssh-askpass-gnome-debugsource-10.0p2-160000.3.1 * openssh-askpass-gnome-debuginfo-10.0p2-160000.3.1 * openssh-clients-10.0p2-160000.3.1 * openssh-clients-debuginfo-10.0p2-160000.3.1 * openssh-common-10.0p2-160000.3.1 * openssh-helpers-10.0p2-160000.3.1 * openssh-common-debuginfo-10.0p2-160000.3.1 * openssh-10.0p2-160000.3.1 * openssh-debuginfo-10.0p2-160000.3.1 * openssh-debugsource-10.0p2-160000.3.1 * openssh-server-10.0p2-160000.3.1 * openssh-server-config-rootlogin-10.0p2-160000.3.1 * openssh-askpass-gnome-10.0p2-160000.3.1 * openssh-helpers-debuginfo-10.0p2-160000.3.1 * openssh-server-debuginfo-10.0p2-160000.3.1 * openssh-cavs-debuginfo-10.0p2-160000.3.1 * openssh-cavs-10.0p2-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61984.html * https://www.suse.com/security/cve/CVE-2025-61985.html * https://bugzilla.suse.com/show_bug.cgi?id=1251198 * https://bugzilla.suse.com/show_bug.cgi?id=1251199 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:51:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:51:17 -0000 Subject: SUSE-SU-2025:21159-1: moderate: Security update for dovecot24 Message-ID: <176538547712.6931.12362781401367507621@smelt2.prg2.suse.org> # Security update for dovecot24 Announcement ID: SUSE-SU-2025:21159-1 Release Date: 2025-11-27T20:17:17Z Rating: moderate References: * bsc#1252839 Cross-References: * CVE-2025-30189 CVSS scores: * CVE-2025-30189 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2025-30189 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2025-30189 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for dovecot24 fixes the following issues: * Update dovecot to 2.4.2: * CVE-2025-30189: Fixed users cached with same cache key when auth cache was enabled (bsc#1252839) * Changes * auth: Remove proxy_always field. * config: Change settings history parsing to use python3. * doveadm: Print table formatter - Print empty values as "-". * imapc: Propagate remote error codes properly. * lda: Default mail_home=$HOME environment if not using userdb lookup * lib-dcrypt: Salt for new version 2 keys has been increased to 16 bytes. * lib-dregex: Add libpcre2 based regular expression support to Dovecot, if the library is missing, disable all regular expressions. This adds libpcre2-32 as build dependency. * lib-oauth2: jwt - Allow nbf and iat to point 1 second into future. * lib: Replace libicu with our own unicode library. Removes libicu as build dependency. * login-common: If proxying fails due to remote having invalid SSL cert, don't reconnect. * New features * auth: Add ssl_client_cert_fp and ssl_client_cert_pubkey_fp fields * config: Add support for $SET:filter/path/setting. * config: Improve @group includes to work with overwriting their settings. * doveadm kick: Add support for kicking multiple usernames * doveadm mailbox status: Add support for deleted status item. * imap, imap-client: Add experimental partial IMAP4rev2 support. * imap: Implement support for UTF8=ACCEPT for APPEND * lib-oauth2, oauth2: Add oauth2_token_expire_grace setting. * lmtp: lmtp-client - Support command pipelining. * login-common: Support local/remote blocks better. * master: accept() unix/inet connections before creating child process to handle it. This reduces timeouts when child processes are slow to spawn themselves. * Bug fixes * SMTPUTF8 was accepted even when it wasn't enabled. * auth, *-login: Direct logging with -L parameter was not working. * auth: Crash occured when OAUTH token validation failed with oauth2_use_worker_with_mech=yes. * auth: Invalid field handling crashes were fixed. * auth: ldap - Potential crash could happen at deinit. * auth: mech-gssapi - Server sending empty initial response would cause errors. * auth: mech-winbind - GSS-SPNEGO mechanism was erroneously marked as * not accepting NUL. * config: Multiple issues with $SET handling has been fixed. * configure: Building without LDAP didn't work. * doveadm: If source user didn't exist, a crash would occur. * imap, pop3, submission, imap-urlauth: USER environment usage was broken when running standalone. * imap-hibernate: Statistics would get truncated on unhibernation. * imap: "SEARCH MIMEPART FILENAME ENDS" command could have accessed memory outside allocated buffer, resulting in a crash. * imapc: Fetching partial headers would cause other cached headers to be cached empty, breaking e.g. imap envelope responses when caching to disk. * imapc: Shared namespace's INBOX mailbox was not always uppercased. * imapc: imapc_features=guid-forced GUID generation was not working correctly. * lda: USER environment was not accepted if -d hasn't been specified. * lib-http: http-url - Significant path percent encoding through parse and create was not preserved. This is mainly important for Dovecot's Lua bindings for lib-http. * lib-settings: Crash would occur when using %variables in SET_FILE type settings. * lib-storage: Attachment flags were attempted to be added for readonly mailboxes with mail_attachment_flags=add-flags. * lib-storage: Root directory for unusable shared namespaces was unnecessarily attempted to be created. * lib: Crash would occur when config was reloaded and logging to syslog. * login-common: Crash might have occured when login proxy was destroyed. * sqlite: The sqlite_journal_mode=wal setting didn't actually do anything. * Many other bugs have been fixed. * Update pigeonhole to 2.4.2 * Changes * lib-sieve: Use new regular expression library in core. * managesieve: Add default service_extra_groups=$SET:default_internal_group. * New features * lib-sieve: Add support for "extlists" extension. * lib-sieve: regex - Allow unicode comparator. * Bug fixes * lib-sieve-tool: sieve-tool - All sieve_script settings were overriden. * lib-sieve: storage: dict: sieve_script_dict filter was missing from settings. * sieve-ldap-storage: Fix compile without LDAP. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-79=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-79=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * dovecot24-devel-2.4.2-160000.1.1 * dovecot24-backend-sqlite-2.4.2-160000.1.1 * dovecot24-backend-mysql-2.4.2-160000.1.1 * dovecot24-fts-solr-2.4.2-160000.1.1 * dovecot24-backend-pgsql-2.4.2-160000.1.1 * dovecot24-backend-pgsql-debuginfo-2.4.2-160000.1.1 * dovecot24-fts-debuginfo-2.4.2-160000.1.1 * dovecot24-backend-sqlite-debuginfo-2.4.2-160000.1.1 * dovecot24-fts-2.4.2-160000.1.1 * dovecot24-fts-solr-debuginfo-2.4.2-160000.1.1 * dovecot24-debuginfo-2.4.2-160000.1.1 * dovecot24-backend-mysql-debuginfo-2.4.2-160000.1.1 * dovecot24-2.4.2-160000.1.1 * dovecot24-debugsource-2.4.2-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * dovecot24-devel-2.4.2-160000.1.1 * dovecot24-backend-sqlite-2.4.2-160000.1.1 * dovecot24-backend-mysql-2.4.2-160000.1.1 * dovecot24-fts-solr-2.4.2-160000.1.1 * dovecot24-backend-pgsql-2.4.2-160000.1.1 * dovecot24-backend-pgsql-debuginfo-2.4.2-160000.1.1 * dovecot24-fts-debuginfo-2.4.2-160000.1.1 * dovecot24-backend-sqlite-debuginfo-2.4.2-160000.1.1 * dovecot24-fts-2.4.2-160000.1.1 * dovecot24-fts-solr-debuginfo-2.4.2-160000.1.1 * dovecot24-debuginfo-2.4.2-160000.1.1 * dovecot24-backend-mysql-debuginfo-2.4.2-160000.1.1 * dovecot24-2.4.2-160000.1.1 * dovecot24-debugsource-2.4.2-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30189.html * https://bugzilla.suse.com/show_bug.cgi?id=1252839 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:51:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:51:19 -0000 Subject: SUSE-SU-2025:21158-1: important: Security update for himmelblau Message-ID: <176538547998.6931.11581707957202870571@smelt2.prg2.suse.org> # Security update for himmelblau Announcement ID: SUSE-SU-2025:21158-1 Release Date: 2025-11-27T20:16:29Z Rating: important References: * bsc#1249013 * bsc#1250687 Cross-References: * CVE-2025-58160 * CVE-2025-59044 CVSS scores: * CVE-2025-58160 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-58160 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-58160 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-59044 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-59044 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for himmelblau fixes the following issues: * Update to version 0.9.23+git.0.9776141: * CVE-2025-59044: Fixed GID collision of same-name groups allowing privilege escalation (bsc#1250687) * deps(rust): bump the all-cargo-updates group * CVE-2025-58160: tracing-subscriber: Fixed log pollution (bsc#1249013) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-80=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-80=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * pam-himmelblau-0.9.23+git.0.9776141-160000.1.1 * himmelblau-debuginfo-0.9.23+git.0.9776141-160000.1.1 * himmelblau-0.9.23+git.0.9776141-160000.1.1 * himmelblau-qr-greeter-0.9.23+git.0.9776141-160000.1.1 * himmelblau-sso-debuginfo-0.9.23+git.0.9776141-160000.1.1 * himmelblau-sso-0.9.23+git.0.9776141-160000.1.1 * libnss_himmelblau2-0.9.23+git.0.9776141-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * himmelblau-sshd-config-0.9.23+git.0.9776141-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * pam-himmelblau-0.9.23+git.0.9776141-160000.1.1 * himmelblau-debuginfo-0.9.23+git.0.9776141-160000.1.1 * himmelblau-0.9.23+git.0.9776141-160000.1.1 * himmelblau-qr-greeter-0.9.23+git.0.9776141-160000.1.1 * himmelblau-sso-debuginfo-0.9.23+git.0.9776141-160000.1.1 * himmelblau-sso-0.9.23+git.0.9776141-160000.1.1 * libnss_himmelblau2-0.9.23+git.0.9776141-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * himmelblau-sshd-config-0.9.23+git.0.9776141-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-58160.html * https://www.suse.com/security/cve/CVE-2025-59044.html * https://bugzilla.suse.com/show_bug.cgi?id=1249013 * https://bugzilla.suse.com/show_bug.cgi?id=1250687 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:51:39 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:51:39 -0000 Subject: SUSE-SU-2025:21152-1: important: Security update for tomcat11 Message-ID: <176538549914.6931.8099941217483396009@smelt2.prg2.suse.org> # Security update for tomcat11 Announcement ID: SUSE-SU-2025:21152-1 Release Date: 2025-11-27T15:45:05Z Rating: important References: * bsc#1252753 * bsc#1252756 * bsc#1252905 Cross-References: * CVE-2025-55752 * CVE-2025-55754 * CVE-2025-61795 CVSS scores: * CVE-2025-55752 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-55752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-55752 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-55754 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-55754 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-55754 ( NVD ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-61795 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61795 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61795 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for tomcat11 fixes the following issues: Update to Tomcat 11.0.13: * CVE-2025-55752: Fixed directory traversal via rewrite with possible RCE if PUT is enabled (bsc#1252753). * CVE-2025-55754: Fixed Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat (bsc#1252905). * CVE-2025-61795: Fixed temporary copies during the processing of multipart upload can lead to a denial of service (bsc#1252756). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-72=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-72=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * tomcat11-jsvc-11.0.13-160000.1.1 * tomcat11-el-6_0-api-11.0.13-160000.1.1 * tomcat11-jsp-4_0-api-11.0.13-160000.1.1 * tomcat11-webapps-11.0.13-160000.1.1 * tomcat11-servlet-6_1-api-11.0.13-160000.1.1 * tomcat11-doc-11.0.13-160000.1.1 * tomcat11-embed-11.0.13-160000.1.1 * tomcat11-docs-webapp-11.0.13-160000.1.1 * tomcat11-lib-11.0.13-160000.1.1 * tomcat11-11.0.13-160000.1.1 * tomcat11-admin-webapps-11.0.13-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * tomcat11-jsvc-11.0.13-160000.1.1 * tomcat11-el-6_0-api-11.0.13-160000.1.1 * tomcat11-jsp-4_0-api-11.0.13-160000.1.1 * tomcat11-webapps-11.0.13-160000.1.1 * tomcat11-servlet-6_1-api-11.0.13-160000.1.1 * tomcat11-doc-11.0.13-160000.1.1 * tomcat11-embed-11.0.13-160000.1.1 * tomcat11-docs-webapp-11.0.13-160000.1.1 * tomcat11-lib-11.0.13-160000.1.1 * tomcat11-11.0.13-160000.1.1 * tomcat11-admin-webapps-11.0.13-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55752.html * https://www.suse.com/security/cve/CVE-2025-55754.html * https://www.suse.com/security/cve/CVE-2025-61795.html * https://bugzilla.suse.com/show_bug.cgi?id=1252753 * https://bugzilla.suse.com/show_bug.cgi?id=1252756 * https://bugzilla.suse.com/show_bug.cgi?id=1252905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:51:44 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:51:44 -0000 Subject: SUSE-SU-2025:21150-1: moderate: Security update for libvirt Message-ID: <176538550442.6931.4625063994304149947@smelt2.prg2.suse.org> # Security update for libvirt Announcement ID: SUSE-SU-2025:21150-1 Release Date: 2025-11-27T10:23:20Z Rating: moderate References: * bsc#1253278 * bsc#1253642 * bsc#1253703 * jsc#PED-9265 Cross-References: * CVE-2025-12748 * CVE-2025-13193 CVSS scores: * CVE-2025-12748 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13193 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-13193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-13193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities, contains one feature and has one fix can now be installed. ## Description: This update for libvirt fixes the following issues: * CVE-2025-13193: Fixed Information disclosure via world-readable VM snapshots (bsc#1253703) * CVE-2025-12748: Fixed Denial of service in XML parsing (bsc#1253278) Other fixes: * spec: Adjust dbus dependency (bsc#1253642) * qemu: Add support for Intel TDX (jsc#PED-9265) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-66=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-66=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libvirt-daemon-lock-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-11.4.0-160000.3.1 * libvirt-daemon-driver-network-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-network-11.4.0-160000.3.1 * libvirt-daemon-driver-secret-11.4.0-160000.3.1 * libvirt-daemon-hooks-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-logical-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-logical-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-qemu-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-nwfilter-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-secret-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-scsi-11.4.0-160000.3.1 * libvirt-daemon-proxy-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-qemu-11.4.0-160000.3.1 * libvirt-libs-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-nodedev-11.4.0-160000.3.1 * libvirt-daemon-common-11.4.0-160000.3.1 * libvirt-client-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-iscsi-direct-11.4.0-160000.3.1 * libvirt-daemon-driver-nwfilter-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-11.4.0-160000.3.1 * libvirt-devel-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-scsi-debuginfo-11.4.0-160000.3.1 * libvirt-nss-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-core-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-iscsi-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-mpath-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-log-11.4.0-160000.3.1 * libvirt-ssh-proxy-11.4.0-160000.3.1 * libvirt-libs-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-disk-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-qemu-11.4.0-160000.3.1 * libvirt-daemon-plugin-lockd-11.4.0-160000.3.1 * libvirt-nss-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-disk-11.4.0-160000.3.1 * libvirt-daemon-proxy-11.4.0-160000.3.1 * libvirt-ssh-proxy-debuginfo-11.4.0-160000.3.1 * libvirt-debugsource-11.4.0-160000.3.1 * libvirt-daemon-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-mpath-11.4.0-160000.3.1 * libvirt-client-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-core-11.4.0-160000.3.1 * libvirt-daemon-lock-debuginfo-11.4.0-160000.3.1 * libvirt-client-qemu-11.4.0-160000.3.1 * libvirt-daemon-config-network-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-config-nwfilter-11.4.0-160000.3.1 * libvirt-daemon-driver-nodedev-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-plugin-lockd-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-log-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-common-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-11.4.0-160000.3.1 * SUSE Linux Enterprise Server 16.0 (noarch) * libvirt-doc-11.4.0-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libvirt-daemon-lock-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-11.4.0-160000.3.1 * libvirt-daemon-driver-network-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-network-11.4.0-160000.3.1 * libvirt-daemon-driver-secret-11.4.0-160000.3.1 * libvirt-daemon-hooks-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-logical-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-logical-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-qemu-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-nwfilter-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-secret-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-scsi-11.4.0-160000.3.1 * libvirt-daemon-proxy-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-qemu-11.4.0-160000.3.1 * libvirt-libs-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-nodedev-11.4.0-160000.3.1 * libvirt-daemon-common-11.4.0-160000.3.1 * libvirt-client-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-iscsi-direct-11.4.0-160000.3.1 * libvirt-daemon-driver-nwfilter-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-11.4.0-160000.3.1 * libvirt-devel-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-scsi-debuginfo-11.4.0-160000.3.1 * libvirt-nss-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-core-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-iscsi-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-mpath-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-log-11.4.0-160000.3.1 * libvirt-ssh-proxy-11.4.0-160000.3.1 * libvirt-libs-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-disk-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-qemu-11.4.0-160000.3.1 * libvirt-daemon-plugin-lockd-11.4.0-160000.3.1 * libvirt-nss-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-disk-11.4.0-160000.3.1 * libvirt-daemon-proxy-11.4.0-160000.3.1 * libvirt-ssh-proxy-debuginfo-11.4.0-160000.3.1 * libvirt-debugsource-11.4.0-160000.3.1 * libvirt-daemon-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-mpath-11.4.0-160000.3.1 * libvirt-client-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-core-11.4.0-160000.3.1 * libvirt-daemon-lock-debuginfo-11.4.0-160000.3.1 * libvirt-client-qemu-11.4.0-160000.3.1 * libvirt-daemon-config-network-11.4.0-160000.3.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-config-nwfilter-11.4.0-160000.3.1 * libvirt-daemon-driver-nodedev-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-plugin-lockd-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-log-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-common-debuginfo-11.4.0-160000.3.1 * libvirt-daemon-11.4.0-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * libvirt-doc-11.4.0-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12748.html * https://www.suse.com/security/cve/CVE-2025-13193.html * https://bugzilla.suse.com/show_bug.cgi?id=1253278 * https://bugzilla.suse.com/show_bug.cgi?id=1253642 * https://bugzilla.suse.com/show_bug.cgi?id=1253703 * https://jira.suse.com/browse/PED-9265 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:51:47 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:51:47 -0000 Subject: SUSE-SU-2025:21149-1: important: Security update for xwayland Message-ID: <176538550775.6931.17305570264229538122@smelt2.prg2.suse.org> # Security update for xwayland Announcement ID: SUSE-SU-2025:21149-1 Release Date: 2025-11-27T10:11:16Z Rating: important References: * bsc#1251958 * bsc#1251959 * bsc#1251960 Cross-References: * CVE-2025-62229 * CVE-2025-62230 * CVE-2025-62231 CVSS scores: * CVE-2025-62229 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-62229 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-62229 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-62230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-62230 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-62230 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2025-62231 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-62231 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-62231 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for xwayland fixes the following issues: * CVE-2025-62229: Fixed use-after-free in XPresentNotify structures creation (bsc#1251958). * CVE-2025-62230: Fixed use-after-free in Xkb client resource removal (bsc#1251959). * CVE-2025-62231: Fixed value overflow in Xkb extension XkbSetCompatMap() (bsc#1251960). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-65=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-65=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * xwayland-devel-24.1.6-160000.3.1 * xwayland-debugsource-24.1.6-160000.3.1 * xwayland-24.1.6-160000.3.1 * xwayland-debuginfo-24.1.6-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * xwayland-devel-24.1.6-160000.3.1 * xwayland-debugsource-24.1.6-160000.3.1 * xwayland-24.1.6-160000.3.1 * xwayland-debuginfo-24.1.6-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62229.html * https://www.suse.com/security/cve/CVE-2025-62230.html * https://www.suse.com/security/cve/CVE-2025-62231.html * https://bugzilla.suse.com/show_bug.cgi?id=1251958 * https://bugzilla.suse.com/show_bug.cgi?id=1251959 * https://bugzilla.suse.com/show_bug.cgi?id=1251960 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:52:59 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:52:59 -0000 Subject: SUSE-SU-2025:21147-1: important: Security update for the Linux Kernel Message-ID: <176538557997.6931.5619191155401382057@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:21147-1 Release Date: 2025-11-26T17:04:24Z Rating: important References: * bsc#1218644 * bsc#1238472 * bsc#1239206 * bsc#1241166 * bsc#1241637 * bsc#1247222 * bsc#1248630 * bsc#1249161 * bsc#1249226 * bsc#1249302 * bsc#1249317 * bsc#1249397 * bsc#1249398 * bsc#1249495 * bsc#1249512 * bsc#1249608 * bsc#1249735 * bsc#1250202 * bsc#1250379 * bsc#1250400 * bsc#1250455 * bsc#1250491 * bsc#1250704 * bsc#1250721 * bsc#1250749 * bsc#1250946 * bsc#1251176 * bsc#1251177 * bsc#1251232 * bsc#1251233 * bsc#1251804 * bsc#1251809 * bsc#1251819 * bsc#1251930 * bsc#1251967 * bsc#1252033 * bsc#1252035 * bsc#1252039 * bsc#1252044 * bsc#1252047 * bsc#1252051 * bsc#1252052 * bsc#1252056 * bsc#1252060 * bsc#1252062 * bsc#1252064 * bsc#1252065 * bsc#1252067 * bsc#1252069 * bsc#1252070 * bsc#1252072 * bsc#1252074 * bsc#1252075 * bsc#1252076 * bsc#1252078 * bsc#1252079 * bsc#1252081 * bsc#1252082 * bsc#1252083 * bsc#1252253 * bsc#1252265 * bsc#1252267 * bsc#1252270 * bsc#1252330 * bsc#1252333 * bsc#1252336 * bsc#1252346 * bsc#1252348 * bsc#1252349 * bsc#1252678 * bsc#1252679 * bsc#1252688 * bsc#1252725 * bsc#1252734 * bsc#1252772 * bsc#1252774 * bsc#1252780 * bsc#1252785 * bsc#1252787 * bsc#1252789 * bsc#1252797 * bsc#1252819 * bsc#1252822 * bsc#1252826 * bsc#1252841 * bsc#1252848 * bsc#1252849 * bsc#1252850 * bsc#1252851 * bsc#1252854 * bsc#1252858 * bsc#1252862 * bsc#1252865 * bsc#1252866 * bsc#1252873 * bsc#1252902 * bsc#1252909 * bsc#1252915 * bsc#1252918 * bsc#1252921 * bsc#1252939 * jsc#PED-348 * jsc#PED-4593 * jsc#PED-9891 Cross-References: * CVE-2025-21816 * CVE-2025-38653 * CVE-2025-38718 * CVE-2025-39676 * CVE-2025-39702 * CVE-2025-39756 * CVE-2025-39779 * CVE-2025-39797 * CVE-2025-39812 * CVE-2025-39866 * CVE-2025-39876 * CVE-2025-39881 * CVE-2025-39895 * CVE-2025-39903 * CVE-2025-39911 * CVE-2025-39947 * CVE-2025-39948 * CVE-2025-39949 * CVE-2025-39950 * CVE-2025-39955 * CVE-2025-39956 * CVE-2025-39963 * CVE-2025-39965 * CVE-2025-39967 * CVE-2025-39968 * CVE-2025-39969 * CVE-2025-39970 * CVE-2025-39971 * CVE-2025-39972 * CVE-2025-39973 * CVE-2025-39978 * CVE-2025-39979 * CVE-2025-39981 * CVE-2025-39982 * CVE-2025-39984 * CVE-2025-39985 * CVE-2025-39986 * CVE-2025-39987 * CVE-2025-39988 * CVE-2025-39991 * CVE-2025-39992 * CVE-2025-39993 * CVE-2025-39994 * CVE-2025-39995 * CVE-2025-39996 * CVE-2025-39997 * CVE-2025-40000 * CVE-2025-40005 * CVE-2025-40009 * CVE-2025-40011 * CVE-2025-40012 * CVE-2025-40013 * CVE-2025-40016 * CVE-2025-40018 * CVE-2025-40019 * CVE-2025-40020 * CVE-2025-40029 * CVE-2025-40032 * CVE-2025-40035 * CVE-2025-40036 * CVE-2025-40037 * CVE-2025-40040 * CVE-2025-40043 * CVE-2025-40044 * CVE-2025-40048 * CVE-2025-40049 * CVE-2025-40051 * CVE-2025-40052 * CVE-2025-40056 * CVE-2025-40058 * CVE-2025-40060 * CVE-2025-40061 * CVE-2025-40062 * CVE-2025-40071 * CVE-2025-40078 * CVE-2025-40080 * CVE-2025-40085 * CVE-2025-40087 * CVE-2025-40091 * CVE-2025-40096 * CVE-2025-40100 * CVE-2025-40104 * CVE-2025-40364 CVSS scores: * CVE-2025-21816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38653 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38653 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39812 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39866 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39866 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39903 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39903 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39947 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39947 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39948 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39948 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39949 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39949 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39950 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39950 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39955 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39955 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39956 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39956 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39963 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39963 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39965 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39965 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39967 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39968 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39968 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39969 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39969 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39970 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39970 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39971 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39971 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39972 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39972 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39973 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39978 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39979 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39979 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39981 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39981 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40005 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40012 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40012 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40016 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40016 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40018 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40019 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40020 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40029 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40032 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40032 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40037 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40043 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40043 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40044 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40049 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40049 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-40051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40056 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40056 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40085 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40085 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40091 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40091 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40096 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40100 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40104 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40104 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-40364 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40364 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40364 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves 83 vulnerabilities, contains three features and has 18 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2025-21816: hrtimers: Force migrate away hrtimers queued after (bsc#1238472). * CVE-2025-38653: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al (bsc#1248630). * CVE-2025-38718: sctp: linearize cloned gso packets in sctp_rcv (bsc#1249161). * CVE-2025-39676: scsi: qla4xxx: Prevent a potential error pointer dereference (bsc#1249302). * CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time (bsc#1249317). * CVE-2025-39756: fs: Prevent file descriptor table allocations exceeding INT_MAX (bsc#1249512). * CVE-2025-39779: btrfs: subpage: keep TOWRITE tag until folio is cleaned (bsc#1249495). * CVE-2025-39812: sctp: initialize more fields in sctp_v6_from_sk() (bsc#1250202). * CVE-2025-39866: fs: writeback: fix use-after-free in __mark_inode_dirty() (bsc#1250455). * CVE-2025-39876: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() (bsc#1250400). * CVE-2025-39881: kernfs: Fix UAF in polling when open file is released (bsc#1250379). * CVE-2025-39895: sched: Fix sched_numa_find_nth_cpu() if mask offline (bsc#1250721). * CVE-2025-39903: of_numa: fix uninitialized memory nodes causing kernel panic (bsc#1250749). * CVE-2025-39911: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path (bsc#1250704). * CVE-2025-39947: net/mlx5e: Harden uplink netdev access against device unbind (bsc#1251232). * CVE-2025-39948: ice: fix Rx page leak on multi-buffer frames (bsc#1251233). * CVE-2025-39949: qed: Don't collect too many protection override GRC elements (bsc#1251177). * CVE-2025-39950: net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR (bsc#1251176). * CVE-2025-39955: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() (bsc#1251804). * CVE-2025-39956: igc: don't fail igc_probe() on LED setup error (bsc#1251809). * CVE-2025-39963: io_uring: fix incorrect io_kiocb reference in io_link_skb (bsc#1251819). * CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047). * CVE-2025-39969: i40e: fix validation of VF state in get resources (bsc#1252044). * CVE-2025-39970: i40e: fix input validation logic for action_meta (bsc#1252051). * CVE-2025-39971: i40e: fix idx validation in config queues msg (bsc#1252052). * CVE-2025-39972: i40e: fix idx validation in i40e_validate_queue_map (bsc#1252039). * CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035). * CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069). * CVE-2025-39979: net/mlx5: fs, add API for sharing HWS action by refcount (bsc#1252067). * CVE-2025-39984: net: tun: Update napi->skb after XDP process (bsc#1252081). * CVE-2025-39992: mm: swap: check for stable address space before operating on the VMA (bsc#1252076). * CVE-2025-40000: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() (bsc#1252062). * CVE-2025-40005: spi: cadence-quadspi: Implement refcount to handle unbind during busy (bsc#1252349). * CVE-2025-40012: net/smc: fix warning in smc_rx_splice() when calling get_page() (bsc#1252330). * CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688). * CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780). * CVE-2025-40051: vhost: vringh: Modify the return value check (bsc#1252858). * CVE-2025-40056: vhost: vringh: Fix copy_to_iter return value check (bsc#1252826). * CVE-2025-40060: coresight: trbe: Return NULL pointer for allocation failures (bsc#1252848). * CVE-2025-40078: bpf: Explicitly check accesses to bpf_sock_addr (bsc#1252789). * CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774). * CVE-2025-40100: btrfs: do not assert we found block group item when creating free space tree (bsc#1252918). The following non security issues were fixed: * add bug reference to existing hv_netvsc change (bsc#1252265) * amd-pstate-ut: Reset amd-pstate driver mode after running selftests (bsc#1249226). * cgroup/cpuset: Remove remote_partition_check() & make update_cpumasks_hier() handle remote partition (bsc#1241166). * cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166). * cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166). * doc/README.SUSE: Correct the character used for TAINT_NO_SUPPORT The character was previously 'N', but upstream used it for TAINT_TEST, which prompted the change of TAINT_NO_SUPPORT to 'n'. * dpll: zl3073x: Add firmware loading functionality (bsc#1252253). * dpll: zl3073x: Add functions to access hardware registers (bsc#1252253). * dpll: zl3073x: Add low-level flash functions (bsc#1252253). * dpll: zl3073x: Add support to get fractional frequency offset (bsc#1252253). * dpll: zl3073x: Add support to get phase offset on connected input pin (bsc#1252253). * dpll: zl3073x: Add support to get/set esync on pins (bsc#1252253). * dpll: zl3073x: Fix double free in zl3073x_devlink_flash_update() (bsc#1252253). * dpll: zl3073x: Handle missing or corrupted flash configuration (bsc#1252253). * dpll: zl3073x: Implement devlink flash callback (bsc#1252253). * dpll: zl3073x: Increase maximum size of flash utility (bsc#1252253). * dpll: zl3073x: Refactor DPLL initialization (bsc#1252253). * drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table() (git-fixes). * drm/xe/guc: Prepare GuC register list and update ADS size for error capture (stable-fixes). * ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd (bsc#1247222). * ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation (bsc#1247222). * ixgbevf: fix getting link speed data for E610 devices (bsc#1247222). * ixgbevf: fix mailbox API compatibility by negotiating supported features (bsc#1247222). * kbuild/modfinal: Link livepatches with module-common.o (bsc#1218644, bsc#1252270). * kdb: Replace deprecated strcpy() with memmove() in vkdb_printf() (bsc#1252939). * kernel-subpackage-spec: Do not doubly-sign modules (bsc#1251930). * nvme-auth: update sc_c in host response (git-fixes bsc#1249397). * perf hwmon_pmu: Fix uninitialized variable warning (perf- sle16-v6.13-userspace-update, git-fixes). * phy: cadence: cdns-dphy: Update calibration wait time for startup state machine (git-fixes). * powerpc/fadump: skip parameter area allocation when fadump is disabled (jsc#PED-9891 git-fixes). * proc: fix missing pde_set_flags() for net proc files (bsc#1248630) * proc: fix type confusion in pde_set_flags() (bsc#1248630) * rpm/check-for-config-changes: ignore CONFIG_SCHED_PROXY_EXEC, too (bsc#1250946) * scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267). * x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1252725). * x86/resctrl: Fix miscount of bandwidth event when reactivating previously unavailable RMID (bsc#1252734). * x86/resctrl: Refactor resctrl_arch_rmid_read() (bsc#1252734). * x86/virt/tdx: Mark memory cache state incoherent when making SEAMCALL (jsc#PED-348). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-58=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-58=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * kernel-source-6.12.0-160000.7.1 * kernel-docs-html-6.12.0-160000.7.1 * kernel-devel-6.12.0-160000.7.1 * kernel-source-vanilla-6.12.0-160000.7.1 * kernel-macros-6.12.0-160000.7.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-6.12.0-160000.7.1 * kernel-kvmsmall-debugsource-6.12.0-160000.7.1 * kernel-kvmsmall-devel-6.12.0-160000.7.1 * kernel-default-base-6.12.0-160000.6.1.160000.2.4 * SUSE Linux Enterprise Server 16.0 (aarch64 nosrc) * kernel-64kb-6.12.0-160000.7.1 * SUSE Linux Enterprise Server 16.0 (aarch64) * kernel-64kb-debugsource-6.12.0-160000.7.1 * kernel-64kb-extra-6.12.0-160000.7.1 * kernel-64kb-devel-6.12.0-160000.7.1 * kernel-64kb-extra-debuginfo-6.12.0-160000.7.1 * kernel-64kb-debuginfo-6.12.0-160000.7.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.12.0-160000.7.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * kernel-syms-6.12.0-160000.7.1 * kernel-default-extra-debuginfo-6.12.0-160000.7.1 * kernel-default-debugsource-6.12.0-160000.7.1 * kernel-default-extra-6.12.0-160000.7.1 * kernel-obs-qa-6.12.0-160000.7.1 * kernel-default-debuginfo-6.12.0-160000.7.1 * kernel-default-devel-6.12.0-160000.7.1 * SUSE Linux Enterprise Server 16.0 (noarch nosrc) * kernel-docs-6.12.0-160000.7.1 * SUSE Linux Enterprise Server 16.0 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.12.0-160000.7.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * kernel-kvmsmall-devel-debuginfo-6.12.0-160000.7.1 * kernel-default-vdso-6.12.0-160000.7.1 * kernel-default-devel-debuginfo-6.12.0-160000.7.1 * kernel-default-vdso-debuginfo-6.12.0-160000.7.1 * kernel-kvmsmall-vdso-6.12.0-160000.7.1 * kernel-kvmsmall-vdso-debuginfo-6.12.0-160000.7.1 * SUSE Linux Enterprise Server 16.0 (ppc64le s390x x86_64) * kernel-default-livepatch-6.12.0-160000.7.1 * SUSE Linux Enterprise Server 16.0 (nosrc s390x) * kernel-zfcpdump-6.12.0-160000.7.1 * SUSE Linux Enterprise Server 16.0 (s390x) * kernel-zfcpdump-debuginfo-6.12.0-160000.7.1 * kernel-zfcpdump-debugsource-6.12.0-160000.7.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * kernel-source-6.12.0-160000.7.1 * kernel-docs-html-6.12.0-160000.7.1 * kernel-devel-6.12.0-160000.7.1 * kernel-source-vanilla-6.12.0-160000.7.1 * kernel-macros-6.12.0-160000.7.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * gfs2-kmp-default-debuginfo-6.12.0-160000.7.1 * kernel-default-livepatch-6.12.0-160000.7.1 * kernel-syms-6.12.0-160000.7.1 * kernel-default-debugsource-6.12.0-160000.7.1 * kernel-default-extra-debuginfo-6.12.0-160000.7.1 * dlm-kmp-default-debuginfo-6.12.0-160000.7.1 * kernel-default-extra-6.12.0-160000.7.1 * kernel-default-base-6.12.0-160000.6.1.160000.2.4 * dlm-kmp-default-6.12.0-160000.7.1 * kernel-default-devel-6.12.0-160000.7.1 * kernel-kvmsmall-debuginfo-6.12.0-160000.7.1 * kernel-kvmsmall-debugsource-6.12.0-160000.7.1 * kernel-obs-qa-6.12.0-160000.7.1 * kernel-default-debuginfo-6.12.0-160000.7.1 * kernel-kvmsmall-devel-6.12.0-160000.7.1 * cluster-md-kmp-default-6.12.0-160000.7.1 * gfs2-kmp-default-6.12.0-160000.7.1 * cluster-md-kmp-default-debuginfo-6.12.0-160000.7.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (nosrc ppc64le x86_64) * kernel-kvmsmall-6.12.0-160000.7.1 * kernel-default-6.12.0-160000.7.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * kernel-kvmsmall-devel-debuginfo-6.12.0-160000.7.1 * kernel-default-vdso-6.12.0-160000.7.1 * kernel-default-devel-debuginfo-6.12.0-160000.7.1 * kernel-default-vdso-debuginfo-6.12.0-160000.7.1 * kernel-kvmsmall-vdso-6.12.0-160000.7.1 * kernel-kvmsmall-vdso-debuginfo-6.12.0-160000.7.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch nosrc) * kernel-docs-6.12.0-160000.7.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21816.html * https://www.suse.com/security/cve/CVE-2025-38653.html * https://www.suse.com/security/cve/CVE-2025-38718.html * https://www.suse.com/security/cve/CVE-2025-39676.html * https://www.suse.com/security/cve/CVE-2025-39702.html * https://www.suse.com/security/cve/CVE-2025-39756.html * https://www.suse.com/security/cve/CVE-2025-39779.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39812.html * https://www.suse.com/security/cve/CVE-2025-39866.html * https://www.suse.com/security/cve/CVE-2025-39876.html * https://www.suse.com/security/cve/CVE-2025-39881.html * https://www.suse.com/security/cve/CVE-2025-39895.html * https://www.suse.com/security/cve/CVE-2025-39903.html * https://www.suse.com/security/cve/CVE-2025-39911.html * https://www.suse.com/security/cve/CVE-2025-39947.html * https://www.suse.com/security/cve/CVE-2025-39948.html * https://www.suse.com/security/cve/CVE-2025-39949.html * https://www.suse.com/security/cve/CVE-2025-39950.html * https://www.suse.com/security/cve/CVE-2025-39955.html * https://www.suse.com/security/cve/CVE-2025-39956.html * https://www.suse.com/security/cve/CVE-2025-39963.html * https://www.suse.com/security/cve/CVE-2025-39965.html * https://www.suse.com/security/cve/CVE-2025-39967.html * https://www.suse.com/security/cve/CVE-2025-39968.html * https://www.suse.com/security/cve/CVE-2025-39969.html * https://www.suse.com/security/cve/CVE-2025-39970.html * https://www.suse.com/security/cve/CVE-2025-39971.html * https://www.suse.com/security/cve/CVE-2025-39972.html * https://www.suse.com/security/cve/CVE-2025-39973.html * https://www.suse.com/security/cve/CVE-2025-39978.html * https://www.suse.com/security/cve/CVE-2025-39979.html * https://www.suse.com/security/cve/CVE-2025-39981.html * https://www.suse.com/security/cve/CVE-2025-39982.html * https://www.suse.com/security/cve/CVE-2025-39984.html * https://www.suse.com/security/cve/CVE-2025-39985.html * https://www.suse.com/security/cve/CVE-2025-39986.html * https://www.suse.com/security/cve/CVE-2025-39987.html * https://www.suse.com/security/cve/CVE-2025-39988.html * https://www.suse.com/security/cve/CVE-2025-39991.html * https://www.suse.com/security/cve/CVE-2025-39992.html * https://www.suse.com/security/cve/CVE-2025-39993.html * https://www.suse.com/security/cve/CVE-2025-39994.html * https://www.suse.com/security/cve/CVE-2025-39995.html * https://www.suse.com/security/cve/CVE-2025-39996.html * https://www.suse.com/security/cve/CVE-2025-39997.html * https://www.suse.com/security/cve/CVE-2025-40000.html * https://www.suse.com/security/cve/CVE-2025-40005.html * https://www.suse.com/security/cve/CVE-2025-40009.html * https://www.suse.com/security/cve/CVE-2025-40011.html * https://www.suse.com/security/cve/CVE-2025-40012.html * https://www.suse.com/security/cve/CVE-2025-40013.html * https://www.suse.com/security/cve/CVE-2025-40016.html * https://www.suse.com/security/cve/CVE-2025-40018.html * https://www.suse.com/security/cve/CVE-2025-40019.html * https://www.suse.com/security/cve/CVE-2025-40020.html * https://www.suse.com/security/cve/CVE-2025-40029.html * https://www.suse.com/security/cve/CVE-2025-40032.html * https://www.suse.com/security/cve/CVE-2025-40035.html * https://www.suse.com/security/cve/CVE-2025-40036.html * https://www.suse.com/security/cve/CVE-2025-40037.html * https://www.suse.com/security/cve/CVE-2025-40040.html * https://www.suse.com/security/cve/CVE-2025-40043.html * https://www.suse.com/security/cve/CVE-2025-40044.html * https://www.suse.com/security/cve/CVE-2025-40048.html * https://www.suse.com/security/cve/CVE-2025-40049.html * https://www.suse.com/security/cve/CVE-2025-40051.html * https://www.suse.com/security/cve/CVE-2025-40052.html * https://www.suse.com/security/cve/CVE-2025-40056.html * https://www.suse.com/security/cve/CVE-2025-40058.html * https://www.suse.com/security/cve/CVE-2025-40060.html * https://www.suse.com/security/cve/CVE-2025-40061.html * https://www.suse.com/security/cve/CVE-2025-40062.html * https://www.suse.com/security/cve/CVE-2025-40071.html * https://www.suse.com/security/cve/CVE-2025-40078.html * https://www.suse.com/security/cve/CVE-2025-40080.html * https://www.suse.com/security/cve/CVE-2025-40085.html * https://www.suse.com/security/cve/CVE-2025-40087.html * https://www.suse.com/security/cve/CVE-2025-40091.html * https://www.suse.com/security/cve/CVE-2025-40096.html * https://www.suse.com/security/cve/CVE-2025-40100.html * https://www.suse.com/security/cve/CVE-2025-40104.html * https://www.suse.com/security/cve/CVE-2025-40364.html * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1238472 * https://bugzilla.suse.com/show_bug.cgi?id=1239206 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241637 * https://bugzilla.suse.com/show_bug.cgi?id=1247222 * https://bugzilla.suse.com/show_bug.cgi?id=1248630 * https://bugzilla.suse.com/show_bug.cgi?id=1249161 * https://bugzilla.suse.com/show_bug.cgi?id=1249226 * https://bugzilla.suse.com/show_bug.cgi?id=1249302 * https://bugzilla.suse.com/show_bug.cgi?id=1249317 * https://bugzilla.suse.com/show_bug.cgi?id=1249397 * https://bugzilla.suse.com/show_bug.cgi?id=1249398 * https://bugzilla.suse.com/show_bug.cgi?id=1249495 * https://bugzilla.suse.com/show_bug.cgi?id=1249512 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249735 * https://bugzilla.suse.com/show_bug.cgi?id=1250202 * https://bugzilla.suse.com/show_bug.cgi?id=1250379 * https://bugzilla.suse.com/show_bug.cgi?id=1250400 * https://bugzilla.suse.com/show_bug.cgi?id=1250455 * https://bugzilla.suse.com/show_bug.cgi?id=1250491 * https://bugzilla.suse.com/show_bug.cgi?id=1250704 * https://bugzilla.suse.com/show_bug.cgi?id=1250721 * https://bugzilla.suse.com/show_bug.cgi?id=1250749 * https://bugzilla.suse.com/show_bug.cgi?id=1250946 * https://bugzilla.suse.com/show_bug.cgi?id=1251176 * https://bugzilla.suse.com/show_bug.cgi?id=1251177 * https://bugzilla.suse.com/show_bug.cgi?id=1251232 * https://bugzilla.suse.com/show_bug.cgi?id=1251233 * https://bugzilla.suse.com/show_bug.cgi?id=1251804 * https://bugzilla.suse.com/show_bug.cgi?id=1251809 * https://bugzilla.suse.com/show_bug.cgi?id=1251819 * https://bugzilla.suse.com/show_bug.cgi?id=1251930 * https://bugzilla.suse.com/show_bug.cgi?id=1251967 * https://bugzilla.suse.com/show_bug.cgi?id=1252033 * https://bugzilla.suse.com/show_bug.cgi?id=1252035 * https://bugzilla.suse.com/show_bug.cgi?id=1252039 * https://bugzilla.suse.com/show_bug.cgi?id=1252044 * https://bugzilla.suse.com/show_bug.cgi?id=1252047 * https://bugzilla.suse.com/show_bug.cgi?id=1252051 * https://bugzilla.suse.com/show_bug.cgi?id=1252052 * https://bugzilla.suse.com/show_bug.cgi?id=1252056 * https://bugzilla.suse.com/show_bug.cgi?id=1252060 * https://bugzilla.suse.com/show_bug.cgi?id=1252062 * https://bugzilla.suse.com/show_bug.cgi?id=1252064 * https://bugzilla.suse.com/show_bug.cgi?id=1252065 * https://bugzilla.suse.com/show_bug.cgi?id=1252067 * https://bugzilla.suse.com/show_bug.cgi?id=1252069 * https://bugzilla.suse.com/show_bug.cgi?id=1252070 * https://bugzilla.suse.com/show_bug.cgi?id=1252072 * https://bugzilla.suse.com/show_bug.cgi?id=1252074 * https://bugzilla.suse.com/show_bug.cgi?id=1252075 * https://bugzilla.suse.com/show_bug.cgi?id=1252076 * https://bugzilla.suse.com/show_bug.cgi?id=1252078 * https://bugzilla.suse.com/show_bug.cgi?id=1252079 * https://bugzilla.suse.com/show_bug.cgi?id=1252081 * https://bugzilla.suse.com/show_bug.cgi?id=1252082 * https://bugzilla.suse.com/show_bug.cgi?id=1252083 * https://bugzilla.suse.com/show_bug.cgi?id=1252253 * https://bugzilla.suse.com/show_bug.cgi?id=1252265 * https://bugzilla.suse.com/show_bug.cgi?id=1252267 * https://bugzilla.suse.com/show_bug.cgi?id=1252270 * https://bugzilla.suse.com/show_bug.cgi?id=1252330 * https://bugzilla.suse.com/show_bug.cgi?id=1252333 * https://bugzilla.suse.com/show_bug.cgi?id=1252336 * https://bugzilla.suse.com/show_bug.cgi?id=1252346 * https://bugzilla.suse.com/show_bug.cgi?id=1252348 * https://bugzilla.suse.com/show_bug.cgi?id=1252349 * https://bugzilla.suse.com/show_bug.cgi?id=1252678 * https://bugzilla.suse.com/show_bug.cgi?id=1252679 * https://bugzilla.suse.com/show_bug.cgi?id=1252688 * https://bugzilla.suse.com/show_bug.cgi?id=1252725 * https://bugzilla.suse.com/show_bug.cgi?id=1252734 * https://bugzilla.suse.com/show_bug.cgi?id=1252772 * https://bugzilla.suse.com/show_bug.cgi?id=1252774 * https://bugzilla.suse.com/show_bug.cgi?id=1252780 * https://bugzilla.suse.com/show_bug.cgi?id=1252785 * https://bugzilla.suse.com/show_bug.cgi?id=1252787 * https://bugzilla.suse.com/show_bug.cgi?id=1252789 * https://bugzilla.suse.com/show_bug.cgi?id=1252797 * https://bugzilla.suse.com/show_bug.cgi?id=1252819 * https://bugzilla.suse.com/show_bug.cgi?id=1252822 * https://bugzilla.suse.com/show_bug.cgi?id=1252826 * https://bugzilla.suse.com/show_bug.cgi?id=1252841 * https://bugzilla.suse.com/show_bug.cgi?id=1252848 * https://bugzilla.suse.com/show_bug.cgi?id=1252849 * https://bugzilla.suse.com/show_bug.cgi?id=1252850 * https://bugzilla.suse.com/show_bug.cgi?id=1252851 * https://bugzilla.suse.com/show_bug.cgi?id=1252854 * https://bugzilla.suse.com/show_bug.cgi?id=1252858 * https://bugzilla.suse.com/show_bug.cgi?id=1252862 * https://bugzilla.suse.com/show_bug.cgi?id=1252865 * https://bugzilla.suse.com/show_bug.cgi?id=1252866 * https://bugzilla.suse.com/show_bug.cgi?id=1252873 * https://bugzilla.suse.com/show_bug.cgi?id=1252902 * https://bugzilla.suse.com/show_bug.cgi?id=1252909 * https://bugzilla.suse.com/show_bug.cgi?id=1252915 * https://bugzilla.suse.com/show_bug.cgi?id=1252918 * https://bugzilla.suse.com/show_bug.cgi?id=1252921 * https://bugzilla.suse.com/show_bug.cgi?id=1252939 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-4593 * https://jira.suse.com/browse/PED-9891 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:53:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:53:07 -0000 Subject: SUSE-SU-2025:21145-1: important: Security update for curl Message-ID: <176538558709.6931.16957195828601405286@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:21145-1 Release Date: 2025-11-26T14:30:14Z Rating: important References: * bsc#1249191 * bsc#1249348 * bsc#1249367 * bsc#1253757 Cross-References: * CVE-2025-10148 * CVE-2025-11563 * CVE-2025-9086 CVSS scores: * CVE-2025-10148 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-11563 ( SUSE ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-11563 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L * CVE-2025-9086 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-9086 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities and has one fix can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-9086: Fixed Out of bounds read for cookie path (bsc#1249191) * CVE-2025-11563: Fixed wcurl path traversal with percent-encoded slashes (bsc#1253757) * CVE-2025-10148: Fixed predictable WebSocket mask (bsc#1249348) Other fixes: \- tool_operate: fix return code when --retry is used but not triggered (bsc#1249367) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-57=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-57=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * curl-mini-debugsource-8.14.1-160000.3.1 * curl-debugsource-8.14.1-160000.3.1 * curl-8.14.1-160000.3.1 * curl-debuginfo-8.14.1-160000.3.1 * libcurl-mini4-debuginfo-8.14.1-160000.3.1 * libcurl-mini4-8.14.1-160000.3.1 * libcurl4-8.14.1-160000.3.1 * libcurl-devel-8.14.1-160000.3.1 * libcurl4-debuginfo-8.14.1-160000.3.1 * SUSE Linux Enterprise Server 16.0 (noarch) * curl-zsh-completion-8.14.1-160000.3.1 * libcurl-devel-doc-8.14.1-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * curl-mini-debugsource-8.14.1-160000.3.1 * curl-debugsource-8.14.1-160000.3.1 * curl-8.14.1-160000.3.1 * curl-debuginfo-8.14.1-160000.3.1 * libcurl-mini4-debuginfo-8.14.1-160000.3.1 * libcurl-mini4-8.14.1-160000.3.1 * libcurl4-8.14.1-160000.3.1 * libcurl-devel-8.14.1-160000.3.1 * libcurl4-debuginfo-8.14.1-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * curl-zsh-completion-8.14.1-160000.3.1 * libcurl-devel-doc-8.14.1-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10148.html * https://www.suse.com/security/cve/CVE-2025-11563.html * https://www.suse.com/security/cve/CVE-2025-9086.html * https://bugzilla.suse.com/show_bug.cgi?id=1249191 * https://bugzilla.suse.com/show_bug.cgi?id=1249348 * https://bugzilla.suse.com/show_bug.cgi?id=1249367 * https://bugzilla.suse.com/show_bug.cgi?id=1253757 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:53:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:53:09 -0000 Subject: SUSE-SU-2025:21144-1: important: Security update for mysql-connector-java Message-ID: <176538558931.6931.12178879283152706081@smelt2.prg2.suse.org> # Security update for mysql-connector-java Announcement ID: SUSE-SU-2025:21144-1 Release Date: 2025-11-26T08:12:38Z Rating: important References: * bsc#1241693 Cross-References: * CVE-2025-30706 CVSS scores: * CVE-2025-30706 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-30706 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-30706 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for mysql-connector-java fixes the following issues: * Upgrade to Version 9.3.0 * CVE-2025-30706: Fixed Connector/J vulnerability (bsc#1241693) * Updatable ResultSet fails with 'Parameter index out of range'. * Fixed Resultset UPDATE methods not checking validity of ResultSet. * DatabaseMetaData clean up. * Fixed implement missing methods in DatabaseMetaDataUsingInfoSchema. * Fixed procedure execution failing when the parameter name contains escape character. * Fixed allow only Krb5LoginModule in Kerberos authentication. * Fixed EXECUTE on CallableStatement resulting in ArrayIndexOutOfBoundsException. * Mysql connector use an uneffective way to match numericValue. * Fixed parameter index validation not proper in CallableStatement ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-56=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-56=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * mysql-connector-java-9.3.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * mysql-connector-java-9.3.0-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30706.html * https://bugzilla.suse.com/show_bug.cgi?id=1241693 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 16:53:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 16:53:18 -0000 Subject: SUSE-SU-2025:21140-1: critical: Security update for lasso Message-ID: <176538559839.6931.5174102969292165461@smelt2.prg2.suse.org> # Security update for lasso Announcement ID: SUSE-SU-2025:21140-1 Release Date: 2025-11-25T13:27:21Z Rating: critical References: * bsc#1253092 * bsc#1253093 * bsc#1253095 Cross-References: * CVE-2025-46404 * CVE-2025-46705 * CVE-2025-47151 CVSS scores: * CVE-2025-46404 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46404 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46404 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46705 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46705 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46705 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47151 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-47151 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-47151 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for lasso fixes the following issues: * CVE-2025-46404: specially crafted SAML response can lead to a denial of service (bsc#1253092). * CVE-2025-46705: specially crafted SAML assertion response can lead to a denial of service (bsc#1253093). * CVE-2025-47151: type confusion vulnerability exists in the lasso_node_impl_init_from_xml functionality can lead to an arbitrary code execution (bsc#1253095). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-52=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-52=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * liblasso3-2.8.2-160000.3.1 * liblasso3-debuginfo-2.8.2-160000.3.1 * lasso-debuginfo-2.8.2-160000.3.1 * lasso-debugsource-2.8.2-160000.3.1 * liblasso-devel-2.8.2-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * liblasso3-2.8.2-160000.3.1 * liblasso3-debuginfo-2.8.2-160000.3.1 * lasso-debuginfo-2.8.2-160000.3.1 * lasso-debugsource-2.8.2-160000.3.1 * liblasso-devel-2.8.2-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46404.html * https://www.suse.com/security/cve/CVE-2025-46705.html * https://www.suse.com/security/cve/CVE-2025-47151.html * https://bugzilla.suse.com/show_bug.cgi?id=1253092 * https://bugzilla.suse.com/show_bug.cgi?id=1253093 * https://bugzilla.suse.com/show_bug.cgi?id=1253095 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 17:01:46 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 17:01:46 -0000 Subject: SUSE-SU-2025:21139-1: important: Security update for the Linux Kernel Message-ID: <176538610647.6931.9281898458256726689@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:21139-1 Release Date: 2025-11-25T07:35:00Z Rating: important References: * bsc#1215199 * bsc#1218644 * bsc#1230062 * bsc#1234634 * bsc#1234693 * bsc#1234863 * bsc#1235953 * bsc#1236897 * bsc#1237108 * bsc#1237131 * bsc#1237542 * bsc#1237776 * bsc#1238972 * bsc#1239206 * bsc#1240324 * bsc#1240696 * bsc#1240966 * bsc#1240998 * bsc#1241166 * bsc#1241353 * bsc#1241403 * bsc#1241435 * bsc#1242034 * bsc#1242086 * bsc#1242414 * bsc#1242782 * bsc#1242864 * bsc#1242965 * bsc#1242995 * bsc#1243000 * bsc#1243055 * bsc#1243068 * bsc#1243100 * bsc#1243112 * bsc#1243774 * bsc#1244309 * bsc#1244723 * bsc#1244734 * bsc#1244749 * bsc#1244792 * bsc#1244812 * bsc#1244930 * bsc#1244939 * bsc#1245000 * bsc#1245151 * bsc#1245193 * bsc#1245206 * bsc#1245216 * bsc#1245260 * bsc#1245410 * bsc#1245457 * bsc#1245504 * bsc#1245506 * bsc#1245508 * bsc#1245510 * bsc#1245596 * bsc#1245621 * bsc#1245630 * bsc#1245654 * bsc#1245657 * bsc#1245658 * bsc#1245659 * bsc#1245663 * bsc#1245664 * bsc#1245665 * bsc#1245666 * bsc#1245668 * bsc#1245669 * bsc#1245670 * bsc#1245671 * bsc#1245675 * bsc#1245676 * bsc#1245678 * bsc#1245683 * bsc#1245684 * bsc#1245686 * bsc#1245688 * bsc#1245690 * bsc#1245691 * bsc#1245695 * bsc#1245700 * bsc#1245703 * bsc#1245705 * bsc#1245710 * bsc#1245711 * bsc#1245713 * bsc#1245714 * bsc#1245715 * bsc#1245717 * bsc#1245719 * bsc#1245721 * bsc#1245723 * bsc#1245726 * bsc#1245728 * bsc#1245729 * bsc#1245730 * bsc#1245731 * bsc#1245735 * bsc#1245737 * bsc#1245744 * bsc#1245745 * bsc#1245746 * bsc#1245747 * bsc#1245748 * bsc#1245749 * bsc#1245751 * bsc#1245757 * bsc#1245763 * bsc#1245765 * bsc#1245767 * bsc#1245769 * bsc#1245777 * bsc#1245780 * bsc#1245781 * bsc#1245784 * bsc#1245785 * bsc#1245787 * bsc#1245812 * bsc#1245814 * bsc#1245815 * bsc#1245937 * bsc#1245945 * bsc#1245952 * bsc#1245955 * bsc#1245956 * bsc#1245963 * bsc#1245966 * bsc#1245970 * bsc#1245973 * bsc#1245976 * bsc#1245977 * bsc#1245986 * bsc#1246000 * bsc#1246002 * bsc#1246005 * bsc#1246008 * bsc#1246012 * bsc#1246022 * bsc#1246023 * bsc#1246031 * bsc#1246034 * bsc#1246037 * bsc#1246041 * bsc#1246042 * bsc#1246047 * bsc#1246049 * bsc#1246050 * bsc#1246053 * bsc#1246054 * bsc#1246055 * bsc#1246057 * bsc#1246098 * bsc#1246109 * bsc#1246125 * bsc#1246166 * bsc#1246171 * bsc#1246176 * bsc#1246181 * bsc#1246183 * bsc#1246185 * bsc#1246186 * bsc#1246188 * bsc#1246190 * bsc#1246192 * bsc#1246193 * bsc#1246195 * bsc#1246220 * bsc#1246234 * bsc#1246236 * bsc#1246240 * bsc#1246243 * bsc#1246244 * bsc#1246245 * bsc#1246246 * bsc#1246248 * bsc#1246250 * bsc#1246252 * bsc#1246253 * bsc#1246255 * bsc#1246258 * bsc#1246259 * bsc#1246260 * bsc#1246262 * bsc#1246266 * bsc#1246268 * bsc#1246283 * bsc#1246285 * bsc#1246286 * bsc#1246287 * bsc#1246290 * bsc#1246292 * bsc#1246293 * bsc#1246295 * bsc#1246297 * bsc#1246333 * bsc#1246334 * bsc#1246337 * bsc#1246342 * bsc#1246349 * bsc#1246351 * bsc#1246353 * bsc#1246354 * bsc#1246358 * bsc#1246364 * bsc#1246366 * bsc#1246370 * bsc#1246375 * bsc#1246376 * bsc#1246385 * bsc#1246386 * bsc#1246387 * bsc#1246438 * bsc#1246443 * bsc#1246444 * bsc#1246447 * bsc#1246450 * bsc#1246453 * bsc#1246473 * bsc#1246490 * bsc#1246509 * bsc#1246547 * bsc#1246631 * bsc#1246651 * bsc#1246688 * bsc#1246777 * bsc#1246781 * bsc#1246782 * bsc#1246868 * bsc#1246896 * bsc#1246911 * bsc#1246979 * bsc#1247018 * bsc#1247020 * bsc#1247022 * bsc#1247023 * bsc#1247024 * bsc#1247027 * bsc#1247028 * bsc#1247031 * bsc#1247033 * bsc#1247035 * bsc#1247061 * bsc#1247062 * bsc#1247064 * bsc#1247076 * bsc#1247078 * bsc#1247079 * bsc#1247088 * bsc#1247089 * bsc#1247091 * bsc#1247097 * bsc#1247098 * bsc#1247099 * bsc#1247101 * bsc#1247102 * bsc#1247103 * bsc#1247104 * bsc#1247112 * bsc#1247113 * bsc#1247116 * bsc#1247118 * bsc#1247119 * bsc#1247123 * bsc#1247125 * bsc#1247126 * bsc#1247128 * bsc#1247130 * bsc#1247131 * bsc#1247132 * bsc#1247136 * bsc#1247137 * bsc#1247138 * bsc#1247141 * bsc#1247143 * bsc#1247145 * bsc#1247146 * bsc#1247147 * bsc#1247149 * bsc#1247150 * bsc#1247151 * bsc#1247152 * bsc#1247153 * bsc#1247154 * bsc#1247155 * bsc#1247156 * bsc#1247157 * bsc#1247160 * bsc#1247162 * bsc#1247163 * bsc#1247164 * bsc#1247167 * bsc#1247169 * bsc#1247170 * bsc#1247171 * bsc#1247174 * bsc#1247176 * bsc#1247177 * bsc#1247178 * bsc#1247181 * bsc#1247209 * bsc#1247210 * bsc#1247220 * bsc#1247223 * bsc#1247227 * bsc#1247229 * bsc#1247231 * bsc#1247233 * bsc#1247234 * bsc#1247235 * bsc#1247236 * bsc#1247238 * bsc#1247239 * bsc#1247241 * bsc#1247243 * bsc#1247250 * bsc#1247251 * bsc#1247252 * bsc#1247253 * bsc#1247255 * bsc#1247262 * bsc#1247265 * bsc#1247270 * bsc#1247271 * bsc#1247273 * bsc#1247274 * bsc#1247276 * bsc#1247277 * bsc#1247278 * bsc#1247279 * bsc#1247280 * bsc#1247282 * bsc#1247283 * bsc#1247284 * bsc#1247285 * bsc#1247288 * bsc#1247289 * bsc#1247290 * bsc#1247293 * bsc#1247308 * bsc#1247311 * bsc#1247313 * bsc#1247314 * bsc#1247317 * bsc#1247325 * bsc#1247347 * bsc#1247348 * bsc#1247349 * bsc#1247366 * bsc#1247372 * bsc#1247376 * bsc#1247426 * bsc#1247437 * bsc#1247442 * bsc#1247483 * bsc#1247500 * bsc#1247712 * bsc#1247837 * bsc#1247838 * bsc#1247935 * bsc#1247936 * bsc#1247949 * bsc#1247950 * bsc#1247963 * bsc#1247976 * bsc#1248088 * bsc#1248111 * bsc#1248121 * bsc#1248183 * bsc#1248186 * bsc#1248190 * bsc#1248192 * bsc#1248194 * bsc#1248198 * bsc#1248199 * bsc#1248200 * bsc#1248202 * bsc#1248205 * bsc#1248211 * bsc#1248223 * bsc#1248224 * bsc#1248225 * bsc#1248230 * bsc#1248235 * bsc#1248255 * bsc#1248296 * bsc#1248297 * bsc#1248299 * bsc#1248302 * bsc#1248304 * bsc#1248306 * bsc#1248312 * bsc#1248333 * bsc#1248334 * bsc#1248337 * bsc#1248338 * bsc#1248340 * bsc#1248341 * bsc#1248343 * bsc#1248345 * bsc#1248349 * bsc#1248350 * bsc#1248354 * bsc#1248355 * bsc#1248357 * bsc#1248359 * bsc#1248361 * bsc#1248363 * bsc#1248365 * bsc#1248367 * bsc#1248368 * bsc#1248374 * bsc#1248377 * bsc#1248378 * bsc#1248380 * bsc#1248386 * bsc#1248390 * bsc#1248392 * bsc#1248395 * bsc#1248396 * bsc#1248399 * bsc#1248401 * bsc#1248511 * bsc#1248512 * bsc#1248573 * bsc#1248575 * bsc#1248577 * bsc#1248609 * bsc#1248610 * bsc#1248616 * bsc#1248617 * bsc#1248619 * bsc#1248621 * bsc#1248622 * bsc#1248624 * bsc#1248627 * bsc#1248628 * bsc#1248634 * bsc#1248635 * bsc#1248639 * bsc#1248643 * bsc#1248647 * bsc#1248648 * bsc#1248652 * bsc#1248655 * bsc#1248662 * bsc#1248664 * bsc#1248666 * bsc#1248669 * bsc#1248674 * bsc#1248681 * bsc#1248727 * bsc#1248728 * bsc#1248748 * bsc#1248754 * bsc#1248775 * bsc#1249022 * bsc#1249038 * bsc#1249060 * bsc#1249061 * bsc#1249062 * bsc#1249064 * bsc#1249065 * bsc#1249066 * bsc#1249126 * bsc#1249143 * bsc#1249156 * bsc#1249159 * bsc#1249160 * bsc#1249163 * bsc#1249164 * bsc#1249166 * bsc#1249167 * bsc#1249169 * bsc#1249170 * bsc#1249172 * bsc#1249176 * bsc#1249177 * bsc#1249182 * bsc#1249186 * bsc#1249190 * bsc#1249193 * bsc#1249195 * bsc#1249199 * bsc#1249201 * bsc#1249202 * bsc#1249203 * bsc#1249204 * bsc#1249206 * bsc#1249215 * bsc#1249220 * bsc#1249221 * bsc#1249254 * bsc#1249258 * bsc#1249262 * bsc#1249263 * bsc#1249265 * bsc#1249266 * bsc#1249269 * bsc#1249271 * bsc#1249272 * bsc#1249273 * bsc#1249274 * bsc#1249278 * bsc#1249279 * bsc#1249281 * bsc#1249282 * bsc#1249284 * bsc#1249285 * bsc#1249286 * bsc#1249288 * bsc#1249290 * bsc#1249292 * bsc#1249295 * bsc#1249296 * bsc#1249297 * bsc#1249299 * bsc#1249300 * bsc#1249301 * bsc#1249303 * bsc#1249304 * bsc#1249305 * bsc#1249306 * bsc#1249308 * bsc#1249309 * bsc#1249312 * bsc#1249313 * bsc#1249314 * bsc#1249315 * bsc#1249316 * bsc#1249318 * bsc#1249319 * bsc#1249320 * bsc#1249321 * bsc#1249322 * bsc#1249323 * bsc#1249324 * bsc#1249333 * bsc#1249334 * bsc#1249338 * bsc#1249346 * bsc#1249374 * bsc#1249413 * bsc#1249477 * bsc#1249478 * bsc#1249479 * bsc#1249486 * bsc#1249490 * bsc#1249494 * bsc#1249500 * bsc#1249504 * bsc#1249506 * bsc#1249508 * bsc#1249509 * bsc#1249510 * bsc#1249513 * bsc#1249515 * bsc#1249516 * bsc#1249522 * bsc#1249523 * bsc#1249524 * bsc#1249526 * bsc#1249533 * bsc#1249538 * bsc#1249540 * bsc#1249542 * bsc#1249545 * bsc#1249547 * bsc#1249548 * bsc#1249550 * bsc#1249552 * bsc#1249554 * bsc#1249562 * bsc#1249566 * bsc#1249587 * bsc#1249598 * bsc#1249604 * bsc#1249608 * bsc#1249615 * bsc#1249618 * bsc#1249774 * bsc#1249833 * bsc#1249887 * bsc#1249888 * bsc#1249901 * bsc#1249904 * bsc#1249906 * bsc#1249915 * bsc#1249974 * bsc#1249975 * bsc#1250002 * bsc#1250007 * bsc#1250021 * bsc#1250025 * bsc#1250028 * bsc#1250032 * bsc#1250087 * bsc#1250088 * bsc#1250119 * bsc#1250123 * bsc#1250124 * bsc#1250177 * bsc#1250179 * bsc#1250203 * bsc#1250204 * bsc#1250205 * bsc#1250237 * bsc#1250242 * bsc#1250247 * bsc#1250249 * bsc#1250251 * bsc#1250258 * bsc#1250262 * bsc#1250266 * bsc#1250267 * bsc#1250268 * bsc#1250275 * bsc#1250276 * bsc#1250281 * bsc#1250291 * bsc#1250292 * bsc#1250294 * bsc#1250296 * bsc#1250297 * bsc#1250298 * bsc#1250334 * bsc#1250344 * bsc#1250365 * bsc#1250371 * bsc#1250377 * bsc#1250386 * bsc#1250389 * bsc#1250398 * bsc#1250402 * bsc#1250406 * bsc#1250407 * bsc#1250408 * bsc#1250450 * bsc#1250491 * bsc#1250519 * bsc#1250522 * bsc#1250650 * bsc#1250655 * bsc#1250671 * bsc#1250702 * bsc#1250711 * bsc#1250712 * bsc#1250713 * bsc#1250716 * bsc#1250719 * bsc#1250722 * bsc#1250729 * bsc#1250736 * bsc#1250737 * bsc#1250739 * bsc#1250741 * bsc#1250742 * bsc#1250758 * bsc#1250952 * bsc#1251100 * bsc#1251114 * bsc#1251134 * bsc#1251135 * bsc#1251143 * bsc#1251146 * bsc#1251186 * bsc#1251216 * bsc#1251230 * bsc#1251810 * bsc#1252084 * jsc#PED-10909 * jsc#PED-12405 * jsc#PED-12745 * jsc#PED-12882 * jsc#PED-13113 * jsc#PED-13256 * jsc#PED-13302 * jsc#PED-13331 * jsc#PED-13343 * jsc#PED-13345 * jsc#PED-13631 * jsc#PED-13704 * jsc#PED-13728 * jsc#PED-13762 * jsc#PED-13815 * jsc#PED-348 * jsc#PED-7249 Cross-References: * CVE-2024-53164 * CVE-2024-57891 * CVE-2024-57951 * CVE-2024-57952 * CVE-2024-58090 * CVE-2025-22034 * CVE-2025-22077 * CVE-2025-23141 * CVE-2025-37798 * CVE-2025-37821 * CVE-2025-37849 * CVE-2025-37856 * CVE-2025-37861 * CVE-2025-37864 * CVE-2025-38006 * CVE-2025-38008 * CVE-2025-38019 * CVE-2025-38034 * CVE-2025-38038 * CVE-2025-38052 * CVE-2025-38058 * CVE-2025-38062 * CVE-2025-38075 * CVE-2025-38087 * CVE-2025-38088 * CVE-2025-38089 * CVE-2025-38090 * CVE-2025-38091 * CVE-2025-38095 * CVE-2025-38096 * CVE-2025-38098 * CVE-2025-38099 * CVE-2025-38101 * CVE-2025-38102 * CVE-2025-38103 * CVE-2025-38106 * CVE-2025-38107 * CVE-2025-38108 * CVE-2025-38109 * CVE-2025-38110 * CVE-2025-38111 * CVE-2025-38112 * CVE-2025-38113 * CVE-2025-38114 * CVE-2025-38117 * CVE-2025-38118 * CVE-2025-38119 * CVE-2025-38120 * CVE-2025-38122 * CVE-2025-38123 * CVE-2025-38124 * CVE-2025-38125 * CVE-2025-38127 * CVE-2025-38128 * CVE-2025-38129 * CVE-2025-38134 * CVE-2025-38135 * CVE-2025-38136 * CVE-2025-38137 * CVE-2025-38138 * CVE-2025-38140 * CVE-2025-38141 * CVE-2025-38142 * CVE-2025-38143 * CVE-2025-38145 * CVE-2025-38146 * CVE-2025-38148 * CVE-2025-38149 * CVE-2025-38151 * CVE-2025-38153 * CVE-2025-38154 * CVE-2025-38155 * CVE-2025-38156 * CVE-2025-38157 * CVE-2025-38159 * CVE-2025-38160 * CVE-2025-38161 * CVE-2025-38165 * CVE-2025-38168 * CVE-2025-38169 * CVE-2025-38170 * CVE-2025-38172 * CVE-2025-38173 * CVE-2025-38174 * CVE-2025-38177 * CVE-2025-38180 * CVE-2025-38181 * CVE-2025-38182 * CVE-2025-38184 * CVE-2025-38185 * CVE-2025-38186 * CVE-2025-38188 * CVE-2025-38189 * CVE-2025-38190 * CVE-2025-38193 * CVE-2025-38197 * CVE-2025-38198 * CVE-2025-38201 * CVE-2025-38205 * CVE-2025-38208 * CVE-2025-38209 * CVE-2025-38211 * CVE-2025-38213 * CVE-2025-38214 * CVE-2025-38215 * CVE-2025-38216 * CVE-2025-38217 * CVE-2025-38220 * CVE-2025-38222 * CVE-2025-38224 * CVE-2025-38225 * CVE-2025-38226 * CVE-2025-38227 * CVE-2025-38228 * CVE-2025-38229 * CVE-2025-38231 * CVE-2025-38232 * CVE-2025-38233 * CVE-2025-38234 * CVE-2025-38242 * CVE-2025-38244 * CVE-2025-38245 * CVE-2025-38246 * CVE-2025-38249 * CVE-2025-38251 * CVE-2025-38253 * CVE-2025-38255 * CVE-2025-38256 * CVE-2025-38257 * CVE-2025-38258 * CVE-2025-38259 * CVE-2025-38263 * CVE-2025-38265 * CVE-2025-38267 * CVE-2025-38268 * CVE-2025-38270 * CVE-2025-38272 * CVE-2025-38273 * CVE-2025-38274 * CVE-2025-38275 * CVE-2025-38277 * CVE-2025-38278 * CVE-2025-38286 * CVE-2025-38287 * CVE-2025-38288 * CVE-2025-38289 * CVE-2025-38290 * CVE-2025-38291 * CVE-2025-38292 * CVE-2025-38293 * CVE-2025-38299 * CVE-2025-38300 * CVE-2025-38301 * CVE-2025-38302 * CVE-2025-38303 * CVE-2025-38304 * CVE-2025-38305 * CVE-2025-38306 * CVE-2025-38307 * CVE-2025-38311 * CVE-2025-38312 * CVE-2025-38313 * CVE-2025-38315 * CVE-2025-38317 * CVE-2025-38318 * CVE-2025-38319 * CVE-2025-38322 * CVE-2025-38323 * CVE-2025-38326 * CVE-2025-38332 * CVE-2025-38335 * CVE-2025-38336 * CVE-2025-38337 * CVE-2025-38338 * CVE-2025-38339 * CVE-2025-38341 * CVE-2025-38342 * CVE-2025-38343 * CVE-2025-38344 * CVE-2025-38345 * CVE-2025-38348 * CVE-2025-38349 * CVE-2025-38350 * CVE-2025-38351 * CVE-2025-38352 * CVE-2025-38353 * CVE-2025-38354 * CVE-2025-38355 * CVE-2025-38356 * CVE-2025-38359 * CVE-2025-38360 * CVE-2025-38361 * CVE-2025-38362 * CVE-2025-38363 * CVE-2025-38364 * CVE-2025-38365 * CVE-2025-38368 * CVE-2025-38369 * CVE-2025-38371 * CVE-2025-38372 * CVE-2025-38373 * CVE-2025-38374 * CVE-2025-38375 * CVE-2025-38376 * CVE-2025-38377 * CVE-2025-38380 * CVE-2025-38381 * CVE-2025-38382 * CVE-2025-38383 * CVE-2025-38384 * CVE-2025-38385 * CVE-2025-38386 * CVE-2025-38387 * CVE-2025-38389 * CVE-2025-38390 * CVE-2025-38391 * CVE-2025-38392 * CVE-2025-38393 * CVE-2025-38395 * CVE-2025-38396 * CVE-2025-38397 * CVE-2025-38399 * CVE-2025-38400 * CVE-2025-38401 * CVE-2025-38402 * CVE-2025-38403 * CVE-2025-38404 * CVE-2025-38405 * CVE-2025-38406 * CVE-2025-38408 * CVE-2025-38409 * CVE-2025-38410 * CVE-2025-38412 * CVE-2025-38413 * CVE-2025-38414 * CVE-2025-38415 * CVE-2025-38416 * CVE-2025-38417 * CVE-2025-38418 * CVE-2025-38419 * CVE-2025-38420 * CVE-2025-38421 * CVE-2025-38424 * CVE-2025-38425 * CVE-2025-38426 * CVE-2025-38427 * CVE-2025-38428 * CVE-2025-38429 * CVE-2025-38430 * CVE-2025-38436 * CVE-2025-38438 * CVE-2025-38439 * CVE-2025-38440 * CVE-2025-38441 * CVE-2025-38443 * CVE-2025-38444 * CVE-2025-38445 * CVE-2025-38446 * CVE-2025-38448 * CVE-2025-38449 * CVE-2025-38450 * CVE-2025-38451 * CVE-2025-38453 * CVE-2025-38454 * CVE-2025-38455 * CVE-2025-38456 * CVE-2025-38457 * CVE-2025-38458 * CVE-2025-38459 * CVE-2025-38460 * CVE-2025-38461 * CVE-2025-38462 * CVE-2025-38463 * CVE-2025-38464 * CVE-2025-38465 * CVE-2025-38466 * CVE-2025-38467 * CVE-2025-38468 * CVE-2025-38470 * CVE-2025-38472 * CVE-2025-38473 * CVE-2025-38474 * CVE-2025-38475 * CVE-2025-38476 * CVE-2025-38477 * CVE-2025-38478 * CVE-2025-38480 * CVE-2025-38481 * CVE-2025-38482 * CVE-2025-38483 * CVE-2025-38484 * CVE-2025-38485 * CVE-2025-38487 * CVE-2025-38488 * CVE-2025-38489 * CVE-2025-38490 * CVE-2025-38491 * CVE-2025-38493 * CVE-2025-38494 * CVE-2025-38495 * CVE-2025-38496 * CVE-2025-38497 * CVE-2025-38499 * CVE-2025-38500 * CVE-2025-38503 * CVE-2025-38506 * CVE-2025-38508 * CVE-2025-38514 * CVE-2025-38524 * CVE-2025-38526 * CVE-2025-38527 * CVE-2025-38528 * CVE-2025-38531 * CVE-2025-38533 * CVE-2025-38539 * CVE-2025-38544 * CVE-2025-38545 * CVE-2025-38546 * CVE-2025-38549 * CVE-2025-38552 * CVE-2025-38553 * CVE-2025-38554 * CVE-2025-38555 * CVE-2025-38556 * CVE-2025-38557 * CVE-2025-38559 * CVE-2025-38560 * CVE-2025-38563 * CVE-2025-38564 * CVE-2025-38565 * CVE-2025-38566 * CVE-2025-38568 * CVE-2025-38571 * CVE-2025-38572 * CVE-2025-38573 * CVE-2025-38574 * CVE-2025-38576 * CVE-2025-38581 * CVE-2025-38582 * CVE-2025-38583 * CVE-2025-38584 * CVE-2025-38585 * CVE-2025-38586 * CVE-2025-38587 * CVE-2025-38588 * CVE-2025-38591 * CVE-2025-38593 * CVE-2025-38595 * CVE-2025-38597 * CVE-2025-38601 * CVE-2025-38602 * CVE-2025-38604 * CVE-2025-38605 * CVE-2025-38608 * CVE-2025-38609 * CVE-2025-38610 * CVE-2025-38612 * CVE-2025-38614 * CVE-2025-38616 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38619 * CVE-2025-38621 * CVE-2025-38622 * CVE-2025-38623 * CVE-2025-38624 * CVE-2025-38628 * CVE-2025-38630 * CVE-2025-38631 * CVE-2025-38632 * CVE-2025-38634 * CVE-2025-38635 * CVE-2025-38639 * CVE-2025-38640 * CVE-2025-38643 * CVE-2025-38644 * CVE-2025-38646 * CVE-2025-38648 * CVE-2025-38656 * CVE-2025-38658 * CVE-2025-38659 * CVE-2025-38660 * CVE-2025-38662 * CVE-2025-38664 * CVE-2025-38665 * CVE-2025-38668 * CVE-2025-38670 * CVE-2025-38671 * CVE-2025-38676 * CVE-2025-38678 * CVE-2025-38679 * CVE-2025-38680 * CVE-2025-38681 * CVE-2025-38683 * CVE-2025-38684 * CVE-2025-38685 * CVE-2025-38686 * CVE-2025-38687 * CVE-2025-38691 * CVE-2025-38692 * CVE-2025-38693 * CVE-2025-38694 * CVE-2025-38695 * CVE-2025-38700 * CVE-2025-38701 * CVE-2025-38702 * CVE-2025-38703 * CVE-2025-38705 * CVE-2025-38706 * CVE-2025-38709 * CVE-2025-38710 * CVE-2025-38717 * CVE-2025-38721 * CVE-2025-38722 * CVE-2025-38724 * CVE-2025-38725 * CVE-2025-38727 * CVE-2025-38729 * CVE-2025-38730 * CVE-2025-38732 * CVE-2025-38733 * CVE-2025-38734 * CVE-2025-38735 * CVE-2025-38736 * CVE-2025-39673 * CVE-2025-39675 * CVE-2025-39677 * CVE-2025-39678 * CVE-2025-39679 * CVE-2025-39681 * CVE-2025-39682 * CVE-2025-39683 * CVE-2025-39684 * CVE-2025-39685 * CVE-2025-39686 * CVE-2025-39687 * CVE-2025-39691 * CVE-2025-39693 * CVE-2025-39694 * CVE-2025-39695 * CVE-2025-39697 * CVE-2025-39698 * CVE-2025-39700 * CVE-2025-39701 * CVE-2025-39703 * CVE-2025-39705 * CVE-2025-39706 * CVE-2025-39707 * CVE-2025-39709 * CVE-2025-39710 * CVE-2025-39711 * CVE-2025-39712 * CVE-2025-39713 * CVE-2025-39714 * CVE-2025-39718 * CVE-2025-39719 * CVE-2025-39721 * CVE-2025-39722 * CVE-2025-39723 * CVE-2025-39724 * CVE-2025-39726 * CVE-2025-39727 * CVE-2025-39730 * CVE-2025-39732 * CVE-2025-39738 * CVE-2025-39739 * CVE-2025-39742 * CVE-2025-39744 * CVE-2025-39746 * CVE-2025-39747 * CVE-2025-39748 * CVE-2025-39749 * CVE-2025-39750 * CVE-2025-39751 * CVE-2025-39754 * CVE-2025-39757 * CVE-2025-39758 * CVE-2025-39759 * CVE-2025-39760 * CVE-2025-39761 * CVE-2025-39763 * CVE-2025-39764 * CVE-2025-39765 * CVE-2025-39766 * CVE-2025-39770 * CVE-2025-39772 * CVE-2025-39773 * CVE-2025-39775 * CVE-2025-39782 * CVE-2025-39783 * CVE-2025-39787 * CVE-2025-39788 * CVE-2025-39790 * CVE-2025-39791 * CVE-2025-39792 * CVE-2025-39797 * CVE-2025-39798 * CVE-2025-39800 * CVE-2025-39801 * CVE-2025-39806 * CVE-2025-39807 * CVE-2025-39808 * CVE-2025-39810 * CVE-2025-39811 * CVE-2025-39813 * CVE-2025-39816 * CVE-2025-39823 * CVE-2025-39824 * CVE-2025-39825 * CVE-2025-39826 * CVE-2025-39827 * CVE-2025-39828 * CVE-2025-39830 * CVE-2025-39832 * CVE-2025-39833 * CVE-2025-39834 * CVE-2025-39835 * CVE-2025-39836 * CVE-2025-39838 * CVE-2025-39839 * CVE-2025-39841 * CVE-2025-39842 * CVE-2025-39844 * CVE-2025-39845 * CVE-2025-39847 * CVE-2025-39848 * CVE-2025-39849 * CVE-2025-39850 * CVE-2025-39851 * CVE-2025-39852 * CVE-2025-39853 * CVE-2025-39854 * CVE-2025-39857 * CVE-2025-39860 * CVE-2025-39861 * CVE-2025-39863 * CVE-2025-39864 * CVE-2025-39865 * CVE-2025-39869 * CVE-2025-39870 * CVE-2025-39871 * CVE-2025-39873 * CVE-2025-39875 * CVE-2025-39877 * CVE-2025-39882 * CVE-2025-39884 * CVE-2025-39885 * CVE-2025-39889 * CVE-2025-39890 * CVE-2025-39891 * CVE-2025-39896 * CVE-2025-39898 * CVE-2025-39899 * CVE-2025-39900 * CVE-2025-39902 * CVE-2025-39907 * CVE-2025-39909 * CVE-2025-39916 * CVE-2025-39918 * CVE-2025-39922 * CVE-2025-39923 * CVE-2025-39925 * CVE-2025-39926 * CVE-2025-39931 * CVE-2025-39934 * CVE-2025-39937 * CVE-2025-39938 * CVE-2025-39945 * CVE-2025-39946 * CVE-2025-39952 * CVE-2025-39957 * CVE-2025-40300 * CVE-2026-38264 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57952 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22034 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22034 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22077 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37856 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37856 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37861 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37861 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37861 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38006 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38006 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38008 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38008 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38008 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38019 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38019 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38019 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38034 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38034 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38038 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38038 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38058 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38058 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38062 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38062 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38087 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38088 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38088 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38090 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38090 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38091 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38096 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38098 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38098 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38099 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38099 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38101 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38101 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38101 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38102 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38102 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38103 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38103 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38106 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38106 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38107 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38107 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38108 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38108 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38109 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38109 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38109 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38110 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38110 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38110 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38111 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38112 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38113 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38114 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38114 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38117 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38117 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38117 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38118 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38118 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38120 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-38120 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-38122 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38123 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38125 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38125 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38128 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38128 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38128 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38129 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38134 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38135 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38137 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38137 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38137 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38140 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38142 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38143 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38146 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38146 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38148 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38149 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38149 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38149 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38153 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38154 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38154 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38155 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38156 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38157 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38157 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38159 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38159 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38160 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38161 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38165 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38168 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38168 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38168 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38169 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38169 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38170 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38170 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38172 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38172 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38172 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38173 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38173 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38174 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38174 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38181 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38181 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38182 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38186 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38186 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38189 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38190 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38193 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38193 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38197 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38197 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38201 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38209 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38209 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38211 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38211 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38213 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38213 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38214 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38215 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38216 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38217 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38217 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38217 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38220 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38220 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38220 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38222 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-38222 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2025-38224 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38224 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38225 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38226 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38226 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38227 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38227 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38228 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38228 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38228 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38229 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38229 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38231 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38231 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38232 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38232 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38232 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38233 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38234 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38242 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38242 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38242 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38244 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38244 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38245 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38249 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38249 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38253 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38253 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38256 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38256 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38257 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38258 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38259 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38265 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38267 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38267 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38268 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38268 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38270 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38270 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38270 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38272 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38273 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38273 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38274 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38274 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38274 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38275 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38277 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38278 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38278 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38286 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38286 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38287 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38289 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38289 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38289 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38290 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38290 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38290 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38291 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38291 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38291 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38292 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38292 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38292 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38293 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38293 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38300 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38300 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38301 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38301 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38302 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38302 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38303 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38303 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38303 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38306 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38306 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38306 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38311 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38311 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38312 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38315 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38315 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38317 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38317 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38317 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38318 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38318 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38318 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38322 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-38322 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-38323 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38336 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38337 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38338 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38338 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38338 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38339 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-38339 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-38339 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38341 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38341 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38342 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38343 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38344 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38345 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38345 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38348 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38349 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38349 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-38349 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38350 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38350 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-38351 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38351 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38352 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38352 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38352 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38353 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38353 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38354 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38355 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38355 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38355 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38356 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38356 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38356 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38359 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38359 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38360 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38362 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38363 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38364 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38365 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38365 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38368 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38369 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38371 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38372 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38372 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38372 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38373 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38373 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38373 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38374 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38375 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38375 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38376 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38377 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38377 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38380 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38380 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38381 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38381 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38382 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38382 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38383 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38383 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38384 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38384 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38385 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38385 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38386 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38387 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38387 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38389 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38390 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38390 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38391 ( SUSE ): 5.2 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38391 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38392 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38392 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38393 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38393 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38395 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38395 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38396 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38396 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38397 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38397 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38399 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38400 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38400 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38401 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38401 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38402 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38402 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38403 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38403 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38404 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38404 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38405 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38405 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38406 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38408 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38408 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38408 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38409 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38409 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38410 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38412 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38413 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38413 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38413 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38414 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38414 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38415 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38415 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38416 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38416 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38417 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38417 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38417 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38418 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38420 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38421 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38421 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38421 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38424 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38425 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38425 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38426 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38426 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38427 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38427 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38428 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38428 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38429 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38429 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38429 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38430 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38436 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38436 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38436 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38438 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38438 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38439 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38439 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38440 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38440 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38440 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38441 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38441 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38443 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38443 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38444 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38445 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38446 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38446 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38446 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38448 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38448 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38449 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38449 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38449 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38450 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38450 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38451 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38453 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38453 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38454 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38454 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38455 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38455 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38457 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38458 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38460 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38460 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38461 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38461 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38462 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38462 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38463 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38463 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38463 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38464 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38464 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38465 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38466 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2025-38467 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38467 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38468 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38470 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38472 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38472 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38473 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38473 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38474 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38475 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38475 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38475 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38478 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38478 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38480 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38480 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38481 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38481 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38482 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38482 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38483 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38483 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38484 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38484 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38485 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38485 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38487 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38489 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38489 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38490 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38491 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38491 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38493 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-38493 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2025-38493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38494 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38495 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38495 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38496 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38496 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38496 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38497 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38497 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38499 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H * CVE-2025-38499 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38503 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38506 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38508 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38508 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38514 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38524 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38527 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38528 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38528 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38531 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38531 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38531 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38533 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38533 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38533 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38544 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38544 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38545 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38545 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38545 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38546 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38546 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38549 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38549 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38552 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38552 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38554 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38554 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38554 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38555 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38555 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38556 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38556 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38556 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38559 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38560 ( SUSE ): 5.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2025-38560 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38564 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38564 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38565 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38566 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38566 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38568 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38568 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38571 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38571 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38571 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38573 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38573 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38573 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38574 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38576 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38576 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38581 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38582 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38583 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38584 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38584 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38584 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38585 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38585 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38585 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38586 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38586 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38587 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38591 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38591 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38591 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38593 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38593 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38595 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38595 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38597 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38601 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38602 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38604 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38604 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38605 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38605 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38609 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38610 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38612 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38614 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38619 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38619 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38619 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38621 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38621 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38623 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38624 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38628 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38628 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38628 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38630 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38631 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38631 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38634 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38639 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38640 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38644 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38644 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38646 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38646 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38646 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38648 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38648 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38656 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38658 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38662 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38662 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38668 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38680 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38692 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38692 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38695 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38700 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38700 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38701 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38702 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38703 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38703 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38706 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38706 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38709 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38709 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38710 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38710 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38717 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38732 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38732 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38733 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38734 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39679 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39695 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39698 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39698 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-39698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39700 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39707 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39707 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39711 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39723 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39738 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39739 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39739 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39742 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39744 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39747 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39750 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39750 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39754 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39759 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N * CVE-2025-39759 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39760 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39761 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39761 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39763 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39787 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39787 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39790 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39790 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39791 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39791 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39792 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39792 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39792 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39798 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39798 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39801 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39801 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39810 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39825 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39825 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-39826 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39826 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39827 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39827 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39828 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-39828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-39830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39830 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39838 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39838 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39848 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39848 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39890 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39891 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39896 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39896 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39898 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39918 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-39918 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-39922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39922 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39923 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39926 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39926 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2025-39931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39945 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39952 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39952 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39957 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40300 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves 573 vulnerabilities, contains 17 features and has 96 fixes can now be installed. ## Description: The SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-57891: sched_ext: Fix invalid irq restore in scx_ops_bypass() (bsc#1235953). * CVE-2024-57951: hrtimers: Handle CPU state correctly on hotplug (bsc#1237108). * CVE-2024-57952: Revert "libfs: fix infinite directory reads for offset dir" (bsc#1237131). * CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are disabled (bsc#1240324). * CVE-2025-22034: mm/rmap: avoid -EBUSY from make_device_exclusive() (bsc#1241435). * CVE-2025-22077: Revert "smb: client: fix TCP timers deadlock after rmmod" (bsc#1241403). * CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782). * CVE-2025-37821: sched/eevdf: Fix se->slice being set to U64_MAX and resulting (bsc#1242864). * CVE-2025-37849: KVM: arm64: Tear down vGIC on failed vCPU creation (bsc#1243000). * CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races (bsc#1243068). * CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055). * CVE-2025-37864: net: dsa: clean up FDB, MDB, VLAN entries on unbind (bsc#1242965). * CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930). * CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory handling (bsc#1244939). * CVE-2025-38019: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices (bsc#1245000). * CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref (bsc#1244792). * CVE-2025-38038: cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost (bsc#1244812). * CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (bsc#1245151). * CVE-2025-38062: kABI: restore layout of struct msi_desc (bsc#1245216). * CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734). * CVE-2025-38101: ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set() (bsc#1245659). * CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663). * CVE-2025-38106: io_uring/sqpoll: do not put task_struct on tctx setup failure (bsc#1245664). * CVE-2025-38117: hci_dev centralize extra lock (bsc#1245695). * CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler (bsc#1245700). * CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710). * CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767). * CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780). * CVE-2025-38168: perf: arm-ni: Unregister PMUs on probe failure (bsc#1245763). * CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970). * CVE-2025-38182: ublk: santizize the arguments from userspace when adding a device (bsc#1245937). * CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956). * CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012). * CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973). * CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977). * CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005). * CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815). * CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased devices (bsc#1245963). * CVE-2025-38220: ext4: only dirty folios when data journaling regular files (bsc#1245966). * CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data (bsc#1245976). * CVE-2025-38242: mm: userfaultfd: fix race of userfaultfd_move and swap cache (bsc#1246176). * CVE-2025-38244: smb: client: fix potential deadlock when reconnecting channels (bsc#1246183). * CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193). * CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181). * CVE-2025-38256: io_uring/rsrc: fix folio unpinning (bsc#1246188). * CVE-2025-38258: mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter->memcg_path on write (bsc#1246185). * CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248). * CVE-2025-38267: ring-buffer: Do not trigger WARN_ON() due to a commit_overrun (bsc#1246245). * CVE-2025-38270: net: drv: netdevsim: do not napi_complete() from netpoll (bsc#1246252). * CVE-2025-38272: net: dsa: b53: do not enable EEE on bcm63xx (bsc#1246268). * CVE-2025-38301: nvmem: zynqmp_nvmem: unbreak driver after cleanup (bsc#1246351). * CVE-2025-38306: fs/fhandle.c: fix a race in call of has_locked_children() (bsc#1246366). * CVE-2025-38311: iavf: get rid of the crit lock (bsc#1246376). * CVE-2025-38318: perf: arm-ni: Fix missing platform_set_drvdata() (bsc#1246444). * CVE-2025-38322: perf/x86/intel: Fix crash in icl_update_topdown_event() (bsc#1246447). * CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473). * CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (bsc#1246253). * CVE-2025-38341: eth: fbnic: avoid double free when failing to DMA-map FW msg (bsc#1246260). * CVE-2025-38349: eventpoll: do not decrement ep refcount while still holding the ep mutex (bsc#1246777). * CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781). * CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (bsc#1246782). * CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911). * CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076). * CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078). * CVE-2025-38365: btrfs: fix a race between renames and directory logging (bsc#1247023). * CVE-2025-38374: optee: ffa: fix sleep in atomic context (bsc#1247024). * CVE-2025-38382: btrfs: fix iteration of extrefs during log replay (bsc#1247031). * CVE-2025-38383: mm/vmalloc: fix data race in show_numa_info() (bsc#1247250). * CVE-2025-38392: idpf: convert control queue mutex to a spinlock (bsc#1247169). * CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (bsc#1247156). * CVE-2025-38399: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() (bsc#1247097). * CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262). * CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126). * CVE-2025-38418: remoteproc: core: Release rproc->clean_table after rproc_attach() fails (bsc#1247137). * CVE-2025-38419: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() (bsc#1247136). * CVE-2025-38426: drm/amdgpu: Add basic validation for RAS header (bsc#1247252). * CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155). * CVE-2025-38440: net/mlx5e: Fix race between DIM disable and net_dim() (bsc#1247290). * CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167). * CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162). * CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229). * CVE-2025-38451: md/md-bitmap: fix GPF in bitmap_get_stats() (bsc#1247102). * CVE-2025-38453: kABI: io_uring: msg_ring ensure io_kiocb freeing is deferred (bsc#1247234). * CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099). * CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not exist (bsc#1247098). * CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116). * CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119). * CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143). * CVE-2025-38463: tcp: Correct signedness in skb remaining space calculation (bsc#1247113). * CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112). * CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (bsc#1247288). * CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313). * CVE-2025-38475: smc: Fix various oops due to inet_sock type confusion (bsc#1247308). * CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239). * CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page() (bsc#1247243). * CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280). * CVE-2025-38493: tracing/osnoise: Fix crash in timerlat_dump_stack() (bsc#1247283). * CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347). * CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976). * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088). * CVE-2025-38508: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (bsc#1248190). * CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202). * CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194). * CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192). * CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199). * CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200). * CVE-2025-38539: tracing: Add down_write(trace_event_sem) when adding trace event (bsc#1248211). * CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225). * CVE-2025-38545: net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info (bsc#1248224). * CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223). * CVE-2025-38549: efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths (bsc#1248235). * CVE-2025-38554: mm: fix a UAF when vma->mm is freed after vma->vm_refcnt got dropped (bsc#1248299). * CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296). * CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312). * CVE-2025-38566: sunrpc: fix handling of server side tls alerts (bsc#1248374). * CVE-2025-38571: sunrpc: fix client side handling of tls alerts (bsc#1248401). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399). * CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365). * CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1248368). * CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357). * CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338). * CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392). * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1248512). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511). * CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619). * CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610). * CVE-2025-38628: vdpa/mlx5: Fix release of uninitialized resources on error path (bsc#1248616). * CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null- terminated (bsc#1248674). * CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622). * CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681). * CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748). * CVE-2025-38659: gfs2: No more self recovery (bsc#1248639). * CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628). * CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775). * CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126). * CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused classes (bsc#1249156). * CVE-2025-38686: userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry (bsc#1249160). * CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (bsc#1249182). * CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258). * CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199). * CVE-2025-38710: gfs2: Validate i_depth for exhash directories (bsc#1249201). * CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172). * CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324). * CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path (bsc#1249320). * CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal (bsc#1249300). * CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (bsc#1249303). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284). * CVE-2025-39683: tracing: Limit access to parser->buffer when trace_get_user failed (bsc#1249286). * CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374). * CVE-2025-39698: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (bsc#1249322). * CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315). * CVE-2025-39723: kABI: netfs: handle new netfs_io_stream flag (bsc#1249314). * CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work (bsc#1249494). * CVE-2025-39749: rcu: Protect ->defer_qs_iw_pending from data race (bsc#1249533). * CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration (bsc#1249524). * CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (bsc#1249510). * CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM (bsc#1249508). * CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504). * CVE-2025-39775: mm/mremap: fix WARN with uffd that has remap events disabled (bsc#1249500). * CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526). * CVE-2025-39791: dm: dm-crypt: Do not partially accept write BIOs with zoned targets (bsc#1249550). * CVE-2025-39792: dm: Always split write BIOs to zoned device limits (bsc#1249618). * CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608). * CVE-2025-39813: ftrace: Also allocate and copy hash for reading of filter files (bsc#1250032). * CVE-2025-39816: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths (bsc#1249906). * CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002). * CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2) (bsc#1250179). * CVE-2025-39828: kABI workaround for struct atmdev_ops extension (bsc#1250205). * CVE-2025-39830: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path (bsc#1249974). * CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion (bsc#1250365). * CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown (bsc#1250267). * CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292). * CVE-2025-39850: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects (bsc#1250276). * CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object (bsc#1250296). * CVE-2025-39852: net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6 (bsc#1250258). * CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty (bsc#1250275). * CVE-2025-39854: ice: fix NULL access of tx->in_use in ice_ll_ts_intr (bsc#1250297). * CVE-2025-39857: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() (bsc#1250251). * CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put (bsc#1250294). * CVE-2025-39875: igb: Fix NULL pointer dereference in ethtool loopback test (bsc#1250398). * CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call (bsc#1250407). * CVE-2025-39898: e1000e: fix heap overflow in e1000_set_eeprom (bsc#1250742). * CVE-2025-39900: net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y (bsc#1250758). * CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in object_err() (bsc#1250702). * CVE-2025-39922: ixgbe: fix incorrect map used in eee linkmode (bsc#1250722). * CVE-2025-39926: genetlink: fix genl_bind() invoking bind() after -EPERM (bsc#1250737). * CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230). * CVE-2025-39946: tls: make sure to abort the stream if headers are bogus (bsc#1251114). * CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483). * CVE-2026-38264: nvme-tcp: sanitize request list handling (bsc#1246387). The following non-security bugs were fixed: * ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes). * ACPI/processor_idle: Add FFH state handling (jsc#PED-13815). * ACPI/processor_idle: Export acpi_processor_ffh_play_dead() (jsc#PED-13815). * ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path (stable-fixes). * ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered (stable-fixes). * ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes). * ACPI: LPSS: Remove AudioDSP related ID (git-fixes). * ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message (git- fixes). * ACPI: RISC-V: Fix FFH_CPPC_CSR error handling (git-fixes). * ACPI: Return -ENODEV from acpi_parse_spcr() when SPCR support is disabled (stable-fixes). * ACPI: Suppress misleading SPCR console message when SPCR table is absent (stable-fixes). * ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT (git-fixes). * ACPI: battery: Add synchronization between interface updates (git-fixes). * ACPI: debug: fix signedness issues in read/write helpers (git-fixes). * ACPI: pfr_update: Fix the driver update version check (git-fixes). * ACPI: processor: Rescan "dead" SMT siblings during initialization (jsc#PED-13815). * ACPI: processor: fix acpi_object initialization (stable-fixes). * ACPI: processor: idle: Fix memory leak when register cpuidle device failed (git-fixes). * ACPI: processor: perflib: Fix initial _PPC limit application (git-fixes). * ACPI: processor: perflib: Move problematic pr->performance check (git- fixes). * ACPI: property: Fix buffer properties extraction for subnodes (git-fixes). * ACPICA: Fix largest possible resource descriptor index (git-fixes). * ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported (stable-fixes). * ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes). * ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out() (git-fixes). * ALSA: hda/cs35l56: Workaround bad dev-index on Lenovo Yoga Book 9i GenX (stable-fixes). * ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable- fixes). * ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx (stable- fixes). * ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx (stable- fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-d1xxx (MB 8A26) (stable- fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx (stable-fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-r1xxx (stable-fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-s0xxx (stable-fixes). * ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks (stable-fixes). * ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS (stable-fixes). * ALSA: hda/realtek: Add support for ASUS NUC using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook 830 G6 (stable-fixes). * ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again (git-fixes). * ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes). * ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes). * ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes). * ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop (git-fixes). * ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx (stable-fixes). * ALSA: hda/realtek: add LG gram 16Z90R-A to alc269 fixup table (stable- fixes). * ALSA: hda: Disable jack polling at shutdown (stable-fixes). * ALSA: hda: Handle the jack polling always via a work (stable-fixes). * ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git- fixes). * ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable- fixes). * ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() (git- fixes). * ALSA: lx_core: use int type to store negative error codes (git-fixes). * ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT (git-fixes). * ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable- fixes). * ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes). * ALSA: timer: fix ida_free call while not allocated (git-fixes). * ALSA: usb-audio: Add DSD support for Comtrue USB Audio device (stable- fixes). * ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 (stable-fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on more devices (stable- fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable- fixes). * ALSA: usb-audio: Allow Focusrite devices to use low samplerates (git-fixes). * ALSA: usb-audio: Avoid multiple assignments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable- fixes). * ALSA: usb-audio: Convert comma to semicolon (git-fixes). * ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks (stable- fixes). * ALSA: usb-audio: Fix block comments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes). * ALSA: usb-audio: Fix code alignment in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes). * ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks (stable-fixes). * ALSA: usb-audio: Simplify NULL comparison in mixer_quirks (stable-fixes). * ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git- fixes). * ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes). * ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes). * ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (git-fixes). * ALSA: usb-audio: move mixer_quirks' min_mute into common quirk (stable- fixes). * ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes). * ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: catpt: Expose correct bit depth to userspace (git-fixes). * ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes). * ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback (git-fixes). * ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel (git- fixes). * ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead of buffer time (git-fixes). * ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message (git-fixes). * ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations in resume context (git-fixes). * ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down (git-fixes). * ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer size (git-fixes). * ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size (git- fixes). * ASoC: SOF: topology: Parse the dapm_widget_tokens in case of DSPless mode (stable-fixes). * ASoC: amd: acp: Adjust pdm gain value (stable-fixes). * ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes). * ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes). * ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes). * ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes). * ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes). * ASoC: codecs: wcd9375: Fix double free of regulator supplies (git-fixes). * ASoC: codecs: wcd937x: Drop unused buck_supply (git-fixes). * ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable- fixes). * ASoC: fsl_sai: replace regmap_write with regmap_update_bits (git-fixes). * ASoC: fsl_xcvr: get channel status data when PHY is not exists (git-fixes). * ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable- fixes). * ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes). * ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv (git-fixes). * ASoC: mediatek: use reserved memory or enable buffer pre-allocation (git- fixes). * ASoC: ops: dynamically allocate struct snd_ctl_elem_value (git-fixes). * ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface (git-fixes). * ASoC: qcom: audioreach: fix potential null pointer dereference (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git- fixes). * ASoC: qcom: use drvdata instead of component to keep id (stable-fixes). * ASoC: rt5682s: Adjust SAR ADC button mode to fix noise issue (stable-fixes). * ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() (git- fixes). * ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was successed (stable-fixes). * ASoC: tas2781: Fix the wrong step for TLV on tas2781 (git-fixes). * ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data() (git-fixes). * ASoC: wm8940: Correct PLL rate rounding (git-fixes). * ASoC: wm8940: Correct typo in control name (git-fixes). * ASoC: wm8974: Correct PLL rate rounding (git-fixes). * Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes). * Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes). * Bluetooth: ISO: do not leak skb in ISO_CONT RX (git-fixes). * Bluetooth: ISO: free rx_skb if not consumed (git-fixes). * Bluetooth: MGMT: Fix not exposing debug UUID on MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes). * Bluetooth: MGMT: Fix possible UAFs (git-fixes). * Bluetooth: btmtk: Fix wait_on_bit_timeout interruption during shutdown (git- fixes). * Bluetooth: btusb: Add USB ID 2001:332a for D-Link AX9U rev. A1 (stable- fixes). * Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e14e for MT7925 (stable-fixes). * Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git- fixes). * Bluetooth: hci_core: Fix using {cis,bis}_capable for current settings (git- fixes). * Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git- fixes). * Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (git-fixes). * Bluetooth: hci_event: Mark connection as closed during suspend disconnect (git-fixes). * Bluetooth: hci_event: Mask data status from LE ext adv reports (git-fixes). * Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git- fixes). * Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes). * Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable- fixes). * Bluetooth: hci_sync: Avoid adding default advertising on startup (stable- fixes). * Bluetooth: hci_sync: Fix hci_resume_advertising_sync (git-fixes). * Bluetooth: hci_sync: Fix scan state after PA Sync has been established (git- fixes). * Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements (git-fixes). * Bluetooth: hci_sync: Prevent unintended PA sync when SID is 0xFF (git- fixes). * Bluetooth: hci_sync: fix set_local_name race condition (git-fixes). * Bluetooth: vhci: Prevent use-after-free by removing debugfs files early (git-fixes). * CONFIG & no reference -> OK temporarily, must be resolved eventually * Disable CET before shutdown by tboot (bsc#1247950). * Docs/ABI: Fix sysfs-kernel-address_bits path (git-fixes). * Documentation/x86: Document new attack vector controls (git-fixes). * Documentation: ACPI: Fix parent device references (git-fixes). * Documentation: KVM: Fix unexpected unindent warning (git-fixes). * Documentation: KVM: Fix unexpected unindent warnings (git-fixes). * Documentation: usb: gadget: Wrap remaining usage snippets in literal code block (git-fixes). * Drop ath12k patch that was reverted in the upstream (git-fixes) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * Enable CONFIG_CMA_SYSFS This is a generally useful feature for anyone using CMA or investigating CMA issues, with a small and simple code base and no runtime overhead. * Enable MT7925 WiFi drivers for openSUSE Leap 16.0 (bsc#1247325) * Enable SMC_LO (a.k.a SMC-D) (jsc#PED-13256). * Fix bogus i915 patch backport (bsc#1238972) It's been already cherry-picked in 6.12 kernel itself. * Fix dma_unmap_sg() nents value (git-fixes) * HID: amd_sfh: Add sync across amd sfh work functions (git-fixes). * HID: apple: avoid setting up battery timer for devices without battery (git- fixes). * HID: apple: validate feature-report field count to prevent NULL pointer dereference (git-fixes). * HID: asus: add support for missing PX series fn keys (stable-fixes). * HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes). * HID: core: do not bypass hid_hw_raw_request (stable-fixes). * HID: core: ensure the allocated report buffer can contain the reserved report ID (stable-fixes). * HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (stable-fixes). * HID: hidraw: tighten ioctl command parsing (git-fixes). * HID: input: rename hidinput_set_battery_charge_status() (stable-fixes). * HID: input: report battery status changes immediately (git-fixes). * HID: intel-ish-ipc: Remove redundant ready check after timeout function (git-fixes). * HID: logitech: Add ids for G PRO 2 LIGHTSPEED (stable-fixes). * HID: magicmouse: avoid setting up battery timer when not needed (git-fixes). * HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git- fixes). * HID: quirks: add support for Legion Go dual dinput modes (stable-fixes). * HID: wacom: Add a new Art Pen 2 (stable-fixes). * IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes) * IB/sa: Fix sa_local_svc_timeout_ms read race (git-fixes) * Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table (stable-fixes). * Input: iqs7222 - avoid enabling unused interrupts (stable-fixes). * Input: psxpad-spi - add a check for the return value of spi_setup() (git- fixes). * Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (git-fixes). * KEYS: X.509: Fix Basic Constraints CA flag parsing (git-fixes). * KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes). * KVM: Allow CPU to reschedule while setting per-page memory attributes (git- fixes). * KVM: Bail from the dirty ring reset flow if a signal is pending (git-fixes). * KVM: Bound the number of dirty ring entries in a single reset at INT_MAX (git-fixes). * KVM: Conditionally reschedule when resetting the dirty ring (git-fixes). * KVM: PPC: Fix misleading interrupts comment in kvmppc_prepare_to_enter() (bsc#1215199). * KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest (git-fixes). * KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes). * KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight (git-fixes). * KVM: TDX: Add new TDVMCALL status code for unsupported subfuncs (jsc#PED-13302). * KVM: TDX: Do not report base TDVMCALLs (git-fixes). * KVM: TDX: Exit to userspace for GetTdVmCallInfo (jsc#PED-13302). * KVM: TDX: Exit to userspace for SetupEventNotifyInterrupt (jsc#PED-13302). * KVM: TDX: Handle TDG.VP.VMCALL<GetQuote> (jsc#PED-13302). * KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities (jsc#PED-13302). * KVM: TDX: Use kvm_arch_vcpu.host_debugctl to restore the host's DEBUGCTL (git-fixes). * KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * KVM: VMX: Ensure unused kvm_tdx_capabilities fields are zeroed out (jsc#PED-13302). * KVM: arm64: Adjust range correctly during host stage-2 faults (git-fixes). * KVM: arm64: Do not free hyp pages with pKVM on GICv2 (git-fixes). * KVM: arm64: Fix error path in init_hyp_mode() (git-fixes). * KVM: arm64: Mark freed S2 MMUs as invalid (git-fixes). * KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes). * KVM: s390: Fix access to unavailable adapter indicator pages during postcopy (git-fixes bsc#1250124). * KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes bsc#1250123). * KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes). * KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table (git-fixes). * KVM: x86: Avoid calling kvm_is_mmio_pfn() when kvm_x86_ops.get_mt_mask is NULL (git-fixes). * KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting MP_STATE (git-fixes). * KVM: x86: Reject KVM_SET_TSC_KHZ vCPU ioctl for TSC protected guest (git- fixes). * KVM: x86: avoid underflow when scaling TSC frequency (git-fixes). * Limit patch filenames to 100 characters (bsc#1249604). * Move upstreamed SPI patch into sorted section * NFS: Fix a race when updating an existing write (git-fixes). * NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (git-fixes). * NFS: Fix the setting of capabilities when automounting a new filesystem (git-fixes). * NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (git- fixes). * NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY (git-fixes). * NFS: nfs_invalidate_folio() must observe the offset and size arguments (git- fixes). * NFSD: Define a proc_layoutcommit for the FlexFiles layout type (git-fixes). * NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul() (git-fixes). * NFSD: detect mismatch of file handle and delegation stateid in OPEN op (git- fixes). * NFSv4.1: fix backchannel max_resp_sz verification check (git-fixes). * NFSv4.2: another fix for listxattr (git-fixes). * NFSv4/flexfiles: Fix layout merge mirror check (git-fixes). * NFSv4: Clear NFS_CAP_OPEN_XOR and NFS_CAP_DELEGTIME if not supported (git- fixes). * NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes). * NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git- fixes). * NFSv4: Do not clear capabilities that won't be reset (git-fixes). * Octeontx2-af: Skip overlap check for SPI field (git-fixes). * PCI/ACPI: Fix pci_acpi_preserve_config() memory leak (git-fixes). * PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * PCI/AER: Fix missing uevent on recovery when a reset is requested (git- fixes). * PCI/ERR: Fix uevent on failure to recover (git-fixes). * PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (git- fixes). * PCI/MSI: Export pci_msix_prepare_desc() for dynamic MSI-X allocations (bsc#1245457). * PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes). * PCI/pwrctrl: Fix device leak at registration (git-fixes). * PCI/sysfs: Ensure devices are powered for config reads (git-fixes). * PCI: Extend isolated function probing to LoongArch (git-fixes). * PCI: Rename PCIE_RESET_CONFIG_DEVICE_WAIT_MS to PCIE_RESET_CONFIG_WAIT_MS (git-fixes). * PCI: Support Immediate Readiness on devices without PM capabilities (git- fixes). * PCI: dw-rockchip: Replace PERST# sleep time with proper macro (git-fixes). * PCI: dw-rockchip: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git- fixes). * PCI: dwc: Ensure that dw_pcie_wait_for_link() waits 100 ms after link up (stable-fixes). * PCI: endpoint: Fix configfs group list head handling (git-fixes). * PCI: endpoint: Fix configfs group removal on driver teardown (git-fixes). * PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute (git-fixes). * PCI: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar() fails (git-fixes). * PCI: hv: Allow dynamic MSI-X vector allocation (bsc#1245457). * PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features (git-fixes). * PCI: imx6: Add IMX8MQ_EP third 64-bit BAR in epc_features (git-fixes). * PCI: imx6: Add i.MX8Q PCIe Endpoint (EP) support (git-fixes). * PCI: imx6: Delay link start until configfs 'start' written (git-fixes). * PCI: imx6: Remove apps_reset toggling from imx_pcie_{assert/deassert}_core_reset (git-fixes). * PCI: j721e: Fix incorrect error message in probe() (git-fixes). * PCI: j721e: Fix programming sequence of "strap" settings (git-fixes). * PCI: keystone: Use devm_request_irq() to free "ks-pcie-error-irq" on exit (git-fixes). * PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199). * PCI: pnv_php: Work around switches with broken presence detection (bsc#1215199). * PCI: qcom: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git-fixes). * PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion (git-fixes). * PCI: rcar-gen4: Assure reset occurs before DBI access (git-fixes). * PCI: rcar-gen4: Fix PHY initialization (git-fixes). * PCI: rcar-gen4: Fix inverted break condition in PHY initialization (git- fixes). * PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git- fixes). * PCI: rcar-host: Drop PMSR spinlock (git-fixes). * PCI: rockchip-host: Fix "Unexpected Completion" log message (git-fixes). * PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git- fixes). * PCI: rockchip: Use standard PCIe definitions (git-fixes). * PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq() (git-fixes). * PCI: tegra194: Fix duplicate PLL disable in pex_ep_event_pex_rst_assert() (git-fixes). * PCI: tegra194: Handle errors in BPMP response (git-fixes). * PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes). * PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock (git- fixes). * PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation (git-fixes). * PCI: xilinx-nwl: Fix ECAM programming (git-fixes). * PM / devfreq: Check governor before using governor->name (git-fixes). * PM / devfreq: Fix a index typo in trans_stat (git-fixes). * PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store() (stable-fixes). * PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() (git-fixes). * PM / devfreq: rockchip-dfi: double count on RK3588 (git-fixes). * PM: EM: use kfree_rcu() to simplify the code (stable-fixes). * PM: cpufreq: powernv/tracing: Move powernv_throttle trace event (git-fixes). * PM: hibernate: Add pm_hibernation_mode_is_suspend() (bsc#1243112). * PM: hibernate: Add stub for pm_hibernate_is_recovering() (bsc#1243112). * PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage (bsc#1243112). * PM: hibernate: add new api pm_hibernate_is_recovering() (bsc#1243112). * PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable- fixes). * PM: runtime: Take active children into account in pm_runtime_get_if_in_use() (git-fixes). * PM: sleep: console: Fix the black screen issue (stable-fixes). * PM: sleep: core: Clear power.must_resume in noirq suspend error path (git- fixes). * RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034). * RAS/AMD/FMPM: Get masked address (bsc#1242034). * RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes) * RDMA/bnxt_re: Fix size of uverbs_copy_to() in BNXT_RE_METHOD_GET_TOGGLE_MEM (git-fixes) * RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes) * RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes) * RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes) * RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes) * RDMA/core: Rate limit GID cache warning messages (git-fixes) * RDMA/core: Resolve MAC of next-hop device without ARP support (git-fixes) * RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes) * RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters (git-fixes) * RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes) * RDMA/hns: Drop GFP_NOWARN (git-fixes) * RDMA/hns: Fix -Wframe-larger-than issue (git-fixes) * RDMA/hns: Fix HW configurations not cleared in error flow (git-fixes) * RDMA/hns: Fix accessing uninitialized resources (git-fixes) * RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes) * RDMA/hns: Fix double destruction of rsv_qp (git-fixes) * RDMA/hns: Fix querying wrong SCC context for DIP algorithm (git-fixes) * RDMA/hns: Get message length of ack_req from FW (git-fixes) * RDMA/mana_ib: Add device statistics support (bsc#1246651). * RDMA/mana_ib: Drain send wrs of GSI QP (bsc#1251135). * RDMA/mana_ib: Extend modify QP (bsc#1251135). * RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes). * RDMA/mana_ib: add additional port counters (git-fixes). * RDMA/mana_ib: add support of multiple ports (git-fixes). * RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes) * RDMA/mlx5: Fix UMR modifying of mkey page size (git-fixes) * RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes) * RDMA/mlx5: Fix vport loopback forcing for MPV device (git-fixes) * RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes) * RDMA/rxe: Fix race in do_task() when draining (git-fixes) * RDMA/rxe: Flush delayed SKBs while releasing RXE resources (git-fixes) * RDMA/siw: Always report immediate post SQ errors (git-fixes) * RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages (git-fixes) * RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git- fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes) * RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes) * README.BRANCH: mfranc at suse.cz leaving SUSE * RISC-V: Add defines for the SBI nested acceleration extension (jsc#PED-348). * Reapply "wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()" (git-fixes). * Reapply "x86/smp: Eliminate mwait_play_dead_cpuid_hint()" (jsc#PED-13815). * Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes). * Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes). * Revert "drm/nouveau: check ioctl command codes better" (git-fixes). * Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes). * Revert "leds: trigger: netdev: Configure LED blink interval for HW offload" (git-fixes). * Revert "mac80211: Dynamically set CoDel parameters per station" (stable- fixes). * Revert "usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running" (git-fixes). * Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()" (stable-fixes). * Revert "wifi: mt76: mt7925: Update mt7925_mcu_uni_[tx,rx]_ba for MLO" (git- fixes). * SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes). * Squashfs: add additional inode sanity checking (git-fixes). * Squashfs: fix uninit-value in squashfs_get_parent (git-fixes). * Squashfs: reject negative file sizes in squashfs_read_inode() (git-fixes). * USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes). * USB: gadget: f_hid: Fix memory leak in hidg_bind error path (git-fixes). * USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI (stable-fixes). * USB: serial: option: add Foxconn T99W640 (stable-fixes). * USB: serial: option: add Foxconn T99W709 (stable-fixes). * USB: serial: option: add SIMCom 8230C compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition (stable- fixes). * USB: serial: option: add Telit Cinterion FN990A w/audio compositions (stable-fixes). * USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions (stable-fixes). * USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera (stable-fixes). * USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles (stable-fixes). * Update config files. (bsc#1249186) Enable where we define KABI refs + rely on Kconfig deps. * Update config files: revive pwc driver for Leap (bsc#1249060) * accel/habanalabs/gaudi2: Use kvfree() for memory allocated with kvcalloc() (git-fixes). * accel/ivpu: Correct DCT interrupt handling (git-fixes). * accel/ivpu: Fix reset_engine debugfs file logic (stable-fixes). * accel/ivpu: Fix warning in ivpu_gem_bo_free() (git-fixes). * accel/ivpu: Prevent recovery work from being queued during device removal (git-fixes). * amdgpu/amdgpu_discovery: increase timeout limit for IFWI init (stable- fixes). * aoe: defer rexmit timer downdev work to workqueue (git-fixes). * arch/powerpc: Remove .interp section in vmlinux (bsc#1215199). * arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes) * arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes) * arm64/mm: Check pmd_table() in pmd_trans_huge() (git-fixes) * arm64/mm: Close theoretical race where stale TLB entry remains valid (git- fixes) * arm64/mm: Drop wrong writes into TCR2_EL1 (git-fixes) * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64/sysreg: Add register fields for HDFGRTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HDFGWTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGITR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGRTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGWTR2_EL2 (git-fixes) * arm64/sysreg: Update register fields for ID_AA64MMFR0_EL1 (git-fixes) * arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes) * arm64: Handle KCOV __init vs inline mismatches (git-fixes) * arm64: Mark kernel as tainted on SAE and SError panic (git-fixes) * arm64: Restrict pagetable teardown to avoid false warning (git-fixes) * arm64: config: Make tpm_tis_spi module build-in (bsc#1246896) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: add big-endian property back into watchdog node (git-fixes) * arm64: dts: apple: Add ethernet0 alias for J375 template (git-fixes) * arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map (git-fixes) * arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes) * arm64: dts: exynos: gs101: Add 'local-timer-stop' to cpuidle nodes (git- fixes) * arm64: dts: exynos: gs101: ufs: add dma-coherent property (git-fixes) * arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes) * arm64: dts: freescale: imx93-tqma9352: Limit BUCK2 to 600mV (git-fixes) * arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mm-beacon: Set SAI5 MCLK direction to output for HDMI (git- fixes) * arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mn-beacon: Set SAI5 MCLK direction to output for HDMI (git- fixes) * arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes) * arm64: dts: imx8mp-venice-gw702x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-venice-gw71xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp: Correct thermal sensor index (git-fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git- fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes) * arm64: dts: imx93-kontron: Fix GPIO for panel regulator (git-fixes) * arm64: dts: imx93-kontron: Fix USB port assignment (git-fixes) * arm64: dts: imx95: Correct the DMA interrupter number of pcie0_ep (git- fixes) * arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid (git-fixes) * arm64: dts: marvell: cn9132-clearfog: disable eMMC high-speed modes (git- fixes) * arm64: dts: marvell: cn9132-clearfog: fix multi-lane pci x2 and x4 (git- fixes) * arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B (git- fixes). * arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5 (git- fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on rk3566-rock3c (git- fixes) * arm64: dts: rockchip: Fix Bluetooth interrupts flag on Neardi LBA3368 (git- fixes) * arm64: dts: rockchip: Fix the headphone detection on the orangepi 5 (git- fixes) * arm64: dts: rockchip: Move SHMEM memory to reserved memory on rk3588 (git- fixes) * arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git- fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399 Puma (git-fixes) * arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes) * arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git- fixes) * arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes) * arm64: dts: st: fix timer used for ticks (git-fixes) * arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git- fixes) * arm64: map [_text, _stext) virtual address range (git-fixes) * arm64: mte: Do not flag the zero page as PG_mte_tagged (git-fixes) * arm64: poe: Handle spurious Overlay faults (git-fixes) * arm64: rust: clean Rust 1.85.0 warning using softfloat target (git-fixes) * arm64: stacktrace: Check kretprobe_find_ret_addr() return value (git-fixes) * arm64: tegra: Add uartd serial alias for Jetson TX1 module (git-fixes) * arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes) * arm64: tegra: Resize aperture for the IGX PCIe C5 slot (git-fixes) * arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes) * arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes) * ata: ahci: Disable DIPM if host lacks support (stable-fixes). * ata: ahci: Disallow LPM policy control if not supported (stable-fixes). * ata: libata-sata: Add link_power_management_supported sysfs attribute (git- fixes). * ata: libata-sata: Disallow changing LPM state if not supported (stable- fixes). * ata: libata-scsi: Fix CDL control (git-fixes). * audit,module: restore audit logging in load failure case (git-fixes). * ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes). * batman-adv: fix OOB read/write in network-coding decode (git-fixes). * benet: fix BUG when creating VFs (git-fixes). * block: Introduce bio_needs_zone_write_plugging() (git-fixes). * block: Make REQ_OP_ZONE_FINISH a write operation (git-fixes, bsc#1249552). * block: ensure discard_granularity is zero when discard is not supported (git-fixes). * block: fix kobject leak in blk_unregister_queue (git-fixes). * block: mtip32xx: Fix usage of dma_map_sg() (git-fixes). * block: sanitize chunk_sectors for atomic write limits (git-fixes). * bnxt_en: Add a helper function to configure MRU and RSS (git-fixes). * bnxt_en: Adjust TX rings if reservation is less than requested (git-fixes). * bnxt_en: Fix DCB ETS validation (git-fixes). * bnxt_en: Fix memory corruption when FW resources change during ifdown (git- fixes). * bnxt_en: Fix stats context reservation logic (git-fixes). * bnxt_en: Flush FW trace before copying to the coredump (git-fixes). * bnxt_en: Update MRU and RSS table of RSS contexts on queue reset (git- fixes). * bnxt_en: eliminate the compile warning in bnxt_request_irq due to CONFIG_RFS_ACCEL (git-fixes). * bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free() (git- fixes) * bpf, arm64: Fix fp initialization for exception boundary (git-fixes) * bpf, docs: Fix broken link to renamed bpf_iter_task_vmas.c (git-fixes). * bpf, sockmap: Fix psock incorrectly pointing to sk (git-fixes). * bpf: Adjust free target to avoid global starvation of LRU map (git-fixes). * bpf: Allow XDP dev-bound programs to perform XDP_REDIRECT into maps (git- fixes). * bpf: Avoid RCU context warning when unpinning htab with internal structs (git-fixes). * bpf: Check link_create.flags parameter for multi_kprobe (git-fixes). * bpf: Check link_create.flags parameter for multi_uprobe (git-fixes). * bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} (git-fixes). * bpf: Fix uninitialized values in BPF_{CORE,PROBE}_READ (git-fixes). * bpf: Forget ranges when refining tnum after JSET (git-fixes). * bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes). * bpf: Only fails the busy counter check in bpf_cgrp_storage_get if it creates storage (git-fixes). * bpf: Reject %p% format string in bprintf-like helpers (git-fixes). * bpf: Reject attaching fexit/fmod_ret to __noreturn functions (git-fixes). * bpf: Reject narrower access to pointer ctx fields (git-fixes). * bpf: Return prog btf_id without capable check (git-fixes). * bpf: Use preempt_count() directly in bpf_send_signal_common() (git-fixes). * bpf: Use proper type to calculate bpf_raw_tp_null_args.mask index (git- fixes). * bpf: fix possible endless loop in BPF map iteration (git-fixes). * btrfs: abort transaction during log replay if walk_log_tree() failed (git- fixes). * btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (git-fixes). * btrfs: add assertions and comment about path expectations to btrfs_cross_ref_exist() (git-fixes). * btrfs: add debug build only WARN (bsc#1249038). * btrfs: add function comment for check_committed_ref() (git-fixes). * btrfs: always abort transaction on failure to add block group to free space tree (git-fixes). * btrfs: avoid load/store tearing races when checking if an inode was logged (git-fixes). * btrfs: avoid redundant call to get inline ref type at check_committed_ref() (git-fixes). * btrfs: avoid starting new transaction when cleaning qgroup during subvolume drop (git-fixes). * btrfs: clear dirty status from extent buffer on error at insert_new_root() (git-fixes). * btrfs: codify pattern for adding block_group to bg_list (git-fixes). * btrfs: convert ASSERT(0) with handled errors to DEBUG_WARN() (bsc#1249038). * btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling (git-fixes). * btrfs: correctly escape subvol in btrfs_show_options() (git-fixes). * btrfs: do not allow relocation of partially dropped subvolumes (bsc#1249540). * btrfs: do not ignore inode missing when replaying log tree (git-fixes). * btrfs: do not output error message if a qgroup has been already cleaned up (git-fixes). * btrfs: do not return VM_FAULT_SIGBUS on failure to set delalloc for mmap write (bsc#1247949). * btrfs: do not silently ignore unexpected extent type when replaying log (git-fixes). * btrfs: do not skip remaining extrefs if dir not found during log replay (git-fixes). * btrfs: enhance ASSERT() to take optional format string (bsc#1249038). * btrfs: error on missing block group when unaccounting log tree extent buffers (git-fixes). * btrfs: exit after state split error at set_extent_bit() (git-fixes). * btrfs: explicitly ref count block_group on new_bgs list (bsc#1243068) * btrfs: fix -ENOSPC mmap write failure on NOCOW files/extents (bsc#1247949). * btrfs: fix assertion when building free space tree (git-fixes). * btrfs: fix corruption reading compressed range when block size is smaller than page size (git-fixes). * btrfs: fix data overwriting bug during buffered write when block size < page size (git-fixes). * btrfs: fix data race when accessing the inode's disk_i_size at btrfs_drop_extents() (git-fixes). * btrfs: fix incorrect log message for nobarrier mount option (git-fixes). * btrfs: fix inode lookup error handling during log replay (git-fixes). * btrfs: fix invalid extref key setup when replaying dentry (git-fixes). * btrfs: fix invalid inode pointer after failure to create reloc inode (git- fixes). * btrfs: fix invalid inode pointer dereferences during log replay (git-fixes). * btrfs: fix iteration bug in __qgroup_excl_accounting() (git-fixes). * btrfs: fix log tree replay failure due to file with 0 links and extents (git-fixes). * btrfs: fix missing error handling when searching for inode refs during log replay (git-fixes). * btrfs: fix non-empty delayed iputs list on unmount due to async workers (git-fixes). * btrfs: fix printing of mount info messages for NODATACOW/NODATASUM (git- fixes). * btrfs: fix race between logging inode and checking if it was logged before (git-fixes). * btrfs: fix race between setting last_dir_index_offset and inode logging (git-fixes). * btrfs: fix squota compressed stats leak (git-fixes). * btrfs: fix ssd_spread overallocation (git-fixes). * btrfs: fix subvolume deletion lockup caused by inodes xarray race (git- fixes). * btrfs: fix the inode leak in btrfs_iget() (git-fixes). * btrfs: fix two misuses of folio_shift() (git-fixes). * btrfs: fix wrong length parameter for btrfs_cleanup_ordered_extents() (git- fixes). * btrfs: handle unaligned EOF truncation correctly for subpage cases (bsc#1249038). * btrfs: initialize inode::file_extent_tree after i_mode has been set (git- fixes). * btrfs: make btrfs_discard_workfn() block_group ref explicit (bsc#1243068) * btrfs: make btrfs_iget() return a btrfs inode instead (git-fixes). * btrfs: make btrfs_iget_path() return a btrfs inode instead (git-fixes). * btrfs: move transaction aborts to the error site in add_block_group_free_space() (git-fixes). * btrfs: pass a btrfs_inode to fixup_inode_link_count() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_defrag_file() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_double_mmap_lock() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_double_mmap_unlock() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_extent_same_range() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_fill_inode() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_iget_locked() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_inode_inherit_props() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_inode_type() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_load_inode_props() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_read_locked_inode() (git-fixes). * btrfs: pass struct btrfs_inode to can_nocow_extent() (git-fixes). * btrfs: pass struct btrfs_inode to clone_copy_inline_extent() (git-fixes). * btrfs: pass struct btrfs_inode to extent_range_clear_dirty_for_io() (git- fixes). * btrfs: pass struct btrfs_inode to fill_stack_inode_item() (git-fixes). * btrfs: pass struct btrfs_inode to new_simple_dir() (git-fixes). * btrfs: pass true to btrfs_delalloc_release_space() at btrfs_page_mkwrite() (bsc#1247949). * btrfs: propagate last_unlink_trans earlier when doing a rmdir (git-fixes). * btrfs: props: switch prop_handler::apply to struct btrfs_inode (git-fixes). * btrfs: props: switch prop_handler::extract to struct btrfs_inode (git- fixes). * btrfs: push cleanup into btrfs_read_locked_inode() (git-fixes). * btrfs: qgroup: fix qgroup create ioctl returning success after quotas disabled (git-fixes). * btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git- fixes). * btrfs: qgroup: remove no longer used fs_info->qgroup_ulist (git-fixes). * btrfs: qgroup: set quota enabled bit if quota disable fails flushing reservations (git-fixes). * btrfs: record new subvolume in parent dir earlier to avoid dir logging races (git-fixes). * btrfs: remove conditional path allocation in btrfs_read_locked_inode() (git- fixes). * btrfs: remove no longer needed strict argument from can_nocow_extent() (git- fixes). * btrfs: remove redundant path release when replaying a log tree (git-fixes). * btrfs: remove the snapshot check from check_committed_ref() (git-fixes). * btrfs: restore mount option info messages during mount (git-fixes). * btrfs: return a btrfs_inode from btrfs_iget_logging() (git-fixes). * btrfs: return a btrfs_inode from read_one_inode() (git-fixes). * btrfs: return any hit error from extent_writepage_io() (git-fixes). * btrfs: send: remove unnecessary inode lookup at send_encoded_inline_extent() (git-fixes). * btrfs: simplify arguments for btrfs_cross_ref_exist() (git-fixes). * btrfs: simplify early error checking in btrfs_page_mkwrite() (bsc#1247949). * btrfs: simplify error detection flow during log replay (git-fixes). * btrfs: simplify return logic at check_committed_ref() (git-fixes). * btrfs: subpage: fix the bitmap dump of the locked flags (git-fixes). * btrfs: tests: fix chunk map leak after failure to add it to the tree (git- fixes). * btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes). * btrfs: unfold transaction aborts when replaying log trees (git-fixes). * btrfs: unify ordering of btrfs_key initializations (git-fixes). * btrfs: update superblock's device bytes_used when dropping chunk (git- fixes). * btrfs: use a single variable to track return value at btrfs_page_mkwrite() (bsc#1247949). * btrfs: use btrfs_record_snapshot_destroy() during rmdir (git-fixes). * btrfs: use filemap_get_folio() helper (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_get_name() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_get_parent() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_remap_file_range() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_remap_file_range_prep() (git- fixes). * btrfs: use struct btrfs_inode inside create_pending_snapshot() (git-fixes). * btrfs: use verbose ASSERT() in volumes.c (bsc#1249038). * build_bug.h: Add KABI assert (bsc#1249186). * bus: firewall: Fix missing static inline annotations for stubs (git-fixes). * bus: fsl-mc: Check return value of platform_get_resource() (git-fixes). * bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint() (git-fixes). * bus: mhi: ep: Fix chained transfer handling in read path (git-fixes). * bus: mhi: host: Detect events pointing to unexpected TREs (git-fixes). * bus: mhi: host: Do not use uninitialized 'dev' pointer in mhi_init_irq_setup() (git-fixes). * bus: mhi: host: pci_generic: Fix the modem name of Foxconn T99W640 (git- fixes). * can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled (stable-fixes). * can: hi311x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes). * can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get() fails (git-fixes). * can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed (git-fixes). * can: kvaser_pciefd: Store device channel index (git-fixes). * can: kvaser_usb: Assign netdev.dev_port based on device channel index (git- fixes). * can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode (git-fixes). * can: peak_usb: fix USB FD devices potential malfunction (git-fixes). * can: peak_usb: fix shift-out-of-bounds issue (git-fixes). * can: rcar_can: rcar_can_resume(): fix s2ram with PSCI (stable-fixes). * can: rcar_canfd: Fix controller mode setting (stable-fixes). * can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB (git-fixes). * cdc-acm: fix race between initial clearing halt and open (git-fixes). * cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes). * cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes). * cgroup/cpuset: Fix a partition error with CPU hotplug (bsc#1241166). * cgroup/cpuset: Use static_branch_enable_cpuslocked() on cpusets_insane_config_key (bsc#1241166). * cgroup: Add compatibility option for content of /proc/cgroups (jsc#PED-12405). * cgroup: Print message when /proc/cgroups is read on v2-only system (jsc#PED-12405). * cgroup: llist: avoid memory tears for llist_node (bsc#1247963). * cgroup: make css_rstat_updated nmi safe (bsc#1247963). * cgroup: remove per-cpu per-subsystem locks (bsc#1247963). * cgroup: support to enable nmi-safe css_rstat_updated (bsc#1247963). * char: misc: Fix improper and inaccurate error code returned by misc_init() (stable-fixes). * clk: at91: peripheral: fix return value (git-fixes). * clk: at91: sam9x7: update pll clk ranges (git-fixes). * clk: clk-axi-clkgen: fix fpfd_max frequency for zynq (git-fixes). * clk: davinci: Add NULL check in davinci_lpsc_clk_register() (git-fixes). * clk: imx95-blk-ctl: Fix synchronous abort (git-fixes). * clk: mediatek: clk-mux: Do not pass flags to clk_mux_determine_rate_flags() (git-fixes). * clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m (git- fixes). * clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register() (git-fixes). * clk: qcom: gcc-ipq8074: fix broken freq table for nss_port6_tx_clk_src (git- fixes). * clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk (git- fixes). * clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init() (git- fixes). * clk: renesas: rzv2h: Fix missing CLK_SET_RATE_PARENT flag for ddiv clocks (git-fixes). * clk: samsung: exynos850: fix a comment (git-fixes). * clk: samsung: gs101: fix CLK_DOUT_CMU_G3D_BUSD (git-fixes). * clk: samsung: gs101: fix alternate mout_hsi0_usb20_ref parent clock (git- fixes). * clk: sunxi-ng: v3s: Fix de clock definition (git-fixes). * clk: tegra: do not overallocate memory for bpmp clocks (git-fixes). * clk: thead: th1520-ap: Correctly refer the parent of osc_12m (git-fixes). * clk: xilinx: vcu: unregister pll_post only if registered correctly (git- fixes). * comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() (git-fixes). * comedi: Make insn_rw_emulate_bits() do insn->n samples (git-fixes). * comedi: fix race between polling and detaching (git-fixes). * comedi: pcl726: Prevent invalid irq number (git-fixes). * compiler-clang.h: define **SANITIZE_*** macros only when undefined (stable- fixes). * compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes). * config.sh: SLFO 1.2 branched in IBS * config: arm64: default: enable mtu3 dual-role support for MediaTek platforms (bsc#1245206) * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cpu: Define attack vectors (git-fixes). * cpufreq/amd-pstate: Fix a regression leading to EPP 0 after resume (git- fixes). * cpufreq/amd-pstate: Fix setting of CPPC.min_perf in active mode for performance governor (git-fixes). * cpufreq/sched: Explicitly synchronize limits_changed flag (git-fixes) * cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS (git-fixes) * cpufreq: Add SM8650 to cpufreq-dt-platdev blocklist (stable-fixes). * cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay (stable- fixes). * cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes). * cpufreq: Exit governor when failed to start old governor (stable-fixes). * cpufreq: Init policy->rwsem before it may be possibly used (git-fixes). * cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes). * cpufreq: Initialize cpufreq-based invariance before subsys (git-fixes). * cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency (stable-fixes git-fixes). * cpufreq: Reference count policy in cpufreq_update_limits() (git-fixes). * cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table() (stable-fixes). * cpufreq: armada-8k: make both cpu masks static (git-fixes). * cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes). * cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git- fixes). * cpufreq: intel_pstate: Add Granite Rapids support in no-HWP mode (stable- fixes). * cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git- fixes). * cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (git-fixes). * cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes). * cpufreq: mediatek: fix device leak on probe failure (git-fixes). * cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus() (git- fixes). * cpufreq: scmi: Skip SCMI devices that are not used by the CPUs (stable- fixes). * cpufreq: scpi: compare kHz instead of Hz (git-fixes). * cpufreq: sun50i: prevent out-of-bounds access (git-fixes). * cpufreq: tegra186: Set target frequency for all cpus in policy (git-fixes). * cpufreq: tegra186: Share policy per cluster (stable-fixes). * cpupower: Fix a bug where the -t option of the set subcommand was not working (stable-fixes). * crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes). * crypto: arm/aes-neonbs - work around gcc-15 warning (git-fixes). * crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes). * crypto: atmel - Fix dma_unmap_sg() direction (git-fixes). * crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP (git-fixes). * crypto: ccp - Add missing bootloader info reg for pspv6 (stable-fixes). * crypto: ccp - Fix crash when rebind ccp device for ccp.ko (git-fixes). * crypto: ccp - Fix locking on alloc failure handling (git-fixes). * crypto: essiv - Check ssize for decryption and in-place encryption (git- fixes). * crypto: hisilicon - re-enable address prefetch after device resuming (git- fixes). * crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes). * crypto: hisilicon/qm - check whether the input function and PF are on the same device (git-fixes). * crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs (git-fixes). * crypto: hisilicon/zip - remove unnecessary validation for high-performance mode configurations (git-fixes). * crypto: img-hash - Fix dma_unmap_sg() nents value (git-fixes). * crypto: inside-secure - Fix `dma_unmap_sg()` nents value (git-fixes). * crypto: jitter - fix intermediary handling (stable-fixes). * crypto: keembay - Add missing check after sg_nents_for_len() (git-fixes). * crypto: keembay - Fix dma_unmap_sg() nents value (git-fixes). * crypto: marvell/cesa - Fix engine load inaccuracy (git-fixes). * crypto: octeontx2 - Call strscpy() with correct size argument (git-fixes). * crypto: octeontx2 - Fix address alignment issue on ucode loading (stable- fixes). * crypto: octeontx2 - Fix address alignment on CN10K A0/A1 and OcteonTX2 (stable-fixes). * crypto: octeontx2 - Fix address alignment on CN10KB and CN10KA-B0 (stable- fixes). * crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes). * crypto: qat - allow enabling VFs in the absence of IOMMU (git-fixes). * crypto: qat - disable ZUC-256 capability for QAT GEN5 (git-fixes). * crypto: qat - fix DMA direction for compression on GEN2 devices (git-fixes). * crypto: qat - fix seq_file position update in adf_ring_next() (git-fixes). * crypto: qat - fix state restore for banks with exceptions (git-fixes). * crypto: qat - flush misc workqueue during device shutdown (git-fixes). * crypto: qat - lower priority for skcipher and aead algorithms (stable- fixes). * crypto: qat - use unmanaged allocation for dc_data (git-fixes). * crypto: rng - Ensure set_ent is always present (git-fixes). * crypto: rockchip - Fix dma_unmap_sg() nents value (git-fixes). * crypto: sun8i-ce - fix nents passed to dma_unmap_sg() (git-fixes). * devlink: Add support for u64 parameters (jsc#PED-13331). * devlink: avoid param type value translations (jsc#PED-13331). * devlink: define enum for attr types of dynamic attributes (jsc#PED-13331). * devlink: introduce devlink_nl_put_u64() (jsc#PED-13331). * devlink: let driver opt out of automatic phys_port_name generation (git- fixes). * dm-mpath: do not print the "loaded" message if registering fails (git- fixes). * dm-stripe: limit chunk_sectors to the stripe size (git-fixes). * dm-table: fix checking for rq stackable devices (git-fixes). * dm: Check for forbidden splitting of zone write operations (git-fixes). * dm: split write BIOs on zone boundaries when zone append is not emulated (git-fixes). * dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes). * dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation (git-fixes). * dmaengine: dw-edma: Drop unused dchan2dev() and chan2dev() (git-fixes). * dmaengine: dw: dmamux: Fix device reference leak in rzn1_dmamux_route_allocate (git-fixes). * dmaengine: fsl-dpaa2-qdma: Drop unused mc_enc() (git-fixes). * dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes). * dmaengine: idxd: Fix refcount underflow on module unload (git-fixes). * dmaengine: idxd: Remove improper idxd_free (git-fixes). * dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() (git- fixes). * dmaengine: mmp: Fix again Wvoid-pointer-to-enum-cast warning (git-fixes). * dmaengine: mv_xor: Fix missing check after DMA map and missing unmap (git- fixes). * dmaengine: nbpfaxi: Add missing check after DMA map (git-fixes). * dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git- fixes). * dmaengine: qcom: gpi: Drop unused gpi_write_reg_field() (git-fixes). * dmaengine: stm32-dma: configure next sg only if there are more than 2 sgs (stable-fixes). * dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git- fixes). * docs: admin-guide: update to current minimum pipe size default (git-fixes). * dpll: Add basic Microchip ZL3073x support (jsc#PED-13331). * dpll: Make ZL3073X invisible (jsc#PED-13331). * dpll: zl3073x: Add support to get/set frequency on pins (jsc#PED-13331). * dpll: zl3073x: Add support to get/set priority on input pins (jsc#PED-13331). * dpll: zl3073x: Fetch invariants during probe (jsc#PED-13331). * dpll: zl3073x: Fix build failure (jsc#PED-13331). * dpll: zl3073x: Implement input pin selection in manual mode (jsc#PED-13331). * dpll: zl3073x: Implement input pin state setting in automatic mode (jsc#PED-13331). * dpll: zl3073x: Read DPLL types and pin properties from system firmware (jsc#PED-13331). * dpll: zl3073x: Register DPLL devices and pins (jsc#PED-13331). * dpll: zl3073x: ZL3073X_I2C and ZL3073X_SPI should depend on NET (jsc#PED-13331). * driver core/PM: Set power.no_callbacks along with power.no_pm (stable- fixes). * drivers/base/node: fix double free in register_one_node() (git-fixes). * drivers/base/node: handle error properly in register_one_node() (git-fixes). * drivers: base: handle module_kobject creation (git-fixes). * drm/amd : Update MES API header file for v11 & v12 (stable-fixes). * drm/amd/amdgpu: Declare isp firmware binary file (stable-fixes). * drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes). * drm/amd/amdgpu: Implement MES suspend/resume gang functionality for v12 (bsc#1243112). * drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on vf mode (stable- fixes). * drm/amd/display: Add NULL check for stream before dereference in 'dm_vupdate_high_irq' (bsc#1243112). * drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs (git-fixes). * drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() (git-fixes). * drm/amd/display: Add primary plane to commits for correct VRR handling (stable-fixes). * drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes). * drm/amd/display: Allow DCN301 to clear update flags (git-fixes). * drm/amd/display: Allow RX6xxx & RX7700 to invoke amdgpu_irq_get/put (git- fixes). * drm/amd/display: Avoid a NULL pointer dereference (stable-fixes). * drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported (stable-fixes). * drm/amd/display: Avoid trying AUX transactions on disconnected ports (stable-fixes). * drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out DPP PG (stable-fixes). * drm/amd/display: Default IPS to RCG_IN_ACTIVE_IPS2_IN_OFF (git-fixes). * drm/amd/display: Disable CRTC degamma LUT for DCN401 (stable-fixes). * drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121). * drm/amd/display: Disable dsc_power_gate for dcn314 by default (stable- fixes). * drm/amd/display: Disable scaling on DCE6 for now (git-fixes). * drm/amd/display: Do not check for NULL divisor in fixpt code (git-fixes). * drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes). * drm/amd/display: Do not overwrite dce60_clk_mgr (git-fixes). * drm/amd/display: Do not print errors for nonexistent connectors (git-fixes). * drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes). * drm/amd/display: Enable Dynamic DTBCLK Switch (bsc#1243112). * drm/amd/display: Fill display clock and vblank time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Find first CRTC and its line time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes). * drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes). * drm/amd/display: Fix Xorg desktop unresponsive on Replay panel (stable- fixes). * drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git- fixes). * drm/amd/display: Fix mismatch type comparison (stable-fixes). * drm/amd/display: Fix vupdate_offload_work doc (bsc#1243112). * drm/amd/display: Free memory allocation (stable-fixes). * drm/amd/display: Init DCN35 clocks from pre-os HW values (git-fixes). * drm/amd/display: Initialize mode_select to 0 (stable-fixes). * drm/amd/display: Only finalize atomic_obj if it was initialized (stable- fixes). * drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6 (git-fixes). * drm/amd/display: Properly disable scaling on DCE6 (git-fixes). * drm/amd/display: Remove redundant semicolons (git-fixes). * drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes). * drm/amd/display: Update DMCUB loading sequence for DCN3.5 (stable-fixes). * drm/amd/display: add workaround flag to link to force FFE preset (stable- fixes). * drm/amd/display: fix a Null pointer dereference vulnerability (stable- fixes). * drm/amd/display: fix dmub access race condition (bsc#1243112). * drm/amd/display: fix initial backlight brightness calculation (git-fixes). * drm/amd/display: limit clear_update_flags to dcn32 and above (stable-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (bsc#1243112). * drm/amd/display: remove output_tf_change flag (git-fixes). * drm/amd/display: use udelay rather than fsleep (git-fixes). * drm/amd/include : MES v11 and v12 API header update (stable-fixes). * drm/amd/include : Update MES v12 API for fence update (stable-fixes). * drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value (git- fixes). * drm/amd/pm: Adjust si_upload_smc_data register programming (v3) (git-fixes). * drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2) (git-fixes). * drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3) (git-fixes). * drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes). * drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes). * drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3) (git-fixes). * drm/amd/pm: fix null pointer access (stable-fixes). * drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual (stable-fixes). * drm/amd: Avoid evicting resources at S5 (bsc#1243112). * drm/amd: Check whether secure display TA loaded successfully (bsc#1243112). * drm/amd: Fix hybrid sleep (bsc#1243112). * drm/amd: Only restore cached manual clock settings in restore if OD enabled (bsc#1243112). * drm/amd: Restore cached manual clock settings during resume (bsc#1243112). * drm/amd: Restore cached power limit during resume (stable-fixes). * drm/amdgpu/discovery: fix fw based ip discovery (git-fixes). * drm/amdgpu/discovery: optionally use fw based ip discovery (stable-fixes). * drm/amdgpu/gfx10: fix KGQ reset sequence (git-fixes). * drm/amdgpu/gfx10: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/gfx9.4.3: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/gfx9: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/mes11: implement detect and reset callback (bsc#1243112). * drm/amdgpu/mes12: implement detect and reset callback (bsc#1243112). * drm/amdgpu/mes: add front end for detect and reset hung queue (bsc#1243112). * drm/amdgpu/mes: add missing locking in helper functions (stable-fixes). * drm/amdgpu/mes: enable compute pipes across all MEC (git-fixes). * drm/amdgpu/mes: optimize compute loop handling (stable-fixes). * drm/amdgpu/swm14: Update power limit logic (stable-fixes). * drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable- fixes). * drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time (stable-fixes). * drm/amdgpu/vcn: fix ref counting for ring based profile handling (git- fixes). * drm/amdgpu/vpe: cancel delayed work in hw_fini (bsc#1243112). * drm/amdgpu: Add additional DCE6 SCL registers (git-fixes). * drm/amdgpu: Avoid extra evict-restore process (stable-fixes). * drm/amdgpu: Avoid rma causes GPU duplicate reset (bsc#1243112). * drm/amdgpu: Enable MES lr_compute_wa by default (stable-fixes). * drm/amdgpu: Fix allocating extra dwords for rings (v2) (git-fixes). * drm/amdgpu: Fix for GPU reset being blocked by KIQ I/O (bsc#1243112). * drm/amdgpu: Increase reset counter only on success (stable-fixes). * drm/amdgpu: Initialize data to NULL in imu_v12_0_program_rlc_ram() (git- fixes). * drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes). * drm/amdgpu: Remove nbiov7.9 replay count reporting (git-fixes). * drm/amdgpu: Report individual reset error (bsc#1243112). * drm/amdgpu: Reset the clear flag in buddy during resume (git-fixes). * drm/amdgpu: Update external revid for GC v9.5.0 (stable-fixes). * drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause (stable- fixes). * drm/amdgpu: add kicker fws loading for gfx11/smu13/psp13 (stable-fixes). * drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities (stable-fixes). * drm/amdgpu: do not resume device in thaw for normal hibernation (bsc#1243112). * drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes). * drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes). * drm/amdgpu: fix incorrect vm flags to map bo (git-fixes). * drm/amdgpu: fix link error for !PM_SLEEP (bsc#1243112). * drm/amdgpu: fix task hang from failed job submission during process kill (git-fixes). * drm/amdgpu: fix vram reservation issue (git-fixes). * drm/amdgpu: remove the redeclaration of variable i (git-fixes). * drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes). * drm/amdgpu: update mmhub 4.1.0 client id mappings (stable-fixes). * drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes). * drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl() (git-fixes). * drm/amdkfd: Fix mmap write lock not release (bsc#1243112). * drm/ast: Use msleep instead of mdelay for edid read (git-fixes). * drm/bridge: fix OF node leak (git-fixes). * drm/bridge: it6505: select REGMAP_I2C (git-fixes). * drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe() (git-fixes). * drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes). * drm/cirrus-qemu: Fix pitch programming (git-fixes). * drm/connector: hdmi: Evaluate limited range after computing format (git- fixes). * drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121). * drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS (stable-fixes). * drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to TRAINING_PATTERN_SET (bsc#1248121). * drm/edid: Add support for quirks visible to DRM core and drivers (bsc#1248121). * drm/edid: Define the quirks in an enum list (bsc#1248121). * drm/format-helper: Add conversion from XRGB8888 to BGR888 (stable-fixes). * drm/gem: Internally test import_attach for imported objects (git-fixes). * drm/gem: Test for imported GEM buffers with helper (stable-fixes). * drm/gma500: Fix null dereference in hdmi teardown (git-fixes). * drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes). * drm/hisilicon/hibmc: fix the i2c device resource leak when vdac init failed (git-fixes). * drm/hisilicon/hibmc: refactored struct hibmc_drm_private (stable-fixes). * drm/i915/backlight: Return immediately when scale() finds invalid parameters (stable-fixes). * drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return type (stable-fixes). * drm/i915/ddi: gracefully handle errors from intel_ddi_init_hdmi_connector() (stable-fixes). * drm/i915/ddi: only call shutdown hooks for valid encoders (stable-fixes). * drm/i915/display: Fix dma_fence_wait_timeout() return value handling (git- fixes). * drm/i915/display: add intel_encoder_is_hdmi() (stable-fixes). * drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x (git-fixes). * drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes). * drm/i915/hdmi: add error handling in g4x_hdmi_init() (stable-fixes). * drm/i915/hdmi: propagate errors from intel_hdmi_init_connector() (stable- fixes). * drm/i915/icl+/tc: Cache the max lane count value (stable-fixes). * drm/i915/icl+/tc: Convert AUX powered WARN to a debug message (stable- fixes). * drm/i915/power: fix size for for_each_set_bit() in abox iteration (git- fixes). * drm/imagination: Clear runtime PM errors while resetting the GPU (stable- fixes). * drm/mediatek: Add error handling for old state CRTC in atomic_disable (git- fixes). * drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv (git-fixes). * drm/mediatek: fix potential OF node use-after-free (git-fixes). * drm/msm/dp: account for widebus and yuv420 during mode validation (git- fixes). * drm/msm/dpu: Fill in min_prefill_lines for SC8180X (git-fixes). * drm/msm/dpu: fix incorrect type for ret (git-fixes). * drm/msm/kms: move snapshot init earlier in KMS init (git-fixes). * drm/msm: Add error handling for krealloc in metadata setup (stable-fixes). * drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes). * drm/msm: update the high bitfield of certain DSI registers (git-fixes). * drm/msm: use trylock for debugfs (stable-fixes). * drm/nouveau/disp: Always accept linear modifier (git-fixes). * drm/nouveau/gsp: fix potential leak of memory used during acpi init (git- fixes). * drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes). * drm/nouveau: fix bad ret code in nouveau_bo_move_prep (git-fixes). * drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes). * drm/nouveau: fix typos in comments (git-fixes). * drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes). * drm/nouveau: remove unused memory target test (git-fixes). * drm/panel: novatek-nt35560: Fix invalid return value (git-fixes). * drm/panfrost: Fix panfrost device variable name in devfreq (git-fixes). * drm/panthor: Add missing explicit padding in drm_panthor_gpu_info (git- fixes). * drm/panthor: Defer scheduler entitiy destruction to queue release (git- fixes). * drm/panthor: Fix memory leak in panthor_ioctl_group_create() (git-fixes). * drm/panthor: validate group queue count (git-fixes). * drm/radeon/r600_cs: clean up of dead code in r600_cs (git-fixes). * drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes). * drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed (git-fixes). * drm/sched: Remove optimization that causes hang when killing dependent jobs (git-fixes). * drm/simpledrm: Do not upcast in release helpers (git-fixes). * drm/tests: Fix endian warning (git-fixes). * drm/ttm: Respect the shrinker core free target (stable-fixes). * drm/ttm: Should to return the evict error (stable-fixes). * drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel (git-fixes). * drm/vmwgfx: Fix Use-after-free in validation (git-fixes). * drm/vmwgfx: Fix a null-ptr access in the cursor snooper (git-fixes). * drm/vmwgfx: Fix copy-paste typo in validation (git-fixes). * drm/xe/bmg: Add new PCI IDs (stable-fixes). * drm/xe/bmg: Add one additional PCI ID (stable-fixes). * drm/xe/bmg: Update Wa_22019338487 (git-fixes). * drm/xe/gsc: do not flush the GSC worker from the reset path (git-fixes). * drm/xe/hw_engine_group: Fix double write lock release in error path (git- fixes). * drm/xe/mocs: Initialize MOCS index early (stable-fixes). * drm/xe/pf: Move VFs reprovisioning to worker (stable-fixes). * drm/xe/pf: Prepare to stop SR-IOV support prior GT reset (git-fixes). * drm/xe/pf: Sanitize VF scratch registers on FLR (stable-fixes). * drm/xe/tile: Release kobject for the failure path (git-fixes). * drm/xe/uapi: Correct sync type definition in comments (git-fixes). * drm/xe/uapi: loosen used tracking restriction (git-fixes). * drm/xe/vf: Disable CSC support on VF (git-fixes). * drm/xe/vm: Clear the scratch_pt pointer on error (git-fixes). * drm/xe/xe_query: Use separate iterator while filling GT list (stable-fixes). * drm/xe/xe_sync: avoid race during ufence signaling (git-fixes). * drm/xe: Allow dropping kunit dependency as built-in (git-fixes). * drm/xe: Attempt to bring bos back to VRAM after eviction (git-fixes). * drm/xe: Carve out wopcm portion from the stolen memory (git-fixes). * drm/xe: Do not trigger rebind on initial dma-buf validation (git-fixes). * drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change (git-fixes). * drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue() (git- fixes). * drm/xe: Fix build without debugfs (git-fixes). * drm/xe: Make dma-fences compliant with the safe access rules (stable-fixes). * drm/xe: Move page fault init after topology init (git-fixes). * drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git- fixes). * drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git- fixes). * drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range (stable-fixes). * dt-bindings: dpll: Add DPLL device and pin (jsc#PED-13331). * dt-bindings: dpll: Add support for Microchip Azurite chip family (jsc#PED-13331). * e1000e: disregard NVM checksum on tgp when valid checksum bit is not set (git-fixes). * e1000e: ignore uninitialized checksum word on tgp (git-fixes). * efi: stmm: Fix incorrect buffer allocation method (git-fixes). * erofs: avoid reading more for fragment maps (git-fixes). * erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git- fixes). * execmem: enforce allocation size aligment to PAGE_SIZE (git-fixes). * exfat: add cluster chain loop check for dir (git-fixes). * exfat: fdatasync flag should be same like generic_write_sync() (git-fixes). * ext4: fix checks for orphan inodes (bsc#1250119). * ext4: remove writable userspace mappings before truncating page cache (bsc#1247223). * fbcon: Fix OOB access in font allocation (git-fixes). * fbcon: Fix outdated registered_fb reference in comment (git-fixes). * fbcon: fix integer overflow in fbcon_do_set_font (git-fixes). * fbdev: Fix logic error in "offb" name match (git-fixes). * fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes). * fbdev: fix potential buffer overflow in do_register_framebuffer() (stable- fixes). * fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref (git-fixes). * fbdev: simplefb: Fix use after free in simplefb_detach_genpds() (git-fixes). * fgraph: Fix set_graph_notrace with setting TRACE_GRAPH_NOTRACE_BIT (git- fixes). * firewire: core: fix overlooked update of subsystem ABI version (git-fixes). * firewire: ohci: correct code comments about bus_reset tasklet (git-fixes). * firmware: arm_ffa: Change initcall level of ffa_init() to rootfs_initcall (stable-fixes). * firmware: arm_scmi: Convert to SYSTEM_SLEEP_PM_OPS (git-fixes). * firmware: arm_scmi: Fix up turbo frequencies selection (git-fixes). * firmware: arm_scmi: Mark VirtIO ready before registering scmi_virtio_driver (git-fixes). * firmware: arm_scmi: power_control: Ensure SCMI_SYSPOWER_IDLE is set early during resume (stable-fixes). * firmware: firmware: meson-sm: fix compile-test default (git-fixes). * firmware: meson_sm: fix device leak at probe (git-fixes). * firmware: tegra: Fix IVC dependency problems (stable-fixes). * flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read (git-fixes). * fs/nfs/io: make nfs_start_io_*() killable (git-fixes). * fs/proc/task_mmu: check p->vec_buf for NULL (git-fixes). * fs/proc: Use inode_get_dev() for device numbers in procmap_query References: bsc#1246450 * ftrace: Fix function profiler's filtering functionality (git-fixes). * ftrace: fix incorrect hash size in register_ftrace_direct() (git-fixes). * gfs2: Call gfs2_queue_verify_delete from gfs2_evict_inode (bsc#1247220). * gfs2: Clean up delete work processing (bsc#1247220). * gfs2: Faster gfs2_upgrade_iopen_glock wakeups (bsc#1247220). * gfs2: Initialize gl_no_formal_ino earlier (bsc#1247220). * gfs2: Minor delete_work_func cleanup (bsc#1247220). * gfs2: Only defer deletes when we have an iopen glock (bsc#1247220). * gfs2: Prevent inode creation race (2) (bsc#1247220). * gfs2: Prevent inode creation race (bsc#1247220). * gfs2: Randomize GLF_VERIFY_DELETE work delay (bsc#1247220). * gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE (bsc#1247220). * gfs2: Rename dinode_demise to evict_behavior (bsc#1247220). * gfs2: Replace GIF_DEFER_DELETE with GLF_DEFER_DELETE (bsc#1247220). * gfs2: Return enum evict_behavior from gfs2_upgrade_iopen_glock (bsc#1247220). * gfs2: Simplify DLM_LKF_QUECVT use (bsc#1247220). * gfs2: Update to the evict / remote delete documentation (bsc#1247220). * gfs2: Use mod_delayed_work in gfs2_queue_try_to_evict (bsc#1247220). * gfs2: gfs2_evict_inode clarification (bsc#1247220). * gfs2: minor evict fix (bsc#1247220). * gfs2: skip if we cannot defer delete (bsc#1247220). * gpio: mlxbf2: use platform_get_irq_optional() (git-fixes). * gpio: mlxbf3: use platform_get_irq_optional() (git-fixes). * gpio: tps65912: check the return value of regmap_update_bits() (stable- fixes). * gpio: virtio: Fix config space reading (git-fixes). * gpio: wcd934x: check the return value of regmap_update_bits() (stable- fixes). * gpio: wcd934x: mark the GPIO controller as sleeping (git-fixes). * gpiolib: Extend software-node support to support secondary software-nodes (git-fixes). * gve: Fix stuck TX queue for DQ queue format (git-fixes). * gve: prevent ethtool ops after shutdown (git-fixes). * habanalabs: fix UAF in export_dmabuf() (git-fixes). * hid: fix I2C read buffer overflow in raw_event() for mcp2221 (stable-fixes). * hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111). * hv_netvsc: Link queues to NAPIs (git-fixes). * hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal state (stable-fixes). * hwmon: (gsc-hwmon) fix fan pwm setpoint show functions (git-fixes). * hwmon: (mlxreg-fan) Separate methods of fan setting coming from different subsystems (git-fixes). * hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes). * hwrng: ks-sa - fix division by zero in ks_sa_rng_init (git-fixes). * hwrng: mtk - handle devm_pm_runtime_enable errors (git-fixes). * hwrng: nomadik - add ARM_AMBA dependency (git-fixes). * i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes). * i2c: designware: Add disabling clocks when probe fails (git-fixes). * i2c: designware: Add quirk for Intel Xe (stable-fixes). * i2c: designware: Fix clock issue when PM is disabled (git-fixes). * i2c: designware: Use temporary variable for struct device (stable-fixes). * i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes). * i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD (git-fixes). * i2c: muxes: mule: Fix an error handling path in mule_i2c_mux_probe() (git- fixes). * i2c: omap: Add support for setting mux (stable-fixes). * i2c: omap: Fix an error handling path in omap_i2c_probe() (git-fixes). * i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe() (git-fixes). * i2c: omap: fix deprecated of_property_read_bool() use (git-fixes). * i2c: qup: jump out of the loop in case of timeout (git-fixes). * i2c: riic: Allow setting frequencies lower than 50KHz (git-fixes). * i2c: tegra: Fix reset error handling with ACPI (git-fixes). * i2c: tegra: Use internal reset when reset property is not available (bsc#1249143) * i2c: virtio: Avoid hang by using interruptible completion wait (git-fixes). * i3c: Fix default I2C adapter timeout value (git-fixes). * i3c: add missing include to internal header (stable-fixes). * i3c: do not fail if GETHDRCAP is unsupported (stable-fixes). * i3c: fix module_i3c_i2c_driver() with I3C=n (git-fixes). * i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes). * i3c: master: svc: Recycle unused IBI slot (git-fixes). * i3c: master: svc: Use manual response for IBI events (git-fixes). * i40e: When removing VF MAC filters, only check PF-set MAC (git-fixes). * i40e: report VF tx_dropped with tx_errors instead of tx_discards (git- fixes). * ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof (git- fixes). * ice, irdma: fix an off by one in error handling code (bsc#1247712). * ice, irdma: move interrupts code to irdma (bsc#1247712). * ice/ptp: fix crosstimestamp reporting (git-fixes). * ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712). * ice: Replace ice specific DSCP mapping num with a kernel define (jsc#PED-13728 jsc#PED-13762). * ice: check correct pointer in fwlog debugfs (git-fixes). * ice: count combined queues using Rx/Tx count (bsc#1247712). * ice: devlink PF MSI-X max and min parameter (bsc#1247712). * ice: do not leave device non-functional if Tx scheduler config fails (git- fixes). * ice: enable_rdma devlink param (bsc#1247712). * ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset (jsc#PED-13728). * ice: fix incorrect counter for buffer allocation failures (git-fixes). * ice: get rid of num_lan_msix field (bsc#1247712). * ice: init flow director before RDMA (bsc#1247712). * ice: remove splitting MSI-X between features (bsc#1247712). * ice: simplify VF MSI-X managing (bsc#1247712). * ice: treat dyn_allowed only as suggestion (bsc#1247712). * ice: use fixed adapter index for E825C embedded devices (git-fixes). * idpf: add PTP clock configuration (jsc#PED-13728 jsc#PED-13762). * idpf: add Tx timestamp capabilities negotiation (jsc#PED-13728 jsc#PED-13762). * idpf: add Tx timestamp flows (jsc#PED-13728 jsc#PED-13762). * idpf: add cross timestamping (jsc#PED-13728). * idpf: add flow steering support (jsc#PED-13728). * idpf: add initial PTP support (jsc#PED-13728 jsc#PED-13762). * idpf: add mailbox access to read PTP clock time (jsc#PED-13728 jsc#PED-13762). * idpf: add support for Rx timestamping (jsc#PED-13728 jsc#PED-13762). * idpf: add support for Tx refillqs in flow scheduling mode (jsc#PED-13728). * idpf: assign extracted ptype to struct libeth_rqe_info field (jsc#PED-13728 jsc#PED-13762). * idpf: change the method for mailbox workqueue allocation (jsc#PED-13728 jsc#PED-13762). * idpf: fix UAF in RDMA core aux dev deinitialization (jsc#PED-13728). * idpf: implement IDC vport aux driver MTU change handler (jsc#PED-13728 jsc#PED-13762). * idpf: implement RDMA vport auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762). * idpf: implement core RDMA auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762). * idpf: implement get LAN MMIO memory regions (jsc#PED-13728 jsc#PED-13762). * idpf: implement remaining IDC RDMA core callbacks and handlers (jsc#PED-13728 jsc#PED-13762). * idpf: improve when to set RE bit logic (jsc#PED-13728). * idpf: move virtchnl structures to the header file (jsc#PED-13728 jsc#PED-13762). * idpf: negotiate PTP capabilities and get PTP clock (jsc#PED-13728 jsc#PED-13762). * idpf: preserve coalescing settings across resets (jsc#PED-13728). * idpf: remove obsolete stashing code (jsc#PED-13728). * idpf: remove unreachable code from setting mailbox (jsc#PED-13728 jsc#PED-13762). * idpf: replace flow scheduling buffer ring with buffer pool (jsc#PED-13728). * idpf: set mac type when adding and removing MAC filters (jsc#PED-13728). * idpf: simplify and fix splitq Tx packet rollback error path (jsc#PED-13728). * idpf: stop Tx if there are insufficient buffer resources (jsc#PED-13728). * idpf: use reserved RDMA vectors from control plane (jsc#PED-13728 jsc#PED-13762). * igb: xsk: solve negative overflow of nb_pkts in zerocopy mode (git-fixes). * igc: disable L1.2 PCI-E link substate to avoid performance issue (git- fixes). * igc: fix disabling L1.2 PCI-E link substate on I226 on init (git-fixes). * iidc/ice/irdma: Break iidc.h into two headers (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Rename IDC header file (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Rename to iidc_* convention (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Update IDC to support multiple consumers (jsc#PED-13728 jsc#PED-13762). * iio/adc/pac1934: fix channel disable configuration (git-fixes). * iio: accel: adxl355: Make timestamp 64-bit aligned using aligned_s64 (git- fixes). * iio: accel: fxls8962af: Fix temperature calculation (git-fixes). * iio: adc: ad7173: fix setting ODR in probe (git-fixes). * iio: adc: ad7266: Fix potential timestamp alignment issue (git-fixes). * iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable- fixes). * iio: adc: ad7768-1: Fix insufficient alignment of timestamp (git-fixes). * iio: adc: ad_sigma_delta: change to buffer predisable (git-fixes). * iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes). * iio: adc: dln2: Use aligned_s64 for timestamp (git-fixes). * iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] (stable-fixes). * iio: adc: max1363: Reorder mode_list[] entries (stable-fixes). * iio: chemical: pms7003: use aligned_s64 for timestamp (git-fixes). * iio: chemical: sps30: use aligned_s64 for timestamp (git-fixes). * iio: common: st_sensors: Fix use of uninitialize device structs (stable- fixes). * iio: consumers: Fix handling of negative channel scale in iio_convert_raw_to_processed() (git-fixes). * iio: consumers: Fix offset handling in iio_convert_raw_to_processed() (git- fixes). * iio: dac: ad5360: use int type to store negative error codes (git-fixes). * iio: dac: ad5421: use int type to store negative error codes (git-fixes). * iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE (git-fixes). * iio: frequency: adf4350: Fix prescaler usage (git-fixes). * iio: hid-sensor-prox: Fix incorrect OFFSET calculation (git-fixes). * iio: hid-sensor-prox: Restore lost scale assignments (git-fixes). * iio: imu: bno055: fix OOB access of hw_xlate array (git-fixes). * iio: imu: inv_icm42600: Convert to uXX and sXX integer types (stable-fixes). * iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in resume (git-fixes). * iio: imu: inv_icm42600: change invalid data error to -EBUSY (git-fixes). * iio: imu: inv_icm42600: fix spi burst write not supported (git-fixes). * iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to aligned_s64 (stable-fixes). * iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes). * iio: light: Use aligned_s64 instead of open coding alignment (stable-fixes). * iio: light: as73211: Ensure buffer holes are zeroed (git-fixes). * iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes). * iio: pressure: mprls0025pa: use aligned_s64 for timestamp (git-fixes). * iio: proximity: isl29501: fix buffered read on big-endian systems (git- fixes). * iio: temperature: maxim_thermocouple: use DMA-safe buffer for spi_read() (git-fixes). * iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes). * iio: xilinx-ams: Unmask interrupts after updating alarms (git-fixes). * integrity/platform_certs: Allow loading of keys in the static key management mode (jsc#PED-13345 jsc#PED-13343). * intel_idle: Provide the default enter_dead() handler (jsc#PED-13815). * intel_idle: Rescan "dead" SMT siblings during initialization (jsc#PED-13815). * intel_idle: Use subsys_initcall_sync() for initialization (jsc#PED-13815). * interconnect: qcom: sc8180x: specify num_nodes (git-fixes). * interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg (git- fixes). * io_uring/rw: do not mask in f_iocb_flags (jsc#PED-12882 bsc#1237542). Drop blacklisting. * io_uring: expose read/write attribute capability (jsc#PED-12882 bsc#1237542). * io_uring: fix potential page leak in io_sqe_buffer_register() (git-fixes). * iommu/amd: Enable PASID and ATS capabilities in the correct order (git- fixes). * iommu/amd: Fix alias device DTE setting (git-fixes). * iommu/amd: Fix geometry.aperture_end for V2 tables (git-fixes). * iommu/arm-smmu-qcom: Add SM6115 MDSS compatible (git-fixes). * iommu/arm-smmu-v3: Fix smmu_domain->nr_ats_masters decrement (git-fixes). * iommu/tegra241-cmdqv: Read SMMU IDR1.CMDQS instead of hardcoding (git- fixes). * iommu/vt-d: Disallow dirty tracking if incoherent page walk (git-fixes). * iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() (git- fixes). * iommu/vt-d: Fix missing PASID in dev TLB flush with cache_tag_flush_all (git-fixes). * iommu/vt-d: Fix possible circular locking dependency (git-fixes). * iommu/vt-d: Fix system hang on reboot -f (git-fixes). * iommu/vt-d: PRS isn't usable if PDS isn't supported (git-fixes). * iommu: Handle race with default domain setup (git-fixes). * iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes). * ipmi: Fix strcpy source and destination the same (stable-fixes). * ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable- fixes). * ipv6: annotate data-races around rt->fib6_nsiblings (git-fixes). * ipv6: fix possible infinite loop in fib6_info_uses_dev() (git-fixes). * ipv6: prevent infinite loop in rt6_nlmsg_size() (git-fixes). * ipv6: reject malicious packets in ipv6_gso_segment() (git-fixes). * ipvs: Fix clamp() of ip_vs_conn_tab on small memory systems (git-fixes). * irdma: free iwdev->rf after removing MSI-X (bsc#1247712). * isolcpus: add missing hunk back (bsc#1236897 bsc#1249206). * iwlwifi: Add missing check for alloc_ordered_workqueue (git-fixes). * ixgbe: fix ixgbe_orom_civd_info struct layout (bsc#1245410). * ixgbe: prevent from unwanted interface name changes (git-fixes). * ixgbe: xsk: resolve the negative overflow of budget in ixgbe_xmit_zc (git- fixes). * kABI fix after Add TDX support for vSphere (jsc#PED-13302). * kABI fix after KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes). * kABI fix after KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * kABI fix after KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * kABI fix after vhost: Reintroduce kthread API and add mode selection (git- fixes). * kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access probe" (bsc#1248121). * kABI workaround for amd_sfh (git-fixes). * kABI workaround for drm_gem.h (git-fixes). * kABI workaround for struct mtk_base_afe changes (git-fixes). * kABI: Fix the module::name type in audit_context (git-fixes). * kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes). * kABI: fix for struct devlink_port_attrs: move new member to the end (git- fixes). * kABI: netfilter: supress warnings for nft_set_ops (git-fixes). * kABI: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (git- fixes). * kabi/severities: ignore kABI compatibility in iio inv_icm42600 drivers They are used only locally * kabi/severities: ignore two unused/dropped symbols from MEI * kabi: Hide adding of u64 to devlink_param_type (jsc#PED-12745). * kabi: Restore layout of parallel_data (bsc1248343). * kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963). * kasan: use vmalloc_dump_obj() for vmalloc error reports (git-fixes). * kbuild/modpost: Continue processing all unresolved symbols when KLP_SYM_RELA is found (bsc#1218644, bsc#1250655). * kbuild: rust: add rustc-min-version support function (git-fixes) * kernel-binary: Another installation ordering fix (bsc#1241353). * kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346) * kernel: globalize lookup_or_create_module_kobject() (stable-fixes). * kernel: param: rename locate_module_kobject (stable-fixes). * leds: flash: leds-qcom-flash: Fix registry access after re-bind (git-fixes). * leds: flash: leds-qcom-flash: Update torch current clamp setting (git- fixes). * leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes). * leds: leds-lp55xx: Use correct address for memory programming (git-fixes). * lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly() (bsc#1236897). * libbpf: Add identical pointer detection to btf_dedup_is_equiv() (git-fixes). * libeth: move idpf_rx_csum_decoded and idpf_rx_extracted (jsc#PED-13728 jsc#PED-13762). * livepatch: Add stack_order sysfs attribute (poo#187320). * loop: use kiocb helpers to fix lockdep warning (git-fixes). * lpfc: do not use file->f_path.dentry for comparisons (bsc#1250519). * mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes). * mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes). * mailbox: Not protect module_put with spin_lock_irqsave (stable-fixes). * mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data() (git- fixes). * mailbox: pcc: Always clear the platform ack interrupt first (stable-fixes). * mailbox: pcc: Fix the possible race in updation of chan_in_use flag (stable- fixes). * mailbox: pcc: Use acpi_os_ioremap() instead of ioremap() (stable-fixes). * mailbox: zynqmp-ipi: Fix SGI cleanup on unbind (git-fixes). * mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop (git- fixes). * mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes (git- fixes). * mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call (git-fixes). * maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs (git-fixes). * maple_tree: fix status setup on restore to active (git-fixes). * maple_tree: fix testing for 32 bit builds (git-fixes). * mctp: no longer rely on net->dev_index_head (git-fixes). * md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes). * md: allow removing faulty rdev during resync (git-fixes). * md: dm-zoned-target: Initialize return variable r to avoid uninitialized use (git-fixes). * md: make rdev_addable usable for rcu mode (git-fixes). * media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove (git-fixes). * media: cec: extron-da-hd-4k-plus: drop external-module make commands (git- fixes). * media: cx18: Add missing check after DMA map (git-fixes). * media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() (stable-fixes). * media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes). * media: gspca: Add bounds checking to firmware parser (git-fixes). * media: hi556: Fix reset GPIO timings (stable-fixes). * media: hi556: correct the test pattern configuration (git-fixes). * media: i2c: mt9v111: fix incorrect type for ret (git-fixes). * media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe (git-fixes). * media: imx: fix a potential memory leak in imx_media_csc_scaler_device_init() (git-fixes). * media: ipu-bridge: Add _HID for OV5670 (stable-fixes). * media: ipu6: isys: Use correct pads for xlate_streams() (git-fixes). * media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls (git-fixes). * media: lirc: Fix error handling in lirc_register() (git-fixes). * media: mc: Fix MUST_CONNECT handling for pads with no links (git-fixes). * media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval (git- fixes). * media: ov2659: Fix memory leaks in ov2659_probe() (git-fixes). * media: pci: ivtv: Add missing check after DMA map (git-fixes). * media: pci: mg4b: fix uninitialized iio scan data (git-fixes). * media: pisp_be: Fix pm_runtime underrun in probe (git-fixes). * media: qcom: camss: cleanup media device allocated resource on error path (git-fixes). * media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() (git- fixes). * media: rc: fix races with imon_disconnect() (git-fixes). * media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes). * media: s5p-mfc: remove an unused/uninitialized variable (git-fixes). * media: st-delta: avoid excessive stack usage (git-fixes). * media: tc358743: Check I2C succeeded during probe (stable-fixes). * media: tc358743: Increase FIFO trigger level to 374 (stable-fixes). * media: tc358743: Return an appropriate colorspace from tc358743_set_fmt (stable-fixes). * media: ti: j721e-csi2rx: Fix source subdev link creation (git-fixes). * media: ti: j721e-csi2rx: Use devm_of_platform_populate (git-fixes). * media: ti: j721e-csi2rx: fix list_del corruption (git-fixes). * media: tuner: xc5000: Fix use-after-free in xc5000_release (git-fixes). * media: usb: hdpvr: disable zero-length read messages (stable-fixes). * media: usbtv: Lock resolution while streaming (git-fixes). * media: uvcvideo: Add quirk for HP Webcam HD 2300 (stable-fixes). * media: uvcvideo: Do not mark valid metadata as invalid (git-fixes). * media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (git- fixes). * media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes). * media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID (git- fixes). * media: uvcvideo: Rollback non processed entities on error (git-fixes). * media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control (stable-fixes). * media: v4l2-ctrls: Do not reset handler's error in v4l2_ctrl_handler_free() (git-fixes). * media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check (git-fixes). * media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() (git-fixes). * media: v4l2: Add support for NV12M tiled variants to v4l2_format_info() (git-fixes). * media: venus: Add a check for packet size after reading from shared memory (git-fixes). * media: venus: Fix MSM8998 frequency table (git-fixes). * media: venus: Fix OOB read due to missing payload bound check (git-fixes). * media: venus: firmware: Use correct reset sequence for IRIS2 (git-fixes). * media: venus: hfi: explicitly release IRQ during teardown (git-fixes). * media: venus: protect against spurious interrupts during probe (git-fixes). * media: venus: vdec: Clamp param smaller than 1fps and bigger than 240 (git- fixes). * media: venus: venc: Clamp param smaller than 1fps and bigger than 240 (git- fixes). * media: verisilicon: Fix AV1 decoder clock frequency (git-fixes). * media: vivid: fix wrong pixel_array control size (git-fixes). * media: zoran: Remove zoran_fh structure (git-fixes). * mei: bus: Check for still connected devices in mei_cl_bus_dev_release() (stable-fixes). * mei: vsc: Destroy mutex after freeing the IRQ (git-fixes). * mei: vsc: Do not re-init VSC from mei_vsc_hw_reset() on stop (git-fixes). * mei: vsc: Drop unused vsc_tp_request_irq() and vsc_tp_free_irq() (stable- fixes). * mei: vsc: Event notifier fixes (git-fixes). * mei: vsc: Fix "BUG: Invalid wait context" lockdep error (git-fixes). * mei: vsc: Run event callback from a workqueue (git-fixes). * mei: vsc: Unset the event callback on remove and probe errors (git-fixes). * memory: mtk-smi: Add ostd setting for mt8186 (git-fixes). * memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe (git- fixes). * memstick: Fix deadlock by moving removing flag earlier (git-fixes). * mfd: axp20x: Set explicit ID for AXP313 regulator (stable-fixes). * mfd: cros_ec: Separate charge-control probing from USB-PD (git-fixes). * mfd: exynos-lpass: Fix another error handling path in exynos_lpass_probe() (git-fixes). * mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes). * mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data() (git-fixes). * microchip: lan865x: Fix LAN8651 autoloading (git-fixes). * microchip: lan865x: Fix module autoloading (git-fixes). * microchip: lan865x: fix missing Timer Increment config for Rev.B0/B1 (git- fixes). * microchip: lan865x: fix missing netif_start_queue() call on device open (git-fixes). * misc: fastrpc: Fix fastrpc_map_lookup operation (git-fixes). * misc: fastrpc: Save actual DMA size in fastrpc_map structure (git-fixes). * misc: fastrpc: Skip reference for DMA handles (git-fixes). * misc: fastrpc: fix possible map leak in fastrpc_put_args (git-fixes). * misc: genwqe: Fix incorrect cmd field being reported in error (git-fixes). * misc: pci_endpoint_test: Fix 'irq_type' to convey the correct type (git- fixes). * misc: pci_endpoint_test: Give disabled BARs a distinct error code (stable- fixes). * misc: rtsx: usb: Ensure mmc child device is active when card is present (git-fixes). * mm/damon/core: avoid destroyed target reference from DAMOS quota (git- fixes). * mm/damon/core: prevent unnecessary overflow in damos_set_effective_quota() (git-fixes). * mm/damon/core: set quota->charged_from to jiffies at first charge window (git-fixes). * mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() (git-fixes). * mm/damon/ops-common: ignore migration request to invalid nodes (git-fixes). * mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() (git-fixes). * mm/damon/sysfs: fix use-after-free in state_show() (git-fixes). * mm/memory-failure: fix redundant updates for already poisoned pages (bsc#1250087). * mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes) * mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE (git-fixes). * mm: close theoretical race where stale TLB entries could linger (git-fixes). * mm: fault in complete folios instead of individual pages for tmpfs (git- fixes). * mm: fix the inaccurate memory statistics issue for users (bsc#1244723). * mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes). * mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma (git- fixes). * mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting (bsc#1245630). * mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting - kabi (bsc#1245630). * mm: move page table sync declarations to linux/pgtable.h (git-fixes). * mm: swap: fix potential buffer overflow in setup_clusters() (git-fixes). * mmc: core: Fix variable shadowing in mmc_route_rpmb_frames() (git-fixes). * mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes). * mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes). * mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes). * mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable- fixes). * mmc: sdhci-of-arasan: Ensure CD logic stabilization before power-up (stable- fixes). * mmc: sdhci-of-arasan: Support for emmc hardware reset (stable-fixes). * mmc: sdhci-pci-gli: Add a new function to simplify the code (git-fixes). * mmc: sdhci-pci-gli: GL9763e: Mask the replay timer timeout of AER (git- fixes). * mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency (git-fixes). * mmc: sdhci_am654: Disable HS400 for AM62P SR1.0 and SR1.1 (git-fixes). * module: Fix memory deallocation on error path in move_module() (git-fixes). * module: Prevent silent truncation of module name in delete_module(2) (git- fixes). * module: Remove unnecessary +1 from last_unloaded_module::name size (git- fixes). * module: Restore the moduleparam prefix length check (git-fixes). * most: core: Drop device reference after usage in get_channel() (git-fixes). * mptcp: fix spurious wake-up on under memory pressure (git-fixes). * mtd: fix possible integer overflow in erase_xfer() (git-fixes). * mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes). * mtd: rawnand: atmel: Fix dma_mapping_error() address (git-fixes). * mtd: rawnand: atmel: Fix error handling path in atmel_nand_controller_add_nands (git-fixes). * mtd: rawnand: atmel: set pmecc data setup time (git-fixes). * mtd: rawnand: fsmc: Add missing check after DMA map (git-fixes). * mtd: rawnand: omap2: fix device leak on probe failure (git-fixes). * mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec() (git-fixes). * mtd: rawnand: renesas: Add missing check after DMA map (git-fixes). * mtd: rawnand: rockchip: Add missing check after DMA map (git-fixes). * mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git- fixes). * mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes). * mtd: spi-nor: Fix spi_nor_try_unlock_all() (git-fixes). * mtd: spi-nor: spansion: Fixup params->set_4byte_addr_mode for SEMPER (git- fixes). * mtd: spinand: propagate spinand_wait() errors from spinand_write_page() (git-fixes). * mwl8k: Add missing check after DMA map (git-fixes). * neighbour: Fix null-ptr-deref in neigh_flush_dev() (git-fixes). * net/mlx5: Base ECVF devlink port attrs from 0 (git-fixes). * net/mlx5: CT: Use the correct counter offset (git-fixes). * net/mlx5: Check device memory pointer before usage (git-fixes). * net/mlx5: Correctly set gso_segs when LRO is used (git-fixes). * net/mlx5: Correctly set gso_size when LRO is used (git-fixes). * net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch (git-fixes). * net/mlx5: Fix lockdep assertion on sync reset unload event (git-fixes). * net/mlx5: Fix memory leak in cmd_exec() (git-fixes). * net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow (git-fixes). * net/mlx5: HWS, Fix pattern destruction in mlx5hws_pat_get_pattern error path (git-fixes). * net/mlx5: HWS, fix bad parameter in CQ creation (git-fixes). * net/mlx5: Nack sync reset when SFs are present (git-fixes). * net/mlx5: Prevent flow steering mode changes in switchdev mode (git-fixes). * net/mlx5: Reload auxiliary drivers on fw_activate (git-fixes). * net/mlx5e: Add new prio for promiscuous mode (git-fixes). * net/mlx5e: Clear Read-Only port buffer size in PBMC before update (git- fixes). * net/mlx5e: Preserve shared buffer capacity during headroom updates (git- fixes). * net/mlx5e: Remove skb secpath if xfrm state is not found (git-fixes). * net/mlx5e: Set local Xoff after FW update (git-fixes). * net/mlx5e: Update and set Xon/Xoff upon MTU set (git-fixes). * net/mlx5e: Update and set Xon/Xoff upon port speed set (git-fixes). * net/packet: fix a race in packet_set_ring() and packet_notifier() (git- fixes). * net/sched: Restrict conditions for adding duplicating netems to qdisc tree (git-fixes). * net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (git- fixes). * net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (git-fixes). * net/sched: taprio: enforce minimum value for picos_per_byte (git-fixes). * net/smc: check sndbuf_space again after NOSPACE flag is set in smc_poll (git-fixes). * net: 802: LLC+SNAP OID:PID lookup on start of skb data (git-fixes). * net: dsa: restore dsa_software_vlan_untag() ability to operate on VLAN- untagged traffic (git-fixes). * net: dsa: tag_ocelot_8021q: fix broken reception (git-fixes). * net: hsr: fix fill_frame_info() regression vs VLAN packets (git-fixes). * net: hsr: fix hsr_init_sk() vs network/transport headers (git-fixes). * net: hv_netvsc: fix loss of early receive events from host during channel open (git-fixes). * net: ieee8021q: fix insufficient table-size assertion (stable-fixes). * net: llc: reset skb->transport_header (git-fixes). * net: mana: Add handler for hardware servicing events (bsc#1245730). * net: mana: Add speed support in mana_get_link_ksettings (bsc#1245726). * net: mana: Add support for net_shaper_ops (bsc#1245726). * net: mana: Allocate MSI-X vectors dynamically (bsc#1245457). * net: mana: Allow irq_setup() to skip cpus for affinity (bsc#1245457). * net: mana: Expose additional hardware counters for drop and TC via ethtool (bsc#1245729). * net: mana: Fix build errors when CONFIG_NET_SHAPER is disabled (gix-fixes). * net: mana: Fix potential deadlocks in mana napi ops (bsc#1245726). * net: mana: Handle Reset Request from MANA NIC (bsc#1245728). * net: mana: Handle unsupported HWC commands (bsc#1245726). * net: mana: Set tx_packets to post gso processing packet count (bsc#1245731). * net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency (bsc#1248754). * net: mana: explain irq_setup() algorithm (bsc#1245457). * net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes). * net: mctp: handle skb cleanup on sock_queue failures (git-fixes). * net: mdio: mdio-bcm-unimac: Correct rate fallback logic (git-fixes). * net: nfc: nci: Add parameter validation for packet data (git-fixes). * net: page_pool: allow enabling recycling late, fix false positive warning (git-fixes). * net: phy: bcm54811: PHY initialization (stable-fixes). * net: phy: fix phy_uses_state_machine() (git-fixes). * net: phy: micrel: Add ksz9131_resume() (stable-fixes). * net: phy: micrel: fix KSZ8081/KSZ8091 cable test (git-fixes). * net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes). * net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer (git-fixes). * net: rose: convert 'use' field to refcount_t (git-fixes). * net: rose: fix a typo in rose_clear_routes() (git-fixes). * net: rose: include node references in rose_neigh refcount (git-fixes). * net: rose: split remove and free operations in rose_remove_neigh() (stable- fixes). * net: thunderbolt: Enable end-to-end flow control also in transmit (stable- fixes). * net: thunderbolt: Fix the parameter passing of tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes). * net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (git- fixes). * net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock (git- fixes). * net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization (git-fixes). * net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes). * net: usb: cdc-ncm: check for filtering capability (git-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990A w/audio composition (stable- fixes). * net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git- fixes). * net: usb: qmi_wwan: fix Telit Cinterion FE990A name (stable-fixes). * net: usb: qmi_wwan: fix Telit Cinterion FN990A name (stable-fixes). * net: usbnet: Avoid potential RCU stall on LINK_CHANGE event (git-fixes). * net: usbnet: Fix the wrong netif_carrier_on() call (git-fixes). * netfilter: ctnetlink: fix refcount leak on table dump (git-fixes). * netfilter: ctnetlink: remove refcounting in expectation dumpers (git-fixes). * netfilter: nf_conncount: garbage collection is not skipped when jiffies wrap around (git-fixes). * netfilter: nf_nat: also check reverse tuple to obtain clashing entry (git- fixes). * netfilter: nf_reject: do not leak dst refcount for loopback packets (git- fixes). * netfilter: nf_tables: Drop dead code from fill_*_info routines (git-fixes). * netfilter: nf_tables: adjust lockdep assertions handling (git-fixes). * netfilter: nf_tables: fix set size with rbtree backend (git-fixes). * netfilter: nf_tables: imbalance in flowtable binding (git-fixes). * netfilter: nft_ct: Use __refcount_inc() for per-CPU nft_ct_pcpu_template (git-fixes). * netfilter: nft_flow_offload: update tcp state flags under lock (git-fixes). * netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237). * netfilter: nft_set_hash: skip duplicated elements pending gc run (git- fixes). * netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext (git- fixes). * netfilter: nft_set_pipapo: prefer kvmalloc for scratch maps (git-fixes). * netfilter: nft_tunnel: fix geneve_opt dump (git-fixes). * netfilter: xtables: support arpt_mark and ipv6 optstrip for iptables-nft only builds (git-fixes). * netlink: fix policy dump for int with validation callback (jsc#PED-13331). * netlink: specs: devlink: replace underscores with dashes in names (jsc#PED-13331). * netpoll: prevent hanging NAPI when netcons gets enabled (git-fixes). * nfs/localio: add direct IO enablement with sync and async IO support (git- fixes). * nfs/localio: remove extra indirect nfs_to call to check {read,write}_iter (git-fixes). * nfsd: Fix NFSD_MAY_BYPASS_GSS and NFSD_MAY_BYPASS_GSS_ON_ROOT (git-fixes). * nfsd: fix access checking for NLM under XPRTSEC policies (git-fixes). * nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (git-fixes). * nouveau: fix disabling the nonstall irq due to storm code (git-fixes). * nvme-auth: update bi_directional flag (git-fixes). * nvme-fc: use lock accessing port_state and rport state (bsc#1245193 bsc#1247500). * nvme-pci: try function level reset on init failure (git-fixes). * nvme-tcp: log TLS handshake failures at error level (git-fixes). * nvme-tcp: send only permitted commands for secure concat (git-fixes). * nvme: fix PI insert on write (git-fixes). * nvme: fix endianness of command word prints in nvme_log_err_passthru() (git- fixes). * nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list() (git-fixes). * nvme: fix misaccounting of nvme-mpath inflight I/O (git-fixes). * nvmet-fc: avoid scheduling association deletion twice (bsc#1245193 bsc#1247500). * nvmet-fc: move lsop put work to nvmet_fc_ls_req_op (bsc#1245193 bsc#1247500). * nvmet-fcloop: call done callback even when remote port is gone (bsc#1245193 bsc#1247500). * nvmet-tcp: fix callback lock for TLS handshake (git-fixes). * nvmet: exit debugfs after discovery subsystem exits (git-fixes). * nvmet: initialize discovery subsys after debugfs is initialized (git-fixes). * nvmet: pci-epf: Do not complete commands twice if nvmet_req_init() fails (git-fixes). * objtool, ASoC: codecs: wcd934x: Remove potential undefined behavior in wcd934x_slim_irq_handler() (stable-fixes). * objtool, lkdtm: Obfuscate the do_nothing() pointer (stable-fixes). * objtool, regulator: rk808: Remove potential undefined behavior in rk806_set_mode_dcdc() (stable-fixes). * of: dynamic: Fix memleak when of_pci_add_properties() failed (git-fixes). * of: dynamic: Fix use after free in of_changeset_add_prop_helper() (git- fixes). * of: resolver: Fix device node refcount leakage in of_resolve_phandles() (git-fixes). * of: resolver: Simplify of_resolve_phandles() using __free() (stable-fixes). * of: unittest: Fix device reference count leak in of_unittest_pci_node_verify (git-fixes). * of: unittest: Unlock on error in unittest_data_add() (git-fixes). * pNFS/flexfiles: do not attempt pnfs on fatal DS errors (git-fixes). * pNFS: Fix disk addr range check in block/scsi layout (git-fixes). * pNFS: Fix stripe mapping in block/scsi layout (git-fixes). * pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes). * pNFS: Handle RPC size limit for layoutcommits (git-fixes). * percpu: fix race on alloc failed warning limit (git-fixes). * perf bpf-event: Fix use-after-free in synthesis (git-fixes). * perf bpf-utils: Constify bpil_array_desc (git-fixes). * perf bpf-utils: Harden get_bpf_prog_info_linear (git-fixes). * perf dso: Add missed dso__put to dso__load_kcore (git-fixes). * perf hwmon_pmu: Avoid shortening hwmon PMU name (git-fixes). * perf parse-events: Set default GH modifier properly (git-fixes). * perf record: Cache build-ID of hit DSOs only (git-fixes). * perf sched: Fix memory leaks for evsel->priv in timehist (git-fixes). * perf sched: Fix memory leaks in 'perf sched latency' (git-fixes). * perf sched: Fix memory leaks in 'perf sched map' (git-fixes). * perf sched: Fix thread leaks in 'perf sched timehist' (git-fixes). * perf sched: Free thread->priv using priv_destructor (git-fixes). * perf sched: Make sure it frees the usage string (git-fixes). * perf sched: Use RC_CHK_EQUAL() to compare pointers (git-fixes). * perf symbol-minimal: Fix ehdr reading in filename__read_build_id (git- fixes). * perf test: Fix a build error in x86 topdown test (git-fixes). * perf tests bp_account: Fix leaked file descriptor (git-fixes). * perf tools: Remove libtraceevent in .gitignore (git-fixes). * perf topdown: Use attribute to see an event is a topdown metic or slots (git-fixes). * perf trace: Remove --map-dump documentation (git-fixes). * phy: fsl-imx8mq-usb: fix phy_tx_vboost_level_from_property() (git-fixes). * phy: mscc: Fix parsing of unicast frames (git-fixes). * phy: mscc: Fix timestamping for vsc8584 (git-fixes). * phy: qcom: phy-qcom-m31: Update IPQ5332 M31 USB phy initialization sequence (git-fixes). * phy: qualcomm: phy-qcom-eusb2-repeater: Do not zero-out registers (git- fixes). * phy: qualcomm: phy-qcom-eusb2-repeater: fix override properties (git-fixes). * phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable- fixes). * phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568 (git-fixes). * phy: rockchip: samsung-hdptx: Do no set rk_hdptx_phy->rate in case of errors (git-fixes). * phy: rockchip: samsung-hdptx: Fix clock ratio setup (git-fixes). * phy: tegra: xusb: fix device and OF node leak at probe (git-fixes). * phy: ti-pipe3: fix device leak at unbind (git-fixes). * phy: ti: omap-usb2: fix device leak at unbind (git-fixes). * pidfs: Fix memory leak in pidfd_info() (jsc#PED-13113). * pidfs: raise SB_I_NODEV and SB_I_NOEXEC (bsc#1249562). * pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes). * pinctrl: berlin: fix memory leak in berlin_pinctrl_build_state() (git- fixes). * pinctrl: equilibrium: Remove redundant semicolons (git-fixes). * pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes). * pinctrl: renesas: Use int type to store negative error codes (git-fixes). * pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read() (git-fixes). * pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes). * pinctrl: stm32: Manage irq affinity settings (stable-fixes). * pinctrl: sunxi: Fix memory leak on krealloc failure (git-fixes). * pinmux: fix race causing mux_owner NULL with active mux_usecount (git- fixes). * platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() (git- fixes). * platform/chrome: cros_ec_sensorhub: Retries when a sensor is not ready (stable-fixes). * platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable- fixes). * platform/mellanox: mlxbf-pmc: Remove newline char from event name input (git-fixes). * platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input (git- fixes). * platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes). * platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL (git-fixes). * platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042 list (stable-fixes). * platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd/pmf: Support new ACPI ID AMDI0108 (stable-fixes). * platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable- fixes). * platform/x86/intel-uncore-freq: Check write blocked for ELC (git-fixes). * platform/x86/intel: power-domains: Use topology_logical_package_id() for package ID (git-fixes). * platform/x86: Fix initialization order for firmware_attributes_class (git- fixes). * platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA (stable-fixes). * platform/x86: asus-wmi: Fix ROG button mapping, tablet mode on ASUS ROG Z13 (stable-fixes). * platform/x86: asus-wmi: Re-add extra keys to ignore_key_wlan quirk (git- fixes). * platform/x86: asus-wmi: Remove extra keys from ignore_key_wlan quirk (git- fixes). * platform/x86: ideapad-laptop: Fix FnLock not remembered among boots (git- fixes). * platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots (git-fixes). * platform/x86: lg-laptop: Fix WMAB call in fan_mode_store() (git-fixes). * pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop() (stable-fixes). * pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable- fixes). * power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery (git-fixes). * power: supply: bq27xxx: restrict no-battery detection to bq27000 (git- fixes). * power: supply: cpcap-charger: Fix null check for power_supply_get_by_name (git-fixes). * power: supply: cw2015: Fix a alignment coding style issue (git-fixes). * power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set (git- fixes). * power: supply: max77976_charger: fix constant current reporting (git-fixes). * power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes). * powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() (git- fixes). * powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199). * powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199). * powerpc/ftrace: ensure ftrace record ops are always set for NOPs (git- fixes). * powerpc/ftrace: ensure ftrace record ops are always set for NOPs (jsc#PED-10909 git-fixes). * powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199). * powerpc/kvm: Fix ifdef to remove build warning (bsc#1215199). * powerpc/powernv/pci: Fix underflow and leak issue (bsc#1215199). * powerpc/pseries/msi: Fix potential underflow and leak issue (bsc#1215199). * powerpc/pseries: Correct secvar format representation for static key management (jsc#PED-13345 jsc#PED-13343). * powerpc/secvar: Expose secvars relevant to the key management mode (jsc#PED-13345 jsc#PED-13343). * powerpc64/modules: correctly iterate over stubs in setup_ftrace_ool_stubs (jsc#PED-10909 git-fixes). * powerpc: do not build ppc_save_regs.o always (bsc#1215199). * powerpc: floppy: Add missing checks after DMA map (bsc#1215199). * pptp: fix pptp_xmit() error path (git-fixes). * printk: nbcon: Allow reacquire during panic (bsc#1246688). * psample: adjust size if rate_as_probability is set (git-fixes). * ptp: fix breakage after ptp_vclock_in_use() rework (git-fixes). * pwm: berlin: Fix wrong register in suspend/resume (git-fixes). * pwm: imx-tpm: Reset counter if CMOD is 0 (git-fixes). * pwm: mediatek: Fix duty and period setting (git-fixes). * pwm: mediatek: Handle hardware enable and clock enable separately (stable- fixes). * pwm: rockchip: Round period/duty down on apply, up on get (git-fixes). * pwm: tiehrpwm: Do not drop runtime PM reference in .free() (git-fixes). * pwm: tiehrpwm: Fix corner case in clock divisor calculation (git-fixes). * pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation (git- fixes). * pwm: tiehrpwm: Make code comment in .free() more useful (git-fixes). * r8169: add support for RTL8125D (stable-fixes). * r8169: disable RTL8126 ZRX-DC timeout (stable-fixes). * r8169: do not scan PHY addresses > 0 (stable-fixes). * rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes) * regmap: Remove superfluous check for !config in __regmap_init() (git-fixes). * regulator: core: fix NULL dereference on unbind due to stale coupling data (stable-fixes). * regulator: scmi: Use int type to store negative error codes (git-fixes). * regulator: sy7636a: fix lifecycle of power good gpio (git-fixes). * reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes). * reset: eyeq: fix OF node leak (git-fixes). * resource: Add resource set range and size helpers (jsc#PED-13728 jsc#PED-13762). * resource: fix false warning in __request_region() (git-fixes). * ring-buffer: Do not allow events in NMI with generic atomic64 cmpxchg() (git-fixes). * ring-buffer: Make reading page consistent with the code logic (git-fixes). * rpm/config.sh: SLFO 1.2 is now synced to OBS as well * rtc: ds1307: fix incorrect maximum clock rate handling (git-fixes). * rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes). * rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable- fixes). * rtc: hym8563: fix incorrect maximum clock rate handling (git-fixes). * rtc: nct3018y: fix incorrect maximum clock rate handling (git-fixes). * rtc: optee: fix memory leak on driver removal (git-fixes). * rtc: pcf85063: fix incorrect maximum clock rate handling (git-fixes). * rtc: pcf8563: fix incorrect maximum clock rate handling (git-fixes). * rtc: rv3028: fix incorrect maximum clock rate handling (git-fixes). * rtc: x1205: Fix Xicor X1205 vendor prefix (git-fixes). * s390/ap: Unmask SLCF bit in card and queue ap functions sysfs (git-fixes bsc#1247837). * s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again (git-fixes bsc#1246868). * s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes bsc#1249477). * s390/early: Copy last breaking event address to pt_regs (git-fixes bsc#1249061). * s390/hypfs: Avoid unnecessary ioctl registration in debugfs (bsc#1248727 git-fixes). * s390/hypfs: Enable limited access during lockdown (bsc#1248727 git-fixes). * s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1247372). * s390/mm: Allocate page table with PAGE_SIZE granularity (git-fixes bsc#1247838). * s390/mm: Do not map lowcore with identity mapping (git-fixes bsc#1249066). * s390/mm: Remove possible false-positive warning in pte_free_defer() (git- fixes bsc#1247366). * s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249478). * s390/pci: Allow automatic recovery with minimal driver support (bsc#1248728 git-fixes). * s390/sclp: Fix SCCB present check (git-fixes bsc#1249065). * s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249062). * s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249064). * samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora (git-fixes). * samples: mei: Fix building on musl libc (git-fixes). * sched/deadline: Always stop dl-server before changing parameters (bsc#1247936). * sched/deadline: Do not count nr_running for dl_server proxy tasks (git- fixes, bsc#1247936). * sched/deadline: Fix RT task potential starvation when expiry time passed (git-fixes, bsc#1247936). * sched/deadline: Fix dl_server_stopped() (bsc#1247936). * sched/deadline: Initialize dl_servers after SMP (git-fixes) * sched_ext, sched/core: Do not call scx_group_set_weight() (git-fixes) * scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes). * scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes). * scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes). * scsi: fc: Avoid -Wflex-array-member-not-at-end warnings (bsc#1250519). * scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes). * scsi: isci: Fix dma_unmap_sg() nents value (git-fixes). * scsi: lpfc: Abort outstanding ELS WQEs regardless of if rmmod is in progress (bsc#1250519). * scsi: lpfc: Check return status of lpfc_reset_flush_io_context during TGT_RESET (bsc#1250519). * scsi: lpfc: Clean up allocated queues when queue setup mbox commands fail (bsc#1250519). * scsi: lpfc: Clean up extraneous phba dentries (bsc#1250519). * scsi: lpfc: Convert debugfs directory counts from atomic to unsigned int (bsc#1250519). * scsi: lpfc: Copyright updates for 14.4.0.11 patches (bsc#1250519). * scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted (bsc#1250519). * scsi: lpfc: Define size of debugfs entry for xri rebalancing (bsc#1250519). * scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point topology (bsc#1250519). * scsi: lpfc: Fix buffer free/clear order in deferred receive path (bsc#1250519). * scsi: lpfc: Fix wrong function reference in a comment (bsc#1250519). * scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in lpfc_cleanup (bsc#1250519). * scsi: lpfc: Remove redundant assignment to avoid memory leak (bsc#1250519). * scsi: lpfc: Remove unused member variables in struct lpfc_hba and lpfc_vport (bsc#1250519). * scsi: lpfc: Update lpfc version to 14.4.0.11 (bsc#1250519). * scsi: lpfc: Use int type to store negative error codes (bsc#1250519). * scsi: lpfc: Use switch case statements in DIF debugfs handlers (bsc#1250519). * scsi: lpfc: use min() to improve code (bsc#1250519). * scsi: mpi3mr: Event processing debug improvement (bsc#1251186). * scsi: mpi3mr: Fix I/O failures during controller reset (bsc#1251186). * scsi: mpi3mr: Fix controller init failure on fault during queue creation (bsc#1251186). * scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link speed (bsc#1251186). * scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes). * scsi: mpi3mr: Fix premature TM timeouts on virtual drives (bsc#1251186). * scsi: mpi3mr: Fix race between config read submit and interrupt completion (git-fixes). * scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git- fixes). * scsi: mpi3mr: Update MPI headers to revision 37 (bsc#1251186). * scsi: mpi3mr: Update driver version to 8.15.0.5.50 (bsc#1251186). * scsi: mpt3sas: Fix a fw_event memory leak (git-fixes). * scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes). * scsi: qla2xxx: Avoid stack frame size warning in qla_dfs (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES() (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp() (git-fixes). * scsi: qla2xxx: Remove firmware URL (git-fixes). * scsi: qla2xxx: Use secs_to_jiffies() instead of msecs_to_jiffies() (git- fixes). * scsi: qla2xxx: edif: Fix incorrect sign of error code (git-fixes). * scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes). * scsi: smartpqi: Enhance WWID logging logic (bsc#1246631). * scsi: smartpqi: Take drives offline when controller is offline (bsc#1246631). * scsi: smartpqi: Update driver version to 2.1.34-035 (bsc#1246631). * scsi: ufs: Fix toggling of clk_gating.state when clock gating is not allowed (git-fixes). * scsi: ufs: Introduce quirk to extend PA_HIBERN8TIME for UFS devices (git- fixes). * scsi: ufs: bsg: Delete bsg_dev when setting up bsg fails (git-fixes). * scsi: ufs: core: Add missing post notify for power mode change (git-fixes). * scsi: ufs: core: Add ufshcd_send_bsg_uic_cmd() for UFS BSG (git-fixes). * scsi: ufs: core: Always initialize the UIC done completion (git-fixes). * scsi: ufs: core: Do not perform UFS clkscaling during host async scan (git- fixes). * scsi: ufs: core: Fix clk scaling to be conditional in reset and restore (git-fixes). * scsi: ufs: core: Fix error return with query response (git-fixes). * scsi: ufs: core: Fix spelling of a sysfs attribute name (git-fixes). * scsi: ufs: core: Fix ufshcd_is_ufs_dev_busy() and ufshcd_eh_timed_out() (git-fixes). * scsi: ufs: core: Honor runtime/system PM levels if set by host controller drivers (git-fixes). * scsi: ufs: core: Improve ufshcd_mcq_sq_cleanup() (git-fixes). * scsi: ufs: core: Introduce ufshcd_has_pending_tasks() (git-fixes). * scsi: ufs: core: Prepare to introduce a new clock_gating lock (git-fixes). * scsi: ufs: core: Remove redundant query_complete trace (git-fixes). * scsi: ufs: core: Set default runtime/system PM levels before ufshcd_hba_init() (git-fixes). * scsi: ufs: core: Update compl_time_stamp_local_clock after completing a cqe (git-fixes). * scsi: ufs: core: Use link recovery when h8 exit fails during runtime resume (git-fixes). * scsi: ufs: exynos: Add check inside exynos_ufs_config_smu() (git-fixes). * scsi: ufs: exynos: Add gs101_ufs_drv_init() hook and enable WriteBooster (git-fixes). * scsi: ufs: exynos: Enable PRDT pre-fetching with UFSHCD_CAP_CRYPTO (git- fixes). * scsi: ufs: exynos: Ensure consistent phy reference counts (git-fixes). * scsi: ufs: exynos: Ensure pre_link() executes before exynos_ufs_phy_init() (git-fixes). * scsi: ufs: exynos: Fix hibern8 notify callbacks (git-fixes). * scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (git-fixes). * scsi: ufs: exynos: Move UFS shareability value to drvdata (git-fixes). * scsi: ufs: exynos: Move phy calls to .exit() callback (git-fixes). * scsi: ufs: exynos: Remove empty drv_init method (git-fixes). * scsi: ufs: exynos: Remove superfluous function parameter (git-fixes). * scsi: ufs: exynos: gs101: Put UFS device in reset on .suspend() (git-fixes). * scsi: ufs: mcq: Delete ufshcd_release_scsi_cmd() in ufshcd_mcq_abort() (git- fixes). * scsi: ufs: pltfrm: Disable runtime PM during removal of glue drivers (git- fixes). * scsi: ufs: pltfrm: Drop PM runtime reference count after ufshcd_remove() (git-fixes). * scsi: ufs: qcom: Fix crypto key eviction (git-fixes). * scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get (git- fixes). * scsi: ufs: ufs-pci: Fix default runtime and system PM levels (git-fixes). * scsi: ufs: ufs-pci: Fix hibernate state transition for Intel MTL-like host controllers (git-fixes). * seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too fast (git-fixes bsc#1250671). * selftest/livepatch: Only run test-kprobe with CONFIG_KPROBES_ON_FTRACE (poo#187320). * selftests/cpufreq: Fix cpufreq basic read and update testcases (bsc#1250344). * selftests/livepatch: Ignore NO_SUPPORT line in dmesg (poo#187320). * selftests/livepatch: Replace hardcoded module name with variable in test- callbacks.sh (poo#187320). * selftests/run_kselftest.sh: Fix help string for --per-test-log (poo#187320). * selftests/run_kselftest.sh: Use readlink if realpath is not available (poo#187320). * selftests/tracing: Fix false failure of subsystem event test (git-fixes). * selftests: ALSA: fix memory leak in utimer test (git-fixes). * selftests: livepatch: add new ftrace helpers functions (poo#187320). * selftests: livepatch: add test cases of stack_order sysfs interface (poo#187320). * selftests: livepatch: handle PRINTK_CALLER in check_result() (poo#187320). * selftests: livepatch: rename KLP_SYSFS_DIR to SYSFS_KLP_DIR (poo#187320). * selftests: livepatch: save and restore kprobe state (poo#187320). * selftests: livepatch: test if ftrace can trace a livepatched function (poo#187320). * selftests: livepatch: test livepatching a kprobed function (poo#187320). * selftests: ncdevmem: Move ncdevmem under drivers/net/hw (poo#187443). * selinux: change security_compute_sid to return the ssid or tsid on match (git-fixes). * selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len (stable- fixes). * serial: 8250: Touch watchdogs in write_atomic() (bsc#1246688). * serial: 8250: fix panic due to PSLVERR (git-fixes). * serial: max310x: Add error checking in probe() (git-fixes). * serial: sc16is7xx: fix bug in flow control levels init (git-fixes). * skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650). * slab: Decouple slab_debug and no_hash_pointers (bsc#1249022). * smb: client: fix crypto buffers in non-linear memory (bsc#1250491, boo#1239206). * smb: client: fix netns refcount leak after net_passive changes (git-fixes). * soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS (git-fixes). * soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes). * soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure (git- fixes). * soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure (git- fixes). * soc: qcom: QMI encoding/decoding for big endian (git-fixes). * soc: qcom: fix endianness for QMI header (git-fixes). * soc: qcom: mdt_loader: Actually use the e_phoff (stable-fixes). * soc: qcom: mdt_loader: Deal with zero e_shentsize (git-fixes). * soc: qcom: mdt_loader: Ensure we do not read past the ELF header (git- fixes). * soc: qcom: mdt_loader: Fix error return values in mdt_header_valid() (git- fixes). * soc: qcom: pmic_glink: fix OF node leak (git-fixes). * soc: qcom: rpmh-rsc: Add RSC version 4 support (stable-fixes). * soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS (git-fixes). * soundwire: Move handle_nested_irq outside of sdw_dev_lock (stable-fixes). * soundwire: amd: cancel pending slave status handling workqueue during remove sequence (stable-fixes). * soundwire: amd: fix for handling slave alerts after link is down (git- fixes). * soundwire: amd: serialize amd manager resume sequence during pm_prepare (stable-fixes). * soundwire: stream: restore params when prepare ports fail (git-fixes). * spi: bcm2835: Remove redundant semicolons (git-fixes). * spi: cadence-quadspi: Fix cqspi_setup_flash() (git-fixes). * spi: cadence-quadspi: Flush posted register writes before DAC access (git- fixes). * spi: cadence-quadspi: Flush posted register writes before INDAC access (git- fixes). * spi: cadence-quadspi: fix cleanup of rx_chan on failure paths (stable- fixes). * spi: cs42l43: Property entry should be a null-terminated array (bsc#1246979). * spi: fix return code when spi device has too many chipselects (git-fixes). * spi: mtk-snfi: Remove redundant semicolons (git-fixes). * spi: spi-fsl-lpspi: Clamp too high speed_hz (git-fixes). * spi: spi-fsl-lpspi: Clear status register after disabling the module (git- fixes). * spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes). * spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git- fixes). * spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes). * spi: stm32: Check for cfg availability in stm32_spi_probe (git-fixes). * sprintf.h requires stdarg.h (git-fixes). * sprintf.h: mask additional include (git-fixes). * squashfs: fix memory leak in squashfs_fill_super (git-fixes). * staging: axis-fifo: fix TX handling on copy_from_user() failure (git-fixes). * staging: axis-fifo: fix maximum TX packet length check (git-fixes). * staging: axis-fifo: flush RX FIFO on read errors (git-fixes). * staging: axis-fifo: remove sysfs interface (git-fixes). * staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() (git- fixes). * staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (git-fixes). * staging: nvec: Fix incorrect null termination of battery manufacturer (git- fixes). * staging: vchiq_arm: Make vchiq_shutdown never fail (git-fixes). * struct cdc_ncm_ctx: move new member to end (git-fixes). * sunrpc: fix client side handling of tls alerts (git-fixes). * sunrpc: fix handling of server side tls alerts (git-fixes). * sunrpc: fix null pointer dereference on zero-length checksum (git-fixes). * sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes). * supported.conf: Mark ZL3073X modules supported * supported.conf: mark hyperv_drm as external * tcp: call tcp_measure_rcv_mss() for ooo packets (git-fixes). * tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650). * thermal/drivers/mediatek/lvts_thermal: Add lvts commands and their sizes to driver data (stable-fixes). * thermal/drivers/mediatek/lvts_thermal: Add mt7988 lvts commands (stable- fixes). * thermal/drivers/mediatek/lvts_thermal: Change lvts commands array to static const (stable-fixes). * thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required (stable-fixes). * thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes). * thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes). * thunderbolt: Compare HMAC values in constant time (git-fixes). * thunderbolt: Fix copy+paste error in match_service_id() (git-fixes). * tools/power turbostat: Clustered Uncore MHz counters should honor show/hide options (stable-fixes). * tools/power turbostat: Fix bogus SysWatt for forked program (git-fixes). * tools/power turbostat: Fix build with musl (stable-fixes). * tools/power turbostat: Handle cap_get_proc() ENOSYS (stable-fixes). * tools/power turbostat: Handle non-root legacy-uncore sysfs permissions (stable-fixes). * tools/resolve_btfids: Fix build when cross compiling kernel with clang (git- fixes). * tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single (git-fixes). * trace/fgraph: Fix error handling (git-fixes). * trace/ring-buffer: Do not use TP_printk() formatting for boot mapped buffers (git-fixes). * tracepoint: Print the function symbol when tracepoint_debug is set (jsc#PED-13631). * tracing/kprobe: Make trace_kprobe's module callback called after jump_label update (git-fixes). * tracing/kprobes: Fix to free objects when failed to copy a symbol (git- fixes). * tracing: Correct the refcount if the hist/hist_debug file fails to open (git-fixes). * tracing: Fix filter string testing (git-fixes). * tracing: Fix using ret variable in tracing_set_tracer() (git-fixes). * tracing: Remove unneeded goto out logic (bsc#1249286). * tracing: Switch trace.c code over to use guard() (git-fixes). * tracing: Switch trace_events_hist.c code over to use guard() (git-fixes). * tracing: fprobe events: Fix possible UAF on modules (git-fixes). * tracing: tprobe-events: Fix leakage of module refcount (git-fixes). * tty: hvc_console: Call hvc_kick in hvc_write unconditionally (bsc#1230062). * tty: n_gsm: Do not block input queue by waiting MSC (git-fixes). * tty: serial: fix print format specifiers (stable-fixes). * ublk: sanity check add_dev input for underflow (git-fixes). * ublk: use vmalloc for ublk_device's __queues (git-fixes). * ucount: fix atomic_long_inc_below() argument type (git-fixes). * uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes). * usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init() (git-fixes). * usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call (git- fixes). * usb: core: Add 0x prefix to quirks debug output (stable-fixes). * usb: core: config: Prevent OOB read in SS endpoint companion parsing (stable-fixes). * usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE test (git-fixes). * usb: core: usb_submit_urb: downgrade type check (stable-fixes). * usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git- fixes). * usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable- fixes). * usb: dwc3: imx8mp: fix device leak at unbind (git-fixes). * usb: dwc3: meson-g12a: fix device leaks at unbind (git-fixes). * usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes). * usb: dwc3: qcom: Do not leave BCR asserted (git-fixes). * usb: early: xhci-dbc: Fix early_ioremap leak (git-fixes). * usb: gadget : fix use-after-free in composite_dev_cleanup() (git-fixes). * usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes). * usb: gadget: midi2: Fix MIDI2 IN EP max packet size (git-fixes). * usb: gadget: midi2: Fix missing UMP group attributes initialization (git- fixes). * usb: gadget: udc: renesas_usb3: fix device leak at unbind (git-fixes). * usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup (git- fixes). * usb: host: xhci-plat: fix incorrect type for of_match variable in xhci_plat_probe() (git-fixes). * usb: misc: apple-mfi-fastcharge: Make power supply names unique (git-fixes). * usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls (git- fixes). * usb: musb: omap2430: fix device leak at unbind (git-fixes). * usb: phy: twl6030: Fix incorrect type for ret (git-fixes). * usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive (stable-fixes). * usb: renesas-xhci: Fix External ROM access timeouts (git-fixes). * usb: storage: realtek_cr: Use correct byte order for bcs->Residue (git- fixes). * usb: typec: fusb302: cache PD RX state (git-fixes). * usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable- fixes). * usb: typec: maxim_contaminant: disable low power mode when reading comparator values (git-fixes). * usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is clean (git-fixes). * usb: typec: tcpm/tcpci_maxim: fix irq wake usage (stable-fixes). * usb: typec: tcpm: allow switching to mode accessory to mux properly (stable- fixes). * usb: typec: tcpm: allow to use sink in accessory mode (stable-fixes). * usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach (git- fixes). * usb: typec: tcpm: properly deliver cable vdms to altmode drivers (git- fixes). * usb: typec: tipd: Clear interrupts first (git-fixes). * usb: typec: ucsi: Update power_supply on power role change (git-fixes). * usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default (stable-fixes). * usb: typec: ucsi: yoga-c630: fix error and remove paths (git-fixes). * usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes). * usb: xhci: Avoid showing errors during surprise removal (stable-fixes). * usb: xhci: Avoid showing warnings for dying controller (stable-fixes). * usb: xhci: Fix slot_id resource race conflict (git-fixes). * usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command (stable-fixes). * usb: xhci: print xhci->xhc_state when queue_command failed (stable-fixes). * use uniform permission checks for all mount propagation changes (git-fixes). * vdpa/mlx5: Fix needs_teardown flag calculation (git-fixes). * vdpa: Fix IDR memory leak in VDUSE module exit (git-fixes). * vhost-scsi: Fix log flooding with target does not exist errors (git-fixes). * vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() (git- fixes). * vhost/vsock: Avoid allocating arbitrarily-sized SKBs (git-fixes). * vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER (git-fixes). * vhost: Reintroduce kthread API and add mode selection (git-fixes). * vhost: fail early when __vhost_add_used() fails (git-fixes). * virtchnl2: add flow steering support (jsc#PED-13728). * virtchnl2: rename enum virtchnl2_cap_rss (jsc#PED-13728). * virtchnl: add PTP virtchnl definitions (jsc#PED-13728 jsc#PED-13762). * virtio_net: Enforce minimum TX ring size for reliability (git-fixes). * virtio_ring: Fix error reporting in virtqueue_resize (git-fixes). * vmci: Prevent the dispatching of uninitialized payloads (git-fixes). * vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page (git-fixes). * vsock/virtio: Validate length in packet header before skb_put() (git-fixes). * vt: defkeymap: Map keycodes above 127 to K_HOLE (git-fixes). * vt: keyboard: Do not process Unicode characters in K_OFF mode (git-fixes). * watchdog: dw_wdt: Fix default timeout (stable-fixes). * watchdog: iTCO_wdt: Report error if timeout configuration fails (stable- fixes). * watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the watchdog (git-fixes). * watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race condition (stable-fixes). * watchdog: ziirave_wdt: check record length in ziirave_firm_verify() (git- fixes). * wifi: ath10k: avoid unnecessary wait for service ready message (git-fixes). * wifi: ath10k: shutdown driver when hardware is unreliable (stable-fixes). * wifi: ath11k: HAL SRNG: do not deinitialize and re-initialize again (git- fixes). * wifi: ath11k: clear initialized flag for deinit-ed srng lists (git-fixes). * wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() (git-fixes). * wifi: ath11k: fix dest ring-buffer corruption (git-fixes). * wifi: ath11k: fix dest ring-buffer corruption when ring is full (git-fixes). * wifi: ath11k: fix group data packet drops during rekey (git-fixes). * wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() (git-fixes). * wifi: ath11k: fix source ring-buffer corruption (git-fixes). * wifi: ath11k: fix suspend use-after-free after probe failure (git-fixes). * wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952). * wifi: ath12k: Add memset and update default rate value in wmi tx completion (stable-fixes). * wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes). * wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable- fixes). * wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0 (stable-fixes). * wifi: ath12k: Fix station association with MBSSID Non-TX BSS (stable-fixes). * wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() (git-fixes). * wifi: ath12k: fix dest ring-buffer corruption (git-fixes). * wifi: ath12k: fix dest ring-buffer corruption when ring is full (git-fixes). * wifi: ath12k: fix endianness handling while accessing wmi service bit (git- fixes). * wifi: ath12k: fix memory leak in ath12k_pci_remove() (stable-fixes). * wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (git-fixes). * wifi: ath12k: fix source ring-buffer corruption (git-fixes). * wifi: ath12k: fix the fetching of combined rssi (git-fixes). * wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes). * wifi: ath12k: fix wrong logging ID used for CE (git-fixes). * wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE (git-fixes). * wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work (git-fixes). * wifi: brcmsmac: Remove const from tbl_ptr parameter in wlc_lcnphy_common_read_table() (git-fixes). * wifi: cfg80211: Fix interface type validation (stable-fixes). * wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes). * wifi: cfg80211: reject HTC bit for management frames (stable-fixes). * wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git- fixes). * wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes). * wifi: iwlegacy: Check rate_idx range after addition (stable-fixes). * wifi: iwlwifi: Add missing firmware info for bz-b0-* models (bsc#1252084). * wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (git-fixes). * wifi: iwlwifi: Fix memory leak in iwl_mvm_init() (git-fixes). * wifi: iwlwifi: Remove redundant header files (git-fixes). * wifi: iwlwifi: config: unify fw/pnvm MODULE_FIRMWARE (bsc#1252084). * wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable- fixes). * wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable- fixes). * wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn (stable-fixes). * wifi: iwlwifi: mvm: fix scan request validation (stable-fixes). * wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes). * wifi: iwlwifi: return ERR_PTR from opmode start() (stable-fixes). * wifi: iwlwifi: uefi: check DSM item validity (git-fixes). * wifi: libertas: cap SSID len in lbs_associate() (git-fixes). * wifi: mac80211: Check 802.11 encaps offloading in ieee80211_tx_h_select_key() (git-fixes). * wifi: mac80211: Do not call fq_flow_idx() for management frames (git-fixes). * wifi: mac80211: Do not schedule stopped TXQs (git-fixes). * wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon() (git-fixes). * wifi: mac80211: avoid weird state in error path (stable-fixes). * wifi: mac80211: do not complete management TX on SAE commit (stable-fixes). * wifi: mac80211: do not unreserve never reserved chanctx (stable-fixes). * wifi: mac80211: fix Rx packet handling when pubsta information is not available (git-fixes). * wifi: mac80211: fix incorrect type for ret (stable-fixes). * wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes). * wifi: mac80211: increase scan_ies_len for S1G (stable-fixes). * wifi: mac80211: reject TDLS operations when station is not associated (git- fixes). * wifi: mac80211: update radar_required in channel context after channel switch (stable-fixes). * wifi: mt76: fix linked list corruption (git-fixes). * wifi: mt76: fix potential memory leak in mt76_wmac_probe() (git-fixes). * wifi: mt76: free pending offchannel tx frames on wcid cleanup (git-fixes). * wifi: mt76: mt7915: fix mt7981 pre-calibration (git-fixes). * wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes). * wifi: mt76: mt7925: adjust rm BSS flow to prevent next connection failure (git-fixes). * wifi: mt76: mt7925: fix locking in mt7925_change_vif_links() (git-fixes). * wifi: mt76: mt7925: fix the wrong bss cleanup for SAP (git-fixes). * wifi: mt76: mt7925u: use connac3 tx aggr check in tx complete (git-fixes). * wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE (git-fixes). * wifi: mt76: mt7996: Fix RX packets configuration for primary WED device (git-fixes). * wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git- fixes). * wifi: mt76: prevent non-offchannel mgmt tx during scan/roc (git-fixes). * wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes). * wifi: mwifiex: send world regulatory domain to driver (git-fixes). * wifi: nl80211: Set num_sub_specs before looping through sub_specs (git- fixes). * wifi: plfxlc: Fix error handling in usb driver probe (git-fixes). * wifi: rtl818x: Kill URBs before clearing tx status queue (git-fixes). * wifi: rtl8xxxu: Do not claim USB ID 07b8:8188 (stable-fixes). * wifi: rtl8xxxu: Fix RX skb size for aggregation disabled (git-fixes). * wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc() (stable-fixes). * wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()` (stable-fixes). * wifi: rtlwifi: rtl8192cu: Do not claim USB ID 07b8:8188 (stable-fixes). * wifi: rtw88: Fix macid assigned to TDLS station (git-fixes). * wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes). * wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable- fixes). * wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band (git-fixes). * wifi: rtw89: avoid circular locking dependency in ser_state_run() (git- fixes). * wifi: rtw89: scan abort when assign/unassign_vif (stable-fixes). * wifi: rtw89: wow: Add Basic Rate IE to probe request in scheduled scan mode (stable-fixes). * wifi: virt_wifi: Fix page fault on connect (stable-fixes). * wifi: wilc1000: avoid buffer overflow in WID string configuration (stable- fixes). * writeback: Avoid contention on wb->list_lock when switching inodes (bsc#1237776). * writeback: Avoid contention on wb->list_lock when switching inodes (kABI fixup) (bsc#1237776). * writeback: Avoid excessively long inode switching times (bsc#1237776). * writeback: Avoid softlockup when switching many inodes (bsc#1237776). * x86/CPU/AMD: Add CPUID faulting support (jsc#PED-13704). * x86/Kconfig: Add arch attack vector support (git-fixes). * x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes). * x86/boot: Sanitize boot params before parsing command line (git-fixes). * x86/bugs: Add SRSO_MITIGATION_NOSMT (git-fixes). * x86/bugs: Add attack vector controls for BHI (git-fixes). * x86/bugs: Add attack vector controls for GDS (git-fixes). * x86/bugs: Add attack vector controls for ITS (git-fixes). * x86/bugs: Add attack vector controls for L1TF (git-fixes). * x86/bugs: Add attack vector controls for MDS (git-fixes). * x86/bugs: Add attack vector controls for MMIO (git-fixes). * x86/bugs: Add attack vector controls for RFDS (git-fixes). * x86/bugs: Add attack vector controls for SRBDS (git-fixes). * x86/bugs: Add attack vector controls for SRSO (git-fixes). * x86/bugs: Add attack vector controls for SSB (git-fixes). * x86/bugs: Add attack vector controls for TAA (git-fixes). * x86/bugs: Add attack vector controls for TSA (git-fixes). * x86/bugs: Add attack vector controls for retbleed (git-fixes). * x86/bugs: Add attack vector controls for spectre_v1 (git-fixes). * x86/bugs: Add attack vector controls for spectre_v2 (git-fixes). * x86/bugs: Add attack vector controls for spectre_v2_user (git-fixes). * x86/bugs: Allow ITS stuffing in eIBRS+retpoline mode also (git-fixes). * x86/bugs: Avoid AUTO after the select step in the retbleed mitigation (git- fixes). * x86/bugs: Avoid warning when overriding return thunk (git-fixes). * x86/bugs: Clean up SRSO microcode handling (git-fixes). * x86/bugs: Define attack vectors relevant for each bug (git-fixes). * x86/bugs: Fix GDS mitigation selecting when mitigation is off (git-fixes). * x86/bugs: Introduce cdt_possible() (git-fixes). * x86/bugs: Print enabled attack vectors (git-fixes). * x86/bugs: Remove its=stuff dependency on retbleed (git-fixes). * x86/bugs: Select best SRSO mitigation (git-fixes). * x86/bugs: Simplify the retbleed=stuff checks (git-fixes). * x86/bugs: Use IBPB for retbleed if used by SRSO (git-fixes). * x86/bugs: Use switch/case in its_apply_mitigation() (git-fixes). * x86/cacheinfo: Properly parse CPUID(0x80000005) L1d/L1i associativity (git- fixes). * x86/cacheinfo: Properly parse CPUID(0x80000006) L2/L3 associativity (git- fixes). * x86/cpu: Sanitize CPUID(0x80000000) output (git-fixes). * x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes). * x86/fpu/xstate: Fix inconsistencies in guest FPU xfeatures (git-fixes). * x86/fpu: Avoid copying dynamic FP state from init_task in arch_dup_task_struct() (git-fixes). * x86/fpu: Delay instruction pointer fixup until after warning (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/fpu: Fully optimize out WARN_ON_FPU() (git-fixes). * x86/fpu: Refactor xfeature bitmask update code for sigframe XSAVE (git- fixes). * x86/fred/signal: Prevent immediate repeat of single step trap on return from SIGTRAP handler (git-fixes). * x86/headers: Replace **ASSEMBLY** with **ASSEMBLER** in UAPI headers (git- fixes). * x86/locking: Use ALT_OUTPUT_SP() for percpu_{,try_}cmpxchg{64,128}_op() (git-fixes). * x86/mce/amd: Add default names for MCA banks and blocks (git-fixes). * x86/mce: Do not remove sysfs if thresholding sysfs init fails (git-fixes). * x86/mce: Ensure user polling settings are honored when restarting timer (git-fixes). * x86/mce: Make sure CMCI banks are cleared during shutdown on Intel (git- fixes). * x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes). * x86/microcode: Consolidate the loader enablement checking (git-fixes). * x86/microcode: Update the Intel processor flag scan check (git-fixes). * x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() (git-fixes). * x86/mm/pat: do not collapse pages without PSE set (git-fixes). * x86/nmi: Add an emergency handler in nmi_desc & use it in nmi_shootdown_cpus() (git-fixes). * x86/percpu: Disable named address spaces for UBSAN_BOOL with KASAN for GCC < 14.2 (git-fixes). * x86/pkeys: Simplify PKRU update in signal frame (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/pti: Add attack vector controls for PTI (git-fixes). * x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes). * x86/smp: Allow calling mwait_play_dead with an arbitrary hint (jsc#PED-13815). * x86/smp: Fix mwait_play_dead() and acpi_processor_ffh_play_dead() noreturn behavior (jsc#PED-13815). * x86/smp: PM/hibernate: Split arch_resume_nosmt() (jsc#PED-13815). * x86/smpboot: Fix INIT delay assignment for extended Intel Families (git- fixes). * x86/topology: Implement topology_is_core_online() to address SMT regression (jsc#PED-13815). * x86/traps: Initialize DR6 by writing its architectural reset value (git- fixes). * xen/gntdev: remove struct gntdev_copy_batch from stack (git-fixes). * xen/netfront: Fix TX response spurious interrupts (git-fixes). * xen: fix UAF in dmabuf_exp_from_pages() (git-fixes). * xfrm: replay: Fix the update of replay_esn->oseq_hi for GSO (git-fixes). * xfs: change xfs_xattr_class from a TRACE_EVENT() to DECLARE_EVENT_CLASS() (git-fixes). * xfs: do not propagate ENODATA disk errors into xattr code (git-fixes). * xfs: fix scrub trace with null pointer in quotacheck (git-fixes). * xfs: only create event xfs_file_compat_ioctl when CONFIG_COMPAT is configure (git-fixes). * xfs: remove unused event xfs_alloc_near_error (git-fixes). * xfs: remove unused event xfs_alloc_near_nominleft (git-fixes). * xfs: remove unused event xfs_attr_node_removename (git-fixes). * xfs: remove unused event xfs_ioctl_clone (git-fixes). * xfs: remove unused event xfs_pagecache_inval (git-fixes). * xfs: remove unused event xlog_iclog_want_sync (git-fixes). * xfs: remove unused trace event xfs_attr_remove_iter_return (git-fixes). * xfs: remove unused trace event xfs_attr_rmtval_set (git-fixes). * xfs: remove unused trace event xfs_discard_rtrelax (git-fixes). * xfs: remove unused trace event xfs_log_cil_return (git-fixes). * xfs: remove unused trace event xfs_reflink_cow_enospc (git-fixes). * xfs: remove unused xfs_attr events (git-fixes). * xfs: remove unused xfs_reflink_compare_extents events (git-fixes). * xfs: remove usused xfs_end_io_direct events (git-fixes). * xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes). * xhci: dbc: decouple endpoint allocation from initialization (git-fixes). * xhci: fix memory leak regression when freeing xhci vdev devices depth first (git-fixes). * xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes). * zram: permit only one post-processing operation at a time (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-50=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-50=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * kernel-source-vanilla-6.12.0-160000.6.1 * kernel-devel-6.12.0-160000.6.1 * kernel-source-6.12.0-160000.6.1 * kernel-macros-6.12.0-160000.6.1 * kernel-docs-html-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64 nosrc) * kernel-64kb-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64) * kernel-64kb-extra-6.12.0-160000.6.1 * kernel-64kb-debuginfo-6.12.0-160000.6.1 * kernel-64kb-devel-6.12.0-160000.6.1 * kernel-64kb-extra-debuginfo-6.12.0-160000.6.1 * kernel-64kb-debugsource-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-6.12.0-160000.6.1 * kernel-default-extra-debuginfo-6.12.0-160000.6.1 * kernel-default-devel-6.12.0-160000.6.1 * kernel-syms-6.12.0-160000.6.1 * kernel-obs-qa-6.12.0-160000.6.1 * kernel-default-debugsource-6.12.0-160000.6.1 * kernel-default-extra-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (noarch nosrc) * kernel-docs-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le x86_64) * kernel-kvmsmall-devel-6.12.0-160000.6.1 * kernel-kvmsmall-debuginfo-6.12.0-160000.6.1 * kernel-default-base-6.12.0-160000.6.1.160000.2.4 * kernel-kvmsmall-debugsource-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * kernel-kvmsmall-vdso-6.12.0-160000.6.1 * kernel-default-devel-debuginfo-6.12.0-160000.6.1 * kernel-default-vdso-6.12.0-160000.6.1 * kernel-default-vdso-debuginfo-6.12.0-160000.6.1 * kernel-kvmsmall-devel-debuginfo-6.12.0-160000.6.1 * kernel-kvmsmall-vdso-debuginfo-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (ppc64le s390x x86_64) * kernel-default-livepatch-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (nosrc s390x) * kernel-zfcpdump-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (s390x) * kernel-zfcpdump-debugsource-6.12.0-160000.6.1 * kernel-zfcpdump-debuginfo-6.12.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * kernel-source-vanilla-6.12.0-160000.6.1 * kernel-devel-6.12.0-160000.6.1 * kernel-source-6.12.0-160000.6.1 * kernel-macros-6.12.0-160000.6.1 * kernel-docs-html-6.12.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * kernel-default-debuginfo-6.12.0-160000.6.1 * kernel-default-livepatch-6.12.0-160000.6.1 * kernel-default-extra-debuginfo-6.12.0-160000.6.1 * kernel-default-devel-6.12.0-160000.6.1 * kernel-syms-6.12.0-160000.6.1 * kernel-kvmsmall-debugsource-6.12.0-160000.6.1 * kernel-obs-qa-6.12.0-160000.6.1 * cluster-md-kmp-default-6.12.0-160000.6.1 * dlm-kmp-default-debuginfo-6.12.0-160000.6.1 * gfs2-kmp-default-6.12.0-160000.6.1 * kernel-default-base-6.12.0-160000.6.1.160000.2.4 * kernel-default-debugsource-6.12.0-160000.6.1 * kernel-kvmsmall-devel-6.12.0-160000.6.1 * kernel-kvmsmall-debuginfo-6.12.0-160000.6.1 * gfs2-kmp-default-debuginfo-6.12.0-160000.6.1 * dlm-kmp-default-6.12.0-160000.6.1 * kernel-default-extra-6.12.0-160000.6.1 * cluster-md-kmp-default-debuginfo-6.12.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (nosrc ppc64le x86_64) * kernel-kvmsmall-6.12.0-160000.6.1 * kernel-default-6.12.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * kernel-kvmsmall-vdso-6.12.0-160000.6.1 * kernel-default-devel-debuginfo-6.12.0-160000.6.1 * kernel-default-vdso-6.12.0-160000.6.1 * kernel-default-vdso-debuginfo-6.12.0-160000.6.1 * kernel-kvmsmall-devel-debuginfo-6.12.0-160000.6.1 * kernel-kvmsmall-vdso-debuginfo-6.12.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch nosrc) * kernel-docs-6.12.0-160000.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-57891.html * https://www.suse.com/security/cve/CVE-2024-57951.html * https://www.suse.com/security/cve/CVE-2024-57952.html * https://www.suse.com/security/cve/CVE-2024-58090.html * https://www.suse.com/security/cve/CVE-2025-22034.html * https://www.suse.com/security/cve/CVE-2025-22077.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37821.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37856.html * https://www.suse.com/security/cve/CVE-2025-37861.html * https://www.suse.com/security/cve/CVE-2025-37864.html * https://www.suse.com/security/cve/CVE-2025-38006.html * https://www.suse.com/security/cve/CVE-2025-38008.html * https://www.suse.com/security/cve/CVE-2025-38019.html * https://www.suse.com/security/cve/CVE-2025-38034.html * https://www.suse.com/security/cve/CVE-2025-38038.html * https://www.suse.com/security/cve/CVE-2025-38052.html * https://www.suse.com/security/cve/CVE-2025-38058.html * https://www.suse.com/security/cve/CVE-2025-38062.html * https://www.suse.com/security/cve/CVE-2025-38075.html * https://www.suse.com/security/cve/CVE-2025-38087.html * https://www.suse.com/security/cve/CVE-2025-38088.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38090.html * https://www.suse.com/security/cve/CVE-2025-38091.html * https://www.suse.com/security/cve/CVE-2025-38095.html * https://www.suse.com/security/cve/CVE-2025-38096.html * https://www.suse.com/security/cve/CVE-2025-38098.html * https://www.suse.com/security/cve/CVE-2025-38099.html * https://www.suse.com/security/cve/CVE-2025-38101.html * https://www.suse.com/security/cve/CVE-2025-38102.html * https://www.suse.com/security/cve/CVE-2025-38103.html * https://www.suse.com/security/cve/CVE-2025-38106.html * https://www.suse.com/security/cve/CVE-2025-38107.html * https://www.suse.com/security/cve/CVE-2025-38108.html * https://www.suse.com/security/cve/CVE-2025-38109.html * https://www.suse.com/security/cve/CVE-2025-38110.html * https://www.suse.com/security/cve/CVE-2025-38111.html * https://www.suse.com/security/cve/CVE-2025-38112.html * https://www.suse.com/security/cve/CVE-2025-38113.html * https://www.suse.com/security/cve/CVE-2025-38114.html * https://www.suse.com/security/cve/CVE-2025-38117.html * https://www.suse.com/security/cve/CVE-2025-38118.html * https://www.suse.com/security/cve/CVE-2025-38119.html * https://www.suse.com/security/cve/CVE-2025-38120.html * https://www.suse.com/security/cve/CVE-2025-38122.html * https://www.suse.com/security/cve/CVE-2025-38123.html * https://www.suse.com/security/cve/CVE-2025-38124.html * https://www.suse.com/security/cve/CVE-2025-38125.html * https://www.suse.com/security/cve/CVE-2025-38127.html * https://www.suse.com/security/cve/CVE-2025-38128.html * https://www.suse.com/security/cve/CVE-2025-38129.html * https://www.suse.com/security/cve/CVE-2025-38134.html * https://www.suse.com/security/cve/CVE-2025-38135.html * https://www.suse.com/security/cve/CVE-2025-38136.html * https://www.suse.com/security/cve/CVE-2025-38137.html * https://www.suse.com/security/cve/CVE-2025-38138.html * https://www.suse.com/security/cve/CVE-2025-38140.html * https://www.suse.com/security/cve/CVE-2025-38141.html * https://www.suse.com/security/cve/CVE-2025-38142.html * https://www.suse.com/security/cve/CVE-2025-38143.html * https://www.suse.com/security/cve/CVE-2025-38145.html * https://www.suse.com/security/cve/CVE-2025-38146.html * https://www.suse.com/security/cve/CVE-2025-38148.html * https://www.suse.com/security/cve/CVE-2025-38149.html * https://www.suse.com/security/cve/CVE-2025-38151.html * https://www.suse.com/security/cve/CVE-2025-38153.html * https://www.suse.com/security/cve/CVE-2025-38154.html * https://www.suse.com/security/cve/CVE-2025-38155.html * https://www.suse.com/security/cve/CVE-2025-38156.html * https://www.suse.com/security/cve/CVE-2025-38157.html * https://www.suse.com/security/cve/CVE-2025-38159.html * https://www.suse.com/security/cve/CVE-2025-38160.html * https://www.suse.com/security/cve/CVE-2025-38161.html * https://www.suse.com/security/cve/CVE-2025-38165.html * https://www.suse.com/security/cve/CVE-2025-38168.html * https://www.suse.com/security/cve/CVE-2025-38169.html * https://www.suse.com/security/cve/CVE-2025-38170.html * https://www.suse.com/security/cve/CVE-2025-38172.html * https://www.suse.com/security/cve/CVE-2025-38173.html * https://www.suse.com/security/cve/CVE-2025-38174.html * https://www.suse.com/security/cve/CVE-2025-38177.html * https://www.suse.com/security/cve/CVE-2025-38180.html * https://www.suse.com/security/cve/CVE-2025-38181.html * https://www.suse.com/security/cve/CVE-2025-38182.html * https://www.suse.com/security/cve/CVE-2025-38184.html * https://www.suse.com/security/cve/CVE-2025-38185.html * https://www.suse.com/security/cve/CVE-2025-38186.html * https://www.suse.com/security/cve/CVE-2025-38188.html * https://www.suse.com/security/cve/CVE-2025-38189.html * https://www.suse.com/security/cve/CVE-2025-38190.html * https://www.suse.com/security/cve/CVE-2025-38193.html * https://www.suse.com/security/cve/CVE-2025-38197.html * https://www.suse.com/security/cve/CVE-2025-38198.html * https://www.suse.com/security/cve/CVE-2025-38201.html * https://www.suse.com/security/cve/CVE-2025-38205.html * https://www.suse.com/security/cve/CVE-2025-38208.html * https://www.suse.com/security/cve/CVE-2025-38209.html * https://www.suse.com/security/cve/CVE-2025-38211.html * https://www.suse.com/security/cve/CVE-2025-38213.html * https://www.suse.com/security/cve/CVE-2025-38214.html * https://www.suse.com/security/cve/CVE-2025-38215.html * https://www.suse.com/security/cve/CVE-2025-38216.html * https://www.suse.com/security/cve/CVE-2025-38217.html * https://www.suse.com/security/cve/CVE-2025-38220.html * https://www.suse.com/security/cve/CVE-2025-38222.html * https://www.suse.com/security/cve/CVE-2025-38224.html * https://www.suse.com/security/cve/CVE-2025-38225.html * https://www.suse.com/security/cve/CVE-2025-38226.html * https://www.suse.com/security/cve/CVE-2025-38227.html * https://www.suse.com/security/cve/CVE-2025-38228.html * https://www.suse.com/security/cve/CVE-2025-38229.html * https://www.suse.com/security/cve/CVE-2025-38231.html * https://www.suse.com/security/cve/CVE-2025-38232.html * https://www.suse.com/security/cve/CVE-2025-38233.html * https://www.suse.com/security/cve/CVE-2025-38234.html * https://www.suse.com/security/cve/CVE-2025-38242.html * https://www.suse.com/security/cve/CVE-2025-38244.html * https://www.suse.com/security/cve/CVE-2025-38245.html * https://www.suse.com/security/cve/CVE-2025-38246.html * https://www.suse.com/security/cve/CVE-2025-38249.html * https://www.suse.com/security/cve/CVE-2025-38251.html * https://www.suse.com/security/cve/CVE-2025-38253.html * https://www.suse.com/security/cve/CVE-2025-38255.html * https://www.suse.com/security/cve/CVE-2025-38256.html * https://www.suse.com/security/cve/CVE-2025-38257.html * https://www.suse.com/security/cve/CVE-2025-38258.html * https://www.suse.com/security/cve/CVE-2025-38259.html * https://www.suse.com/security/cve/CVE-2025-38263.html * https://www.suse.com/security/cve/CVE-2025-38265.html * https://www.suse.com/security/cve/CVE-2025-38267.html * https://www.suse.com/security/cve/CVE-2025-38268.html * https://www.suse.com/security/cve/CVE-2025-38270.html * https://www.suse.com/security/cve/CVE-2025-38272.html * https://www.suse.com/security/cve/CVE-2025-38273.html * https://www.suse.com/security/cve/CVE-2025-38274.html * https://www.suse.com/security/cve/CVE-2025-38275.html * https://www.suse.com/security/cve/CVE-2025-38277.html * https://www.suse.com/security/cve/CVE-2025-38278.html * https://www.suse.com/security/cve/CVE-2025-38286.html * https://www.suse.com/security/cve/CVE-2025-38287.html * https://www.suse.com/security/cve/CVE-2025-38288.html * https://www.suse.com/security/cve/CVE-2025-38289.html * https://www.suse.com/security/cve/CVE-2025-38290.html * https://www.suse.com/security/cve/CVE-2025-38291.html * https://www.suse.com/security/cve/CVE-2025-38292.html * https://www.suse.com/security/cve/CVE-2025-38293.html * https://www.suse.com/security/cve/CVE-2025-38299.html * https://www.suse.com/security/cve/CVE-2025-38300.html * https://www.suse.com/security/cve/CVE-2025-38301.html * https://www.suse.com/security/cve/CVE-2025-38302.html * https://www.suse.com/security/cve/CVE-2025-38303.html * https://www.suse.com/security/cve/CVE-2025-38304.html * https://www.suse.com/security/cve/CVE-2025-38305.html * https://www.suse.com/security/cve/CVE-2025-38306.html * https://www.suse.com/security/cve/CVE-2025-38307.html * https://www.suse.com/security/cve/CVE-2025-38311.html * https://www.suse.com/security/cve/CVE-2025-38312.html * https://www.suse.com/security/cve/CVE-2025-38313.html * https://www.suse.com/security/cve/CVE-2025-38315.html * https://www.suse.com/security/cve/CVE-2025-38317.html * https://www.suse.com/security/cve/CVE-2025-38318.html * https://www.suse.com/security/cve/CVE-2025-38319.html * https://www.suse.com/security/cve/CVE-2025-38322.html * https://www.suse.com/security/cve/CVE-2025-38323.html * https://www.suse.com/security/cve/CVE-2025-38326.html * https://www.suse.com/security/cve/CVE-2025-38332.html * https://www.suse.com/security/cve/CVE-2025-38335.html * https://www.suse.com/security/cve/CVE-2025-38336.html * https://www.suse.com/security/cve/CVE-2025-38337.html * https://www.suse.com/security/cve/CVE-2025-38338.html * https://www.suse.com/security/cve/CVE-2025-38339.html * https://www.suse.com/security/cve/CVE-2025-38341.html * https://www.suse.com/security/cve/CVE-2025-38342.html * https://www.suse.com/security/cve/CVE-2025-38343.html * https://www.suse.com/security/cve/CVE-2025-38344.html * https://www.suse.com/security/cve/CVE-2025-38345.html * https://www.suse.com/security/cve/CVE-2025-38348.html * https://www.suse.com/security/cve/CVE-2025-38349.html * https://www.suse.com/security/cve/CVE-2025-38350.html * https://www.suse.com/security/cve/CVE-2025-38351.html * https://www.suse.com/security/cve/CVE-2025-38352.html * https://www.suse.com/security/cve/CVE-2025-38353.html * https://www.suse.com/security/cve/CVE-2025-38354.html * https://www.suse.com/security/cve/CVE-2025-38355.html * https://www.suse.com/security/cve/CVE-2025-38356.html * https://www.suse.com/security/cve/CVE-2025-38359.html * https://www.suse.com/security/cve/CVE-2025-38360.html * https://www.suse.com/security/cve/CVE-2025-38361.html * https://www.suse.com/security/cve/CVE-2025-38362.html * https://www.suse.com/security/cve/CVE-2025-38363.html * https://www.suse.com/security/cve/CVE-2025-38364.html * https://www.suse.com/security/cve/CVE-2025-38365.html * https://www.suse.com/security/cve/CVE-2025-38368.html * https://www.suse.com/security/cve/CVE-2025-38369.html * https://www.suse.com/security/cve/CVE-2025-38371.html * https://www.suse.com/security/cve/CVE-2025-38372.html * https://www.suse.com/security/cve/CVE-2025-38373.html * https://www.suse.com/security/cve/CVE-2025-38374.html * https://www.suse.com/security/cve/CVE-2025-38375.html * https://www.suse.com/security/cve/CVE-2025-38376.html * https://www.suse.com/security/cve/CVE-2025-38377.html * https://www.suse.com/security/cve/CVE-2025-38380.html * https://www.suse.com/security/cve/CVE-2025-38381.html * https://www.suse.com/security/cve/CVE-2025-38382.html * https://www.suse.com/security/cve/CVE-2025-38383.html * https://www.suse.com/security/cve/CVE-2025-38384.html * https://www.suse.com/security/cve/CVE-2025-38385.html * https://www.suse.com/security/cve/CVE-2025-38386.html * https://www.suse.com/security/cve/CVE-2025-38387.html * https://www.suse.com/security/cve/CVE-2025-38389.html * https://www.suse.com/security/cve/CVE-2025-38390.html * https://www.suse.com/security/cve/CVE-2025-38391.html * https://www.suse.com/security/cve/CVE-2025-38392.html * https://www.suse.com/security/cve/CVE-2025-38393.html * https://www.suse.com/security/cve/CVE-2025-38395.html * https://www.suse.com/security/cve/CVE-2025-38396.html * https://www.suse.com/security/cve/CVE-2025-38397.html * https://www.suse.com/security/cve/CVE-2025-38399.html * https://www.suse.com/security/cve/CVE-2025-38400.html * https://www.suse.com/security/cve/CVE-2025-38401.html * https://www.suse.com/security/cve/CVE-2025-38402.html * https://www.suse.com/security/cve/CVE-2025-38403.html * https://www.suse.com/security/cve/CVE-2025-38404.html * https://www.suse.com/security/cve/CVE-2025-38405.html * https://www.suse.com/security/cve/CVE-2025-38406.html * https://www.suse.com/security/cve/CVE-2025-38408.html * https://www.suse.com/security/cve/CVE-2025-38409.html * https://www.suse.com/security/cve/CVE-2025-38410.html * https://www.suse.com/security/cve/CVE-2025-38412.html * https://www.suse.com/security/cve/CVE-2025-38413.html * https://www.suse.com/security/cve/CVE-2025-38414.html * https://www.suse.com/security/cve/CVE-2025-38415.html * https://www.suse.com/security/cve/CVE-2025-38416.html * https://www.suse.com/security/cve/CVE-2025-38417.html * https://www.suse.com/security/cve/CVE-2025-38418.html * https://www.suse.com/security/cve/CVE-2025-38419.html * https://www.suse.com/security/cve/CVE-2025-38420.html * https://www.suse.com/security/cve/CVE-2025-38421.html * https://www.suse.com/security/cve/CVE-2025-38424.html * https://www.suse.com/security/cve/CVE-2025-38425.html * https://www.suse.com/security/cve/CVE-2025-38426.html * https://www.suse.com/security/cve/CVE-2025-38427.html * https://www.suse.com/security/cve/CVE-2025-38428.html * https://www.suse.com/security/cve/CVE-2025-38429.html * https://www.suse.com/security/cve/CVE-2025-38430.html * https://www.suse.com/security/cve/CVE-2025-38436.html * https://www.suse.com/security/cve/CVE-2025-38438.html * https://www.suse.com/security/cve/CVE-2025-38439.html * https://www.suse.com/security/cve/CVE-2025-38440.html * https://www.suse.com/security/cve/CVE-2025-38441.html * https://www.suse.com/security/cve/CVE-2025-38443.html * https://www.suse.com/security/cve/CVE-2025-38444.html * https://www.suse.com/security/cve/CVE-2025-38445.html * https://www.suse.com/security/cve/CVE-2025-38446.html * https://www.suse.com/security/cve/CVE-2025-38448.html * https://www.suse.com/security/cve/CVE-2025-38449.html * https://www.suse.com/security/cve/CVE-2025-38450.html * https://www.suse.com/security/cve/CVE-2025-38451.html * https://www.suse.com/security/cve/CVE-2025-38453.html * https://www.suse.com/security/cve/CVE-2025-38454.html * https://www.suse.com/security/cve/CVE-2025-38455.html * https://www.suse.com/security/cve/CVE-2025-38456.html * https://www.suse.com/security/cve/CVE-2025-38457.html * https://www.suse.com/security/cve/CVE-2025-38458.html * https://www.suse.com/security/cve/CVE-2025-38459.html * https://www.suse.com/security/cve/CVE-2025-38460.html * https://www.suse.com/security/cve/CVE-2025-38461.html * https://www.suse.com/security/cve/CVE-2025-38462.html * https://www.suse.com/security/cve/CVE-2025-38463.html * https://www.suse.com/security/cve/CVE-2025-38464.html * https://www.suse.com/security/cve/CVE-2025-38465.html * https://www.suse.com/security/cve/CVE-2025-38466.html * https://www.suse.com/security/cve/CVE-2025-38467.html * https://www.suse.com/security/cve/CVE-2025-38468.html * https://www.suse.com/security/cve/CVE-2025-38470.html * https://www.suse.com/security/cve/CVE-2025-38472.html * https://www.suse.com/security/cve/CVE-2025-38473.html * https://www.suse.com/security/cve/CVE-2025-38474.html * https://www.suse.com/security/cve/CVE-2025-38475.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://www.suse.com/security/cve/CVE-2025-38478.html * https://www.suse.com/security/cve/CVE-2025-38480.html * https://www.suse.com/security/cve/CVE-2025-38481.html * https://www.suse.com/security/cve/CVE-2025-38482.html * https://www.suse.com/security/cve/CVE-2025-38483.html * https://www.suse.com/security/cve/CVE-2025-38484.html * https://www.suse.com/security/cve/CVE-2025-38485.html * https://www.suse.com/security/cve/CVE-2025-38487.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38489.html * https://www.suse.com/security/cve/CVE-2025-38490.html * https://www.suse.com/security/cve/CVE-2025-38491.html * https://www.suse.com/security/cve/CVE-2025-38493.html * https://www.suse.com/security/cve/CVE-2025-38494.html * https://www.suse.com/security/cve/CVE-2025-38495.html * https://www.suse.com/security/cve/CVE-2025-38496.html * https://www.suse.com/security/cve/CVE-2025-38497.html * https://www.suse.com/security/cve/CVE-2025-38499.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38503.html * https://www.suse.com/security/cve/CVE-2025-38506.html * https://www.suse.com/security/cve/CVE-2025-38508.html * https://www.suse.com/security/cve/CVE-2025-38514.html * https://www.suse.com/security/cve/CVE-2025-38524.html * https://www.suse.com/security/cve/CVE-2025-38526.html * https://www.suse.com/security/cve/CVE-2025-38527.html * https://www.suse.com/security/cve/CVE-2025-38528.html * https://www.suse.com/security/cve/CVE-2025-38531.html * https://www.suse.com/security/cve/CVE-2025-38533.html * https://www.suse.com/security/cve/CVE-2025-38539.html * https://www.suse.com/security/cve/CVE-2025-38544.html * https://www.suse.com/security/cve/CVE-2025-38545.html * https://www.suse.com/security/cve/CVE-2025-38546.html * https://www.suse.com/security/cve/CVE-2025-38549.html * https://www.suse.com/security/cve/CVE-2025-38552.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38554.html * https://www.suse.com/security/cve/CVE-2025-38555.html * https://www.suse.com/security/cve/CVE-2025-38556.html * https://www.suse.com/security/cve/CVE-2025-38557.html * https://www.suse.com/security/cve/CVE-2025-38559.html * https://www.suse.com/security/cve/CVE-2025-38560.html * https://www.suse.com/security/cve/CVE-2025-38563.html * https://www.suse.com/security/cve/CVE-2025-38564.html * https://www.suse.com/security/cve/CVE-2025-38565.html * https://www.suse.com/security/cve/CVE-2025-38566.html * https://www.suse.com/security/cve/CVE-2025-38568.html * https://www.suse.com/security/cve/CVE-2025-38571.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38573.html * https://www.suse.com/security/cve/CVE-2025-38574.html * https://www.suse.com/security/cve/CVE-2025-38576.html * https://www.suse.com/security/cve/CVE-2025-38581.html * https://www.suse.com/security/cve/CVE-2025-38582.html * https://www.suse.com/security/cve/CVE-2025-38583.html * https://www.suse.com/security/cve/CVE-2025-38584.html * https://www.suse.com/security/cve/CVE-2025-38585.html * https://www.suse.com/security/cve/CVE-2025-38586.html * https://www.suse.com/security/cve/CVE-2025-38587.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38591.html * https://www.suse.com/security/cve/CVE-2025-38593.html * https://www.suse.com/security/cve/CVE-2025-38595.html * https://www.suse.com/security/cve/CVE-2025-38597.html * https://www.suse.com/security/cve/CVE-2025-38601.html * https://www.suse.com/security/cve/CVE-2025-38602.html * https://www.suse.com/security/cve/CVE-2025-38604.html * https://www.suse.com/security/cve/CVE-2025-38605.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-38609.html * https://www.suse.com/security/cve/CVE-2025-38610.html * https://www.suse.com/security/cve/CVE-2025-38612.html * https://www.suse.com/security/cve/CVE-2025-38614.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38619.html * https://www.suse.com/security/cve/CVE-2025-38621.html * https://www.suse.com/security/cve/CVE-2025-38622.html * https://www.suse.com/security/cve/CVE-2025-38623.html * https://www.suse.com/security/cve/CVE-2025-38624.html * https://www.suse.com/security/cve/CVE-2025-38628.html * https://www.suse.com/security/cve/CVE-2025-38630.html * https://www.suse.com/security/cve/CVE-2025-38631.html * https://www.suse.com/security/cve/CVE-2025-38632.html * https://www.suse.com/security/cve/CVE-2025-38634.html * https://www.suse.com/security/cve/CVE-2025-38635.html * https://www.suse.com/security/cve/CVE-2025-38639.html * https://www.suse.com/security/cve/CVE-2025-38640.html * https://www.suse.com/security/cve/CVE-2025-38643.html * https://www.suse.com/security/cve/CVE-2025-38644.html * https://www.suse.com/security/cve/CVE-2025-38646.html * https://www.suse.com/security/cve/CVE-2025-38648.html * https://www.suse.com/security/cve/CVE-2025-38656.html * https://www.suse.com/security/cve/CVE-2025-38658.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38660.html * https://www.suse.com/security/cve/CVE-2025-38662.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38665.html * https://www.suse.com/security/cve/CVE-2025-38668.html * https://www.suse.com/security/cve/CVE-2025-38670.html * https://www.suse.com/security/cve/CVE-2025-38671.html * https://www.suse.com/security/cve/CVE-2025-38676.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38679.html * https://www.suse.com/security/cve/CVE-2025-38680.html * https://www.suse.com/security/cve/CVE-2025-38681.html * https://www.suse.com/security/cve/CVE-2025-38683.html * https://www.suse.com/security/cve/CVE-2025-38684.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38686.html * https://www.suse.com/security/cve/CVE-2025-38687.html * https://www.suse.com/security/cve/CVE-2025-38691.html * https://www.suse.com/security/cve/CVE-2025-38692.html * https://www.suse.com/security/cve/CVE-2025-38693.html * https://www.suse.com/security/cve/CVE-2025-38694.html * https://www.suse.com/security/cve/CVE-2025-38695.html * https://www.suse.com/security/cve/CVE-2025-38700.html * https://www.suse.com/security/cve/CVE-2025-38701.html * https://www.suse.com/security/cve/CVE-2025-38702.html * https://www.suse.com/security/cve/CVE-2025-38703.html * https://www.suse.com/security/cve/CVE-2025-38705.html * https://www.suse.com/security/cve/CVE-2025-38706.html * https://www.suse.com/security/cve/CVE-2025-38709.html * https://www.suse.com/security/cve/CVE-2025-38710.html * https://www.suse.com/security/cve/CVE-2025-38717.html * https://www.suse.com/security/cve/CVE-2025-38721.html * https://www.suse.com/security/cve/CVE-2025-38722.html * https://www.suse.com/security/cve/CVE-2025-38724.html * https://www.suse.com/security/cve/CVE-2025-38725.html * https://www.suse.com/security/cve/CVE-2025-38727.html * https://www.suse.com/security/cve/CVE-2025-38729.html * https://www.suse.com/security/cve/CVE-2025-38730.html * https://www.suse.com/security/cve/CVE-2025-38732.html * https://www.suse.com/security/cve/CVE-2025-38733.html * https://www.suse.com/security/cve/CVE-2025-38734.html * https://www.suse.com/security/cve/CVE-2025-38735.html * https://www.suse.com/security/cve/CVE-2025-38736.html * https://www.suse.com/security/cve/CVE-2025-39673.html * https://www.suse.com/security/cve/CVE-2025-39675.html * https://www.suse.com/security/cve/CVE-2025-39677.html * https://www.suse.com/security/cve/CVE-2025-39678.html * https://www.suse.com/security/cve/CVE-2025-39679.html * https://www.suse.com/security/cve/CVE-2025-39681.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-39683.html * https://www.suse.com/security/cve/CVE-2025-39684.html * https://www.suse.com/security/cve/CVE-2025-39685.html * https://www.suse.com/security/cve/CVE-2025-39686.html * https://www.suse.com/security/cve/CVE-2025-39687.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39693.html * https://www.suse.com/security/cve/CVE-2025-39694.html * https://www.suse.com/security/cve/CVE-2025-39695.html * https://www.suse.com/security/cve/CVE-2025-39697.html * https://www.suse.com/security/cve/CVE-2025-39698.html * https://www.suse.com/security/cve/CVE-2025-39700.html * https://www.suse.com/security/cve/CVE-2025-39701.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39705.html * https://www.suse.com/security/cve/CVE-2025-39706.html * https://www.suse.com/security/cve/CVE-2025-39707.html * https://www.suse.com/security/cve/CVE-2025-39709.html * https://www.suse.com/security/cve/CVE-2025-39710.html * https://www.suse.com/security/cve/CVE-2025-39711.html * https://www.suse.com/security/cve/CVE-2025-39712.html * https://www.suse.com/security/cve/CVE-2025-39713.html * https://www.suse.com/security/cve/CVE-2025-39714.html * https://www.suse.com/security/cve/CVE-2025-39718.html * https://www.suse.com/security/cve/CVE-2025-39719.html * https://www.suse.com/security/cve/CVE-2025-39721.html * https://www.suse.com/security/cve/CVE-2025-39722.html * https://www.suse.com/security/cve/CVE-2025-39723.html * https://www.suse.com/security/cve/CVE-2025-39724.html * https://www.suse.com/security/cve/CVE-2025-39726.html * https://www.suse.com/security/cve/CVE-2025-39727.html * https://www.suse.com/security/cve/CVE-2025-39730.html * https://www.suse.com/security/cve/CVE-2025-39732.html * https://www.suse.com/security/cve/CVE-2025-39738.html * https://www.suse.com/security/cve/CVE-2025-39739.html * https://www.suse.com/security/cve/CVE-2025-39742.html * https://www.suse.com/security/cve/CVE-2025-39744.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39747.html * https://www.suse.com/security/cve/CVE-2025-39748.html * https://www.suse.com/security/cve/CVE-2025-39749.html * https://www.suse.com/security/cve/CVE-2025-39750.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39754.html * https://www.suse.com/security/cve/CVE-2025-39757.html * https://www.suse.com/security/cve/CVE-2025-39758.html * https://www.suse.com/security/cve/CVE-2025-39759.html * https://www.suse.com/security/cve/CVE-2025-39760.html * https://www.suse.com/security/cve/CVE-2025-39761.html * https://www.suse.com/security/cve/CVE-2025-39763.html * https://www.suse.com/security/cve/CVE-2025-39764.html * https://www.suse.com/security/cve/CVE-2025-39765.html * https://www.suse.com/security/cve/CVE-2025-39766.html * https://www.suse.com/security/cve/CVE-2025-39770.html * https://www.suse.com/security/cve/CVE-2025-39772.html * https://www.suse.com/security/cve/CVE-2025-39773.html * https://www.suse.com/security/cve/CVE-2025-39775.html * https://www.suse.com/security/cve/CVE-2025-39782.html * https://www.suse.com/security/cve/CVE-2025-39783.html * https://www.suse.com/security/cve/CVE-2025-39787.html * https://www.suse.com/security/cve/CVE-2025-39788.html * https://www.suse.com/security/cve/CVE-2025-39790.html * https://www.suse.com/security/cve/CVE-2025-39791.html * https://www.suse.com/security/cve/CVE-2025-39792.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39798.html * https://www.suse.com/security/cve/CVE-2025-39800.html * https://www.suse.com/security/cve/CVE-2025-39801.html * https://www.suse.com/security/cve/CVE-2025-39806.html * https://www.suse.com/security/cve/CVE-2025-39807.html * https://www.suse.com/security/cve/CVE-2025-39808.html * https://www.suse.com/security/cve/CVE-2025-39810.html * https://www.suse.com/security/cve/CVE-2025-39811.html * https://www.suse.com/security/cve/CVE-2025-39813.html * https://www.suse.com/security/cve/CVE-2025-39816.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://www.suse.com/security/cve/CVE-2025-39824.html * https://www.suse.com/security/cve/CVE-2025-39825.html * https://www.suse.com/security/cve/CVE-2025-39826.html * https://www.suse.com/security/cve/CVE-2025-39827.html * https://www.suse.com/security/cve/CVE-2025-39828.html * https://www.suse.com/security/cve/CVE-2025-39830.html * https://www.suse.com/security/cve/CVE-2025-39832.html * https://www.suse.com/security/cve/CVE-2025-39833.html * https://www.suse.com/security/cve/CVE-2025-39834.html * https://www.suse.com/security/cve/CVE-2025-39835.html * https://www.suse.com/security/cve/CVE-2025-39836.html * https://www.suse.com/security/cve/CVE-2025-39838.html * https://www.suse.com/security/cve/CVE-2025-39839.html * https://www.suse.com/security/cve/CVE-2025-39841.html * https://www.suse.com/security/cve/CVE-2025-39842.html * https://www.suse.com/security/cve/CVE-2025-39844.html * https://www.suse.com/security/cve/CVE-2025-39845.html * https://www.suse.com/security/cve/CVE-2025-39847.html * https://www.suse.com/security/cve/CVE-2025-39848.html * https://www.suse.com/security/cve/CVE-2025-39849.html * https://www.suse.com/security/cve/CVE-2025-39850.html * https://www.suse.com/security/cve/CVE-2025-39851.html * https://www.suse.com/security/cve/CVE-2025-39852.html * https://www.suse.com/security/cve/CVE-2025-39853.html * https://www.suse.com/security/cve/CVE-2025-39854.html * https://www.suse.com/security/cve/CVE-2025-39857.html * https://www.suse.com/security/cve/CVE-2025-39860.html * https://www.suse.com/security/cve/CVE-2025-39861.html * https://www.suse.com/security/cve/CVE-2025-39863.html * https://www.suse.com/security/cve/CVE-2025-39864.html * https://www.suse.com/security/cve/CVE-2025-39865.html * https://www.suse.com/security/cve/CVE-2025-39869.html * https://www.suse.com/security/cve/CVE-2025-39870.html * https://www.suse.com/security/cve/CVE-2025-39871.html * https://www.suse.com/security/cve/CVE-2025-39873.html * https://www.suse.com/security/cve/CVE-2025-39875.html * https://www.suse.com/security/cve/CVE-2025-39877.html * https://www.suse.com/security/cve/CVE-2025-39882.html * https://www.suse.com/security/cve/CVE-2025-39884.html * https://www.suse.com/security/cve/CVE-2025-39885.html * https://www.suse.com/security/cve/CVE-2025-39889.html * https://www.suse.com/security/cve/CVE-2025-39890.html * https://www.suse.com/security/cve/CVE-2025-39891.html * https://www.suse.com/security/cve/CVE-2025-39896.html * https://www.suse.com/security/cve/CVE-2025-39898.html * https://www.suse.com/security/cve/CVE-2025-39899.html * https://www.suse.com/security/cve/CVE-2025-39900.html * https://www.suse.com/security/cve/CVE-2025-39902.html * https://www.suse.com/security/cve/CVE-2025-39907.html * https://www.suse.com/security/cve/CVE-2025-39909.html * https://www.suse.com/security/cve/CVE-2025-39916.html * https://www.suse.com/security/cve/CVE-2025-39918.html * https://www.suse.com/security/cve/CVE-2025-39922.html * https://www.suse.com/security/cve/CVE-2025-39923.html * https://www.suse.com/security/cve/CVE-2025-39925.html * https://www.suse.com/security/cve/CVE-2025-39926.html * https://www.suse.com/security/cve/CVE-2025-39931.html * https://www.suse.com/security/cve/CVE-2025-39934.html * https://www.suse.com/security/cve/CVE-2025-39937.html * https://www.suse.com/security/cve/CVE-2025-39938.html * https://www.suse.com/security/cve/CVE-2025-39945.html * https://www.suse.com/security/cve/CVE-2025-39946.html * https://www.suse.com/security/cve/CVE-2025-39952.html * https://www.suse.com/security/cve/CVE-2025-39957.html * https://www.suse.com/security/cve/CVE-2025-40300.html * https://www.suse.com/security/cve/CVE-2026-38264.html * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1230062 * https://bugzilla.suse.com/show_bug.cgi?id=1234634 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1235953 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1237108 * https://bugzilla.suse.com/show_bug.cgi?id=1237131 * https://bugzilla.suse.com/show_bug.cgi?id=1237542 * https://bugzilla.suse.com/show_bug.cgi?id=1237776 * https://bugzilla.suse.com/show_bug.cgi?id=1238972 * https://bugzilla.suse.com/show_bug.cgi?id=1239206 * https://bugzilla.suse.com/show_bug.cgi?id=1240324 * https://bugzilla.suse.com/show_bug.cgi?id=1240696 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1240998 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1241403 * https://bugzilla.suse.com/show_bug.cgi?id=1241435 * https://bugzilla.suse.com/show_bug.cgi?id=1242034 * https://bugzilla.suse.com/show_bug.cgi?id=1242086 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242864 * https://bugzilla.suse.com/show_bug.cgi?id=1242965 * https://bugzilla.suse.com/show_bug.cgi?id=1242995 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243055 * https://bugzilla.suse.com/show_bug.cgi?id=1243068 * https://bugzilla.suse.com/show_bug.cgi?id=1243100 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1243774 * https://bugzilla.suse.com/show_bug.cgi?id=1244309 * https://bugzilla.suse.com/show_bug.cgi?id=1244723 * https://bugzilla.suse.com/show_bug.cgi?id=1244734 * https://bugzilla.suse.com/show_bug.cgi?id=1244749 * https://bugzilla.suse.com/show_bug.cgi?id=1244792 * https://bugzilla.suse.com/show_bug.cgi?id=1244812 * https://bugzilla.suse.com/show_bug.cgi?id=1244930 * https://bugzilla.suse.com/show_bug.cgi?id=1244939 * https://bugzilla.suse.com/show_bug.cgi?id=1245000 * https://bugzilla.suse.com/show_bug.cgi?id=1245151 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245206 * https://bugzilla.suse.com/show_bug.cgi?id=1245216 * https://bugzilla.suse.com/show_bug.cgi?id=1245260 * https://bugzilla.suse.com/show_bug.cgi?id=1245410 * https://bugzilla.suse.com/show_bug.cgi?id=1245457 * https://bugzilla.suse.com/show_bug.cgi?id=1245504 * https://bugzilla.suse.com/show_bug.cgi?id=1245506 * https://bugzilla.suse.com/show_bug.cgi?id=1245508 * https://bugzilla.suse.com/show_bug.cgi?id=1245510 * https://bugzilla.suse.com/show_bug.cgi?id=1245596 * https://bugzilla.suse.com/show_bug.cgi?id=1245621 * https://bugzilla.suse.com/show_bug.cgi?id=1245630 * https://bugzilla.suse.com/show_bug.cgi?id=1245654 * https://bugzilla.suse.com/show_bug.cgi?id=1245657 * https://bugzilla.suse.com/show_bug.cgi?id=1245658 * https://bugzilla.suse.com/show_bug.cgi?id=1245659 * https://bugzilla.suse.com/show_bug.cgi?id=1245663 * https://bugzilla.suse.com/show_bug.cgi?id=1245664 * https://bugzilla.suse.com/show_bug.cgi?id=1245665 * https://bugzilla.suse.com/show_bug.cgi?id=1245666 * https://bugzilla.suse.com/show_bug.cgi?id=1245668 * https://bugzilla.suse.com/show_bug.cgi?id=1245669 * https://bugzilla.suse.com/show_bug.cgi?id=1245670 * https://bugzilla.suse.com/show_bug.cgi?id=1245671 * https://bugzilla.suse.com/show_bug.cgi?id=1245675 * https://bugzilla.suse.com/show_bug.cgi?id=1245676 * https://bugzilla.suse.com/show_bug.cgi?id=1245678 * https://bugzilla.suse.com/show_bug.cgi?id=1245683 * https://bugzilla.suse.com/show_bug.cgi?id=1245684 * https://bugzilla.suse.com/show_bug.cgi?id=1245686 * https://bugzilla.suse.com/show_bug.cgi?id=1245688 * https://bugzilla.suse.com/show_bug.cgi?id=1245690 * https://bugzilla.suse.com/show_bug.cgi?id=1245691 * https://bugzilla.suse.com/show_bug.cgi?id=1245695 * https://bugzilla.suse.com/show_bug.cgi?id=1245700 * https://bugzilla.suse.com/show_bug.cgi?id=1245703 * https://bugzilla.suse.com/show_bug.cgi?id=1245705 * https://bugzilla.suse.com/show_bug.cgi?id=1245710 * https://bugzilla.suse.com/show_bug.cgi?id=1245711 * https://bugzilla.suse.com/show_bug.cgi?id=1245713 * https://bugzilla.suse.com/show_bug.cgi?id=1245714 * https://bugzilla.suse.com/show_bug.cgi?id=1245715 * https://bugzilla.suse.com/show_bug.cgi?id=1245717 * https://bugzilla.suse.com/show_bug.cgi?id=1245719 * https://bugzilla.suse.com/show_bug.cgi?id=1245721 * https://bugzilla.suse.com/show_bug.cgi?id=1245723 * https://bugzilla.suse.com/show_bug.cgi?id=1245726 * https://bugzilla.suse.com/show_bug.cgi?id=1245728 * https://bugzilla.suse.com/show_bug.cgi?id=1245729 * https://bugzilla.suse.com/show_bug.cgi?id=1245730 * https://bugzilla.suse.com/show_bug.cgi?id=1245731 * https://bugzilla.suse.com/show_bug.cgi?id=1245735 * https://bugzilla.suse.com/show_bug.cgi?id=1245737 * https://bugzilla.suse.com/show_bug.cgi?id=1245744 * https://bugzilla.suse.com/show_bug.cgi?id=1245745 * https://bugzilla.suse.com/show_bug.cgi?id=1245746 * https://bugzilla.suse.com/show_bug.cgi?id=1245747 * https://bugzilla.suse.com/show_bug.cgi?id=1245748 * https://bugzilla.suse.com/show_bug.cgi?id=1245749 * https://bugzilla.suse.com/show_bug.cgi?id=1245751 * https://bugzilla.suse.com/show_bug.cgi?id=1245757 * https://bugzilla.suse.com/show_bug.cgi?id=1245763 * https://bugzilla.suse.com/show_bug.cgi?id=1245765 * https://bugzilla.suse.com/show_bug.cgi?id=1245767 * https://bugzilla.suse.com/show_bug.cgi?id=1245769 * https://bugzilla.suse.com/show_bug.cgi?id=1245777 * https://bugzilla.suse.com/show_bug.cgi?id=1245780 * https://bugzilla.suse.com/show_bug.cgi?id=1245781 * https://bugzilla.suse.com/show_bug.cgi?id=1245784 * https://bugzilla.suse.com/show_bug.cgi?id=1245785 * https://bugzilla.suse.com/show_bug.cgi?id=1245787 * https://bugzilla.suse.com/show_bug.cgi?id=1245812 * https://bugzilla.suse.com/show_bug.cgi?id=1245814 * https://bugzilla.suse.com/show_bug.cgi?id=1245815 * https://bugzilla.suse.com/show_bug.cgi?id=1245937 * https://bugzilla.suse.com/show_bug.cgi?id=1245945 * https://bugzilla.suse.com/show_bug.cgi?id=1245952 * https://bugzilla.suse.com/show_bug.cgi?id=1245955 * https://bugzilla.suse.com/show_bug.cgi?id=1245956 * https://bugzilla.suse.com/show_bug.cgi?id=1245963 * https://bugzilla.suse.com/show_bug.cgi?id=1245966 * https://bugzilla.suse.com/show_bug.cgi?id=1245970 * https://bugzilla.suse.com/show_bug.cgi?id=1245973 * https://bugzilla.suse.com/show_bug.cgi?id=1245976 * https://bugzilla.suse.com/show_bug.cgi?id=1245977 * https://bugzilla.suse.com/show_bug.cgi?id=1245986 * https://bugzilla.suse.com/show_bug.cgi?id=1246000 * https://bugzilla.suse.com/show_bug.cgi?id=1246002 * https://bugzilla.suse.com/show_bug.cgi?id=1246005 * https://bugzilla.suse.com/show_bug.cgi?id=1246008 * https://bugzilla.suse.com/show_bug.cgi?id=1246012 * https://bugzilla.suse.com/show_bug.cgi?id=1246022 * https://bugzilla.suse.com/show_bug.cgi?id=1246023 * https://bugzilla.suse.com/show_bug.cgi?id=1246031 * https://bugzilla.suse.com/show_bug.cgi?id=1246034 * https://bugzilla.suse.com/show_bug.cgi?id=1246037 * https://bugzilla.suse.com/show_bug.cgi?id=1246041 * https://bugzilla.suse.com/show_bug.cgi?id=1246042 * https://bugzilla.suse.com/show_bug.cgi?id=1246047 * https://bugzilla.suse.com/show_bug.cgi?id=1246049 * https://bugzilla.suse.com/show_bug.cgi?id=1246050 * https://bugzilla.suse.com/show_bug.cgi?id=1246053 * https://bugzilla.suse.com/show_bug.cgi?id=1246054 * https://bugzilla.suse.com/show_bug.cgi?id=1246055 * https://bugzilla.suse.com/show_bug.cgi?id=1246057 * https://bugzilla.suse.com/show_bug.cgi?id=1246098 * https://bugzilla.suse.com/show_bug.cgi?id=1246109 * https://bugzilla.suse.com/show_bug.cgi?id=1246125 * https://bugzilla.suse.com/show_bug.cgi?id=1246166 * https://bugzilla.suse.com/show_bug.cgi?id=1246171 * https://bugzilla.suse.com/show_bug.cgi?id=1246176 * https://bugzilla.suse.com/show_bug.cgi?id=1246181 * https://bugzilla.suse.com/show_bug.cgi?id=1246183 * https://bugzilla.suse.com/show_bug.cgi?id=1246185 * https://bugzilla.suse.com/show_bug.cgi?id=1246186 * https://bugzilla.suse.com/show_bug.cgi?id=1246188 * https://bugzilla.suse.com/show_bug.cgi?id=1246190 * https://bugzilla.suse.com/show_bug.cgi?id=1246192 * https://bugzilla.suse.com/show_bug.cgi?id=1246193 * https://bugzilla.suse.com/show_bug.cgi?id=1246195 * https://bugzilla.suse.com/show_bug.cgi?id=1246220 * https://bugzilla.suse.com/show_bug.cgi?id=1246234 * https://bugzilla.suse.com/show_bug.cgi?id=1246236 * https://bugzilla.suse.com/show_bug.cgi?id=1246240 * https://bugzilla.suse.com/show_bug.cgi?id=1246243 * https://bugzilla.suse.com/show_bug.cgi?id=1246244 * https://bugzilla.suse.com/show_bug.cgi?id=1246245 * https://bugzilla.suse.com/show_bug.cgi?id=1246246 * https://bugzilla.suse.com/show_bug.cgi?id=1246248 * https://bugzilla.suse.com/show_bug.cgi?id=1246250 * https://bugzilla.suse.com/show_bug.cgi?id=1246252 * https://bugzilla.suse.com/show_bug.cgi?id=1246253 * https://bugzilla.suse.com/show_bug.cgi?id=1246255 * https://bugzilla.suse.com/show_bug.cgi?id=1246258 * https://bugzilla.suse.com/show_bug.cgi?id=1246259 * https://bugzilla.suse.com/show_bug.cgi?id=1246260 * https://bugzilla.suse.com/show_bug.cgi?id=1246262 * https://bugzilla.suse.com/show_bug.cgi?id=1246266 * https://bugzilla.suse.com/show_bug.cgi?id=1246268 * https://bugzilla.suse.com/show_bug.cgi?id=1246283 * https://bugzilla.suse.com/show_bug.cgi?id=1246285 * https://bugzilla.suse.com/show_bug.cgi?id=1246286 * https://bugzilla.suse.com/show_bug.cgi?id=1246287 * https://bugzilla.suse.com/show_bug.cgi?id=1246290 * https://bugzilla.suse.com/show_bug.cgi?id=1246292 * https://bugzilla.suse.com/show_bug.cgi?id=1246293 * https://bugzilla.suse.com/show_bug.cgi?id=1246295 * https://bugzilla.suse.com/show_bug.cgi?id=1246297 * https://bugzilla.suse.com/show_bug.cgi?id=1246333 * https://bugzilla.suse.com/show_bug.cgi?id=1246334 * https://bugzilla.suse.com/show_bug.cgi?id=1246337 * https://bugzilla.suse.com/show_bug.cgi?id=1246342 * https://bugzilla.suse.com/show_bug.cgi?id=1246349 * https://bugzilla.suse.com/show_bug.cgi?id=1246351 * https://bugzilla.suse.com/show_bug.cgi?id=1246353 * https://bugzilla.suse.com/show_bug.cgi?id=1246354 * https://bugzilla.suse.com/show_bug.cgi?id=1246358 * https://bugzilla.suse.com/show_bug.cgi?id=1246364 * https://bugzilla.suse.com/show_bug.cgi?id=1246366 * https://bugzilla.suse.com/show_bug.cgi?id=1246370 * https://bugzilla.suse.com/show_bug.cgi?id=1246375 * https://bugzilla.suse.com/show_bug.cgi?id=1246376 * https://bugzilla.suse.com/show_bug.cgi?id=1246385 * https://bugzilla.suse.com/show_bug.cgi?id=1246386 * https://bugzilla.suse.com/show_bug.cgi?id=1246387 * https://bugzilla.suse.com/show_bug.cgi?id=1246438 * https://bugzilla.suse.com/show_bug.cgi?id=1246443 * https://bugzilla.suse.com/show_bug.cgi?id=1246444 * https://bugzilla.suse.com/show_bug.cgi?id=1246447 * https://bugzilla.suse.com/show_bug.cgi?id=1246450 * https://bugzilla.suse.com/show_bug.cgi?id=1246453 * https://bugzilla.suse.com/show_bug.cgi?id=1246473 * https://bugzilla.suse.com/show_bug.cgi?id=1246490 * https://bugzilla.suse.com/show_bug.cgi?id=1246509 * https://bugzilla.suse.com/show_bug.cgi?id=1246547 * https://bugzilla.suse.com/show_bug.cgi?id=1246631 * https://bugzilla.suse.com/show_bug.cgi?id=1246651 * https://bugzilla.suse.com/show_bug.cgi?id=1246688 * https://bugzilla.suse.com/show_bug.cgi?id=1246777 * https://bugzilla.suse.com/show_bug.cgi?id=1246781 * https://bugzilla.suse.com/show_bug.cgi?id=1246782 * https://bugzilla.suse.com/show_bug.cgi?id=1246868 * https://bugzilla.suse.com/show_bug.cgi?id=1246896 * https://bugzilla.suse.com/show_bug.cgi?id=1246911 * https://bugzilla.suse.com/show_bug.cgi?id=1246979 * https://bugzilla.suse.com/show_bug.cgi?id=1247018 * https://bugzilla.suse.com/show_bug.cgi?id=1247020 * https://bugzilla.suse.com/show_bug.cgi?id=1247022 * https://bugzilla.suse.com/show_bug.cgi?id=1247023 * https://bugzilla.suse.com/show_bug.cgi?id=1247024 * https://bugzilla.suse.com/show_bug.cgi?id=1247027 * https://bugzilla.suse.com/show_bug.cgi?id=1247028 * https://bugzilla.suse.com/show_bug.cgi?id=1247031 * https://bugzilla.suse.com/show_bug.cgi?id=1247033 * https://bugzilla.suse.com/show_bug.cgi?id=1247035 * https://bugzilla.suse.com/show_bug.cgi?id=1247061 * https://bugzilla.suse.com/show_bug.cgi?id=1247062 * https://bugzilla.suse.com/show_bug.cgi?id=1247064 * https://bugzilla.suse.com/show_bug.cgi?id=1247076 * https://bugzilla.suse.com/show_bug.cgi?id=1247078 * https://bugzilla.suse.com/show_bug.cgi?id=1247079 * https://bugzilla.suse.com/show_bug.cgi?id=1247088 * https://bugzilla.suse.com/show_bug.cgi?id=1247089 * https://bugzilla.suse.com/show_bug.cgi?id=1247091 * https://bugzilla.suse.com/show_bug.cgi?id=1247097 * https://bugzilla.suse.com/show_bug.cgi?id=1247098 * https://bugzilla.suse.com/show_bug.cgi?id=1247099 * https://bugzilla.suse.com/show_bug.cgi?id=1247101 * https://bugzilla.suse.com/show_bug.cgi?id=1247102 * https://bugzilla.suse.com/show_bug.cgi?id=1247103 * https://bugzilla.suse.com/show_bug.cgi?id=1247104 * https://bugzilla.suse.com/show_bug.cgi?id=1247112 * https://bugzilla.suse.com/show_bug.cgi?id=1247113 * https://bugzilla.suse.com/show_bug.cgi?id=1247116 * https://bugzilla.suse.com/show_bug.cgi?id=1247118 * https://bugzilla.suse.com/show_bug.cgi?id=1247119 * https://bugzilla.suse.com/show_bug.cgi?id=1247123 * https://bugzilla.suse.com/show_bug.cgi?id=1247125 * https://bugzilla.suse.com/show_bug.cgi?id=1247126 * https://bugzilla.suse.com/show_bug.cgi?id=1247128 * https://bugzilla.suse.com/show_bug.cgi?id=1247130 * https://bugzilla.suse.com/show_bug.cgi?id=1247131 * https://bugzilla.suse.com/show_bug.cgi?id=1247132 * https://bugzilla.suse.com/show_bug.cgi?id=1247136 * https://bugzilla.suse.com/show_bug.cgi?id=1247137 * https://bugzilla.suse.com/show_bug.cgi?id=1247138 * https://bugzilla.suse.com/show_bug.cgi?id=1247141 * https://bugzilla.suse.com/show_bug.cgi?id=1247143 * https://bugzilla.suse.com/show_bug.cgi?id=1247145 * https://bugzilla.suse.com/show_bug.cgi?id=1247146 * https://bugzilla.suse.com/show_bug.cgi?id=1247147 * https://bugzilla.suse.com/show_bug.cgi?id=1247149 * https://bugzilla.suse.com/show_bug.cgi?id=1247150 * https://bugzilla.suse.com/show_bug.cgi?id=1247151 * https://bugzilla.suse.com/show_bug.cgi?id=1247152 * https://bugzilla.suse.com/show_bug.cgi?id=1247153 * https://bugzilla.suse.com/show_bug.cgi?id=1247154 * https://bugzilla.suse.com/show_bug.cgi?id=1247155 * https://bugzilla.suse.com/show_bug.cgi?id=1247156 * https://bugzilla.suse.com/show_bug.cgi?id=1247157 * https://bugzilla.suse.com/show_bug.cgi?id=1247160 * https://bugzilla.suse.com/show_bug.cgi?id=1247162 * https://bugzilla.suse.com/show_bug.cgi?id=1247163 * https://bugzilla.suse.com/show_bug.cgi?id=1247164 * https://bugzilla.suse.com/show_bug.cgi?id=1247167 * https://bugzilla.suse.com/show_bug.cgi?id=1247169 * https://bugzilla.suse.com/show_bug.cgi?id=1247170 * https://bugzilla.suse.com/show_bug.cgi?id=1247171 * https://bugzilla.suse.com/show_bug.cgi?id=1247174 * https://bugzilla.suse.com/show_bug.cgi?id=1247176 * https://bugzilla.suse.com/show_bug.cgi?id=1247177 * https://bugzilla.suse.com/show_bug.cgi?id=1247178 * https://bugzilla.suse.com/show_bug.cgi?id=1247181 * https://bugzilla.suse.com/show_bug.cgi?id=1247209 * https://bugzilla.suse.com/show_bug.cgi?id=1247210 * https://bugzilla.suse.com/show_bug.cgi?id=1247220 * https://bugzilla.suse.com/show_bug.cgi?id=1247223 * https://bugzilla.suse.com/show_bug.cgi?id=1247227 * https://bugzilla.suse.com/show_bug.cgi?id=1247229 * https://bugzilla.suse.com/show_bug.cgi?id=1247231 * https://bugzilla.suse.com/show_bug.cgi?id=1247233 * https://bugzilla.suse.com/show_bug.cgi?id=1247234 * https://bugzilla.suse.com/show_bug.cgi?id=1247235 * https://bugzilla.suse.com/show_bug.cgi?id=1247236 * https://bugzilla.suse.com/show_bug.cgi?id=1247238 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247241 * https://bugzilla.suse.com/show_bug.cgi?id=1247243 * https://bugzilla.suse.com/show_bug.cgi?id=1247250 * https://bugzilla.suse.com/show_bug.cgi?id=1247251 * https://bugzilla.suse.com/show_bug.cgi?id=1247252 * https://bugzilla.suse.com/show_bug.cgi?id=1247253 * https://bugzilla.suse.com/show_bug.cgi?id=1247255 * https://bugzilla.suse.com/show_bug.cgi?id=1247262 * https://bugzilla.suse.com/show_bug.cgi?id=1247265 * https://bugzilla.suse.com/show_bug.cgi?id=1247270 * https://bugzilla.suse.com/show_bug.cgi?id=1247271 * https://bugzilla.suse.com/show_bug.cgi?id=1247273 * https://bugzilla.suse.com/show_bug.cgi?id=1247274 * https://bugzilla.suse.com/show_bug.cgi?id=1247276 * https://bugzilla.suse.com/show_bug.cgi?id=1247277 * https://bugzilla.suse.com/show_bug.cgi?id=1247278 * https://bugzilla.suse.com/show_bug.cgi?id=1247279 * https://bugzilla.suse.com/show_bug.cgi?id=1247280 * https://bugzilla.suse.com/show_bug.cgi?id=1247282 * https://bugzilla.suse.com/show_bug.cgi?id=1247283 * https://bugzilla.suse.com/show_bug.cgi?id=1247284 * https://bugzilla.suse.com/show_bug.cgi?id=1247285 * https://bugzilla.suse.com/show_bug.cgi?id=1247288 * https://bugzilla.suse.com/show_bug.cgi?id=1247289 * https://bugzilla.suse.com/show_bug.cgi?id=1247290 * https://bugzilla.suse.com/show_bug.cgi?id=1247293 * https://bugzilla.suse.com/show_bug.cgi?id=1247308 * https://bugzilla.suse.com/show_bug.cgi?id=1247311 * https://bugzilla.suse.com/show_bug.cgi?id=1247313 * https://bugzilla.suse.com/show_bug.cgi?id=1247314 * https://bugzilla.suse.com/show_bug.cgi?id=1247317 * https://bugzilla.suse.com/show_bug.cgi?id=1247325 * https://bugzilla.suse.com/show_bug.cgi?id=1247347 * https://bugzilla.suse.com/show_bug.cgi?id=1247348 * https://bugzilla.suse.com/show_bug.cgi?id=1247349 * https://bugzilla.suse.com/show_bug.cgi?id=1247366 * https://bugzilla.suse.com/show_bug.cgi?id=1247372 * https://bugzilla.suse.com/show_bug.cgi?id=1247376 * https://bugzilla.suse.com/show_bug.cgi?id=1247426 * https://bugzilla.suse.com/show_bug.cgi?id=1247437 * https://bugzilla.suse.com/show_bug.cgi?id=1247442 * https://bugzilla.suse.com/show_bug.cgi?id=1247483 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1247712 * https://bugzilla.suse.com/show_bug.cgi?id=1247837 * https://bugzilla.suse.com/show_bug.cgi?id=1247838 * https://bugzilla.suse.com/show_bug.cgi?id=1247935 * https://bugzilla.suse.com/show_bug.cgi?id=1247936 * https://bugzilla.suse.com/show_bug.cgi?id=1247949 * https://bugzilla.suse.com/show_bug.cgi?id=1247950 * https://bugzilla.suse.com/show_bug.cgi?id=1247963 * https://bugzilla.suse.com/show_bug.cgi?id=1247976 * https://bugzilla.suse.com/show_bug.cgi?id=1248088 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248121 * https://bugzilla.suse.com/show_bug.cgi?id=1248183 * https://bugzilla.suse.com/show_bug.cgi?id=1248186 * https://bugzilla.suse.com/show_bug.cgi?id=1248190 * https://bugzilla.suse.com/show_bug.cgi?id=1248192 * https://bugzilla.suse.com/show_bug.cgi?id=1248194 * https://bugzilla.suse.com/show_bug.cgi?id=1248198 * https://bugzilla.suse.com/show_bug.cgi?id=1248199 * https://bugzilla.suse.com/show_bug.cgi?id=1248200 * https://bugzilla.suse.com/show_bug.cgi?id=1248202 * https://bugzilla.suse.com/show_bug.cgi?id=1248205 * https://bugzilla.suse.com/show_bug.cgi?id=1248211 * https://bugzilla.suse.com/show_bug.cgi?id=1248223 * https://bugzilla.suse.com/show_bug.cgi?id=1248224 * https://bugzilla.suse.com/show_bug.cgi?id=1248225 * https://bugzilla.suse.com/show_bug.cgi?id=1248230 * https://bugzilla.suse.com/show_bug.cgi?id=1248235 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248296 * https://bugzilla.suse.com/show_bug.cgi?id=1248297 * https://bugzilla.suse.com/show_bug.cgi?id=1248299 * https://bugzilla.suse.com/show_bug.cgi?id=1248302 * https://bugzilla.suse.com/show_bug.cgi?id=1248304 * https://bugzilla.suse.com/show_bug.cgi?id=1248306 * https://bugzilla.suse.com/show_bug.cgi?id=1248312 * https://bugzilla.suse.com/show_bug.cgi?id=1248333 * https://bugzilla.suse.com/show_bug.cgi?id=1248334 * https://bugzilla.suse.com/show_bug.cgi?id=1248337 * https://bugzilla.suse.com/show_bug.cgi?id=1248338 * https://bugzilla.suse.com/show_bug.cgi?id=1248340 * https://bugzilla.suse.com/show_bug.cgi?id=1248341 * https://bugzilla.suse.com/show_bug.cgi?id=1248343 * https://bugzilla.suse.com/show_bug.cgi?id=1248345 * https://bugzilla.suse.com/show_bug.cgi?id=1248349 * https://bugzilla.suse.com/show_bug.cgi?id=1248350 * https://bugzilla.suse.com/show_bug.cgi?id=1248354 * https://bugzilla.suse.com/show_bug.cgi?id=1248355 * https://bugzilla.suse.com/show_bug.cgi?id=1248357 * https://bugzilla.suse.com/show_bug.cgi?id=1248359 * https://bugzilla.suse.com/show_bug.cgi?id=1248361 * https://bugzilla.suse.com/show_bug.cgi?id=1248363 * https://bugzilla.suse.com/show_bug.cgi?id=1248365 * https://bugzilla.suse.com/show_bug.cgi?id=1248367 * https://bugzilla.suse.com/show_bug.cgi?id=1248368 * https://bugzilla.suse.com/show_bug.cgi?id=1248374 * https://bugzilla.suse.com/show_bug.cgi?id=1248377 * https://bugzilla.suse.com/show_bug.cgi?id=1248378 * https://bugzilla.suse.com/show_bug.cgi?id=1248380 * https://bugzilla.suse.com/show_bug.cgi?id=1248386 * https://bugzilla.suse.com/show_bug.cgi?id=1248390 * https://bugzilla.suse.com/show_bug.cgi?id=1248392 * https://bugzilla.suse.com/show_bug.cgi?id=1248395 * https://bugzilla.suse.com/show_bug.cgi?id=1248396 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248401 * https://bugzilla.suse.com/show_bug.cgi?id=1248511 * https://bugzilla.suse.com/show_bug.cgi?id=1248512 * https://bugzilla.suse.com/show_bug.cgi?id=1248573 * https://bugzilla.suse.com/show_bug.cgi?id=1248575 * https://bugzilla.suse.com/show_bug.cgi?id=1248577 * https://bugzilla.suse.com/show_bug.cgi?id=1248609 * https://bugzilla.suse.com/show_bug.cgi?id=1248610 * https://bugzilla.suse.com/show_bug.cgi?id=1248616 * https://bugzilla.suse.com/show_bug.cgi?id=1248617 * https://bugzilla.suse.com/show_bug.cgi?id=1248619 * https://bugzilla.suse.com/show_bug.cgi?id=1248621 * https://bugzilla.suse.com/show_bug.cgi?id=1248622 * https://bugzilla.suse.com/show_bug.cgi?id=1248624 * https://bugzilla.suse.com/show_bug.cgi?id=1248627 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248634 * https://bugzilla.suse.com/show_bug.cgi?id=1248635 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248643 * https://bugzilla.suse.com/show_bug.cgi?id=1248647 * https://bugzilla.suse.com/show_bug.cgi?id=1248648 * https://bugzilla.suse.com/show_bug.cgi?id=1248652 * https://bugzilla.suse.com/show_bug.cgi?id=1248655 * https://bugzilla.suse.com/show_bug.cgi?id=1248662 * https://bugzilla.suse.com/show_bug.cgi?id=1248664 * https://bugzilla.suse.com/show_bug.cgi?id=1248666 * https://bugzilla.suse.com/show_bug.cgi?id=1248669 * https://bugzilla.suse.com/show_bug.cgi?id=1248674 * https://bugzilla.suse.com/show_bug.cgi?id=1248681 * https://bugzilla.suse.com/show_bug.cgi?id=1248727 * https://bugzilla.suse.com/show_bug.cgi?id=1248728 * https://bugzilla.suse.com/show_bug.cgi?id=1248748 * https://bugzilla.suse.com/show_bug.cgi?id=1248754 * https://bugzilla.suse.com/show_bug.cgi?id=1248775 * https://bugzilla.suse.com/show_bug.cgi?id=1249022 * https://bugzilla.suse.com/show_bug.cgi?id=1249038 * https://bugzilla.suse.com/show_bug.cgi?id=1249060 * https://bugzilla.suse.com/show_bug.cgi?id=1249061 * https://bugzilla.suse.com/show_bug.cgi?id=1249062 * https://bugzilla.suse.com/show_bug.cgi?id=1249064 * https://bugzilla.suse.com/show_bug.cgi?id=1249065 * https://bugzilla.suse.com/show_bug.cgi?id=1249066 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249143 * https://bugzilla.suse.com/show_bug.cgi?id=1249156 * https://bugzilla.suse.com/show_bug.cgi?id=1249159 * https://bugzilla.suse.com/show_bug.cgi?id=1249160 * https://bugzilla.suse.com/show_bug.cgi?id=1249163 * https://bugzilla.suse.com/show_bug.cgi?id=1249164 * https://bugzilla.suse.com/show_bug.cgi?id=1249166 * https://bugzilla.suse.com/show_bug.cgi?id=1249167 * https://bugzilla.suse.com/show_bug.cgi?id=1249169 * https://bugzilla.suse.com/show_bug.cgi?id=1249170 * https://bugzilla.suse.com/show_bug.cgi?id=1249172 * https://bugzilla.suse.com/show_bug.cgi?id=1249176 * https://bugzilla.suse.com/show_bug.cgi?id=1249177 * https://bugzilla.suse.com/show_bug.cgi?id=1249182 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249190 * https://bugzilla.suse.com/show_bug.cgi?id=1249193 * https://bugzilla.suse.com/show_bug.cgi?id=1249195 * https://bugzilla.suse.com/show_bug.cgi?id=1249199 * https://bugzilla.suse.com/show_bug.cgi?id=1249201 * https://bugzilla.suse.com/show_bug.cgi?id=1249202 * https://bugzilla.suse.com/show_bug.cgi?id=1249203 * https://bugzilla.suse.com/show_bug.cgi?id=1249204 * https://bugzilla.suse.com/show_bug.cgi?id=1249206 * https://bugzilla.suse.com/show_bug.cgi?id=1249215 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249221 * https://bugzilla.suse.com/show_bug.cgi?id=1249254 * https://bugzilla.suse.com/show_bug.cgi?id=1249258 * https://bugzilla.suse.com/show_bug.cgi?id=1249262 * https://bugzilla.suse.com/show_bug.cgi?id=1249263 * https://bugzilla.suse.com/show_bug.cgi?id=1249265 * https://bugzilla.suse.com/show_bug.cgi?id=1249266 * https://bugzilla.suse.com/show_bug.cgi?id=1249269 * https://bugzilla.suse.com/show_bug.cgi?id=1249271 * https://bugzilla.suse.com/show_bug.cgi?id=1249272 * https://bugzilla.suse.com/show_bug.cgi?id=1249273 * https://bugzilla.suse.com/show_bug.cgi?id=1249274 * https://bugzilla.suse.com/show_bug.cgi?id=1249278 * https://bugzilla.suse.com/show_bug.cgi?id=1249279 * https://bugzilla.suse.com/show_bug.cgi?id=1249281 * https://bugzilla.suse.com/show_bug.cgi?id=1249282 * https://bugzilla.suse.com/show_bug.cgi?id=1249284 * https://bugzilla.suse.com/show_bug.cgi?id=1249285 * https://bugzilla.suse.com/show_bug.cgi?id=1249286 * https://bugzilla.suse.com/show_bug.cgi?id=1249288 * https://bugzilla.suse.com/show_bug.cgi?id=1249290 * https://bugzilla.suse.com/show_bug.cgi?id=1249292 * https://bugzilla.suse.com/show_bug.cgi?id=1249295 * https://bugzilla.suse.com/show_bug.cgi?id=1249296 * https://bugzilla.suse.com/show_bug.cgi?id=1249297 * https://bugzilla.suse.com/show_bug.cgi?id=1249299 * https://bugzilla.suse.com/show_bug.cgi?id=1249300 * https://bugzilla.suse.com/show_bug.cgi?id=1249301 * https://bugzilla.suse.com/show_bug.cgi?id=1249303 * https://bugzilla.suse.com/show_bug.cgi?id=1249304 * https://bugzilla.suse.com/show_bug.cgi?id=1249305 * https://bugzilla.suse.com/show_bug.cgi?id=1249306 * https://bugzilla.suse.com/show_bug.cgi?id=1249308 * https://bugzilla.suse.com/show_bug.cgi?id=1249309 * https://bugzilla.suse.com/show_bug.cgi?id=1249312 * https://bugzilla.suse.com/show_bug.cgi?id=1249313 * https://bugzilla.suse.com/show_bug.cgi?id=1249314 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249316 * https://bugzilla.suse.com/show_bug.cgi?id=1249318 * https://bugzilla.suse.com/show_bug.cgi?id=1249319 * https://bugzilla.suse.com/show_bug.cgi?id=1249320 * https://bugzilla.suse.com/show_bug.cgi?id=1249321 * https://bugzilla.suse.com/show_bug.cgi?id=1249322 * https://bugzilla.suse.com/show_bug.cgi?id=1249323 * https://bugzilla.suse.com/show_bug.cgi?id=1249324 * https://bugzilla.suse.com/show_bug.cgi?id=1249333 * https://bugzilla.suse.com/show_bug.cgi?id=1249334 * https://bugzilla.suse.com/show_bug.cgi?id=1249338 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249413 * https://bugzilla.suse.com/show_bug.cgi?id=1249477 * https://bugzilla.suse.com/show_bug.cgi?id=1249478 * https://bugzilla.suse.com/show_bug.cgi?id=1249479 * https://bugzilla.suse.com/show_bug.cgi?id=1249486 * https://bugzilla.suse.com/show_bug.cgi?id=1249490 * https://bugzilla.suse.com/show_bug.cgi?id=1249494 * https://bugzilla.suse.com/show_bug.cgi?id=1249500 * https://bugzilla.suse.com/show_bug.cgi?id=1249504 * https://bugzilla.suse.com/show_bug.cgi?id=1249506 * https://bugzilla.suse.com/show_bug.cgi?id=1249508 * https://bugzilla.suse.com/show_bug.cgi?id=1249509 * https://bugzilla.suse.com/show_bug.cgi?id=1249510 * https://bugzilla.suse.com/show_bug.cgi?id=1249513 * https://bugzilla.suse.com/show_bug.cgi?id=1249515 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249522 * https://bugzilla.suse.com/show_bug.cgi?id=1249523 * https://bugzilla.suse.com/show_bug.cgi?id=1249524 * https://bugzilla.suse.com/show_bug.cgi?id=1249526 * https://bugzilla.suse.com/show_bug.cgi?id=1249533 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249540 * https://bugzilla.suse.com/show_bug.cgi?id=1249542 * https://bugzilla.suse.com/show_bug.cgi?id=1249545 * https://bugzilla.suse.com/show_bug.cgi?id=1249547 * https://bugzilla.suse.com/show_bug.cgi?id=1249548 * https://bugzilla.suse.com/show_bug.cgi?id=1249550 * https://bugzilla.suse.com/show_bug.cgi?id=1249552 * https://bugzilla.suse.com/show_bug.cgi?id=1249554 * https://bugzilla.suse.com/show_bug.cgi?id=1249562 * https://bugzilla.suse.com/show_bug.cgi?id=1249566 * https://bugzilla.suse.com/show_bug.cgi?id=1249587 * https://bugzilla.suse.com/show_bug.cgi?id=1249598 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249615 * https://bugzilla.suse.com/show_bug.cgi?id=1249618 * https://bugzilla.suse.com/show_bug.cgi?id=1249774 * https://bugzilla.suse.com/show_bug.cgi?id=1249833 * https://bugzilla.suse.com/show_bug.cgi?id=1249887 * https://bugzilla.suse.com/show_bug.cgi?id=1249888 * https://bugzilla.suse.com/show_bug.cgi?id=1249901 * https://bugzilla.suse.com/show_bug.cgi?id=1249904 * https://bugzilla.suse.com/show_bug.cgi?id=1249906 * https://bugzilla.suse.com/show_bug.cgi?id=1249915 * https://bugzilla.suse.com/show_bug.cgi?id=1249974 * https://bugzilla.suse.com/show_bug.cgi?id=1249975 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250007 * https://bugzilla.suse.com/show_bug.cgi?id=1250021 * https://bugzilla.suse.com/show_bug.cgi?id=1250025 * https://bugzilla.suse.com/show_bug.cgi?id=1250028 * https://bugzilla.suse.com/show_bug.cgi?id=1250032 * https://bugzilla.suse.com/show_bug.cgi?id=1250087 * https://bugzilla.suse.com/show_bug.cgi?id=1250088 * https://bugzilla.suse.com/show_bug.cgi?id=1250119 * https://bugzilla.suse.com/show_bug.cgi?id=1250123 * https://bugzilla.suse.com/show_bug.cgi?id=1250124 * https://bugzilla.suse.com/show_bug.cgi?id=1250177 * https://bugzilla.suse.com/show_bug.cgi?id=1250179 * https://bugzilla.suse.com/show_bug.cgi?id=1250203 * https://bugzilla.suse.com/show_bug.cgi?id=1250204 * https://bugzilla.suse.com/show_bug.cgi?id=1250205 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250242 * https://bugzilla.suse.com/show_bug.cgi?id=1250247 * https://bugzilla.suse.com/show_bug.cgi?id=1250249 * https://bugzilla.suse.com/show_bug.cgi?id=1250251 * https://bugzilla.suse.com/show_bug.cgi?id=1250258 * https://bugzilla.suse.com/show_bug.cgi?id=1250262 * https://bugzilla.suse.com/show_bug.cgi?id=1250266 * https://bugzilla.suse.com/show_bug.cgi?id=1250267 * https://bugzilla.suse.com/show_bug.cgi?id=1250268 * https://bugzilla.suse.com/show_bug.cgi?id=1250275 * https://bugzilla.suse.com/show_bug.cgi?id=1250276 * https://bugzilla.suse.com/show_bug.cgi?id=1250281 * https://bugzilla.suse.com/show_bug.cgi?id=1250291 * https://bugzilla.suse.com/show_bug.cgi?id=1250292 * https://bugzilla.suse.com/show_bug.cgi?id=1250294 * https://bugzilla.suse.com/show_bug.cgi?id=1250296 * https://bugzilla.suse.com/show_bug.cgi?id=1250297 * https://bugzilla.suse.com/show_bug.cgi?id=1250298 * https://bugzilla.suse.com/show_bug.cgi?id=1250334 * https://bugzilla.suse.com/show_bug.cgi?id=1250344 * https://bugzilla.suse.com/show_bug.cgi?id=1250365 * https://bugzilla.suse.com/show_bug.cgi?id=1250371 * https://bugzilla.suse.com/show_bug.cgi?id=1250377 * https://bugzilla.suse.com/show_bug.cgi?id=1250386 * https://bugzilla.suse.com/show_bug.cgi?id=1250389 * https://bugzilla.suse.com/show_bug.cgi?id=1250398 * https://bugzilla.suse.com/show_bug.cgi?id=1250402 * https://bugzilla.suse.com/show_bug.cgi?id=1250406 * https://bugzilla.suse.com/show_bug.cgi?id=1250407 * https://bugzilla.suse.com/show_bug.cgi?id=1250408 * https://bugzilla.suse.com/show_bug.cgi?id=1250450 * https://bugzilla.suse.com/show_bug.cgi?id=1250491 * https://bugzilla.suse.com/show_bug.cgi?id=1250519 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250650 * https://bugzilla.suse.com/show_bug.cgi?id=1250655 * https://bugzilla.suse.com/show_bug.cgi?id=1250671 * https://bugzilla.suse.com/show_bug.cgi?id=1250702 * https://bugzilla.suse.com/show_bug.cgi?id=1250711 * https://bugzilla.suse.com/show_bug.cgi?id=1250712 * https://bugzilla.suse.com/show_bug.cgi?id=1250713 * https://bugzilla.suse.com/show_bug.cgi?id=1250716 * https://bugzilla.suse.com/show_bug.cgi?id=1250719 * https://bugzilla.suse.com/show_bug.cgi?id=1250722 * https://bugzilla.suse.com/show_bug.cgi?id=1250729 * https://bugzilla.suse.com/show_bug.cgi?id=1250736 * https://bugzilla.suse.com/show_bug.cgi?id=1250737 * https://bugzilla.suse.com/show_bug.cgi?id=1250739 * https://bugzilla.suse.com/show_bug.cgi?id=1250741 * https://bugzilla.suse.com/show_bug.cgi?id=1250742 * https://bugzilla.suse.com/show_bug.cgi?id=1250758 * https://bugzilla.suse.com/show_bug.cgi?id=1250952 * https://bugzilla.suse.com/show_bug.cgi?id=1251100 * https://bugzilla.suse.com/show_bug.cgi?id=1251114 * https://bugzilla.suse.com/show_bug.cgi?id=1251134 * https://bugzilla.suse.com/show_bug.cgi?id=1251135 * https://bugzilla.suse.com/show_bug.cgi?id=1251143 * https://bugzilla.suse.com/show_bug.cgi?id=1251146 * https://bugzilla.suse.com/show_bug.cgi?id=1251186 * https://bugzilla.suse.com/show_bug.cgi?id=1251216 * https://bugzilla.suse.com/show_bug.cgi?id=1251230 * https://bugzilla.suse.com/show_bug.cgi?id=1251810 * https://bugzilla.suse.com/show_bug.cgi?id=1252084 * https://jira.suse.com/browse/PED-10909 * https://jira.suse.com/browse/PED-12405 * https://jira.suse.com/browse/PED-12745 * https://jira.suse.com/browse/PED-12882 * https://jira.suse.com/browse/PED-13113 * https://jira.suse.com/browse/PED-13256 * https://jira.suse.com/browse/PED-13302 * https://jira.suse.com/browse/PED-13331 * https://jira.suse.com/browse/PED-13343 * https://jira.suse.com/browse/PED-13345 * https://jira.suse.com/browse/PED-13631 * https://jira.suse.com/browse/PED-13704 * https://jira.suse.com/browse/PED-13728 * https://jira.suse.com/browse/PED-13762 * https://jira.suse.com/browse/PED-13815 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7249 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 17:02:02 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 17:02:02 -0000 Subject: SUSE-SU-2025:21136-1: important: Security update for runc Message-ID: <176538612297.6931.13790962580130707145@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2025:21136-1 Release Date: 2025-11-20T16:44:20Z Rating: important References: * bsc#1252110 * bsc#1252232 Cross-References: * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 CVSS scores: * CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31133 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-31133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-52565 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52565 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52565 ( NVD ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52565 ( NVD ): 7.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52881 ( NVD ): 7.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for runc fixes the following issues: * Update to runc v1.3.3: * CVE-2025-31133, CVE-2025-52565, CVE-2025-52881: Fixed container breakouts by bypassing runc's restrictions for writing to arbitrary /proc files (bsc#1252232) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-46=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-46=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * runc-1.3.3-160000.1.1 * runc-debuginfo-1.3.3-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * runc-1.3.3-160000.1.1 * runc-debuginfo-1.3.3-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31133.html * https://www.suse.com/security/cve/CVE-2025-52565.html * https://www.suse.com/security/cve/CVE-2025-52881.html * https://bugzilla.suse.com/show_bug.cgi?id=1252110 * https://bugzilla.suse.com/show_bug.cgi?id=1252232 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 17:01:55 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 17:01:55 -0000 Subject: SUSE-SU-2025:21137-1: moderate: Security update for alloy Message-ID: <176538611524.6931.7923579143172053314@smelt2.prg2.suse.org> # Security update for alloy Announcement ID: SUSE-SU-2025:21137-1 Release Date: 2025-11-20T17:26:16Z Rating: moderate References: * bsc#1248960 * bsc#1250621 Cross-References: * CVE-2025-11065 * CVE-2025-58058 CVSS scores: * CVE-2025-11065 ( SUSE ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-11065 ( SUSE ): 4.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N * CVE-2025-58058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58058 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for alloy fixes the following issues: * CVE-2025-58058: Removed dependency on vulnerable github.com/ulikunitz/xz (bsc#1248960). * CVE-2025-11065: Fixed sensitive information leak in logs (bsc#1250621). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-47=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-47=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * alloy-1.11.3-160000.1.1 * alloy-debuginfo-1.11.3-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * alloy-1.11.3-160000.1.1 * alloy-debuginfo-1.11.3-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11065.html * https://www.suse.com/security/cve/CVE-2025-58058.html * https://bugzilla.suse.com/show_bug.cgi?id=1248960 * https://bugzilla.suse.com/show_bug.cgi?id=1250621 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 17:02:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 17:02:18 -0000 Subject: SUSE-SU-2025:21132-1: important: Security update for poppler Message-ID: <176538613821.6931.12095276099991712788@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2025:21132-1 Release Date: 2025-11-20T13:33:03Z Rating: important References: * bsc#1251940 Cross-References: * CVE-2025-52885 CVSS scores: * CVE-2025-52885 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-52885 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-52885 ( NVD ): 6.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2025-52885: Fixed raw pointers leading to dangling pointers when the vector is resized (bsc#1251940) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-42=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-42=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * poppler-tools-debuginfo-25.04.0-160000.3.1 * libpoppler-glib8-debuginfo-25.04.0-160000.3.1 * typelib-1_0-Poppler-0_18-25.04.0-160000.3.1 * libpoppler-qt6-3-25.04.0-160000.3.1 * poppler-debugsource-25.04.0-160000.3.1 * libpoppler-devel-25.04.0-160000.3.1 * libpoppler148-25.04.0-160000.3.1 * libpoppler148-debuginfo-25.04.0-160000.3.1 * poppler-tools-25.04.0-160000.3.1 * poppler-qt6-debugsource-25.04.0-160000.3.1 * libpoppler-qt6-devel-25.04.0-160000.3.1 * libpoppler-cpp2-debuginfo-25.04.0-160000.3.1 * libpoppler-cpp2-25.04.0-160000.3.1 * libpoppler-qt6-3-debuginfo-25.04.0-160000.3.1 * libpoppler-glib8-25.04.0-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * poppler-tools-debuginfo-25.04.0-160000.3.1 * libpoppler-glib8-debuginfo-25.04.0-160000.3.1 * typelib-1_0-Poppler-0_18-25.04.0-160000.3.1 * libpoppler-qt6-3-25.04.0-160000.3.1 * poppler-debugsource-25.04.0-160000.3.1 * libpoppler-devel-25.04.0-160000.3.1 * libpoppler148-25.04.0-160000.3.1 * libpoppler148-debuginfo-25.04.0-160000.3.1 * poppler-tools-25.04.0-160000.3.1 * poppler-qt6-debugsource-25.04.0-160000.3.1 * libpoppler-qt6-devel-25.04.0-160000.3.1 * libpoppler-cpp2-debuginfo-25.04.0-160000.3.1 * libpoppler-cpp2-25.04.0-160000.3.1 * libpoppler-qt6-3-debuginfo-25.04.0-160000.3.1 * libpoppler-glib8-25.04.0-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-52885.html * https://bugzilla.suse.com/show_bug.cgi?id=1251940 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 20:30:02 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 20:30:02 -0000 Subject: SUSE-SU-2025:4353-1: low: Security update for fontforge Message-ID: <176539860278.2574.12230054032640721390@smelt2.prg2.suse.org> # Security update for fontforge Announcement ID: SUSE-SU-2025:4353-1 Release Date: 2025-12-10T18:03:45Z Rating: low References: * bsc#1252652 Cross-References: * CVE-2025-50949 CVSS scores: * CVE-2025-50949 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-50949 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-50949 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for fontforge fixes the following issues: * CVE-2025-50949: Fixed a memory leak in the DlgCreate8 function. (bsc#1252652) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-4353=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4353=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-4353=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * fontforge-debuginfo-20200314-150200.3.12.1 * fontforge-debugsource-20200314-150200.3.12.1 * fontforge-20200314-150200.3.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * fontforge-devel-20200314-150200.3.12.1 * fontforge-debuginfo-20200314-150200.3.12.1 * fontforge-debugsource-20200314-150200.3.12.1 * fontforge-20200314-150200.3.12.1 * openSUSE Leap 15.6 (noarch) * fontforge-doc-20200314-150200.3.12.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * fontforge-debuginfo-20200314-150200.3.12.1 * fontforge-debugsource-20200314-150200.3.12.1 * fontforge-20200314-150200.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-50949.html * https://bugzilla.suse.com/show_bug.cgi?id=1252652 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 10 20:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Dec 2025 20:30:06 -0000 Subject: SUSE-SU-2025:4352-1: low: Security update for python310 Message-ID: <176539860611.2574.13756740236403662226@smelt2.prg2.suse.org> # Security update for python310 Announcement ID: SUSE-SU-2025:4352-1 Release Date: 2025-12-10T17:18:31Z Rating: low References: * bsc#1251305 * bsc#1252974 Cross-References: * CVE-2025-6075 * CVE-2025-8291 CVSS scores: * CVE-2025-6075 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-6075 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-6075 ( NVD ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8291 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-8291 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-8291 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 An update that solves two vulnerabilities can now be installed. ## Description: This update for python310 fixes the following issues: Update to 3.10.19: * CVE-2025-6075: Fixed simple quadratic complexity vulnerabilities of os.path.expandvars(). (bsc#1252974) * CVE-2025-8291: Check the validity the ZIP64 End of Central Directory (EOCD). (bsc#1251305) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4352=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4352=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libpython3_10-1_0-3.10.19-150400.4.91.3 * python310-tk-debuginfo-3.10.19-150400.4.91.3 * python310-tk-3.10.19-150400.4.91.3 * python310-dbm-debuginfo-3.10.19-150400.4.91.3 * python310-doc-devhelp-3.10.19-150400.4.91.3 * python310-idle-3.10.19-150400.4.91.3 * python310-testsuite-3.10.19-150400.4.91.3 * python310-base-3.10.19-150400.4.91.3 * python310-base-debuginfo-3.10.19-150400.4.91.3 * python310-core-debugsource-3.10.19-150400.4.91.3 * python310-doc-3.10.19-150400.4.91.3 * python310-testsuite-debuginfo-3.10.19-150400.4.91.3 * python310-debuginfo-3.10.19-150400.4.91.3 * libpython3_10-1_0-debuginfo-3.10.19-150400.4.91.3 * python310-curses-3.10.19-150400.4.91.3 * python310-3.10.19-150400.4.91.3 * python310-debugsource-3.10.19-150400.4.91.3 * python310-devel-3.10.19-150400.4.91.3 * python310-curses-debuginfo-3.10.19-150400.4.91.3 * python310-tools-3.10.19-150400.4.91.3 * python310-dbm-3.10.19-150400.4.91.3 * openSUSE Leap 15.4 (x86_64) * libpython3_10-1_0-32bit-3.10.19-150400.4.91.3 * python310-base-32bit-3.10.19-150400.4.91.3 * python310-32bit-debuginfo-3.10.19-150400.4.91.3 * libpython3_10-1_0-32bit-debuginfo-3.10.19-150400.4.91.3 * python310-base-32bit-debuginfo-3.10.19-150400.4.91.3 * python310-32bit-3.10.19-150400.4.91.3 * openSUSE Leap 15.4 (aarch64_ilp32) * python310-base-64bit-debuginfo-3.10.19-150400.4.91.3 * python310-64bit-3.10.19-150400.4.91.3 * python310-base-64bit-3.10.19-150400.4.91.3 * libpython3_10-1_0-64bit-debuginfo-3.10.19-150400.4.91.3 * libpython3_10-1_0-64bit-3.10.19-150400.4.91.3 * python310-64bit-debuginfo-3.10.19-150400.4.91.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libpython3_10-1_0-3.10.19-150400.4.91.3 * python310-tk-debuginfo-3.10.19-150400.4.91.3 * python310-tk-3.10.19-150400.4.91.3 * python310-dbm-debuginfo-3.10.19-150400.4.91.3 * python310-doc-devhelp-3.10.19-150400.4.91.3 * python310-idle-3.10.19-150400.4.91.3 * python310-testsuite-3.10.19-150400.4.91.3 * python310-base-3.10.19-150400.4.91.3 * python310-base-debuginfo-3.10.19-150400.4.91.3 * python310-core-debugsource-3.10.19-150400.4.91.3 * python310-doc-3.10.19-150400.4.91.3 * python310-testsuite-debuginfo-3.10.19-150400.4.91.3 * python310-debuginfo-3.10.19-150400.4.91.3 * libpython3_10-1_0-debuginfo-3.10.19-150400.4.91.3 * python310-curses-3.10.19-150400.4.91.3 * python310-3.10.19-150400.4.91.3 * python310-debugsource-3.10.19-150400.4.91.3 * python310-devel-3.10.19-150400.4.91.3 * python310-curses-debuginfo-3.10.19-150400.4.91.3 * python310-tools-3.10.19-150400.4.91.3 * python310-dbm-3.10.19-150400.4.91.3 * openSUSE Leap 15.6 (x86_64) * libpython3_10-1_0-32bit-3.10.19-150400.4.91.3 * python310-base-32bit-3.10.19-150400.4.91.3 * python310-32bit-debuginfo-3.10.19-150400.4.91.3 * libpython3_10-1_0-32bit-debuginfo-3.10.19-150400.4.91.3 * python310-base-32bit-debuginfo-3.10.19-150400.4.91.3 * python310-32bit-3.10.19-150400.4.91.3 ## References: * https://www.suse.com/security/cve/CVE-2025-6075.html * https://www.suse.com/security/cve/CVE-2025-8291.html * https://bugzilla.suse.com/show_bug.cgi?id=1251305 * https://bugzilla.suse.com/show_bug.cgi?id=1252974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 11 12:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 11 Dec 2025 12:30:07 -0000 Subject: SUSE-SU-2025:4364-1: important: Security update for postgresql17, postgresql18 Message-ID: <176545620798.5018.15773480693876500518@smelt2.prg2.suse.org> # Security update for postgresql17, postgresql18 Announcement ID: SUSE-SU-2025:4364-1 Release Date: 2025-12-11T10:12:53Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql17, postgresql18 fixes the following issues: Changes in postgresql18: * Fix build with uring for post SLE15 code streams. Update to 18.1: * https://www.postgresql.org/about/news/p-3171/ * https://www.postgresql.org/docs/release/18.1/ * bsc#1253332, CVE-2025-12817: Missing check for CREATE privileges on the schema in CREATE STATISTICS allowed table owners to create statistics in any schema, potentially leading to unexpected naming conflicts. * bsc#1253333, CVE-2025-12818: Several places in libpq were not sufficiently careful about computing the required size of a memory allocation. Sufficiently large inputs could cause integer overflow, resulting in an undersized buffer, which would then lead to writing past the end of the buffer. * pg_config --libs returns -lnuma so we need to require it. Update to 18.0: * https://www.postgresql.org/about/news/p-3142/ * https://www.postgresql.org/docs/18/release-18.html Changes in postgresql17: Update to 17.7: * https://www.postgresql.org/about/news/p-3171/ * https://www.postgresql.org/docs/release/17.7/ * bsc#1253332, CVE-2025-12817: Missing check for CREATE privileges on the schema in CREATE STATISTICS allowed table owners to create statistics in any schema, potentially leading to unexpected naming conflicts. * bsc#1253333, CVE-2025-12818: Several places in libpq were not sufficiently careful about computing the required size of a memory allocation. Sufficiently large inputs could cause integer overflow, resulting in an undersized buffer, which would then lead to writing past the end of the buffer. * switch library to pg 18 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4364=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4364=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4364=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4364=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4364=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4364=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4364=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4364=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4364=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4364=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4364=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4364=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4364=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4364=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4364=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4364=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4364=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4364=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql18-debuginfo-18.1-150200.5.3.1 * libecpg6-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql-docs-18-150400.4.21.2 * postgresql-server-18-150400.4.21.2 * postgresql-pltcl-18-150400.4.21.2 * postgresql-18-150400.4.21.2 * postgresql-plperl-18-150400.4.21.2 * postgresql-llvmjit-devel-18-150400.4.21.2 * postgresql-contrib-18-150400.4.21.2 * postgresql-plpython-18-150400.4.21.2 * postgresql-llvmjit-18-150400.4.21.2 * postgresql-devel-18-150400.4.21.2 * postgresql-server-devel-18-150400.4.21.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libpq5-32bit-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-18.1-150200.5.3.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libecpg6-18.1-150200.5.3.1 * postgresql17-plperl-debuginfo-17.7-150200.5.19.1 * postgresql17-plperl-17.7-150200.5.19.1 * postgresql17-llvmjit-17.7-150200.5.19.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * postgresql17-server-devel-debuginfo-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql17-pltcl-17.7-150200.5.19.1 * postgresql17-pltcl-debuginfo-17.7-150200.5.19.1 * postgresql17-llvmjit-devel-17.7-150200.5.19.1 * postgresql17-server-17.7-150200.5.19.1 * postgresql17-plpython-17.7-150200.5.19.1 * postgresql17-server-debuginfo-17.7-150200.5.19.1 * postgresql17-17.7-150200.5.19.1 * postgresql17-contrib-debuginfo-17.7-150200.5.19.1 * postgresql17-devel-debuginfo-17.7-150200.5.19.1 * postgresql17-devel-17.7-150200.5.19.1 * postgresql17-contrib-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * postgresql18-debuginfo-18.1-150200.5.3.1 * postgresql17-server-devel-17.7-150200.5.19.1 * postgresql17-plpython-debuginfo-17.7-150200.5.19.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * postgresql-plpython-18-150500.10.12.2 * postgresql-18-150500.10.12.2 * postgresql-plperl-18-150500.10.12.2 * postgresql-devel-18-150500.10.12.2 * postgresql-server-18-150500.10.12.2 * postgresql-docs-18-150500.10.12.2 * postgresql17-docs-17.7-150200.5.19.1 * postgresql-contrib-18-150500.10.12.2 * postgresql-pltcl-18-150500.10.12.2 * postgresql-server-devel-18-150500.10.12.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libpq5-32bit-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-18.1-150200.5.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql18-debuginfo-18.1-150200.5.3.1 * libecpg6-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql-plperl-18-150300.10.30.2 * postgresql-server-18-150300.10.30.2 * postgresql-docs-18-150300.10.30.2 * postgresql-plpython-18-150300.10.30.2 * postgresql-devel-18-150300.10.30.2 * postgresql-server-devel-18-150300.10.30.2 * postgresql-pltcl-18-150300.10.30.2 * postgresql-contrib-18-150300.10.30.2 * postgresql-18-150300.10.30.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql18-debuginfo-18.1-150200.5.3.1 * libecpg6-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql-docs-18-150400.4.21.2 * postgresql-server-18-150400.4.21.2 * postgresql-pltcl-18-150400.4.21.2 * postgresql-18-150400.4.21.2 * postgresql-plperl-18-150400.4.21.2 * postgresql-llvmjit-devel-18-150400.4.21.2 * postgresql-contrib-18-150400.4.21.2 * postgresql-plpython-18-150400.4.21.2 * postgresql-llvmjit-18-150400.4.21.2 * postgresql-devel-18-150400.4.21.2 * postgresql-server-devel-18-150400.4.21.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libpq5-32bit-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-18.1-150200.5.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libecpg6-18.1-150200.5.3.1 * postgresql17-plperl-debuginfo-17.7-150200.5.19.1 * postgresql17-plperl-17.7-150200.5.19.1 * postgresql17-llvmjit-17.7-150200.5.19.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * postgresql17-server-devel-debuginfo-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql17-pltcl-17.7-150200.5.19.1 * postgresql17-pltcl-debuginfo-17.7-150200.5.19.1 * postgresql17-llvmjit-devel-17.7-150200.5.19.1 * postgresql17-server-17.7-150200.5.19.1 * postgresql17-plpython-17.7-150200.5.19.1 * postgresql17-server-debuginfo-17.7-150200.5.19.1 * postgresql17-17.7-150200.5.19.1 * postgresql17-contrib-debuginfo-17.7-150200.5.19.1 * postgresql17-devel-debuginfo-17.7-150200.5.19.1 * postgresql17-devel-17.7-150200.5.19.1 * postgresql17-contrib-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * postgresql18-debuginfo-18.1-150200.5.3.1 * postgresql17-server-devel-17.7-150200.5.19.1 * postgresql17-plpython-debuginfo-17.7-150200.5.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * postgresql-plpython-18-150500.10.12.2 * postgresql-18-150500.10.12.2 * postgresql-plperl-18-150500.10.12.2 * postgresql-devel-18-150500.10.12.2 * postgresql-server-18-150500.10.12.2 * postgresql-docs-18-150500.10.12.2 * postgresql17-docs-17.7-150200.5.19.1 * postgresql-contrib-18-150500.10.12.2 * postgresql-pltcl-18-150500.10.12.2 * postgresql-server-devel-18-150500.10.12.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libpq5-32bit-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-18.1-150200.5.3.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * libecpg6-18.1-150200.5.3.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-debuginfo-18.1-150200.5.3.1 * libpq5-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-18.1-150200.5.3.1 * SUSE Manager Proxy 4.3 LTS (noarch) * postgresql-docs-18-150400.4.21.2 * postgresql-server-18-150400.4.21.2 * postgresql-pltcl-18-150400.4.21.2 * postgresql-18-150400.4.21.2 * postgresql-plperl-18-150400.4.21.2 * postgresql-contrib-18-150400.4.21.2 * postgresql-plpython-18-150400.4.21.2 * postgresql-devel-18-150400.4.21.2 * postgresql-server-devel-18-150400.4.21.2 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libecpg6-18.1-150200.5.3.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-debuginfo-18.1-150200.5.3.1 * libpq5-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-18.1-150200.5.3.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * postgresql-docs-18-150400.4.21.2 * postgresql-server-18-150400.4.21.2 * postgresql-pltcl-18-150400.4.21.2 * postgresql-18-150400.4.21.2 * postgresql-plperl-18-150400.4.21.2 * postgresql-contrib-18-150400.4.21.2 * postgresql-plpython-18-150400.4.21.2 * postgresql-devel-18-150400.4.21.2 * postgresql-server-devel-18-150400.4.21.2 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * libecpg6-debuginfo-18.1-150200.5.3.1 * libecpg6-18.1-150200.5.3.1 * libpq5-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * SUSE Manager Server 4.3 LTS (noarch) * postgresql-docs-18-150400.4.21.2 * postgresql-server-18-150400.4.21.2 * postgresql-pltcl-18-150400.4.21.2 * postgresql-18-150400.4.21.2 * postgresql17-docs-17.7-150200.5.19.1 * postgresql-plperl-18-150400.4.21.2 * postgresql-contrib-18-150400.4.21.2 * postgresql-plpython-18-150400.4.21.2 * postgresql-devel-18-150400.4.21.2 * postgresql-server-devel-18-150400.4.21.2 * SUSE Manager Server 4.3 LTS (s390x) * postgresql18-debuginfo-18.1-150200.5.3.1 * postgresql17-devel-17.7-150200.5.19.1 * postgresql17-server-17.7-150200.5.19.1 * postgresql17-contrib-17.7-150200.5.19.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * postgresql17-plperl-debuginfo-17.7-150200.5.19.1 * postgresql17-plperl-17.7-150200.5.19.1 * postgresql17-plpython-17.7-150200.5.19.1 * postgresql17-server-debuginfo-17.7-150200.5.19.1 * postgresql17-server-devel-17.7-150200.5.19.1 * postgresql17-17.7-150200.5.19.1 * postgresql17-debugsource-17.7-150200.5.19.1 * postgresql17-server-devel-debuginfo-17.7-150200.5.19.1 * postgresql17-pltcl-17.7-150200.5.19.1 * postgresql18-debugsource-18.1-150200.5.3.1 * postgresql17-pltcl-debuginfo-17.7-150200.5.19.1 * postgresql17-contrib-debuginfo-17.7-150200.5.19.1 * postgresql17-devel-debuginfo-17.7-150200.5.19.1 * postgresql17-plpython-debuginfo-17.7-150200.5.19.1 * SUSE Manager Server 4.3 LTS (x86_64) * libpq5-32bit-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-18.1-150200.5.3.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql18-debuginfo-18.1-150200.5.3.1 * libecpg6-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql-plperl-18-150300.10.30.2 * postgresql-server-18-150300.10.30.2 * postgresql-docs-18-150300.10.30.2 * postgresql-plpython-18-150300.10.30.2 * postgresql-devel-18-150300.10.30.2 * postgresql-server-devel-18-150300.10.30.2 * postgresql-pltcl-18-150300.10.30.2 * postgresql-contrib-18-150300.10.30.2 * postgresql-18-150300.10.30.2 * openSUSE Leap 15.3 (noarch) * postgresql-plperl-18-150300.10.30.2 * postgresql-server-18-150300.10.30.2 * postgresql-docs-18-150300.10.30.2 * postgresql-plpython-18-150300.10.30.2 * postgresql-llvmjit-18-150300.10.30.2 * postgresql-devel-18-150300.10.30.2 * postgresql-server-devel-18-150300.10.30.2 * postgresql-pltcl-18-150300.10.30.2 * postgresql-contrib-18-150300.10.30.2 * postgresql-18-150300.10.30.2 * postgresql-test-18-150300.10.30.2 * postgresql-llvmjit-devel-18-150300.10.30.2 * openSUSE Leap 15.4 (noarch) * postgresql-docs-18-150400.4.21.2 * postgresql-server-18-150400.4.21.2 * postgresql-pltcl-18-150400.4.21.2 * postgresql-18-150400.4.21.2 * postgresql-plperl-18-150400.4.21.2 * postgresql-llvmjit-devel-18-150400.4.21.2 * postgresql-contrib-18-150400.4.21.2 * postgresql-plpython-18-150400.4.21.2 * postgresql-test-18-150400.4.21.2 * postgresql-llvmjit-18-150400.4.21.2 * postgresql-devel-18-150400.4.21.2 * postgresql-server-devel-18-150400.4.21.2 * openSUSE Leap 15.5 (noarch) * postgresql-plpython-18-150500.10.12.2 * postgresql-18-150500.10.12.2 * postgresql-plperl-18-150500.10.12.2 * postgresql-devel-18-150500.10.12.2 * postgresql-server-18-150500.10.12.2 * postgresql-docs-18-150500.10.12.2 * postgresql-contrib-18-150500.10.12.2 * postgresql-pltcl-18-150500.10.12.2 * postgresql-test-18-150500.10.12.2 * postgresql-server-devel-18-150500.10.12.2 * postgresql-llvmjit-devel-18-150500.10.12.2 * postgresql-llvmjit-18-150500.10.12.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql18-debuginfo-18.1-150200.5.3.1 * libecpg6-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql-plperl-18-150300.10.30.2 * postgresql-server-18-150300.10.30.2 * postgresql-docs-18-150300.10.30.2 * postgresql-plpython-18-150300.10.30.2 * postgresql-devel-18-150300.10.30.2 * postgresql-server-devel-18-150300.10.30.2 * postgresql-pltcl-18-150300.10.30.2 * postgresql-contrib-18-150300.10.30.2 * postgresql-18-150300.10.30.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql18-debuginfo-18.1-150200.5.3.1 * libecpg6-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql-docs-18-150400.4.21.2 * postgresql-server-18-150400.4.21.2 * postgresql-pltcl-18-150400.4.21.2 * postgresql-18-150400.4.21.2 * postgresql-plperl-18-150400.4.21.2 * postgresql-llvmjit-devel-18-150400.4.21.2 * postgresql-contrib-18-150400.4.21.2 * postgresql-plpython-18-150400.4.21.2 * postgresql-llvmjit-18-150400.4.21.2 * postgresql-devel-18-150400.4.21.2 * postgresql-server-devel-18-150400.4.21.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libpq5-32bit-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-18.1-150200.5.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql18-debuginfo-18.1-150200.5.3.1 * libecpg6-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql-docs-18-150400.4.21.2 * postgresql-server-18-150400.4.21.2 * postgresql-pltcl-18-150400.4.21.2 * postgresql-18-150400.4.21.2 * postgresql-plperl-18-150400.4.21.2 * postgresql-llvmjit-devel-18-150400.4.21.2 * postgresql-contrib-18-150400.4.21.2 * postgresql-plpython-18-150400.4.21.2 * postgresql-llvmjit-18-150400.4.21.2 * postgresql-devel-18-150400.4.21.2 * postgresql-server-devel-18-150400.4.21.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libpq5-32bit-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-18.1-150200.5.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libecpg6-18.1-150200.5.3.1 * postgresql17-plperl-debuginfo-17.7-150200.5.19.1 * postgresql17-plperl-17.7-150200.5.19.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * postgresql17-server-devel-debuginfo-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql17-pltcl-17.7-150200.5.19.1 * postgresql17-pltcl-debuginfo-17.7-150200.5.19.1 * postgresql17-server-17.7-150200.5.19.1 * postgresql17-plpython-17.7-150200.5.19.1 * postgresql17-server-debuginfo-17.7-150200.5.19.1 * postgresql17-17.7-150200.5.19.1 * postgresql17-contrib-debuginfo-17.7-150200.5.19.1 * postgresql17-devel-debuginfo-17.7-150200.5.19.1 * postgresql17-devel-17.7-150200.5.19.1 * postgresql17-contrib-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * postgresql18-debuginfo-18.1-150200.5.3.1 * postgresql17-server-devel-17.7-150200.5.19.1 * postgresql17-plpython-debuginfo-17.7-150200.5.19.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * postgresql-plpython-18-150500.10.12.2 * postgresql-18-150500.10.12.2 * postgresql-plperl-18-150500.10.12.2 * postgresql-devel-18-150500.10.12.2 * postgresql-server-18-150500.10.12.2 * postgresql-docs-18-150500.10.12.2 * postgresql17-docs-17.7-150200.5.19.1 * postgresql-contrib-18-150500.10.12.2 * postgresql-pltcl-18-150500.10.12.2 * postgresql-server-devel-18-150500.10.12.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libpq5-32bit-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-18.1-150200.5.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libecpg6-18.1-150200.5.3.1 * postgresql17-plperl-debuginfo-17.7-150200.5.19.1 * postgresql17-plperl-17.7-150200.5.19.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * postgresql17-server-devel-debuginfo-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql17-pltcl-17.7-150200.5.19.1 * postgresql17-pltcl-debuginfo-17.7-150200.5.19.1 * postgresql17-server-17.7-150200.5.19.1 * postgresql17-plpython-17.7-150200.5.19.1 * postgresql17-server-debuginfo-17.7-150200.5.19.1 * postgresql17-17.7-150200.5.19.1 * postgresql17-contrib-debuginfo-17.7-150200.5.19.1 * postgresql17-devel-debuginfo-17.7-150200.5.19.1 * postgresql17-devel-17.7-150200.5.19.1 * postgresql17-contrib-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * postgresql18-debuginfo-18.1-150200.5.3.1 * postgresql17-server-devel-17.7-150200.5.19.1 * postgresql17-plpython-debuginfo-17.7-150200.5.19.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * postgresql-plpython-18-150500.10.12.2 * postgresql-18-150500.10.12.2 * postgresql-plperl-18-150500.10.12.2 * postgresql-devel-18-150500.10.12.2 * postgresql-server-18-150500.10.12.2 * postgresql-docs-18-150500.10.12.2 * postgresql17-docs-17.7-150200.5.19.1 * postgresql-contrib-18-150500.10.12.2 * postgresql-pltcl-18-150500.10.12.2 * postgresql-server-devel-18-150500.10.12.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libpq5-32bit-debuginfo-18.1-150200.5.3.1 * libpq5-32bit-18.1-150200.5.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * postgresql18-debuginfo-18.1-150200.5.3.1 * libecpg6-18.1-150200.5.3.1 * postgresql17-debuginfo-17.7-150200.5.19.1 * libecpg6-debuginfo-18.1-150200.5.3.1 * postgresql17-debugsource-17.7-150200.5.19.1 * libpq5-18.1-150200.5.3.1 * postgresql18-debugsource-18.1-150200.5.3.1 * libpq5-debuginfo-18.1-150200.5.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * postgresql-plperl-18-150300.10.30.2 * postgresql-server-18-150300.10.30.2 * postgresql-docs-18-150300.10.30.2 * postgresql-plpython-18-150300.10.30.2 * postgresql-devel-18-150300.10.30.2 * postgresql-server-devel-18-150300.10.30.2 * postgresql-pltcl-18-150300.10.30.2 * postgresql-contrib-18-150300.10.30.2 * postgresql-18-150300.10.30.2 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 11 12:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 11 Dec 2025 12:30:12 -0000 Subject: SUSE-SU-2025:4363-1: important: Security update for postgresql17, postgresql18 Message-ID: <176545621228.5018.9936820885957423686@smelt2.prg2.suse.org> # Security update for postgresql17, postgresql18 Announcement ID: SUSE-SU-2025:4363-1 Release Date: 2025-12-11T10:10:59Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql17, postgresql18 fixes the following issues: Changes in postgresql18: * Fix build with uring for post SLE15 code streams. Update to 18.1: * https://www.postgresql.org/about/news/p-3171/ * https://www.postgresql.org/docs/release/18.1/ * bsc#1253332, CVE-2025-12817: Missing check for CREATE privileges on the schema in CREATE STATISTICS allowed table owners to create statistics in any schema, potentially leading to unexpected naming conflicts. * bsc#1253333, CVE-2025-12818: Several places in libpq were not sufficiently careful about computing the required size of a memory allocation. Sufficiently large inputs could cause integer overflow, resulting in an undersized buffer, which would then lead to writing past the end of the buffer. * pg_config --libs returns -lnuma so we need to require it. Update to 18.0: * https://www.postgresql.org/about/news/p-3142/ * https://www.postgresql.org/docs/18/release-18.html Changes in postgresql17: Update to 17.7: * https://www.postgresql.org/about/news/p-3171/ * https://www.postgresql.org/docs/release/17.7/ * bsc#1253332, CVE-2025-12817: Missing check for CREATE privileges on the schema in CREATE STATISTICS allowed table owners to create statistics in any schema, potentially leading to unexpected naming conflicts. * bsc#1253333, CVE-2025-12818: Several places in libpq were not sufficiently careful about computing the required size of a memory allocation. Sufficiently large inputs could cause integer overflow, resulting in an undersized buffer, which would then lead to writing past the end of the buffer. * switch library to pg 18 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4363=1 openSUSE-SLE-15.6-2025-4363=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4363=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4363=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4363=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4363=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-4363=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-4363=1 ## Package List: * openSUSE Leap 15.6 (noarch) * postgresql-plperl-18-150600.17.9.1 * postgresql-pltcl-18-150600.17.9.1 * postgresql-devel-18-150600.17.9.1 * postgresql-llvmjit-devel-18-150600.17.9.1 * postgresql-server-devel-18-150600.17.9.1 * postgresql-test-18-150600.17.9.1 * postgresql-docs-18-150600.17.9.1 * postgresql17-docs-17.7-150600.13.19.1 * postgresql18-docs-18.1-150600.13.3.1 * postgresql-server-18-150600.17.9.1 * postgresql-plpython-18-150600.17.9.1 * postgresql-contrib-18-150600.17.9.1 * postgresql-llvmjit-18-150600.17.9.1 * postgresql-18-150600.17.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * postgresql17-pltcl-17.7-150600.13.19.1 * postgresql18-mini-debugsource-18.1-150600.13.3.1 * postgresql17-server-devel-17.7-150600.13.19.1 * libpq5-18.1-150600.13.3.1 * postgresql17-server-devel-debuginfo-17.7-150600.13.19.1 * libecpg6-debuginfo-18.1-150600.13.3.1 * postgresql18-devel-18.1-150600.13.3.1 * postgresql18-llvmjit-debuginfo-18.1-150600.13.3.1 * postgresql17-contrib-17.7-150600.13.19.1 * postgresql18-server-devel-debuginfo-18.1-150600.13.3.1 * postgresql17-devel-debuginfo-17.7-150600.13.19.1 * postgresql17-pltcl-debuginfo-17.7-150600.13.19.1 * postgresql17-debugsource-17.7-150600.13.19.1 * postgresql18-devel-debuginfo-18.1-150600.13.3.1 * postgresql17-plpython-17.7-150600.13.19.1 * postgresql18-server-18.1-150600.13.3.1 * postgresql18-18.1-150600.13.3.1 * postgresql18-llvmjit-devel-18.1-150600.13.3.1 * postgresql17-llvmjit-devel-17.7-150600.13.19.1 * postgresql17-server-debuginfo-17.7-150600.13.19.1 * libpq5-debuginfo-18.1-150600.13.3.1 * postgresql18-devel-mini-18.1-150600.13.3.1 * postgresql17-devel-17.7-150600.13.19.1 * postgresql18-debugsource-18.1-150600.13.3.1 * postgresql17-plpython-debuginfo-17.7-150600.13.19.1 * postgresql18-llvmjit-18.1-150600.13.3.1 * postgresql17-plperl-debuginfo-17.7-150600.13.19.1 * postgresql18-devel-mini-debuginfo-18.1-150600.13.3.1 * postgresql17-plperl-17.7-150600.13.19.1 * postgresql17-server-17.7-150600.13.19.1 * postgresql18-pltcl-18.1-150600.13.3.1 * postgresql17-llvmjit-17.7-150600.13.19.1 * postgresql18-contrib-18.1-150600.13.3.1 * postgresql18-pltcl-debuginfo-18.1-150600.13.3.1 * postgresql18-debuginfo-18.1-150600.13.3.1 * postgresql18-plpython-debuginfo-18.1-150600.13.3.1 * libecpg6-18.1-150600.13.3.1 * postgresql18-contrib-debuginfo-18.1-150600.13.3.1 * postgresql18-plperl-18.1-150600.13.3.1 * postgresql17-llvmjit-debuginfo-17.7-150600.13.19.1 * postgresql17-test-17.7-150600.13.19.1 * postgresql18-plpython-18.1-150600.13.3.1 * postgresql17-17.7-150600.13.19.1 * postgresql17-debuginfo-17.7-150600.13.19.1 * postgresql18-test-18.1-150600.13.3.1 * postgresql18-server-debuginfo-18.1-150600.13.3.1 * postgresql17-contrib-debuginfo-17.7-150600.13.19.1 * postgresql18-plperl-debuginfo-18.1-150600.13.3.1 * postgresql18-server-devel-18.1-150600.13.3.1 * openSUSE Leap 15.6 (x86_64) * libpq5-32bit-18.1-150600.13.3.1 * libecpg6-32bit-18.1-150600.13.3.1 * libpq5-32bit-debuginfo-18.1-150600.13.3.1 * libecpg6-32bit-debuginfo-18.1-150600.13.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libecpg6-64bit-18.1-150600.13.3.1 * libpq5-64bit-debuginfo-18.1-150600.13.3.1 * libecpg6-64bit-debuginfo-18.1-150600.13.3.1 * libpq5-64bit-18.1-150600.13.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * postgresql18-18.1-150600.13.3.1 * postgresql17-17.7-150600.13.19.1 * libpq5-18.1-150600.13.3.1 * postgresql17-debuginfo-17.7-150600.13.19.1 * libpq5-debuginfo-18.1-150600.13.3.1 * postgresql18-debuginfo-18.1-150600.13.3.1 * postgresql17-debugsource-17.7-150600.13.19.1 * postgresql18-debugsource-18.1-150600.13.3.1 * Basesystem Module 15-SP6 (noarch) * postgresql-18-150600.17.9.1 * Basesystem Module 15-SP6 (x86_64) * libpq5-32bit-debuginfo-18.1-150600.13.3.1 * libpq5-32bit-18.1-150600.13.3.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql18-18.1-150600.13.3.1 * postgresql17-17.7-150600.13.19.1 * libpq5-18.1-150600.13.3.1 * postgresql17-debuginfo-17.7-150600.13.19.1 * libpq5-debuginfo-18.1-150600.13.3.1 * postgresql18-debuginfo-18.1-150600.13.3.1 * postgresql17-debugsource-17.7-150600.13.19.1 * postgresql18-debugsource-18.1-150600.13.3.1 * Basesystem Module 15-SP7 (noarch) * postgresql-18-150700.23.3.1 * Basesystem Module 15-SP7 (x86_64) * libpq5-32bit-debuginfo-18.1-150600.13.3.1 * libpq5-32bit-18.1-150600.13.3.1 * SUSE Package Hub 15 15-SP6 (noarch) * postgresql-plperl-18-150600.17.9.1 * postgresql-pltcl-18-150600.17.9.1 * postgresql-devel-18-150600.17.9.1 * postgresql-llvmjit-devel-18-150600.17.9.1 * postgresql-server-devel-18-150600.17.9.1 * postgresql-test-18-150600.17.9.1 * postgresql-docs-18-150600.17.9.1 * postgresql-server-18-150600.17.9.1 * postgresql-plpython-18-150600.17.9.1 * postgresql-contrib-18-150600.17.9.1 * postgresql-llvmjit-18-150600.17.9.1 * postgresql-18-150600.17.9.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * postgresql18-llvmjit-devel-18.1-150600.13.3.1 * postgresql17-llvmjit-debuginfo-17.7-150600.13.19.1 * postgresql17-llvmjit-devel-17.7-150600.13.19.1 * postgresql17-test-17.7-150600.13.19.1 * postgresql17-debuginfo-17.7-150600.13.19.1 * postgresql18-test-18.1-150600.13.3.1 * postgresql18-llvmjit-debuginfo-18.1-150600.13.3.1 * postgresql17-llvmjit-17.7-150600.13.19.1 * postgresql18-llvmjit-18.1-150600.13.3.1 * postgresql17-debugsource-17.7-150600.13.19.1 * SUSE Package Hub 15 15-SP7 (noarch) * postgresql-server-devel-18-150700.23.3.1 * postgresql-plperl-18-150700.23.3.1 * postgresql-llvmjit-devel-18-150700.23.3.1 * postgresql-18-150700.23.3.1 * postgresql-plpython-18-150700.23.3.1 * postgresql-docs-18-150700.23.3.1 * postgresql-llvmjit-18-150700.23.3.1 * postgresql-devel-18-150700.23.3.1 * postgresql-contrib-18-150700.23.3.1 * postgresql-server-18-150700.23.3.1 * postgresql-pltcl-18-150700.23.3.1 * postgresql-test-18-150700.23.3.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql18-llvmjit-devel-18.1-150600.13.3.1 * postgresql17-llvmjit-debuginfo-17.7-150600.13.19.1 * postgresql17-llvmjit-devel-17.7-150600.13.19.1 * postgresql17-test-17.7-150600.13.19.1 * postgresql17-debuginfo-17.7-150600.13.19.1 * postgresql18-test-18.1-150600.13.3.1 * postgresql18-llvmjit-debuginfo-18.1-150600.13.3.1 * postgresql17-llvmjit-17.7-150600.13.19.1 * postgresql18-llvmjit-18.1-150600.13.3.1 * postgresql17-debugsource-17.7-150600.13.19.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * postgresql17-pltcl-17.7-150600.13.19.1 * postgresql17-server-devel-17.7-150600.13.19.1 * postgresql18-devel-18.1-150600.13.3.1 * postgresql17-server-devel-debuginfo-17.7-150600.13.19.1 * libecpg6-debuginfo-18.1-150600.13.3.1 * postgresql17-contrib-17.7-150600.13.19.1 * postgresql18-server-devel-debuginfo-18.1-150600.13.3.1 * postgresql17-devel-debuginfo-17.7-150600.13.19.1 * postgresql17-pltcl-debuginfo-17.7-150600.13.19.1 * postgresql17-debugsource-17.7-150600.13.19.1 * postgresql18-devel-debuginfo-18.1-150600.13.3.1 * postgresql17-plpython-17.7-150600.13.19.1 * postgresql18-server-18.1-150600.13.3.1 * postgresql17-server-debuginfo-17.7-150600.13.19.1 * postgresql17-devel-17.7-150600.13.19.1 * postgresql18-debugsource-18.1-150600.13.3.1 * postgresql17-plpython-debuginfo-17.7-150600.13.19.1 * postgresql17-plperl-debuginfo-17.7-150600.13.19.1 * postgresql17-plperl-17.7-150600.13.19.1 * postgresql17-server-17.7-150600.13.19.1 * postgresql18-pltcl-18.1-150600.13.3.1 * postgresql18-contrib-18.1-150600.13.3.1 * postgresql18-pltcl-debuginfo-18.1-150600.13.3.1 * postgresql18-debuginfo-18.1-150600.13.3.1 * postgresql18-plpython-debuginfo-18.1-150600.13.3.1 * libecpg6-18.1-150600.13.3.1 * postgresql18-contrib-debuginfo-18.1-150600.13.3.1 * postgresql18-plperl-18.1-150600.13.3.1 * postgresql18-plpython-18.1-150600.13.3.1 * postgresql17-debuginfo-17.7-150600.13.19.1 * postgresql18-server-debuginfo-18.1-150600.13.3.1 * postgresql17-contrib-debuginfo-17.7-150600.13.19.1 * postgresql18-plperl-debuginfo-18.1-150600.13.3.1 * postgresql18-server-devel-18.1-150600.13.3.1 * Server Applications Module 15-SP6 (noarch) * postgresql-plperl-18-150600.17.9.1 * postgresql-pltcl-18-150600.17.9.1 * postgresql-devel-18-150600.17.9.1 * postgresql-server-devel-18-150600.17.9.1 * postgresql17-docs-17.7-150600.13.19.1 * postgresql18-docs-18.1-150600.13.3.1 * postgresql-docs-18-150600.17.9.1 * postgresql-server-18-150600.17.9.1 * postgresql-plpython-18-150600.17.9.1 * postgresql-contrib-18-150600.17.9.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql17-pltcl-17.7-150600.13.19.1 * postgresql17-server-devel-17.7-150600.13.19.1 * postgresql18-devel-18.1-150600.13.3.1 * postgresql17-server-devel-debuginfo-17.7-150600.13.19.1 * libecpg6-debuginfo-18.1-150600.13.3.1 * postgresql17-contrib-17.7-150600.13.19.1 * postgresql18-server-devel-debuginfo-18.1-150600.13.3.1 * postgresql17-devel-debuginfo-17.7-150600.13.19.1 * postgresql17-pltcl-debuginfo-17.7-150600.13.19.1 * postgresql17-debugsource-17.7-150600.13.19.1 * postgresql18-devel-debuginfo-18.1-150600.13.3.1 * postgresql17-plpython-17.7-150600.13.19.1 * postgresql18-server-18.1-150600.13.3.1 * postgresql17-server-debuginfo-17.7-150600.13.19.1 * postgresql17-devel-17.7-150600.13.19.1 * postgresql18-debugsource-18.1-150600.13.3.1 * postgresql17-plpython-debuginfo-17.7-150600.13.19.1 * postgresql17-plperl-debuginfo-17.7-150600.13.19.1 * postgresql17-plperl-17.7-150600.13.19.1 * postgresql17-server-17.7-150600.13.19.1 * postgresql18-pltcl-18.1-150600.13.3.1 * postgresql18-contrib-18.1-150600.13.3.1 * postgresql18-pltcl-debuginfo-18.1-150600.13.3.1 * postgresql18-debuginfo-18.1-150600.13.3.1 * postgresql18-plpython-debuginfo-18.1-150600.13.3.1 * libecpg6-18.1-150600.13.3.1 * postgresql18-contrib-debuginfo-18.1-150600.13.3.1 * postgresql18-plperl-18.1-150600.13.3.1 * postgresql18-plpython-18.1-150600.13.3.1 * postgresql17-debuginfo-17.7-150600.13.19.1 * postgresql18-server-debuginfo-18.1-150600.13.3.1 * postgresql17-contrib-debuginfo-17.7-150600.13.19.1 * postgresql18-plperl-debuginfo-18.1-150600.13.3.1 * postgresql18-server-devel-18.1-150600.13.3.1 * Server Applications Module 15-SP7 (noarch) * postgresql-server-devel-18-150700.23.3.1 * postgresql-plperl-18-150700.23.3.1 * postgresql17-docs-17.7-150600.13.19.1 * postgresql18-docs-18.1-150600.13.3.1 * postgresql-plpython-18-150700.23.3.1 * postgresql-docs-18-150700.23.3.1 * postgresql-devel-18-150700.23.3.1 * postgresql-contrib-18-150700.23.3.1 * postgresql-server-18-150700.23.3.1 * postgresql-pltcl-18-150700.23.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 11 16:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 11 Dec 2025 16:30:04 -0000 Subject: SUSE-SU-2025:4368-1: low: Security update for python3 Message-ID: <176547060470.12425.12171666305013158115@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2025:4368-1 Release Date: 2025-12-11T15:12:56Z Rating: low References: * bsc#1251305 * bsc#1252974 Cross-References: * CVE-2025-6075 * CVE-2025-8291 CVSS scores: * CVE-2025-6075 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-6075 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-6075 ( NVD ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8291 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-8291 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-8291 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.3 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for python3 fixes the following issues: * CVE-2025-6075: quadratic complexity in `os.path.expandvars()` can lead to performance degradation when values passed to it are user-controlled (bsc#1252974). * CVE-2025-8291: lack of validity checks on the ZIP64 End of Central Directory (EOCD) record allows for the creation of ZIP archives that are processed inconsistently by the `zipfile` module (bsc#1251305). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4368=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4368=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4368=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4368=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4368=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4368=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4368=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4368=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4368=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-4368=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-4368=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4368=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4368=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python3-tk-debuginfo-3.6.15-150300.10.100.1 * python3-dbm-3.6.15-150300.10.100.1 * python3-curses-3.6.15-150300.10.100.1 * python3-debuginfo-3.6.15-150300.10.100.1 * python3-core-debugsource-3.6.15-150300.10.100.1 * python3-doc-devhelp-3.6.15-150300.10.100.1 * libpython3_6m1_0-3.6.15-150300.10.100.1 * python3-idle-3.6.15-150300.10.100.1 * python3-devel-3.6.15-150300.10.100.1 * python3-debugsource-3.6.15-150300.10.100.1 * python3-testsuite-debuginfo-3.6.15-150300.10.100.1 * python3-doc-3.6.15-150300.10.100.1 * python3-base-debuginfo-3.6.15-150300.10.100.1 * python3-base-3.6.15-150300.10.100.1 * python3-3.6.15-150300.10.100.1 * python3-tk-3.6.15-150300.10.100.1 * python3-devel-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.100.1 * python3-testsuite-3.6.15-150300.10.100.1 * python3-curses-debuginfo-3.6.15-150300.10.100.1 * python3-dbm-debuginfo-3.6.15-150300.10.100.1 * python3-tools-3.6.15-150300.10.100.1 * openSUSE Leap 15.3 (x86_64) * libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-32bit-3.6.15-150300.10.100.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libpython3_6m1_0-64bit-3.6.15-150300.10.100.1 * libpython3_6m1_0-64bit-debuginfo-3.6.15-150300.10.100.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python3-tk-debuginfo-3.6.15-150300.10.100.1 * python3-dbm-3.6.15-150300.10.100.1 * python3-curses-3.6.15-150300.10.100.1 * python3-debuginfo-3.6.15-150300.10.100.1 * python3-core-debugsource-3.6.15-150300.10.100.1 * libpython3_6m1_0-3.6.15-150300.10.100.1 * python3-idle-3.6.15-150300.10.100.1 * python3-devel-3.6.15-150300.10.100.1 * python3-debugsource-3.6.15-150300.10.100.1 * python3-testsuite-debuginfo-3.6.15-150300.10.100.1 * python3-doc-3.6.15-150300.10.100.1 * python3-base-debuginfo-3.6.15-150300.10.100.1 * python3-base-3.6.15-150300.10.100.1 * python3-3.6.15-150300.10.100.1 * python3-tk-3.6.15-150300.10.100.1 * python3-devel-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.100.1 * python3-tools-3.6.15-150300.10.100.1 * python3-curses-debuginfo-3.6.15-150300.10.100.1 * python3-dbm-debuginfo-3.6.15-150300.10.100.1 * python3-testsuite-3.6.15-150300.10.100.1 * python3-doc-devhelp-3.6.15-150300.10.100.1 * openSUSE Leap 15.6 (x86_64) * libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-32bit-3.6.15-150300.10.100.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python3-core-debugsource-3.6.15-150300.10.100.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.100.1 * python3-base-debuginfo-3.6.15-150300.10.100.1 * python3-base-3.6.15-150300.10.100.1 * python3-3.6.15-150300.10.100.1 * python3-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-3.6.15-150300.10.100.1 * python3-debugsource-3.6.15-150300.10.100.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python3-core-debugsource-3.6.15-150300.10.100.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.100.1 * python3-base-debuginfo-3.6.15-150300.10.100.1 * python3-base-3.6.15-150300.10.100.1 * python3-3.6.15-150300.10.100.1 * python3-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-3.6.15-150300.10.100.1 * python3-debugsource-3.6.15-150300.10.100.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python3-core-debugsource-3.6.15-150300.10.100.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.100.1 * python3-base-debuginfo-3.6.15-150300.10.100.1 * python3-base-3.6.15-150300.10.100.1 * python3-3.6.15-150300.10.100.1 * python3-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-3.6.15-150300.10.100.1 * python3-debugsource-3.6.15-150300.10.100.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python3-core-debugsource-3.6.15-150300.10.100.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.100.1 * python3-base-debuginfo-3.6.15-150300.10.100.1 * python3-base-3.6.15-150300.10.100.1 * python3-3.6.15-150300.10.100.1 * python3-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-3.6.15-150300.10.100.1 * python3-debugsource-3.6.15-150300.10.100.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * python3-core-debugsource-3.6.15-150300.10.100.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.100.1 * python3-base-debuginfo-3.6.15-150300.10.100.1 * python3-base-3.6.15-150300.10.100.1 * python3-3.6.15-150300.10.100.1 * python3-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-3.6.15-150300.10.100.1 * python3-debugsource-3.6.15-150300.10.100.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-core-debugsource-3.6.15-150300.10.100.1 * python3-tk-debuginfo-3.6.15-150300.10.100.1 * python3-idle-3.6.15-150300.10.100.1 * python3-devel-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.100.1 * python3-dbm-3.6.15-150300.10.100.1 * python3-curses-3.6.15-150300.10.100.1 * python3-tk-3.6.15-150300.10.100.1 * python3-base-debuginfo-3.6.15-150300.10.100.1 * python3-base-3.6.15-150300.10.100.1 * python3-3.6.15-150300.10.100.1 * python3-curses-debuginfo-3.6.15-150300.10.100.1 * python3-dbm-debuginfo-3.6.15-150300.10.100.1 * python3-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-3.6.15-150300.10.100.1 * python3-devel-3.6.15-150300.10.100.1 * python3-debugsource-3.6.15-150300.10.100.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python3-core-debugsource-3.6.15-150300.10.100.1 * python3-tk-debuginfo-3.6.15-150300.10.100.1 * python3-idle-3.6.15-150300.10.100.1 * python3-devel-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.100.1 * python3-dbm-3.6.15-150300.10.100.1 * python3-curses-3.6.15-150300.10.100.1 * python3-tk-3.6.15-150300.10.100.1 * python3-base-debuginfo-3.6.15-150300.10.100.1 * python3-base-3.6.15-150300.10.100.1 * python3-3.6.15-150300.10.100.1 * python3-curses-debuginfo-3.6.15-150300.10.100.1 * python3-dbm-debuginfo-3.6.15-150300.10.100.1 * python3-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-3.6.15-150300.10.100.1 * python3-devel-3.6.15-150300.10.100.1 * python3-debugsource-3.6.15-150300.10.100.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-tools-3.6.15-150300.10.100.1 * python3-core-debugsource-3.6.15-150300.10.100.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python3-tools-3.6.15-150300.10.100.1 * python3-core-debugsource-3.6.15-150300.10.100.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * python3-core-debugsource-3.6.15-150300.10.100.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.100.1 * python3-base-debuginfo-3.6.15-150300.10.100.1 * python3-base-3.6.15-150300.10.100.1 * python3-3.6.15-150300.10.100.1 * python3-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-3.6.15-150300.10.100.1 * python3-debugsource-3.6.15-150300.10.100.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * python3-core-debugsource-3.6.15-150300.10.100.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.100.1 * python3-base-debuginfo-3.6.15-150300.10.100.1 * python3-base-3.6.15-150300.10.100.1 * python3-3.6.15-150300.10.100.1 * python3-debuginfo-3.6.15-150300.10.100.1 * libpython3_6m1_0-3.6.15-150300.10.100.1 * python3-debugsource-3.6.15-150300.10.100.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6075.html * https://www.suse.com/security/cve/CVE-2025-8291.html * https://bugzilla.suse.com/show_bug.cgi?id=1251305 * https://bugzilla.suse.com/show_bug.cgi?id=1252974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 11 20:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 11 Dec 2025 20:30:04 -0000 Subject: SUSE-SU-2025:4372-1: important: Security update for postgresql15 Message-ID: <176548500482.5149.9004240949156219456@smelt2.prg2.suse.org> # Security update for postgresql15 Announcement ID: SUSE-SU-2025:4372-1 Release Date: 2025-12-11T19:06:41Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql15 fixes the following issues: Upgraded to 15.15: * CVE-2025-12817: Fixed missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332) * CVE-2025-12818: Fixed integer overflow in allocation-size calculations within libpq (bsc#1253333) Other fixes: * Use %product_libs_llvm_ver to determine the LLVM version. * Remove conditionals for obsolete PostgreSQL releases. * Sync spec file from version 18. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4372=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4372=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-pltcl-15.15-3.47.1 * postgresql15-debugsource-15.15-3.47.1 * postgresql15-plperl-debuginfo-15.15-3.47.1 * postgresql15-server-15.15-3.47.1 * postgresql15-server-devel-15.15-3.47.1 * postgresql15-contrib-debuginfo-15.15-3.47.1 * postgresql15-15.15-3.47.1 * postgresql15-plpython-debuginfo-15.15-3.47.1 * postgresql15-devel-debuginfo-15.15-3.47.1 * postgresql15-server-devel-debuginfo-15.15-3.47.1 * postgresql15-server-debuginfo-15.15-3.47.1 * postgresql15-plpython-15.15-3.47.1 * postgresql15-plperl-15.15-3.47.1 * postgresql15-contrib-15.15-3.47.1 * postgresql15-pltcl-debuginfo-15.15-3.47.1 * postgresql15-devel-15.15-3.47.1 * postgresql15-debuginfo-15.15-3.47.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * postgresql15-docs-15.15-3.47.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * postgresql15-pltcl-15.15-3.47.1 * postgresql15-debugsource-15.15-3.47.1 * postgresql15-plperl-debuginfo-15.15-3.47.1 * postgresql15-server-15.15-3.47.1 * postgresql15-server-devel-15.15-3.47.1 * postgresql15-contrib-debuginfo-15.15-3.47.1 * postgresql15-15.15-3.47.1 * postgresql15-plpython-debuginfo-15.15-3.47.1 * postgresql15-devel-debuginfo-15.15-3.47.1 * postgresql15-server-devel-debuginfo-15.15-3.47.1 * postgresql15-server-debuginfo-15.15-3.47.1 * postgresql15-plpython-15.15-3.47.1 * postgresql15-plperl-15.15-3.47.1 * postgresql15-contrib-15.15-3.47.1 * postgresql15-pltcl-debuginfo-15.15-3.47.1 * postgresql15-devel-15.15-3.47.1 * postgresql15-debuginfo-15.15-3.47.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * postgresql15-docs-15.15-3.47.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 11 20:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 11 Dec 2025 20:30:08 -0000 Subject: SUSE-SU-2025:4371-1: important: Security update for postgresql14 Message-ID: <176548500815.5149.7552897092639163750@smelt2.prg2.suse.org> # Security update for postgresql14 Announcement ID: SUSE-SU-2025:4371-1 Release Date: 2025-12-11T19:05:09Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Legacy Module 15-SP6 * Legacy Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql14 fixes the following issues: Upgraded to 14.20: * CVE-2025-12817: Fixed missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332) * CVE-2025-12818: Fixed integer overflow in allocation-size calculations within libpq (bsc#1253333) Other fixes: * Use %product_libs_llvm_ver to determine the LLVM version. * Remove conditionals for obsolete PostgreSQL releases. * Sync spec file from version 18. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4371=1 openSUSE-SLE-15.6-2025-4371=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-4371=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-4371=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4371=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4371=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * postgresql14-plpython-14.20-150600.16.23.1 * postgresql14-contrib-debuginfo-14.20-150600.16.23.1 * postgresql14-devel-14.20-150600.16.23.1 * postgresql14-test-14.20-150600.16.23.1 * postgresql14-devel-debuginfo-14.20-150600.16.23.1 * postgresql14-debugsource-14.20-150600.16.23.1 * postgresql14-debuginfo-14.20-150600.16.23.1 * postgresql14-server-devel-14.20-150600.16.23.1 * postgresql14-14.20-150600.16.23.1 * postgresql14-contrib-14.20-150600.16.23.1 * postgresql14-plperl-14.20-150600.16.23.1 * postgresql14-pltcl-14.20-150600.16.23.1 * postgresql14-llvmjit-14.20-150600.16.23.1 * postgresql14-plperl-debuginfo-14.20-150600.16.23.1 * postgresql14-llvmjit-debuginfo-14.20-150600.16.23.1 * postgresql14-server-devel-debuginfo-14.20-150600.16.23.1 * postgresql14-server-14.20-150600.16.23.1 * postgresql14-pltcl-debuginfo-14.20-150600.16.23.1 * postgresql14-llvmjit-devel-14.20-150600.16.23.1 * postgresql14-server-debuginfo-14.20-150600.16.23.1 * postgresql14-plpython-debuginfo-14.20-150600.16.23.1 * openSUSE Leap 15.6 (noarch) * postgresql14-docs-14.20-150600.16.23.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * postgresql14-debuginfo-14.20-150600.16.23.1 * postgresql14-pltcl-debuginfo-14.20-150600.16.23.1 * postgresql14-plpython-14.20-150600.16.23.1 * postgresql14-server-devel-14.20-150600.16.23.1 * postgresql14-14.20-150600.16.23.1 * postgresql14-plperl-debuginfo-14.20-150600.16.23.1 * postgresql14-contrib-debuginfo-14.20-150600.16.23.1 * postgresql14-server-debuginfo-14.20-150600.16.23.1 * postgresql14-devel-14.20-150600.16.23.1 * postgresql14-server-14.20-150600.16.23.1 * postgresql14-contrib-14.20-150600.16.23.1 * postgresql14-devel-debuginfo-14.20-150600.16.23.1 * postgresql14-server-devel-debuginfo-14.20-150600.16.23.1 * postgresql14-plperl-14.20-150600.16.23.1 * postgresql14-plpython-debuginfo-14.20-150600.16.23.1 * postgresql14-debugsource-14.20-150600.16.23.1 * postgresql14-pltcl-14.20-150600.16.23.1 * Legacy Module 15-SP6 (noarch) * postgresql14-docs-14.20-150600.16.23.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql14-debuginfo-14.20-150600.16.23.1 * postgresql14-pltcl-debuginfo-14.20-150600.16.23.1 * postgresql14-plpython-14.20-150600.16.23.1 * postgresql14-server-devel-14.20-150600.16.23.1 * postgresql14-14.20-150600.16.23.1 * postgresql14-plperl-debuginfo-14.20-150600.16.23.1 * postgresql14-contrib-debuginfo-14.20-150600.16.23.1 * postgresql14-server-debuginfo-14.20-150600.16.23.1 * postgresql14-devel-14.20-150600.16.23.1 * postgresql14-server-14.20-150600.16.23.1 * postgresql14-contrib-14.20-150600.16.23.1 * postgresql14-devel-debuginfo-14.20-150600.16.23.1 * postgresql14-server-devel-debuginfo-14.20-150600.16.23.1 * postgresql14-plperl-14.20-150600.16.23.1 * postgresql14-plpython-debuginfo-14.20-150600.16.23.1 * postgresql14-debugsource-14.20-150600.16.23.1 * postgresql14-pltcl-14.20-150600.16.23.1 * Legacy Module 15-SP7 (noarch) * postgresql14-docs-14.20-150600.16.23.1 * Legacy Module 15-SP7 (ppc64le s390x x86_64) * postgresql14-test-14.20-150600.16.23.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * postgresql14-debuginfo-14.20-150600.16.23.1 * postgresql14-llvmjit-14.20-150600.16.23.1 * postgresql14-llvmjit-debuginfo-14.20-150600.16.23.1 * postgresql14-test-14.20-150600.16.23.1 * postgresql14-debugsource-14.20-150600.16.23.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql14-debuginfo-14.20-150600.16.23.1 * postgresql14-llvmjit-14.20-150600.16.23.1 * postgresql14-llvmjit-debuginfo-14.20-150600.16.23.1 * postgresql14-test-14.20-150600.16.23.1 * postgresql14-debugsource-14.20-150600.16.23.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 11 20:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 11 Dec 2025 20:30:11 -0000 Subject: SUSE-SU-2025:4370-1: important: Security update for postgresql14 Message-ID: <176548501193.5149.14776468038146768330@smelt2.prg2.suse.org> # Security update for postgresql14 Announcement ID: SUSE-SU-2025:4370-1 Release Date: 2025-12-11T19:03:40Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql14 fixes the following issues: Upgraded to 14.20: * CVE-2025-12817: Fixed missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332) * CVE-2025-12818: Fixed integer overflow in allocation-size calculations within libpq (bsc#1253333) Other fixes: * Use %product_libs_llvm_ver to determine the LLVM version. * Remove conditionals for obsolete PostgreSQL releases. * Sync spec file from version 18. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4370=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4370=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql14-debugsource-14.20-3.63.1 * postgresql14-pltcl-debuginfo-14.20-3.63.1 * postgresql14-plpython-debuginfo-14.20-3.63.1 * postgresql14-debuginfo-14.20-3.63.1 * postgresql14-14.20-3.63.1 * postgresql14-pltcl-14.20-3.63.1 * postgresql14-server-14.20-3.63.1 * postgresql14-plperl-debuginfo-14.20-3.63.1 * postgresql14-server-debuginfo-14.20-3.63.1 * postgresql14-plperl-14.20-3.63.1 * postgresql14-devel-debuginfo-14.20-3.63.1 * postgresql14-plpython-14.20-3.63.1 * postgresql14-contrib-debuginfo-14.20-3.63.1 * postgresql14-contrib-14.20-3.63.1 * postgresql14-devel-14.20-3.63.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * postgresql14-docs-14.20-3.63.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64) * postgresql14-server-devel-14.20-3.63.1 * postgresql14-server-devel-debuginfo-14.20-3.63.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * postgresql14-debugsource-14.20-3.63.1 * postgresql14-pltcl-debuginfo-14.20-3.63.1 * postgresql14-server-devel-14.20-3.63.1 * postgresql14-plpython-debuginfo-14.20-3.63.1 * postgresql14-debuginfo-14.20-3.63.1 * postgresql14-server-devel-debuginfo-14.20-3.63.1 * postgresql14-14.20-3.63.1 * postgresql14-pltcl-14.20-3.63.1 * postgresql14-server-14.20-3.63.1 * postgresql14-plperl-debuginfo-14.20-3.63.1 * postgresql14-server-debuginfo-14.20-3.63.1 * postgresql14-plperl-14.20-3.63.1 * postgresql14-devel-debuginfo-14.20-3.63.1 * postgresql14-plpython-14.20-3.63.1 * postgresql14-contrib-debuginfo-14.20-3.63.1 * postgresql14-contrib-14.20-3.63.1 * postgresql14-devel-14.20-3.63.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * postgresql14-docs-14.20-3.63.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 12 12:30:01 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Dec 2025 12:30:01 -0000 Subject: SUSE-SU-2025:4381-1: important: Security update for kubernetes-client Message-ID: <176554260199.2574.2841555834300865795@smelt2.prg2.suse.org> # Security update for kubernetes-client Announcement ID: SUSE-SU-2025:4381-1 Release Date: 2025-12-12T10:19:22Z Rating: important References: Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for kubernetes client rebuilds it against current the go release to fix bugs and security issues in the go stdlib. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-4381=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-4381=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4381=1 openSUSE-SLE-15.6-2025-4381=1 ## Package List: * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kubernetes1.33-client-common-1.33.1-150600.13.15.2 * kubernetes1.33-client-1.33.1-150600.13.15.2 * Containers Module 15-SP6 (noarch) * kubernetes1.33-client-bash-completion-1.33.1-150600.13.15.2 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kubernetes1.33-client-common-1.33.1-150600.13.15.2 * kubernetes1.33-client-1.33.1-150600.13.15.2 * Containers Module 15-SP7 (noarch) * kubernetes1.33-client-bash-completion-1.33.1-150600.13.15.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kubernetes1.33-controller-manager-1.33.1-150600.13.15.2 * kubernetes1.33-client-1.33.1-150600.13.15.2 * kubernetes1.33-proxy-1.33.1-150600.13.15.2 * kubernetes1.33-client-common-1.33.1-150600.13.15.2 * kubernetes1.33-scheduler-1.33.1-150600.13.15.2 * kubernetes1.33-kubelet-1.33.1-150600.13.15.2 * kubernetes1.33-apiserver-1.33.1-150600.13.15.2 * kubernetes1.33-kubeadm-1.33.1-150600.13.15.2 * kubernetes1.33-kubelet-common-1.33.1-150600.13.15.2 * openSUSE Leap 15.6 (noarch) * kubernetes1.33-client-fish-completion-1.33.1-150600.13.15.2 * kubernetes1.33-client-bash-completion-1.33.1-150600.13.15.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 12 12:30:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Dec 2025 12:30:03 -0000 Subject: SUSE-SU-2025:4380-1: important: Security update for kubernetes-client Message-ID: <176554260368.2574.15748435647814895650@smelt2.prg2.suse.org> # Security update for kubernetes-client Announcement ID: SUSE-SU-2025:4380-1 Release Date: 2025-12-12T10:19:01Z Rating: important References: Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for kubernetes client rebuilds it against current the go release to fix bugs and security issues in the go stdlib. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4380=1 openSUSE-SLE-15.6-2025-4380=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-4380=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-4380=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kubernetes1.31-client-common-1.31.9-150600.13.15.2 * kubernetes1.31-proxy-1.31.9-150600.13.15.2 * kubernetes1.31-apiserver-1.31.9-150600.13.15.2 * kubernetes1.31-kubelet-1.31.9-150600.13.15.2 * kubernetes1.31-client-1.31.9-150600.13.15.2 * kubernetes1.31-kubelet-common-1.31.9-150600.13.15.2 * kubernetes1.31-scheduler-1.31.9-150600.13.15.2 * kubernetes1.31-controller-manager-1.31.9-150600.13.15.2 * kubernetes1.31-kubeadm-1.31.9-150600.13.15.2 * openSUSE Leap 15.6 (noarch) * kubernetes1.31-client-bash-completion-1.31.9-150600.13.15.2 * kubernetes1.31-client-fish-completion-1.31.9-150600.13.15.2 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kubernetes1.31-client-1.31.9-150600.13.15.2 * kubernetes1.31-client-common-1.31.9-150600.13.15.2 * Containers Module 15-SP6 (noarch) * kubernetes1.31-client-bash-completion-1.31.9-150600.13.15.2 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kubernetes1.31-client-1.31.9-150600.13.15.2 * kubernetes1.31-client-common-1.31.9-150600.13.15.2 * Containers Module 15-SP7 (noarch) * kubernetes1.31-client-bash-completion-1.31.9-150600.13.15.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 12 12:30:39 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Dec 2025 12:30:39 -0000 Subject: SUSE-SU-2025:4373-1: moderate: Security update for container-suseconnect Message-ID: <176554263970.2574.11682952202696665522@smelt2.prg2.suse.org> # Security update for container-suseconnect Announcement ID: SUSE-SU-2025:4373-1 Release Date: 2025-12-12T09:05:52Z Rating: moderate References: Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for container-suseconnect rebuilds it against current go security release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-4373=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-4373=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4373=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4373=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4373=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4373=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4373=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4373=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4373=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4373=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4373=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4373=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4373=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4373=1 ## Package List: * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * container-suseconnect-2.5.5-150000.4.75.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * container-suseconnect-2.5.5-150000.4.75.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 12 16:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Dec 2025 16:30:08 -0000 Subject: SUSE-SU-2025:4389-1: low: Security update for python Message-ID: <176555700801.2574.5192180780276252179@smelt2.prg2.suse.org> # Security update for python Announcement ID: SUSE-SU-2025:4389-1 Release Date: 2025-12-12T13:49:32Z Rating: low References: * bsc#1251305 * bsc#1252974 Cross-References: * CVE-2025-6075 * CVE-2025-8291 CVSS scores: * CVE-2025-6075 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-6075 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-6075 ( NVD ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8291 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-8291 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-8291 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for python fixes the following issues: * CVE-2025-6075: quadratic complexity in `os.path.expandvars()` can lead to performance degradation when values passed to it are user-controlled (bsc#1252974). * CVE-2025-8291: lack of validity checks on the ZIP64 End of Central Directory (EOCD) record allows for the creation of ZIP archives that are processed inconsistently by the `zipfile` module (bsc#1251305). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4389=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4389=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4389=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python-gdbm-2.7.18-150000.89.1 * python-base-2.7.18-150000.89.2 * python-xml-debuginfo-2.7.18-150000.89.2 * libpython2_7-1_0-2.7.18-150000.89.2 * python-tk-2.7.18-150000.89.1 * python-base-debugsource-2.7.18-150000.89.2 * libpython2_7-1_0-debuginfo-2.7.18-150000.89.2 * python-2.7.18-150000.89.1 * python-tk-debuginfo-2.7.18-150000.89.1 * python-xml-2.7.18-150000.89.2 * python-curses-2.7.18-150000.89.1 * python-curses-debuginfo-2.7.18-150000.89.1 * python-demo-2.7.18-150000.89.1 * python-devel-2.7.18-150000.89.2 * python-idle-2.7.18-150000.89.1 * python-debugsource-2.7.18-150000.89.1 * python-base-debuginfo-2.7.18-150000.89.2 * python-debuginfo-2.7.18-150000.89.1 * python-gdbm-debuginfo-2.7.18-150000.89.1 * openSUSE Leap 15.6 (x86_64) * python-32bit-2.7.18-150000.89.1 * python-base-32bit-debuginfo-2.7.18-150000.89.2 * libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.89.2 * python-32bit-debuginfo-2.7.18-150000.89.1 * python-base-32bit-2.7.18-150000.89.2 * libpython2_7-1_0-32bit-2.7.18-150000.89.2 * openSUSE Leap 15.6 (noarch) * python-doc-pdf-2.7.18-150000.89.1 * python-doc-2.7.18-150000.89.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * python-gdbm-2.7.18-150000.89.1 * python-base-2.7.18-150000.89.2 * python-xml-debuginfo-2.7.18-150000.89.2 * libpython2_7-1_0-2.7.18-150000.89.2 * python-base-debugsource-2.7.18-150000.89.2 * libpython2_7-1_0-debuginfo-2.7.18-150000.89.2 * python-2.7.18-150000.89.1 * python-xml-2.7.18-150000.89.2 * python-curses-2.7.18-150000.89.1 * python-curses-debuginfo-2.7.18-150000.89.1 * python-debugsource-2.7.18-150000.89.1 * python-base-debuginfo-2.7.18-150000.89.2 * python-debuginfo-2.7.18-150000.89.1 * python-gdbm-debuginfo-2.7.18-150000.89.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * python-gdbm-2.7.18-150000.89.1 * python-base-2.7.18-150000.89.2 * python-xml-debuginfo-2.7.18-150000.89.2 * libpython2_7-1_0-2.7.18-150000.89.2 * python-base-debugsource-2.7.18-150000.89.2 * libpython2_7-1_0-debuginfo-2.7.18-150000.89.2 * python-2.7.18-150000.89.1 * python-xml-2.7.18-150000.89.2 * python-curses-2.7.18-150000.89.1 * python-curses-debuginfo-2.7.18-150000.89.1 * python-debugsource-2.7.18-150000.89.1 * python-base-debuginfo-2.7.18-150000.89.2 * python-debuginfo-2.7.18-150000.89.1 * python-gdbm-debuginfo-2.7.18-150000.89.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6075.html * https://www.suse.com/security/cve/CVE-2025-8291.html * https://bugzilla.suse.com/show_bug.cgi?id=1251305 * https://bugzilla.suse.com/show_bug.cgi?id=1252974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 12 16:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Dec 2025 16:30:11 -0000 Subject: SUSE-SU-2025:4388-1: important: Security update for postgresql16 Message-ID: <176555701149.2574.5310028913553276385@smelt2.prg2.suse.org> # Security update for postgresql16 Announcement ID: SUSE-SU-2025:4388-1 Release Date: 2025-12-12T13:36:55Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Legacy Module 15-SP7 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql16 fixes the following issues: Upgraded to 16.11: * CVE-2025-12817: Fixed missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332) * CVE-2025-12818: Fixed integer overflow in allocation-size calculations within libpq (bsc#1253333) Other fixes: * Use %product_libs_llvm_ver to determine the LLVM version. * Remove conditionals for obsolete PostgreSQL releases. * Sync spec file from version 18. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4388=1 openSUSE-SLE-15.6-2025-4388=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4388=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-4388=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4388=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4388=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-4388=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-4388=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * postgresql16-llvmjit-debuginfo-16.11-150600.16.25.1 * postgresql16-plperl-16.11-150600.16.25.1 * postgresql16-plperl-debuginfo-16.11-150600.16.25.1 * postgresql16-test-16.11-150600.16.25.1 * postgresql16-devel-debuginfo-16.11-150600.16.25.1 * postgresql16-pltcl-16.11-150600.16.25.1 * postgresql16-16.11-150600.16.25.1 * postgresql16-server-devel-16.11-150600.16.25.1 * postgresql16-server-16.11-150600.16.25.1 * postgresql16-debuginfo-16.11-150600.16.25.1 * postgresql16-llvmjit-devel-16.11-150600.16.25.1 * postgresql16-debugsource-16.11-150600.16.25.1 * postgresql16-server-debuginfo-16.11-150600.16.25.1 * postgresql16-plpython-16.11-150600.16.25.1 * postgresql16-plpython-debuginfo-16.11-150600.16.25.1 * postgresql16-contrib-16.11-150600.16.25.1 * postgresql16-contrib-debuginfo-16.11-150600.16.25.1 * postgresql16-pltcl-debuginfo-16.11-150600.16.25.1 * postgresql16-devel-16.11-150600.16.25.1 * postgresql16-server-devel-debuginfo-16.11-150600.16.25.1 * postgresql16-llvmjit-16.11-150600.16.25.1 * openSUSE Leap 15.6 (noarch) * postgresql16-docs-16.11-150600.16.25.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * postgresql16-debugsource-16.11-150600.16.25.1 * postgresql16-debuginfo-16.11-150600.16.25.1 * postgresql16-16.11-150600.16.25.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql16-debugsource-16.11-150600.16.25.1 * postgresql16-contrib-debuginfo-16.11-150600.16.25.1 * postgresql16-devel-debuginfo-16.11-150600.16.25.1 * postgresql16-contrib-16.11-150600.16.25.1 * postgresql16-devel-16.11-150600.16.25.1 * postgresql16-debuginfo-16.11-150600.16.25.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * postgresql16-llvmjit-debuginfo-16.11-150600.16.25.1 * postgresql16-debugsource-16.11-150600.16.25.1 * postgresql16-test-16.11-150600.16.25.1 * postgresql16-debuginfo-16.11-150600.16.25.1 * postgresql16-llvmjit-16.11-150600.16.25.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql16-llvmjit-devel-16.11-150600.16.25.1 * postgresql16-llvmjit-debuginfo-16.11-150600.16.25.1 * postgresql16-debugsource-16.11-150600.16.25.1 * postgresql16-test-16.11-150600.16.25.1 * postgresql16-debuginfo-16.11-150600.16.25.1 * postgresql16-llvmjit-16.11-150600.16.25.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * postgresql16-plperl-16.11-150600.16.25.1 * postgresql16-plperl-debuginfo-16.11-150600.16.25.1 * postgresql16-debugsource-16.11-150600.16.25.1 * postgresql16-server-debuginfo-16.11-150600.16.25.1 * postgresql16-plpython-16.11-150600.16.25.1 * postgresql16-server-devel-16.11-150600.16.25.1 * postgresql16-contrib-debuginfo-16.11-150600.16.25.1 * postgresql16-pltcl-debuginfo-16.11-150600.16.25.1 * postgresql16-devel-debuginfo-16.11-150600.16.25.1 * postgresql16-pltcl-16.11-150600.16.25.1 * postgresql16-plpython-debuginfo-16.11-150600.16.25.1 * postgresql16-contrib-16.11-150600.16.25.1 * postgresql16-devel-16.11-150600.16.25.1 * postgresql16-server-16.11-150600.16.25.1 * postgresql16-debuginfo-16.11-150600.16.25.1 * postgresql16-server-devel-debuginfo-16.11-150600.16.25.1 * Server Applications Module 15-SP6 (noarch) * postgresql16-docs-16.11-150600.16.25.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql16-debugsource-16.11-150600.16.25.1 * postgresql16-server-debuginfo-16.11-150600.16.25.1 * postgresql16-16.11-150600.16.25.1 * postgresql16-server-devel-16.11-150600.16.25.1 * postgresql16-server-16.11-150600.16.25.1 * postgresql16-debuginfo-16.11-150600.16.25.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 12 16:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Dec 2025 16:30:15 -0000 Subject: SUSE-SU-2025:4387-1: important: Security update for postgresql16 Message-ID: <176555701572.2574.8372088029932679220@smelt2.prg2.suse.org> # Security update for postgresql16 Announcement ID: SUSE-SU-2025:4387-1 Release Date: 2025-12-12T13:36:03Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql16 fixes the following issues: Upgraded to 16.11: * CVE-2025-12817: Fixed missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332) * CVE-2025-12818: Fixed integer overflow in allocation-size calculations within libpq (bsc#1253333) Other fixes: * Use %product_libs_llvm_ver to determine the LLVM version. * Remove conditionals for obsolete PostgreSQL releases. * Sync spec file from version 18. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4387=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4387=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4387=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4387=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4387=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4387=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4387=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4387=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4387=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4387=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4387=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4387=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4387=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4387=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4387=1 ## Package List: * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql16-server-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-server-devel-16.11-150200.5.35.1 * postgresql16-pltcl-debuginfo-16.11-150200.5.35.1 * postgresql16-plperl-debuginfo-16.11-150200.5.35.1 * postgresql16-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-pltcl-16.11-150200.5.35.1 * postgresql16-plpython-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * postgresql16-plpython-debuginfo-16.11-150200.5.35.1 * postgresql16-server-16.11-150200.5.35.1 * postgresql16-contrib-debuginfo-16.11-150200.5.35.1 * postgresql16-server-debuginfo-16.11-150200.5.35.1 * postgresql16-contrib-16.11-150200.5.35.1 * postgresql16-16.11-150200.5.35.1 * postgresql16-devel-16.11-150200.5.35.1 * postgresql16-plperl-16.11-150200.5.35.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql16-docs-16.11-150200.5.35.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql16-server-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-server-devel-16.11-150200.5.35.1 * postgresql16-pltcl-debuginfo-16.11-150200.5.35.1 * postgresql16-plperl-debuginfo-16.11-150200.5.35.1 * postgresql16-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-pltcl-16.11-150200.5.35.1 * postgresql16-plpython-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * postgresql16-plpython-debuginfo-16.11-150200.5.35.1 * postgresql16-server-16.11-150200.5.35.1 * postgresql16-contrib-debuginfo-16.11-150200.5.35.1 * postgresql16-server-debuginfo-16.11-150200.5.35.1 * postgresql16-contrib-16.11-150200.5.35.1 * postgresql16-16.11-150200.5.35.1 * postgresql16-devel-16.11-150200.5.35.1 * postgresql16-plperl-16.11-150200.5.35.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * postgresql16-docs-16.11-150200.5.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql16-server-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-server-devel-16.11-150200.5.35.1 * postgresql16-pltcl-debuginfo-16.11-150200.5.35.1 * postgresql16-plperl-debuginfo-16.11-150200.5.35.1 * postgresql16-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-pltcl-16.11-150200.5.35.1 * postgresql16-plpython-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * postgresql16-plpython-debuginfo-16.11-150200.5.35.1 * postgresql16-server-16.11-150200.5.35.1 * postgresql16-contrib-debuginfo-16.11-150200.5.35.1 * postgresql16-server-debuginfo-16.11-150200.5.35.1 * postgresql16-contrib-16.11-150200.5.35.1 * postgresql16-16.11-150200.5.35.1 * postgresql16-devel-16.11-150200.5.35.1 * postgresql16-plperl-16.11-150200.5.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql16-docs-16.11-150200.5.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * postgresql16-server-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-server-devel-16.11-150200.5.35.1 * postgresql16-pltcl-debuginfo-16.11-150200.5.35.1 * postgresql16-plperl-debuginfo-16.11-150200.5.35.1 * postgresql16-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-pltcl-16.11-150200.5.35.1 * postgresql16-plpython-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * postgresql16-plpython-debuginfo-16.11-150200.5.35.1 * postgresql16-server-16.11-150200.5.35.1 * postgresql16-contrib-debuginfo-16.11-150200.5.35.1 * postgresql16-server-debuginfo-16.11-150200.5.35.1 * postgresql16-contrib-16.11-150200.5.35.1 * postgresql16-16.11-150200.5.35.1 * postgresql16-devel-16.11-150200.5.35.1 * postgresql16-plperl-16.11-150200.5.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * postgresql16-docs-16.11-150200.5.35.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * postgresql16-server-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-server-devel-16.11-150200.5.35.1 * postgresql16-pltcl-debuginfo-16.11-150200.5.35.1 * postgresql16-plperl-debuginfo-16.11-150200.5.35.1 * postgresql16-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-pltcl-16.11-150200.5.35.1 * postgresql16-plpython-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * postgresql16-plpython-debuginfo-16.11-150200.5.35.1 * postgresql16-server-16.11-150200.5.35.1 * postgresql16-contrib-debuginfo-16.11-150200.5.35.1 * postgresql16-server-debuginfo-16.11-150200.5.35.1 * postgresql16-contrib-16.11-150200.5.35.1 * postgresql16-16.11-150200.5.35.1 * postgresql16-devel-16.11-150200.5.35.1 * postgresql16-plperl-16.11-150200.5.35.1 * SUSE Manager Proxy 4.3 LTS (noarch) * postgresql16-docs-16.11-150200.5.35.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * postgresql16-server-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-server-devel-16.11-150200.5.35.1 * postgresql16-pltcl-debuginfo-16.11-150200.5.35.1 * postgresql16-plperl-debuginfo-16.11-150200.5.35.1 * postgresql16-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-pltcl-16.11-150200.5.35.1 * postgresql16-plpython-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * postgresql16-plpython-debuginfo-16.11-150200.5.35.1 * postgresql16-server-16.11-150200.5.35.1 * postgresql16-contrib-debuginfo-16.11-150200.5.35.1 * postgresql16-server-debuginfo-16.11-150200.5.35.1 * postgresql16-contrib-16.11-150200.5.35.1 * postgresql16-16.11-150200.5.35.1 * postgresql16-devel-16.11-150200.5.35.1 * postgresql16-plperl-16.11-150200.5.35.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * postgresql16-docs-16.11-150200.5.35.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * postgresql16-server-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-server-devel-16.11-150200.5.35.1 * postgresql16-pltcl-debuginfo-16.11-150200.5.35.1 * postgresql16-plperl-debuginfo-16.11-150200.5.35.1 * postgresql16-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-pltcl-16.11-150200.5.35.1 * postgresql16-plpython-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * postgresql16-plpython-debuginfo-16.11-150200.5.35.1 * postgresql16-server-16.11-150200.5.35.1 * postgresql16-contrib-debuginfo-16.11-150200.5.35.1 * postgresql16-server-debuginfo-16.11-150200.5.35.1 * postgresql16-contrib-16.11-150200.5.35.1 * postgresql16-16.11-150200.5.35.1 * postgresql16-devel-16.11-150200.5.35.1 * postgresql16-plperl-16.11-150200.5.35.1 * SUSE Manager Server 4.3 LTS (noarch) * postgresql16-docs-16.11-150200.5.35.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql16-server-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-server-devel-16.11-150200.5.35.1 * postgresql16-pltcl-debuginfo-16.11-150200.5.35.1 * postgresql16-plperl-debuginfo-16.11-150200.5.35.1 * postgresql16-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-pltcl-16.11-150200.5.35.1 * postgresql16-plpython-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * postgresql16-plpython-debuginfo-16.11-150200.5.35.1 * postgresql16-server-16.11-150200.5.35.1 * postgresql16-contrib-debuginfo-16.11-150200.5.35.1 * postgresql16-server-debuginfo-16.11-150200.5.35.1 * postgresql16-contrib-16.11-150200.5.35.1 * postgresql16-16.11-150200.5.35.1 * postgresql16-devel-16.11-150200.5.35.1 * postgresql16-plperl-16.11-150200.5.35.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql16-docs-16.11-150200.5.35.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql16-server-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-server-devel-16.11-150200.5.35.1 * postgresql16-pltcl-debuginfo-16.11-150200.5.35.1 * postgresql16-plperl-debuginfo-16.11-150200.5.35.1 * postgresql16-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-pltcl-16.11-150200.5.35.1 * postgresql16-plpython-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * postgresql16-plpython-debuginfo-16.11-150200.5.35.1 * postgresql16-server-16.11-150200.5.35.1 * postgresql16-contrib-debuginfo-16.11-150200.5.35.1 * postgresql16-server-debuginfo-16.11-150200.5.35.1 * postgresql16-contrib-16.11-150200.5.35.1 * postgresql16-16.11-150200.5.35.1 * postgresql16-devel-16.11-150200.5.35.1 * postgresql16-plperl-16.11-150200.5.35.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql16-docs-16.11-150200.5.35.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * postgresql16-server-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-server-devel-16.11-150200.5.35.1 * postgresql16-pltcl-debuginfo-16.11-150200.5.35.1 * postgresql16-plperl-debuginfo-16.11-150200.5.35.1 * postgresql16-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-pltcl-16.11-150200.5.35.1 * postgresql16-plpython-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * postgresql16-plpython-debuginfo-16.11-150200.5.35.1 * postgresql16-server-16.11-150200.5.35.1 * postgresql16-contrib-debuginfo-16.11-150200.5.35.1 * postgresql16-server-debuginfo-16.11-150200.5.35.1 * postgresql16-contrib-16.11-150200.5.35.1 * postgresql16-16.11-150200.5.35.1 * postgresql16-devel-16.11-150200.5.35.1 * postgresql16-plperl-16.11-150200.5.35.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * postgresql16-docs-16.11-150200.5.35.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * postgresql16-server-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-debuginfo-16.11-150200.5.35.1 * postgresql16-server-devel-16.11-150200.5.35.1 * postgresql16-pltcl-debuginfo-16.11-150200.5.35.1 * postgresql16-plperl-debuginfo-16.11-150200.5.35.1 * postgresql16-devel-debuginfo-16.11-150200.5.35.1 * postgresql16-pltcl-16.11-150200.5.35.1 * postgresql16-plpython-16.11-150200.5.35.1 * postgresql16-debugsource-16.11-150200.5.35.1 * postgresql16-plpython-debuginfo-16.11-150200.5.35.1 * postgresql16-server-16.11-150200.5.35.1 * postgresql16-contrib-debuginfo-16.11-150200.5.35.1 * postgresql16-server-debuginfo-16.11-150200.5.35.1 * postgresql16-contrib-16.11-150200.5.35.1 * postgresql16-16.11-150200.5.35.1 * postgresql16-devel-16.11-150200.5.35.1 * postgresql16-plperl-16.11-150200.5.35.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * postgresql16-docs-16.11-150200.5.35.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 12 16:30:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Dec 2025 16:30:21 -0000 Subject: SUSE-SU-2025:4384-1: important: Security update for python-Django Message-ID: <176555702182.2574.11157663319136266541@smelt2.prg2.suse.org> # Security update for python-Django Announcement ID: SUSE-SU-2025:4384-1 Release Date: 2025-12-12T13:28:37Z Rating: important References: * bsc#1254437 Cross-References: * CVE-2025-13372 * CVE-2025-64460 CVSS scores: * CVE-2025-13372 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-13372 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-64460 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64460 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-Django fixes the following issues: * CVE-2025-13372: Fixed SQL Injection in FilteredRelation (bsc#1254437) * CVE-2025-64460: Fixed denial of service via specially crafted XML input in django.core.serializers.xml_serializer.getInnerText() (bsc#1254437) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4384=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4384=1 openSUSE-SLE-15.6-2025-4384=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4384=1 ## Package List: * SUSE Package Hub 15 15-SP7 (noarch) * python311-Django-4.2.11-150600.3.44.1 * openSUSE Leap 15.6 (noarch) * python311-Django-4.2.11-150600.3.44.1 * SUSE Package Hub 15 15-SP6 (noarch) * python311-Django-4.2.11-150600.3.44.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13372.html * https://www.suse.com/security/cve/CVE-2025-64460.html * https://bugzilla.suse.com/show_bug.cgi?id=1254437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 12 16:30:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Dec 2025 16:30:19 -0000 Subject: SUSE-SU-2025:4386-1: important: Security update for postgresql16 Message-ID: <176555701927.2574.11355179343121997988@smelt2.prg2.suse.org> # Security update for postgresql16 Announcement ID: SUSE-SU-2025:4386-1 Release Date: 2025-12-12T13:34:22Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql16 fixes the following issues: Upgraded to 16.11: * CVE-2025-12817: Fixed missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332) * CVE-2025-12818: Fixed integer overflow in allocation-size calculations within libpq (bsc#1253333) Other fixes: * Use %product_libs_llvm_ver to determine the LLVM version. * Remove conditionals for obsolete PostgreSQL releases. * Sync spec file from version 18. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4386=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4386=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql16-plperl-16.11-3.35.1 * postgresql16-plpython-16.11-3.35.1 * postgresql16-server-devel-debuginfo-16.11-3.35.1 * postgresql16-plperl-debuginfo-16.11-3.35.1 * postgresql16-debuginfo-16.11-3.35.1 * postgresql16-contrib-debuginfo-16.11-3.35.1 * postgresql16-devel-debuginfo-16.11-3.35.1 * postgresql16-debugsource-16.11-3.35.1 * postgresql16-devel-16.11-3.35.1 * postgresql16-server-debuginfo-16.11-3.35.1 * postgresql16-server-devel-16.11-3.35.1 * postgresql16-server-16.11-3.35.1 * postgresql16-pltcl-debuginfo-16.11-3.35.1 * postgresql16-contrib-16.11-3.35.1 * postgresql16-16.11-3.35.1 * postgresql16-pltcl-16.11-3.35.1 * postgresql16-plpython-debuginfo-16.11-3.35.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * postgresql16-docs-16.11-3.35.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * postgresql16-plperl-16.11-3.35.1 * postgresql16-plpython-16.11-3.35.1 * postgresql16-server-devel-debuginfo-16.11-3.35.1 * postgresql16-plperl-debuginfo-16.11-3.35.1 * postgresql16-debuginfo-16.11-3.35.1 * postgresql16-contrib-debuginfo-16.11-3.35.1 * postgresql16-devel-debuginfo-16.11-3.35.1 * postgresql16-debugsource-16.11-3.35.1 * postgresql16-devel-16.11-3.35.1 * postgresql16-server-debuginfo-16.11-3.35.1 * postgresql16-server-devel-16.11-3.35.1 * postgresql16-server-16.11-3.35.1 * postgresql16-pltcl-debuginfo-16.11-3.35.1 * postgresql16-contrib-16.11-3.35.1 * postgresql16-16.11-3.35.1 * postgresql16-pltcl-16.11-3.35.1 * postgresql16-plpython-debuginfo-16.11-3.35.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * postgresql16-docs-16.11-3.35.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 12 16:30:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Dec 2025 16:30:24 -0000 Subject: SUSE-SU-2025:4383-1: moderate: Security update for libpng12 Message-ID: <176555702475.2574.16112533691396970450@smelt2.prg2.suse.org> # Security update for libpng12 Announcement ID: SUSE-SU-2025:4383-1 Release Date: 2025-12-12T13:13:47Z Rating: moderate References: * bsc#1254157 Cross-References: * CVE-2025-64505 CVSS scores: * CVE-2025-64505 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-64505 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-64505 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libpng12 fixes the following issues: * CVE-2025-64505: Fixed heap buffer over-read in `png_do_quantize` via malformed palette index (bsc#1254157) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4383=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libpng12-0-1.2.50-20.6.1 * libpng12-0-debuginfo-32bit-1.2.50-20.6.1 * libpng12-devel-1.2.50-20.6.1 * libpng12-0-debuginfo-1.2.50-20.6.1 * libpng12-0-32bit-1.2.50-20.6.1 * libpng12-debugsource-1.2.50-20.6.1 * libpng12-compat-devel-1.2.50-20.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-64505.html * https://bugzilla.suse.com/show_bug.cgi?id=1254157 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 12 16:30:27 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Dec 2025 16:30:27 -0000 Subject: SUSE-SU-2025:4382-1: important: Security update for gegl Message-ID: <176555702733.2574.4929851689531190285@smelt2.prg2.suse.org> # Security update for gegl Announcement ID: SUSE-SU-2025:4382-1 Release Date: 2025-12-12T13:06:57Z Rating: important References: * bsc#1250496 Cross-References: * CVE-2025-10921 CVSS scores: * CVE-2025-10921 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-10921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-10921 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for gegl fixes the following issues: * CVE-2025-10921: Fixed HDR file parsing heap-based buffer overflow that can lead to remote code execution. (bsc#1250496) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4382=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4382=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * gegl-devel-0.2.0-15.9.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * gegl-devel-0.2.0-15.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10921.html * https://bugzilla.suse.com/show_bug.cgi?id=1250496 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 12 20:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Dec 2025 20:30:04 -0000 Subject: SUSE-SU-2025:4390-1: moderate: Security update for rhino Message-ID: <176557140414.21777.10442203828875770193@smelt2.prg2.suse.org> # Security update for rhino Announcement ID: SUSE-SU-2025:4390-1 Release Date: 2025-12-12T16:18:19Z Rating: moderate References: * bsc#1254481 Cross-References: * CVE-2025-66453 CVSS scores: * CVE-2025-66453 ( SUSE ): 5.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-66453 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-66453 ( NVD ): 5.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for rhino fixes the following issues: Update to version 1.7.15.1. Security issues fixed: * CVE-2025-66453: high CPU consumption when processing specific numbers via the `toFixed()` function (bsc#1254481). Other changes and issues fixed: * Version 1.7.15: * Basic support for "rest parameters". * Improvements in Unicode support. * "Symbol.species" implemented in many places. * More correct property ordering in many places. * Miscellaneous improvements and bug fixes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4390=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4390=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4390=1 ## Package List: * Basesystem Module 15-SP7 (noarch) * rhino-1.7.15.1-150200.12.7.1 * openSUSE Leap 15.6 (noarch) * rhino-runtime-1.7.15.1-150200.12.7.1 * rhino-demo-1.7.15.1-150200.12.7.1 * rhino-1.7.15.1-150200.12.7.1 * rhino-javadoc-1.7.15.1-150200.12.7.1 * rhino-engine-1.7.15.1-150200.12.7.1 * Basesystem Module 15-SP6 (noarch) * rhino-1.7.15.1-150200.12.7.1 ## References: * https://www.suse.com/security/cve/CVE-2025-66453.html * https://bugzilla.suse.com/show_bug.cgi?id=1254481 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 12:31:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 12:31:12 -0000 Subject: SUSE-SU-2025:4393-1: important: Security update for the Linux Kernel Message-ID: <176580187291.2574.4310146638602688360@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:4393-1 Release Date: 2025-12-15T11:09:12Z Rating: important References: * bsc#1235463 * bsc#1236743 * bsc#1237888 * bsc#1241166 * bsc#1243474 * bsc#1245193 * bsc#1247076 * bsc#1247500 * bsc#1247509 * bsc#1247683 * bsc#1249547 * bsc#1249912 * bsc#1249982 * bsc#1250034 * bsc#1250176 * bsc#1250237 * bsc#1250252 * bsc#1250705 * bsc#1251120 * bsc#1251786 * bsc#1252063 * bsc#1252267 * bsc#1252269 * bsc#1252303 * bsc#1252352 * bsc#1252353 * bsc#1252365 * bsc#1252366 * bsc#1252368 * bsc#1252370 * bsc#1252681 * bsc#1252763 * bsc#1252773 * bsc#1252774 * bsc#1252780 * bsc#1252790 * bsc#1252794 * bsc#1252795 * bsc#1252809 * bsc#1252817 * bsc#1252821 * bsc#1252836 * bsc#1252845 * bsc#1252862 * bsc#1252912 * bsc#1252917 * bsc#1252923 * bsc#1252928 * bsc#1253018 * bsc#1253176 * bsc#1253275 * bsc#1253318 * bsc#1253324 * bsc#1253349 * bsc#1253352 * bsc#1253355 * bsc#1253360 * bsc#1253362 * bsc#1253363 * bsc#1253367 * bsc#1253369 * bsc#1253393 * bsc#1253394 * bsc#1253395 * bsc#1253403 * bsc#1253407 * bsc#1253409 * bsc#1253412 * bsc#1253416 * bsc#1253421 * bsc#1253423 * bsc#1253424 * bsc#1253425 * bsc#1253427 * bsc#1253428 * bsc#1253431 * bsc#1253436 * bsc#1253438 * bsc#1253440 * bsc#1253441 * bsc#1253445 * bsc#1253448 * bsc#1253449 * bsc#1253453 * bsc#1253456 * bsc#1253472 * bsc#1253648 * bsc#1253779 * bsc#1254181 * bsc#1254221 * bsc#1254235 Cross-References: * CVE-2022-50253 * CVE-2023-53676 * CVE-2025-21710 * CVE-2025-37916 * CVE-2025-38359 * CVE-2025-39788 * CVE-2025-39805 * CVE-2025-39819 * CVE-2025-39822 * CVE-2025-39859 * CVE-2025-39944 * CVE-2025-39980 * CVE-2025-40001 * CVE-2025-40021 * CVE-2025-40027 * CVE-2025-40030 * CVE-2025-40038 * CVE-2025-40040 * CVE-2025-40047 * CVE-2025-40048 * CVE-2025-40055 * CVE-2025-40059 * CVE-2025-40064 * CVE-2025-40070 * CVE-2025-40074 * CVE-2025-40075 * CVE-2025-40080 * CVE-2025-40083 * CVE-2025-40086 * CVE-2025-40098 * CVE-2025-40105 * CVE-2025-40107 * CVE-2025-40109 * CVE-2025-40110 * CVE-2025-40111 * CVE-2025-40115 * CVE-2025-40116 * CVE-2025-40118 * CVE-2025-40120 * CVE-2025-40121 * CVE-2025-40127 * CVE-2025-40129 * CVE-2025-40139 * CVE-2025-40140 * CVE-2025-40141 * CVE-2025-40149 * CVE-2025-40154 * CVE-2025-40156 * CVE-2025-40157 * CVE-2025-40159 * CVE-2025-40164 * CVE-2025-40168 * CVE-2025-40169 * CVE-2025-40171 * CVE-2025-40172 * CVE-2025-40173 * CVE-2025-40176 * CVE-2025-40180 * CVE-2025-40183 * CVE-2025-40185 * CVE-2025-40186 * CVE-2025-40188 * CVE-2025-40194 * CVE-2025-40198 * CVE-2025-40200 * CVE-2025-40204 * CVE-2025-40205 * CVE-2025-40206 * CVE-2025-40207 CVSS scores: * CVE-2022-50253 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37916 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37916 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37916 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38359 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38359 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39980 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39980 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40001 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40001 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40021 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-40021 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-40027 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40027 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40030 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40038 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40047 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40047 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40059 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40086 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40086 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40105 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40110 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40110 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40115 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40118 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40118 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40120 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40121 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40129 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40129 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40139 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40140 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40141 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40141 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40154 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40157 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40168 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40168 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40169 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40169 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40171 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40171 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40173 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40173 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40176 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40176 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40180 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40180 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40183 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40183 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40186 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40194 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-40205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40206 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * Legacy Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves 69 vulnerabilities and has 22 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP7 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2022-50253: bpf: make sure skb->len != 0 when redirecting to a tunneling device (bsc#1249912). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786). * CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888). * CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474). * CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076). * CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547). * CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982). * CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176). * CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034). * CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252). * CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120). * CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063). * CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303). * CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681). * CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763). * CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773). * CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid (bsc#1252817). * CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780). * CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790). * CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862). * CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821). * CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809). * CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845). * CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836). * CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794). * CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795). * CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774). * CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912). * CVE-2025-40086: drm/xe: Don't allow evicting of BOs in same VM in array of VM binds (bsc#1252923). * CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917). * CVE-2025-40105: vfs: Don't leak disconnected dentries on umount (bsc#1252928). * CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409). * CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355). * CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403). * CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427). * CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416). * CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421). * CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425). * CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436). The following non security issues were fixed: * ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes). * ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes). * ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes). * ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable- fixes). * ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes). * ACPI: property: Return present device nodes only on fwnode interface (stable-fixes). * ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes). * ACPICA: Update dsmethod.c to get rid of unused variable warning (stable- fixes). * ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes). * ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes). * ALSA: serial-generic: remove shared static buffer (stable-fixes). * ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes). * ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes). * ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable- fixes). * ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes). * ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes). * ALSA: usb-audio: don't log messages meant for 1810c when initializing 1824c (git-fixes). * ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes). * ASoC: cs4271: Fix regulator leak on probe failure (git-fixes). * ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable- fixes). * ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes). * ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes). * ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes). * ASoC: tas2781: fix getting the wrong device number (git-fixes). * ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable- fixes). * Bluetooth: 6lowpan: Don't hold spin lock over sleeping functions (git- fixes). * Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes). * Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes). * Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes). * Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes). * Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() (git-fixes). * Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes). * Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes). * Bluetooth: bcsp: receive data only if registered (stable-fixes). * Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes). * Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes). * Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git- fixes). * Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes). * Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes). * HID: amd_sfh: Stop sensor before starting (git-fixes). * HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes). * HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes). * HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes). * HID: uclogic: Fix potential memory leak in error path (git-fixes). * Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes). * Input: imx_sc_key - fix memory corruption on unload (git-fixes). * Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes). * KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes). * KVM: SEV: Enforce minimum GHCB version requirement for SEV-SNP guests (git- fixes). * KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git- fixes). * KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes). * KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes). * KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git- fixes). * KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes). * KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes). * KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git- fixes). * KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git- fixes). * KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes). * KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes). * KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git- fixes). * KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter (git-fixes). * KVM: s390: improve interrupt cpu for wakeup (bsc#1235463). * KVM: s390: kABI backport for 'last_sleep_cpu' (bsc#1252352). * KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes). * KVM: x86: Add helper to retrieve current value of user return MSR (git- fixes). * KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * KVM: x86: Don't treat ENTER and LEAVE as branches, because they aren't (git- fixes). * KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git- fixes). * KVM: x86: Have all vendor neutral sub-configs depend on KVM_X86, not just KVM (git-fixes). * NFS4: Fix state renewals missing after boot (git-fixes). * NFS: check if suid/sgid was cleared after a write as needed (git-fixes). * NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes). * NFSD: Skip close replay processing if XDR encoding fails (git-fixes). * NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes). * NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes). * NFSv4: handle ERR_GRACE on delegation recalls (git-fixes). * PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes). * PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes). * PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes). * PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes). * PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable- fixes). * PCI: j721e: Fix incorrect error message in probe() (git-fixes). * PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git- fixes). * PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes). * RDMA/bnxt_re: Don't fail destroy QP and cleanup debugfs earlier (git-fixes). * RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes). * RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes). * RDMA/hns: Fix the modification of max_send_sge (git-fixes). * RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes). * RDMA/irdma: Fix SD index calculation (git-fixes). * RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes). * accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes). * accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes). * accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes). * accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes). * acpi,srat: Fix incorrect device handle check for Generic Initiator (git- fixes). * acpi/hmat: Fix lockdep warning for hmem_register_resource() (git-fixes). * amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes). * ata: libata-scsi: Add missing scsi_device_put() in ata_scsi_dev_rescan() (git-fixes). * block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes). * block: fix kobject double initialization in add_disk (git-fixes). * bpf: Fix test verif_scale_strobemeta_subprogs failure due to llvm19 (bsc#1252368). * bpf: improve error message for unsupported helper (bsc#1252370). * btrfs: abort transaction on failure to add link to inode (git-fixes). * btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git- fix). * btrfs: avoid using fixed char array size for tree names (git-fix). * btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes). * btrfs: fix COW handling in run_delalloc_nocow() (git-fix). * btrfs: fix inode leak on failure to add link to inode (git-fixes). * btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix). * btrfs: mark dirty extent range for out of bound prealloc extents (git- fixes). * btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix). * btrfs: rename err to ret in btrfs_link() (git-fixes). * btrfs: run btrfs_error_commit_super() early (git-fix). * btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git- fix). * btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git- fixes). * btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes). * btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes). * btrfs: simplify error handling logic for btrfs_link() (git-fixes). * btrfs: tree-checker: add dev extent item checks (git-fix). * btrfs: tree-checker: add type and sequence check for inline backrefs (git- fix). * btrfs: tree-checker: fix the wrong output of data backref objectid (git- fix). * btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix). * btrfs: tree-checker: validate dref root and objectid (git-fix). * btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes). * cgroup/cpuset: Remove remote_partition_check() & make update_cpumasks_hier() handle remote partition (bsc#1241166). * char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes). * char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes). * char: misc: restrict the dynamic range to exclude reserved minors (stable- fixes). * cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166). * cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166). * cramfs: Verify inode mode when loading from disk (git-fixes). * crypto: aspeed - fix double free caused by devm (git-fixes). * crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes). * crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git- fixes). * crypto: iaa - Do not clobber req->base.data (git-fixes). * crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes). * dmaengine: dw-edma: Set status for callback_result (stable-fixes). * dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes). * drm/amd/amdgpu: Release xcp drm memory after unplug (stable-fixes). * drm/amd/display/dml2: Guard dml21_map_dc_state_into_dml_display_cfg with DC_FP_START (stable-fixes). * drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes). * drm/amd/display: Add fallback path for YCBCR422 (stable-fixes). * drm/amd/display: Allow VRR params change if unsynced with the stream (git- fixes). * drm/amd/display: Disable VRR on DCE 6 (stable-fixes). * drm/amd/display: Enable mst when it's detected but yet to be initialized (git-fixes). * drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes). * drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes). * drm/amd/display: Fix black screen with HDMI outputs (git-fixes). * drm/amd/display: Fix for test crash due to power gating (stable-fixes). * drm/amd/display: Fix incorrect return of vblank enable on unconfigured crtc (stable-fixes). * drm/amd/display: Fix pbn_div Calculation Error (stable-fixes). * drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable- fixes). * drm/amd/display: Increase minimum clock for TMDS 420 with pipe splitting (stable-fixes). * drm/amd/display: Init dispclk from bootup clock for DCN314 (stable-fixes). * drm/amd/display: Move setup_stream_attribute (stable-fixes). * drm/amd/display: Reject modes with too high pixel clock on DCE6-10 (git- fixes). * drm/amd/display: Reset apply_eamless_boot_optimization when dpms_off (stable-fixes). * drm/amd/display: Set up pixel encoding for YCBCR422 (stable-fixes). * drm/amd/display: Support HW cursor 180 rot for any number of pipe splits (stable-fixes). * drm/amd/display: Wait until OTG enable state is cleared (stable-fixes). * drm/amd/display: add more cyan skillfish devices (stable-fixes). * drm/amd/display: change dc stream color settings only in atomic commit (stable-fixes). * drm/amd/display: ensure committing streams is seamless (stable-fixes). * drm/amd/display: fix condition for setting timing_adjust_pending (stable- fixes). * drm/amd/display: fix dml ms order of operations (stable-fixes). * drm/amd/display: incorrect conditions for failing dto calculations (stable- fixes). * drm/amd/display: update color on atomic commit time (stable-fixes). * drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes). * drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable- fixes). * drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes). * drm/amd/pm: Use cached metrics data on arcturus (stable-fixes). * drm/amd: Avoid evicting resources at S5 (stable-fixes). * drm/amd: Check that VPE has reached DPM0 in idle handler (stable-fixes). * drm/amd: Fix suspend failure with secure display TA (git-fixes). * drm/amd: add more cyan skillfish PCI ids (stable-fixes). * drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() (stable-fixes). * drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes). * drm/amdgpu/smu: Handle S0ix for vangogh (stable-fixes). * drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes). * drm/amdgpu: Check vcn sram load return value (stable-fixes). * drm/amdgpu: Correct the counts of nr_banks and nr_errors (stable-fixes). * drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes). * drm/amdgpu: Fix function header names in amdgpu_connectors.c (git-fixes). * drm/amdgpu: Fix unintended error log in VCN5_0_0 (git-fixes). * drm/amdgpu: Respect max pixel clock for HDMI and DVI-D (v2) (stable-fixes). * drm/amdgpu: Skip poison aca bank from UE channel (stable-fixes). * drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable- fixes). * drm/amdgpu: add range check for RAS bad page address (stable-fixes). * drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes). * drm/amdgpu: disable peer-to-peer access for DCC-enabled GC12 VRAM surfaces (stable-fixes). * drm/amdgpu: don't enable SMU on cyan skillfish (stable-fixes). * drm/amdgpu: fix nullptr err of vm_handle_moved (stable-fixes). * drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM (stable-fixes). * drm/amdgpu: reject gang submissions under SRIOV (stable-fixes). * drm/amdgpu: remove two invalid BUG_ON()s (stable-fixes). * drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes). * drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes). * drm/amdkfd: fix vram allocation failure for a special case (stable-fixes). * drm/amdkfd: relax checks for over allocation of save area (stable-fixes). * drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes). * drm/ast: Blank with VGACR17 sync enable, always clear VGACRB6 sync off (git- fixes). * drm/bridge: cdns-dsi: Don't fail on MIPI_DSI_MODE_VIDEO_BURST (stable- fixes). * drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes). * drm/bridge: display-connector: don't set OP_DETECT for DisplayPorts (stable- fixes). * drm/exynos: exynos7_drm_decon: remove ctx->suspended (git-fixes). * drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes). * drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git- fixes). * drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes). * drm/mediatek: Add pm_runtime support for GCE power control (git-fixes). * drm/mediatek: Disable AFBC support on Mediatek DRM driver (git-fixes). * drm/msm/a6xx: Fix PDC sleep sequence (git-fixes). * drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable- fixes). * drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes). * drm/msm/registers: Generate _HI/LO builders for reg64 (stable-fixes). * drm/msm: make sure to not queue up recovery more than once (stable-fixes). * drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes). * drm/panthor: Serialize GPU cache flush operations (stable-fixes). * drm/panthor: check bo offset alignment in vm bind (stable-fixes). * drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes). * drm/sched: Optimise drm_sched_entity_push_job (stable-fixes). * drm/sched: avoid killing parent entity on child SIGKILL (stable-fixes). * drm/tegra: Add call to put_pid() (git-fixes). * drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes). * drm/tidss: Set crtc modesetting parameters with adjusted mode (stable- fixes). * drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes). * drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git- fixes). * drm/xe/guc: Add more GuC load error status codes (stable-fixes). * drm/xe/guc: Increase GuC crash dump buffer size (stable-fixes). * drm/xe/guc: Return an error code if the GuC load fails (stable-fixes). * drm/xe/guc: Set upper limit of H2G retries over CTB (stable-fixes). * drm/xe/guc: Synchronize Dead CT worker with unbind (git-fixes). * drm/xe: Do clean shutdown also when using flr (git-fixes). * drm/xe: Do not wake device during a GT reset (git-fixes). * drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test (stable- fixes). * drm/xe: Move declarations under conditional branch (stable-fixes). * drm/xe: Remove duplicate DRM_EXEC selection from Kconfig (git-fixes). * drm: panel-backlight-quirks: Make EDID match optional (stable-fixes). * exfat: limit log print for IO error (git-fixes). * extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes). * extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes). * fbcon: Set fb_display[i]->mode to NULL when the mode is released (stable- fixes). * fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes). * fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes). * fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable- fixes). * hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable- fixes). * hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes). * hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes). * hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes). * hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable- fixes). * hwmon: sy7636a: add alias (stable-fixes). * hyperv: Remove the spurious null directive line (git-fixes). * iio: adc: imx93_adc: load calibrated values even calibration failed (stable- fixes). * iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes). * ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes). * iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git- fixes). * isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes). * ixgbe: fix memory leak and use-after-free in ixgbe_recovery_probe() (git- fixes). * jfs: Verify inode mode when loading from disk (git-fixes). * jfs: fix uninitialized waitqueue in transaction manager (git-fixes). * lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes). * md/raid1: fix data lost for writemostly rdev (git-fixes). * md: fix mssing blktrace bio split events (git-fixes). * media: adv7180: Add missing lock in suspend callback (stable-fixes). * media: adv7180: Do not write format to device in set_fmt (stable-fixes). * media: adv7180: Only validate format in querystd (stable-fixes). * media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes). * media: fix uninitialized symbol warnings (stable-fixes). * media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes). * media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes). * media: imon: make send_packet() more robust (stable-fixes). * media: ov08x40: Fix the horizontal flip control (stable-fixes). * media: redrat3: use int type to store negative error codes (stable-fixes). * media: uvcvideo: Use heuristic to find stream entity (git-fixes). * media: videobuf2: forbid remove_bufs when legacy fileio is active (git- fixes). * memstick: Add timeout to prevent indefinite waiting (stable-fixes). * mfd: da9063: Split chip variant reading in two bus transactions (stable- fixes). * mfd: madera: Work around false-positive -Wininitialized warning (stable- fixes). * mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes). * mfd: stmpe: Remove IRQ domain upon removal (stable-fixes). * minixfs: Verify inode mode when loading from disk (git-fixes). * mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git- fixes). * mm/secretmem: fix use-after-free race in fault handler (git-fixes). * mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes). * mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes). * mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes). * mtd: onenand: Pass correct pointer to IRQ handler (git-fixes). * mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes). * mtdchar: fix integer overflow in read/write ioctls (git-fixes). * net/mana: fix warning in the writer of client oob (git-fixes). * net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779). * net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes). * net: phy: clear link parameters on admin link down (stable-fixes). * net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable- fixes). * net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes). * net: tcp: send zero-window ACK when no memory (bsc#1253779). * net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git- fixes). * nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing (git-fixes). * nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes). * nvme-auth: add hkdf_expand_label() (bsc#1247683). * nvme-auth: use hkdf_expand_label() (bsc#1247683). * phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes). * phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes). * phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes). * pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes). * pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git- fixes). * pinctrl: single: fix bias pull up/down handling in pin_config_set (stable- fixes). * platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes). * power: supply: qcom_battmgr: add OOI chemistry (stable-fixes). * power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes). * power: supply: sbs-charger: Support multiple devices (stable-fixes). * powerpc: export MIN RMA size (bsc#1236743 ltc#211409). * powerpc: increase MIN RMA size for CAS negotiation (bsc#1236743 ltc#211409 bsc#1252269 ltc#215957). * regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes). * rtc: rx8025: fix incorrect register reference (git-fixes). * s390/mm,fault: simplify kfence fault handling (bsc#1247076). * scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git- fixes). * scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes). * scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes). * scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git- fixes). * scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes). * scsi: mpi3mr: Correctly handle ATA device errors (git-fixes). * scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes). * scsi: mpt3sas: Correctly handle ATA device errors (git-fixes). * scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git- fixes). * scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes). * scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267). * selftests/bpf: Check for timeout in perf_link test (bsc#1253648). * selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes). * selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes). * selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes). * selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes). * selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes). * selftests/bpf: Fix string read in strncmp benchmark (git-fixes). * selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git- fixes). * selftests/bpf: Remove sockmap_ktls disconnect_after_delete test (bsc#1252365). * selftests/bpf: Remove tests for zeroed-array kptr (bsc#1252366). * selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes). * selftests/bpf: fix signedness bug in redir_partial() (git-fixes). * selftests/net/forwarding: add slowwait functions (bsc#1254235). * selftests/net/lib: no need to record ns name if it already exist (bsc#1254235). * selftests/net/lib: update busywait timeout value (bsc#1254235). * selftests/net: add lib.sh (bsc#1254235). * selftests/net: add variable NS_LIST for lib.sh (bsc#1254235). * selftests/net: use tc rule to filter the na packet (bsc#1254235). * selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221). * selftests: forwarding.config.sample: Move overrides to lib.sh (bsc#1254235). * selftests: forwarding: Add a test for testing lib.sh functionality (bsc#1254235). * selftests: forwarding: Avoid failures to source net/lib.sh (bsc#1254235). * selftests: forwarding: Change inappropriate log_test_skip() calls (bsc#1254235). * selftests: forwarding: Convert log_test() to recognize RET values (bsc#1254235). * selftests: forwarding: Have RET track kselftest framework constants (bsc#1254235). * selftests: forwarding: Parametrize mausezahn delay (bsc#1254235). * selftests: forwarding: Redefine relative_path variable (bsc#1254235). * selftests: forwarding: Remove duplicated lib.sh content (bsc#1254235). * selftests: forwarding: Support for performance sensitive tests (bsc#1254235). * selftests: lib: Define more kselftest exit codes (bsc#1254235). * selftests: lib: tc_rule_stats_get(): Move default to argument definition (bsc#1254235). * selftests: net: List helper scripts in TEST_FILES Makefile variable (bsc#1254235). * selftests: net: Unify code of busywait() and slowwait() (bsc#1254235). * selftests: net: add helper for checking if nettest is available (bsc#1254235). * selftests: net: lib: Do not overwrite error messages (bsc#1254235). * selftests: net: lib: Move logging from forwarding/lib.sh here (bsc#1254235). * selftests: net: lib: avoid error removing empty netns name (bsc#1254235). * selftests: net: lib: do not set ns var as readonly (bsc#1254235). * selftests: net: lib: fix shift count out of range (bsc#1254235). * selftests: net: lib: ignore possible errors (bsc#1254235). * selftests: net: lib: kill PIDs before del netns (bsc#1254235). * selftests: net: lib: remove 'ns' var in setup_ns (bsc#1254235). * selftests: net: lib: remove ns from list after clean-up (bsc#1254235). * selftests: net: lib: set 'i' as local (bsc#1254235). * selftests: net: lib: support errexit with busywait (bsc#1254235). * selftests: net: libs: Change variable fallback syntax (bsc#1254235). * serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes). * serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes). * soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes). * soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes). * soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes). * spi: Try to get ACPI GPIO IRQ earlier (git-fixes). * spi: loopback-test: Don't use %pK through printk (stable-fixes). * spi: rpc-if: Add resume support for RZ/G3E (stable-fixes). * strparser: Fix signed/unsigned mismatch bug (git-fixes). * tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork (bsc#1250705). * thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes). * tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable- fixes). * tools/cpupower: fix error return value in cpupower_write_sysfs() (stable- fixes). * tools/hv: fcopy: Fix incorrect file path conversion (git-fixes). * tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes). * tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable- fixes). * tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes). * tools: lib: thermal: don't preserve owner in install (stable-fixes). * tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes). * uio_hv_generic: Query the ringbuffer size for device (git-fixes). * usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes). * usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes). * usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable- fixes). * usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes). * usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes). * usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable- fixes). * usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable- fixes). * video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable- fixes). * watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable- fixes). * wifi: ath10k: Fix connection after GTK rekeying (stable-fixes). * wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181). * wifi: ath11k: zero init info->status in wmi_process_mgmt_tx_comp() (git- fixes). * wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes). * wifi: iwlwifi: fw: Add ASUS to PPAG and TAS list (stable-fixes). * wifi: mac80211: Fix 6 GHz Band capabilities element advertisement in lower bands (stable-fixes). * wifi: mac80211: Fix HE capabilities element check (stable-fixes). * wifi: mac80211: Track NAN interface start/stop (stable-fixes). * wifi: mac80211: don't mark keys for inactive links as uploaded (stable- fixes). * wifi: mac80211: fix key tailroom accounting leak (git-fixes). * wifi: mac80211: reject address change while connecting (git-fixes). * wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes). * wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git- fixes). * wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes). * wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes). * wifi: mt76: mt7996: fix memory leak on mt7996_mcu_sta_key_tlv error (stable- fixes). * wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git- fixes). * wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes). * wifi: rtw89: print just once for unknown C2H events (stable-fixes). * wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git- fixes). * x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes). * x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes). * x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes). * x86/CPU/AMD: Do the common init on future Zens too (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes). * x86/bugs: Fix reporting of LFENCE retpoline (git-fixes). * x86/bugs: Report correct retbleed mitigation status (git-fixes). * x86/vmscape: Add old Intel CPUs to affected list (git-fixes). * xe/oa: Fix query mode of operation for OAR/OAC (git-fixes). * xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes). * xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes). * xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes). * xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes). * xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4393=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-4393=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-4393=1 * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2025-4393=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-4393=1 * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-4393=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. ## Package List: * Basesystem Module 15-SP7 (aarch64 nosrc) * kernel-64kb-6.4.0-150700.53.25.1 * Basesystem Module 15-SP7 (aarch64) * kernel-64kb-devel-debuginfo-6.4.0-150700.53.25.1 * kernel-64kb-devel-6.4.0-150700.53.25.1 * kernel-64kb-debugsource-6.4.0-150700.53.25.1 * kernel-64kb-debuginfo-6.4.0-150700.53.25.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150700.53.25.1 * Basesystem Module 15-SP7 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150700.53.25.1.150700.17.17.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-6.4.0-150700.53.25.1 * kernel-default-debuginfo-6.4.0-150700.53.25.1 * kernel-default-devel-6.4.0-150700.53.25.1 * kernel-default-debugsource-6.4.0-150700.53.25.1 * Basesystem Module 15-SP7 (noarch) * kernel-devel-6.4.0-150700.53.25.1 * kernel-macros-6.4.0-150700.53.25.1 * Basesystem Module 15-SP7 (nosrc s390x) * kernel-zfcpdump-6.4.0-150700.53.25.1 * Basesystem Module 15-SP7 (s390x) * kernel-zfcpdump-debugsource-6.4.0-150700.53.25.1 * kernel-zfcpdump-debuginfo-6.4.0-150700.53.25.1 * Development Tools Module 15-SP7 (noarch nosrc) * kernel-docs-6.4.0-150700.53.25.2 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-6.4.0-150700.53.25.1 * kernel-syms-6.4.0-150700.53.25.1 * kernel-obs-build-debugsource-6.4.0-150700.53.25.1 * Development Tools Module 15-SP7 (noarch) * kernel-source-6.4.0-150700.53.25.1 * Legacy Module 15-SP7 (nosrc) * kernel-default-6.4.0-150700.53.25.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-6.4.0-150700.53.25.1 * reiserfs-kmp-default-6.4.0-150700.53.25.1 * reiserfs-kmp-default-debuginfo-6.4.0-150700.53.25.1 * kernel-default-debugsource-6.4.0-150700.53.25.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-debuginfo-6.4.0-150700.53.25.1 * dlm-kmp-default-debuginfo-6.4.0-150700.53.25.1 * gfs2-kmp-default-6.4.0-150700.53.25.1 * ocfs2-kmp-default-6.4.0-150700.53.25.1 * cluster-md-kmp-default-6.4.0-150700.53.25.1 * dlm-kmp-default-6.4.0-150700.53.25.1 * kernel-default-debuginfo-6.4.0-150700.53.25.1 * kernel-default-debugsource-6.4.0-150700.53.25.1 * cluster-md-kmp-default-debuginfo-6.4.0-150700.53.25.1 * ocfs2-kmp-default-debuginfo-6.4.0-150700.53.25.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (nosrc) * kernel-default-6.4.0-150700.53.25.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (nosrc) * kernel-default-6.4.0-150700.53.25.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * kernel-default-debuginfo-6.4.0-150700.53.25.1 * kernel-default-extra-debuginfo-6.4.0-150700.53.25.1 * kernel-default-extra-6.4.0-150700.53.25.1 * kernel-default-debugsource-6.4.0-150700.53.25.1 * SUSE Linux Enterprise Live Patching 15-SP7 (nosrc) * kernel-default-6.4.0-150700.53.25.1 * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP7_Update_7-debugsource-1-150700.15.3.1 * kernel-default-debuginfo-6.4.0-150700.53.25.1 * kernel-livepatch-6_4_0-150700_53_25-default-1-150700.15.3.1 * kernel-default-debugsource-6.4.0-150700.53.25.1 * kernel-livepatch-6_4_0-150700_53_25-default-debuginfo-1-150700.15.3.1 * kernel-default-livepatch-6.4.0-150700.53.25.1 * kernel-default-livepatch-devel-6.4.0-150700.53.25.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50253.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-21710.html * https://www.suse.com/security/cve/CVE-2025-37916.html * https://www.suse.com/security/cve/CVE-2025-38359.html * https://www.suse.com/security/cve/CVE-2025-39788.html * https://www.suse.com/security/cve/CVE-2025-39805.html * https://www.suse.com/security/cve/CVE-2025-39819.html * https://www.suse.com/security/cve/CVE-2025-39822.html * https://www.suse.com/security/cve/CVE-2025-39859.html * https://www.suse.com/security/cve/CVE-2025-39944.html * https://www.suse.com/security/cve/CVE-2025-39980.html * https://www.suse.com/security/cve/CVE-2025-40001.html * https://www.suse.com/security/cve/CVE-2025-40021.html * https://www.suse.com/security/cve/CVE-2025-40027.html * https://www.suse.com/security/cve/CVE-2025-40030.html * https://www.suse.com/security/cve/CVE-2025-40038.html * https://www.suse.com/security/cve/CVE-2025-40040.html * https://www.suse.com/security/cve/CVE-2025-40047.html * https://www.suse.com/security/cve/CVE-2025-40048.html * https://www.suse.com/security/cve/CVE-2025-40055.html * https://www.suse.com/security/cve/CVE-2025-40059.html * https://www.suse.com/security/cve/CVE-2025-40064.html * https://www.suse.com/security/cve/CVE-2025-40070.html * https://www.suse.com/security/cve/CVE-2025-40074.html * https://www.suse.com/security/cve/CVE-2025-40075.html * https://www.suse.com/security/cve/CVE-2025-40080.html * https://www.suse.com/security/cve/CVE-2025-40083.html * https://www.suse.com/security/cve/CVE-2025-40086.html * https://www.suse.com/security/cve/CVE-2025-40098.html * https://www.suse.com/security/cve/CVE-2025-40105.html * https://www.suse.com/security/cve/CVE-2025-40107.html * https://www.suse.com/security/cve/CVE-2025-40109.html * https://www.suse.com/security/cve/CVE-2025-40110.html * https://www.suse.com/security/cve/CVE-2025-40111.html * https://www.suse.com/security/cve/CVE-2025-40115.html * https://www.suse.com/security/cve/CVE-2025-40116.html * https://www.suse.com/security/cve/CVE-2025-40118.html * https://www.suse.com/security/cve/CVE-2025-40120.html * https://www.suse.com/security/cve/CVE-2025-40121.html * https://www.suse.com/security/cve/CVE-2025-40127.html * https://www.suse.com/security/cve/CVE-2025-40129.html * https://www.suse.com/security/cve/CVE-2025-40139.html * https://www.suse.com/security/cve/CVE-2025-40140.html * https://www.suse.com/security/cve/CVE-2025-40141.html * https://www.suse.com/security/cve/CVE-2025-40149.html * https://www.suse.com/security/cve/CVE-2025-40154.html * https://www.suse.com/security/cve/CVE-2025-40156.html * https://www.suse.com/security/cve/CVE-2025-40157.html * https://www.suse.com/security/cve/CVE-2025-40159.html * https://www.suse.com/security/cve/CVE-2025-40164.html * https://www.suse.com/security/cve/CVE-2025-40168.html * https://www.suse.com/security/cve/CVE-2025-40169.html * https://www.suse.com/security/cve/CVE-2025-40171.html * https://www.suse.com/security/cve/CVE-2025-40172.html * https://www.suse.com/security/cve/CVE-2025-40173.html * https://www.suse.com/security/cve/CVE-2025-40176.html * https://www.suse.com/security/cve/CVE-2025-40180.html * https://www.suse.com/security/cve/CVE-2025-40183.html * https://www.suse.com/security/cve/CVE-2025-40185.html * https://www.suse.com/security/cve/CVE-2025-40186.html * https://www.suse.com/security/cve/CVE-2025-40188.html * https://www.suse.com/security/cve/CVE-2025-40194.html * https://www.suse.com/security/cve/CVE-2025-40198.html * https://www.suse.com/security/cve/CVE-2025-40200.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://www.suse.com/security/cve/CVE-2025-40205.html * https://www.suse.com/security/cve/CVE-2025-40206.html * https://www.suse.com/security/cve/CVE-2025-40207.html * https://bugzilla.suse.com/show_bug.cgi?id=1235463 * https://bugzilla.suse.com/show_bug.cgi?id=1236743 * https://bugzilla.suse.com/show_bug.cgi?id=1237888 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1243474 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1247076 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1247509 * https://bugzilla.suse.com/show_bug.cgi?id=1247683 * https://bugzilla.suse.com/show_bug.cgi?id=1249547 * https://bugzilla.suse.com/show_bug.cgi?id=1249912 * https://bugzilla.suse.com/show_bug.cgi?id=1249982 * https://bugzilla.suse.com/show_bug.cgi?id=1250034 * https://bugzilla.suse.com/show_bug.cgi?id=1250176 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250252 * https://bugzilla.suse.com/show_bug.cgi?id=1250705 * https://bugzilla.suse.com/show_bug.cgi?id=1251120 * https://bugzilla.suse.com/show_bug.cgi?id=1251786 * https://bugzilla.suse.com/show_bug.cgi?id=1252063 * https://bugzilla.suse.com/show_bug.cgi?id=1252267 * https://bugzilla.suse.com/show_bug.cgi?id=1252269 * https://bugzilla.suse.com/show_bug.cgi?id=1252303 * https://bugzilla.suse.com/show_bug.cgi?id=1252352 * https://bugzilla.suse.com/show_bug.cgi?id=1252353 * https://bugzilla.suse.com/show_bug.cgi?id=1252365 * https://bugzilla.suse.com/show_bug.cgi?id=1252366 * https://bugzilla.suse.com/show_bug.cgi?id=1252368 * https://bugzilla.suse.com/show_bug.cgi?id=1252370 * https://bugzilla.suse.com/show_bug.cgi?id=1252681 * https://bugzilla.suse.com/show_bug.cgi?id=1252763 * https://bugzilla.suse.com/show_bug.cgi?id=1252773 * https://bugzilla.suse.com/show_bug.cgi?id=1252774 * https://bugzilla.suse.com/show_bug.cgi?id=1252780 * https://bugzilla.suse.com/show_bug.cgi?id=1252790 * https://bugzilla.suse.com/show_bug.cgi?id=1252794 * https://bugzilla.suse.com/show_bug.cgi?id=1252795 * https://bugzilla.suse.com/show_bug.cgi?id=1252809 * https://bugzilla.suse.com/show_bug.cgi?id=1252817 * https://bugzilla.suse.com/show_bug.cgi?id=1252821 * https://bugzilla.suse.com/show_bug.cgi?id=1252836 * https://bugzilla.suse.com/show_bug.cgi?id=1252845 * https://bugzilla.suse.com/show_bug.cgi?id=1252862 * https://bugzilla.suse.com/show_bug.cgi?id=1252912 * https://bugzilla.suse.com/show_bug.cgi?id=1252917 * https://bugzilla.suse.com/show_bug.cgi?id=1252923 * https://bugzilla.suse.com/show_bug.cgi?id=1252928 * https://bugzilla.suse.com/show_bug.cgi?id=1253018 * https://bugzilla.suse.com/show_bug.cgi?id=1253176 * https://bugzilla.suse.com/show_bug.cgi?id=1253275 * https://bugzilla.suse.com/show_bug.cgi?id=1253318 * https://bugzilla.suse.com/show_bug.cgi?id=1253324 * https://bugzilla.suse.com/show_bug.cgi?id=1253349 * https://bugzilla.suse.com/show_bug.cgi?id=1253352 * https://bugzilla.suse.com/show_bug.cgi?id=1253355 * https://bugzilla.suse.com/show_bug.cgi?id=1253360 * https://bugzilla.suse.com/show_bug.cgi?id=1253362 * https://bugzilla.suse.com/show_bug.cgi?id=1253363 * https://bugzilla.suse.com/show_bug.cgi?id=1253367 * https://bugzilla.suse.com/show_bug.cgi?id=1253369 * https://bugzilla.suse.com/show_bug.cgi?id=1253393 * https://bugzilla.suse.com/show_bug.cgi?id=1253394 * https://bugzilla.suse.com/show_bug.cgi?id=1253395 * https://bugzilla.suse.com/show_bug.cgi?id=1253403 * https://bugzilla.suse.com/show_bug.cgi?id=1253407 * https://bugzilla.suse.com/show_bug.cgi?id=1253409 * https://bugzilla.suse.com/show_bug.cgi?id=1253412 * https://bugzilla.suse.com/show_bug.cgi?id=1253416 * https://bugzilla.suse.com/show_bug.cgi?id=1253421 * https://bugzilla.suse.com/show_bug.cgi?id=1253423 * https://bugzilla.suse.com/show_bug.cgi?id=1253424 * https://bugzilla.suse.com/show_bug.cgi?id=1253425 * https://bugzilla.suse.com/show_bug.cgi?id=1253427 * https://bugzilla.suse.com/show_bug.cgi?id=1253428 * https://bugzilla.suse.com/show_bug.cgi?id=1253431 * https://bugzilla.suse.com/show_bug.cgi?id=1253436 * https://bugzilla.suse.com/show_bug.cgi?id=1253438 * https://bugzilla.suse.com/show_bug.cgi?id=1253440 * https://bugzilla.suse.com/show_bug.cgi?id=1253441 * https://bugzilla.suse.com/show_bug.cgi?id=1253445 * https://bugzilla.suse.com/show_bug.cgi?id=1253448 * https://bugzilla.suse.com/show_bug.cgi?id=1253449 * https://bugzilla.suse.com/show_bug.cgi?id=1253453 * https://bugzilla.suse.com/show_bug.cgi?id=1253456 * https://bugzilla.suse.com/show_bug.cgi?id=1253472 * https://bugzilla.suse.com/show_bug.cgi?id=1253648 * https://bugzilla.suse.com/show_bug.cgi?id=1253779 * https://bugzilla.suse.com/show_bug.cgi?id=1254181 * https://bugzilla.suse.com/show_bug.cgi?id=1254221 * https://bugzilla.suse.com/show_bug.cgi?id=1254235 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 12:31:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 12:31:16 -0000 Subject: SUSE-SU-2025:4398-1: low: Security update for python3 Message-ID: <176580187657.2574.17235135793448519067@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2025:4398-1 Release Date: 2025-12-15T11:30:55Z Rating: low References: * bsc#1251305 * bsc#1252974 Cross-References: * CVE-2025-6075 * CVE-2025-8291 CVSS scores: * CVE-2025-6075 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-6075 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-6075 ( NVD ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8291 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-8291 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-8291 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for python3 fixes the following issues: Security issues fixed: * CVE-2025-6075: Fixed simple quadratic complexity vulnerabilities on `os.path.expandvars()` (bsc#1252974). * CVE-2025-8291: Fixed missing validity checks of the ZIP64 End of Central Directory (EOCD) (bsc#1251305). Other issues fixed: * Added @requires_lchmod operator for skipping tests on platforms were changing the mode of symbolic links is supported. * Fixed decoding byte strings in `localeconv()` for consistent output. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4398=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * python3-debugsource-3.4.10-25.163.1 * python3-base-debugsource-3.4.10-25.163.1 * libpython3_4m1_0-32bit-3.4.10-25.163.1 * python3-tk-debuginfo-3.4.10-25.163.1 * python3-curses-3.4.10-25.163.1 * libpython3_4m1_0-3.4.10-25.163.1 * python3-base-debuginfo-3.4.10-25.163.1 * python3-debuginfo-3.4.10-25.163.1 * libpython3_4m1_0-debuginfo-3.4.10-25.163.1 * libpython3_4m1_0-debuginfo-32bit-3.4.10-25.163.1 * python3-base-debuginfo-32bit-3.4.10-25.163.1 * python3-devel-3.4.10-25.163.1 * python3-3.4.10-25.163.1 * python3-devel-debuginfo-3.4.10-25.163.1 * python3-base-3.4.10-25.163.1 * python3-tk-3.4.10-25.163.1 * python3-curses-debuginfo-3.4.10-25.163.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6075.html * https://www.suse.com/security/cve/CVE-2025-8291.html * https://bugzilla.suse.com/show_bug.cgi?id=1251305 * https://bugzilla.suse.com/show_bug.cgi?id=1252974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 12:31:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 12:31:19 -0000 Subject: SUSE-SU-2025:4397-1: important: Security update for MozillaThunderbird Message-ID: <176580187960.2574.12457963334494131452@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2025:4397-1 Release Date: 2025-12-15T11:26:47Z Rating: important References: * bsc#1254551 Cross-References: * CVE-2025-14321 * CVE-2025-14322 * CVE-2025-14323 * CVE-2025-14324 * CVE-2025-14325 * CVE-2025-14328 * CVE-2025-14329 * CVE-2025-14330 * CVE-2025-14331 * CVE-2025-14333 CVSS scores: * CVE-2025-14321 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14321 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14321 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14321 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14322 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14322 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14322 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N * CVE-2025-14323 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14323 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14323 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14324 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14324 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14324 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14324 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14325 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14325 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14325 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-14328 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-14328 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-14328 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14329 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-14329 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-14329 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14330 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-14330 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-14330 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14330 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14331 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-14331 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-14331 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-14331 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-14333 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14333 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14333 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14333 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: Update to Mozilla Thunderbird 140.6 (bsc#1254551). * MFSA 2025-96 * CVE-2025-14321: use-after-free in the WebRTC: Signaling component. * CVE-2025-14322: sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. * CVE-2025-14323: privilege escalation in the DOM: Notifications component. * CVE-2025-14324: JIT miscompilation in the JavaScript Engine: JIT component. * CVE-2025-14325: JIT miscompilation in the JavaScript Engine: JIT component. * CVE-2025-14328: privilege escalation in the Netmonitor component. * CVE-2025-14329: privilege escalation in the Netmonitor component. * CVE-2025-14330: JIT miscompilation in the JavaScript Engine: JIT component. * CVE-2025-14331: same-origin policy bypass in the Request Handling component. * CVE-2025-14333: memory safety bugs. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4397=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4397=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4397=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-4397=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-4397=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-debugsource-140.6.0-150200.8.248.1 * MozillaThunderbird-debuginfo-140.6.0-150200.8.248.1 * MozillaThunderbird-translations-other-140.6.0-150200.8.248.1 * MozillaThunderbird-140.6.0-150200.8.248.1 * MozillaThunderbird-translations-common-140.6.0-150200.8.248.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-debugsource-140.6.0-150200.8.248.1 * MozillaThunderbird-debuginfo-140.6.0-150200.8.248.1 * MozillaThunderbird-translations-other-140.6.0-150200.8.248.1 * MozillaThunderbird-140.6.0-150200.8.248.1 * MozillaThunderbird-translations-common-140.6.0-150200.8.248.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * MozillaThunderbird-debugsource-140.6.0-150200.8.248.1 * MozillaThunderbird-debuginfo-140.6.0-150200.8.248.1 * MozillaThunderbird-translations-other-140.6.0-150200.8.248.1 * MozillaThunderbird-140.6.0-150200.8.248.1 * MozillaThunderbird-translations-common-140.6.0-150200.8.248.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-debugsource-140.6.0-150200.8.248.1 * MozillaThunderbird-debuginfo-140.6.0-150200.8.248.1 * MozillaThunderbird-translations-other-140.6.0-150200.8.248.1 * MozillaThunderbird-140.6.0-150200.8.248.1 * MozillaThunderbird-translations-common-140.6.0-150200.8.248.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * MozillaThunderbird-debugsource-140.6.0-150200.8.248.1 * MozillaThunderbird-debuginfo-140.6.0-150200.8.248.1 * MozillaThunderbird-translations-other-140.6.0-150200.8.248.1 * MozillaThunderbird-140.6.0-150200.8.248.1 * MozillaThunderbird-translations-common-140.6.0-150200.8.248.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14321.html * https://www.suse.com/security/cve/CVE-2025-14322.html * https://www.suse.com/security/cve/CVE-2025-14323.html * https://www.suse.com/security/cve/CVE-2025-14324.html * https://www.suse.com/security/cve/CVE-2025-14325.html * https://www.suse.com/security/cve/CVE-2025-14328.html * https://www.suse.com/security/cve/CVE-2025-14329.html * https://www.suse.com/security/cve/CVE-2025-14330.html * https://www.suse.com/security/cve/CVE-2025-14331.html * https://www.suse.com/security/cve/CVE-2025-14333.html * https://bugzilla.suse.com/show_bug.cgi?id=1254551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 12:31:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 12:31:22 -0000 Subject: SUSE-SU-2025:4396-1: important: Security update for MozillaFirefox Message-ID: <176580188271.2574.2835020080055683178@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2025:4396-1 Release Date: 2025-12-15T11:24:33Z Rating: important References: * bsc#1254551 Cross-References: * CVE-2025-14321 * CVE-2025-14322 * CVE-2025-14323 * CVE-2025-14324 * CVE-2025-14325 * CVE-2025-14328 * CVE-2025-14329 * CVE-2025-14330 * CVE-2025-14331 * CVE-2025-14333 CVSS scores: * CVE-2025-14321 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14321 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14321 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14321 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14322 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14322 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14322 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N * CVE-2025-14323 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14323 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14323 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14324 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14324 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14324 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14324 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14325 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14325 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14325 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-14328 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-14328 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-14328 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14329 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-14329 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-14329 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14330 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-14330 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-14330 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14330 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14331 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-14331 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-14331 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-14331 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-14333 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14333 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14333 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14333 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 140.6.0 ESR (bsc#1254551). * MFSA 2025-94 * CVE-2025-14321: use-after-free in the WebRTC: Signaling component. * CVE-2025-14322: sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. * CVE-2025-14323: privilege escalation in the DOM: Notifications component. * CVE-2025-14324: JIT miscompilation in the JavaScript Engine: JIT component. * CVE-2025-14325: JIT miscompilation in the JavaScript Engine: JIT component. * CVE-2025-14328: privilege escalation in the Netmonitor component. * CVE-2025-14329: privilege escalation in the Netmonitor component. * CVE-2025-14330: JIT miscompilation in the JavaScript Engine: JIT component. * CVE-2025-14331: same-origin policy bypass in the Request Handling component. * CVE-2025-14333: memory safety bugs. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4396=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4396=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-140.6.0-112.292.1 * MozillaFirefox-debugsource-140.6.0-112.292.1 * MozillaFirefox-140.6.0-112.292.1 * MozillaFirefox-translations-common-140.6.0-112.292.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * MozillaFirefox-devel-140.6.0-112.292.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * MozillaFirefox-debuginfo-140.6.0-112.292.1 * MozillaFirefox-debugsource-140.6.0-112.292.1 * MozillaFirefox-140.6.0-112.292.1 * MozillaFirefox-translations-common-140.6.0-112.292.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * MozillaFirefox-devel-140.6.0-112.292.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14321.html * https://www.suse.com/security/cve/CVE-2025-14322.html * https://www.suse.com/security/cve/CVE-2025-14323.html * https://www.suse.com/security/cve/CVE-2025-14324.html * https://www.suse.com/security/cve/CVE-2025-14325.html * https://www.suse.com/security/cve/CVE-2025-14328.html * https://www.suse.com/security/cve/CVE-2025-14329.html * https://www.suse.com/security/cve/CVE-2025-14330.html * https://www.suse.com/security/cve/CVE-2025-14331.html * https://www.suse.com/security/cve/CVE-2025-14333.html * https://bugzilla.suse.com/show_bug.cgi?id=1254551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 12:31:25 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 12:31:25 -0000 Subject: SUSE-SU-2025:4395-1: moderate: Security update for govulncheck-vulndb Message-ID: <176580188501.2574.11336433863956937945@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2025:4395-1 Release Date: 2025-12-15T11:15:31Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20251209T172047 2025-12-09T17:20:47Z (jsc#PED-11136). Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-4006 CVE-2025-61725 * GO-2025-4176 CVE-2025-65105 GHSA-j3rw-fx6g-q46j * GO-2025-4177 CVE-2025-64750 GHSA-wwrx-w7c9-rf87 * GO-2025-4178 CVE-2025-13870 GHSA-58w6-w55x-6wq8 * GO-2025-4179 CVE-2025-64443 GHSA-46gc-mwh4-cc5r * GO-2025-4180 CVE-2025-44005 GHSA-h8cp-697h-8c8p * GO-2025-4181 CVE-2025-66406 GHSA-j7c9-79x7-8hpr * GO-2025-4182 CVE-2025-66411 GHSA-jf75-p25m-pw74 * GO-2025-4183 CVE-2017-18870 GHSA-9j9j-mm2r-9rfm * GO-2025-4184 CVE-2017-18871 GHSA-jc6w-8r7f-vmp5 * GO-2025-4185 CVE-2017-18902 GHSA-jwfv-5hwq-f97r * GO-2025-4186 CVE-2017-18875 GHSA-9rr5-q43r-ccv4 * GO-2025-4187 CVE-2017-18876 GHSA-hjqh-j6rj-gh8q * GO-2025-4189 CVE-2017-18879 GHSA-498j-wxww-j897 * GO-2025-4190 CVE-2017-18877 GHSA-9x8x-w6g5-hx4w * GO-2025-4192 CVE-2025-66564 GHSA-4qg8-fj49-pxjh * GO-2025-4193 CVE-2025-66506 GHSA-f83f-xpx7-ffpw * GO-2025-4197 CVE-2017-18884 GHSA-876j-jfqf-m7j7 * GO-2025-4198 CVE-2017-18883 GHSA-w8cc-3h7q-jhc3 * Update to version 0.0.20251203T174324 2025-12-03T17:43:24Z (jsc#PED-11136). Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-4155 CVE-2025-61729 * GO-2025-4163 CVE-2025-60638 GHSA-f2hj-vpp9-6vm2 * GO-2025-4164 CVE-2025-60632 GHSA-vgq7-9r5r-j9v3 * GO-2025-4171 CVE-2025-66410 GHSA- jrhg-82w2-vvj7 * GO-2025-4172 CVE-2025-12756 GHSA-p6gj-jc38-x2m7 * GO-2025-4174 CVE-2025-13353 GHSA-69jw-4jj8-fcxm * GO-2025-4175 CVE-2025-61727 * Update to version 0.0.20251125T181218 2025-11-25T18:12:18Z (jsc#PED-11136). Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-4133 CVE-2025-55074 GHSA-9hh7-6558-qfp2 * GO-2025-4138 CVE-2025-65025 GHSA-h3mw-4f23-gwpw * GO-2025-4139 CVE-2025-65026 GHSA-hcpf-qv9m-vfgp * GO-2025-4146 CVE-2018-21258 GHSA-5mh6-p63g-3mv5 * GO-2025-4147 GHSA-6xvf-4vh9-mw47 * GO-2025-4149 CVE-2025-13425 GHSA-f786-75f3-74xj * GO-2025-4150 CVE-2025-64751 GHSA-2c64-vmv2-hgfc * GO-2025-4151 CVE-2025-65111 GHSA-9m7r-g8hg-x3vr * GO-2025-4152 CVE-2025-13357 GHSA-gmm6-j2g5-r52m * GO-2025-4153 CVE-2025-41115 GHSA-w62r-7c53-fmc5 * GO-2025-4156 CVE-2025-64761 GHSA-7ff4-jw48-3436 * GO-2025-4157 GHSA-2fcv-qww3-9v6h * GO-2025-4158 GHSA- rj4j-2jph-gg43 * GO-2025-4159 GHSA-xq4h-wqm2-668w * GO-2025-4160 CVE-2025-65965 GHSA-6gxw-85q2-q646 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4395=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4395=1 ## Package List: * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20251209T172047-150000.1.127.1 * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20251209T172047-150000.1.127.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 12:31:39 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 12:31:39 -0000 Subject: SUSE-SU-2025:4391-1: moderate: Security update for unbound Message-ID: <176580189991.2574.8775052913307436994@smelt2.prg2.suse.org> # Security update for unbound Announcement ID: SUSE-SU-2025:4391-1 Release Date: 2025-12-15T10:34:11Z Rating: moderate References: * bsc#1252525 Cross-References: * CVE-2025-11411 CVSS scores: * CVE-2025-11411 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:L * CVE-2025-11411 ( SUSE ): 6.9 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L * CVE-2025-11411 ( NVD ): 5.7 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Micro 5.5 An update that solves one vulnerability can now be installed. ## Description: This update for unbound fixes the following issues: * CVE-2025-11411: Fixed domain hijacking due to promiscuous records (bsc#1252525) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4391=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * unbound-anchor-1.20.0-150100.10.22.1 * libunbound8-1.20.0-150100.10.22.1 * unbound-debuginfo-1.20.0-150100.10.22.1 * unbound-debugsource-1.20.0-150100.10.22.1 * libunbound8-debuginfo-1.20.0-150100.10.22.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11411.html * https://bugzilla.suse.com/show_bug.cgi?id=1252525 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 12:31:43 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 12:31:43 -0000 Subject: SUSE-SU-2025:4257-2: low: Security update for python311 Message-ID: <176580190387.2574.14333062988903139435@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2025:4257-2 Release Date: 2025-12-15T10:33:52Z Rating: low References: * bsc#1251305 * bsc#1252974 Cross-References: * CVE-2025-6075 * CVE-2025-8291 CVSS scores: * CVE-2025-6075 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-6075 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-6075 ( NVD ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8291 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-8291 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-8291 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for python311 fixes the following issues: Update to 3.11.14: * CVE-2025-6075: Fixed simple quadratic complexity vulnerabilities of os.path.expandvars() (bsc#1252974) * CVE-2025-8291: Fixed validity of the ZIP64 End of Central Directory (EOCD) not checked by the 'zipfile' module (bsc#1251305) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4257=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4257=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4257=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4257=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4257=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4257=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4257=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4257=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libpython3_11-1_0-debuginfo-3.11.14-150400.9.69.1 * libpython3_11-1_0-3.11.14-150400.9.69.1 * python311-debuginfo-3.11.14-150400.9.69.1 * python311-core-debugsource-3.11.14-150400.9.69.1 * python311-3.11.14-150400.9.69.1 * python311-dbm-3.11.14-150400.9.69.1 * python311-devel-3.11.14-150400.9.69.1 * python311-curses-3.11.14-150400.9.69.1 * python311-tk-debuginfo-3.11.14-150400.9.69.1 * python311-tools-3.11.14-150400.9.69.1 * python311-tk-3.11.14-150400.9.69.1 * python311-doc-devhelp-3.11.14-150400.9.69.1 * python311-dbm-debuginfo-3.11.14-150400.9.69.1 * python311-debugsource-3.11.14-150400.9.69.1 * python311-idle-3.11.14-150400.9.69.1 * python311-doc-3.11.14-150400.9.69.1 * python311-base-debuginfo-3.11.14-150400.9.69.1 * python311-curses-debuginfo-3.11.14-150400.9.69.1 * python311-base-3.11.14-150400.9.69.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libpython3_11-1_0-debuginfo-3.11.14-150400.9.69.1 * libpython3_11-1_0-3.11.14-150400.9.69.1 * python311-debuginfo-3.11.14-150400.9.69.1 * python311-core-debugsource-3.11.14-150400.9.69.1 * python311-3.11.14-150400.9.69.1 * python311-dbm-3.11.14-150400.9.69.1 * python311-devel-3.11.14-150400.9.69.1 * python311-curses-3.11.14-150400.9.69.1 * python311-tk-debuginfo-3.11.14-150400.9.69.1 * python311-tools-3.11.14-150400.9.69.1 * python311-tk-3.11.14-150400.9.69.1 * python311-doc-devhelp-3.11.14-150400.9.69.1 * python311-dbm-debuginfo-3.11.14-150400.9.69.1 * python311-debugsource-3.11.14-150400.9.69.1 * python311-idle-3.11.14-150400.9.69.1 * python311-doc-3.11.14-150400.9.69.1 * python311-base-debuginfo-3.11.14-150400.9.69.1 * python311-curses-debuginfo-3.11.14-150400.9.69.1 * python311-base-3.11.14-150400.9.69.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libpython3_11-1_0-debuginfo-3.11.14-150400.9.69.1 * libpython3_11-1_0-3.11.14-150400.9.69.1 * python311-debuginfo-3.11.14-150400.9.69.1 * python311-core-debugsource-3.11.14-150400.9.69.1 * python311-3.11.14-150400.9.69.1 * python311-dbm-3.11.14-150400.9.69.1 * python311-devel-3.11.14-150400.9.69.1 * python311-curses-3.11.14-150400.9.69.1 * python311-tk-debuginfo-3.11.14-150400.9.69.1 * python311-tools-3.11.14-150400.9.69.1 * python311-tk-3.11.14-150400.9.69.1 * python311-doc-devhelp-3.11.14-150400.9.69.1 * python311-dbm-debuginfo-3.11.14-150400.9.69.1 * python311-debugsource-3.11.14-150400.9.69.1 * python311-idle-3.11.14-150400.9.69.1 * python311-doc-3.11.14-150400.9.69.1 * python311-base-debuginfo-3.11.14-150400.9.69.1 * python311-curses-debuginfo-3.11.14-150400.9.69.1 * python311-base-3.11.14-150400.9.69.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libpython3_11-1_0-debuginfo-3.11.14-150400.9.69.1 * libpython3_11-1_0-3.11.14-150400.9.69.1 * python311-debuginfo-3.11.14-150400.9.69.1 * python311-core-debugsource-3.11.14-150400.9.69.1 * python311-3.11.14-150400.9.69.1 * python311-dbm-3.11.14-150400.9.69.1 * python311-devel-3.11.14-150400.9.69.1 * python311-curses-3.11.14-150400.9.69.1 * python311-tk-debuginfo-3.11.14-150400.9.69.1 * python311-tools-3.11.14-150400.9.69.1 * python311-tk-3.11.14-150400.9.69.1 * python311-doc-devhelp-3.11.14-150400.9.69.1 * python311-dbm-debuginfo-3.11.14-150400.9.69.1 * python311-debugsource-3.11.14-150400.9.69.1 * python311-idle-3.11.14-150400.9.69.1 * python311-doc-3.11.14-150400.9.69.1 * python311-base-debuginfo-3.11.14-150400.9.69.1 * python311-curses-debuginfo-3.11.14-150400.9.69.1 * python311-base-3.11.14-150400.9.69.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libpython3_11-1_0-debuginfo-3.11.14-150400.9.69.1 * libpython3_11-1_0-3.11.14-150400.9.69.1 * python311-debuginfo-3.11.14-150400.9.69.1 * python311-core-debugsource-3.11.14-150400.9.69.1 * python311-3.11.14-150400.9.69.1 * python311-dbm-3.11.14-150400.9.69.1 * python311-devel-3.11.14-150400.9.69.1 * python311-curses-3.11.14-150400.9.69.1 * python311-tk-debuginfo-3.11.14-150400.9.69.1 * python311-tools-3.11.14-150400.9.69.1 * python311-tk-3.11.14-150400.9.69.1 * python311-doc-devhelp-3.11.14-150400.9.69.1 * python311-dbm-debuginfo-3.11.14-150400.9.69.1 * python311-debugsource-3.11.14-150400.9.69.1 * python311-idle-3.11.14-150400.9.69.1 * python311-doc-3.11.14-150400.9.69.1 * python311-base-debuginfo-3.11.14-150400.9.69.1 * python311-curses-debuginfo-3.11.14-150400.9.69.1 * python311-base-3.11.14-150400.9.69.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libpython3_11-1_0-debuginfo-3.11.14-150400.9.69.1 * libpython3_11-1_0-3.11.14-150400.9.69.1 * python311-debuginfo-3.11.14-150400.9.69.1 * python311-core-debugsource-3.11.14-150400.9.69.1 * python311-3.11.14-150400.9.69.1 * python311-dbm-3.11.14-150400.9.69.1 * python311-devel-3.11.14-150400.9.69.1 * python311-curses-3.11.14-150400.9.69.1 * python311-tk-debuginfo-3.11.14-150400.9.69.1 * python311-tools-3.11.14-150400.9.69.1 * python311-tk-3.11.14-150400.9.69.1 * python311-doc-devhelp-3.11.14-150400.9.69.1 * python311-dbm-debuginfo-3.11.14-150400.9.69.1 * python311-debugsource-3.11.14-150400.9.69.1 * python311-idle-3.11.14-150400.9.69.1 * python311-doc-3.11.14-150400.9.69.1 * python311-base-debuginfo-3.11.14-150400.9.69.1 * python311-curses-debuginfo-3.11.14-150400.9.69.1 * python311-base-3.11.14-150400.9.69.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libpython3_11-1_0-debuginfo-3.11.14-150400.9.69.1 * libpython3_11-1_0-3.11.14-150400.9.69.1 * python311-debuginfo-3.11.14-150400.9.69.1 * python311-core-debugsource-3.11.14-150400.9.69.1 * python311-3.11.14-150400.9.69.1 * python311-dbm-3.11.14-150400.9.69.1 * python311-devel-3.11.14-150400.9.69.1 * python311-curses-3.11.14-150400.9.69.1 * python311-tk-debuginfo-3.11.14-150400.9.69.1 * python311-tools-3.11.14-150400.9.69.1 * python311-tk-3.11.14-150400.9.69.1 * python311-doc-devhelp-3.11.14-150400.9.69.1 * python311-dbm-debuginfo-3.11.14-150400.9.69.1 * python311-debugsource-3.11.14-150400.9.69.1 * python311-idle-3.11.14-150400.9.69.1 * python311-doc-3.11.14-150400.9.69.1 * python311-base-debuginfo-3.11.14-150400.9.69.1 * python311-curses-debuginfo-3.11.14-150400.9.69.1 * python311-base-3.11.14-150400.9.69.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libpython3_11-1_0-debuginfo-3.11.14-150400.9.69.1 * libpython3_11-1_0-3.11.14-150400.9.69.1 * python311-debuginfo-3.11.14-150400.9.69.1 * python311-core-debugsource-3.11.14-150400.9.69.1 * python311-3.11.14-150400.9.69.1 * python311-dbm-3.11.14-150400.9.69.1 * python311-devel-3.11.14-150400.9.69.1 * python311-curses-3.11.14-150400.9.69.1 * python311-tk-debuginfo-3.11.14-150400.9.69.1 * python311-tools-3.11.14-150400.9.69.1 * python311-tk-3.11.14-150400.9.69.1 * python311-doc-devhelp-3.11.14-150400.9.69.1 * python311-dbm-debuginfo-3.11.14-150400.9.69.1 * python311-debugsource-3.11.14-150400.9.69.1 * python311-idle-3.11.14-150400.9.69.1 * python311-doc-3.11.14-150400.9.69.1 * python311-base-debuginfo-3.11.14-150400.9.69.1 * python311-curses-debuginfo-3.11.14-150400.9.69.1 * python311-base-3.11.14-150400.9.69.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6075.html * https://www.suse.com/security/cve/CVE-2025-8291.html * https://bugzilla.suse.com/show_bug.cgi?id=1251305 * https://bugzilla.suse.com/show_bug.cgi?id=1252974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 20:30:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 20:30:23 -0000 Subject: SUSE-SU-2025:21197-1: important: Security update for binutils Message-ID: <176583062385.4867.13280548894124425417@smelt2.prg2.suse.org> # Security update for binutils Announcement ID: SUSE-SU-2025:21197-1 Release Date: 2025-12-10T09:59:09Z Rating: important References: * bsc#1236632 * bsc#1236976 * bsc#1236977 * bsc#1236978 * bsc#1236999 * bsc#1237000 * bsc#1237001 * bsc#1237003 * bsc#1237005 * bsc#1237018 * bsc#1237019 * bsc#1237020 * bsc#1237021 * bsc#1237042 * bsc#1240870 * bsc#1243756 * bsc#1243760 * bsc#1246481 * bsc#1246486 * bsc#1247105 * bsc#1247114 * bsc#1247117 * bsc#1250632 * bsc#1251275 * bsc#1251276 * bsc#1251277 * bsc#1251794 * bsc#1251795 Cross-References: * CVE-2025-0840 * CVE-2025-11083 * CVE-2025-11412 * CVE-2025-11413 * CVE-2025-11414 * CVE-2025-1147 * CVE-2025-1148 * CVE-2025-1149 * CVE-2025-11494 * CVE-2025-11495 * CVE-2025-1150 * CVE-2025-1151 * CVE-2025-1152 * CVE-2025-1153 * CVE-2025-1176 * CVE-2025-1178 * CVE-2025-1179 * CVE-2025-1180 * CVE-2025-1181 * CVE-2025-1182 * CVE-2025-3198 * CVE-2025-5244 * CVE-2025-5245 * CVE-2025-7545 * CVE-2025-7546 * CVE-2025-8224 * CVE-2025-8225 CVSS scores: * CVE-2025-0840 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-0840 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-0840 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-0840 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-0840 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-11083 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11083 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-11083 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-11083 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-11412 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11412 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11412 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11412 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11413 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11413 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11413 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11413 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11413 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11414 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11414 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11414 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11414 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11414 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-1147 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1147 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2025-1147 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1147 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1147 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-1148 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1148 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1148 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1148 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1148 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1149 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1149 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1149 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1149 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-11494 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11494 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11494 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11494 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11494 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11495 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-1150 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-1150 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1150 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1150 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1150 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1151 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1151 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1151 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1151 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1152 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1152 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1152 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1152 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1153 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1153 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1153 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1153 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1153 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-1176 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1176 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1176 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1176 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1176 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1178 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1178 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1178 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1178 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-1179 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1179 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1179 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1179 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1179 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-1180 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1180 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1180 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1180 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1181 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1181 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1181 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1181 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1182 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1182 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1182 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1182 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-3198 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3198 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-3198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3198 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5244 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5244 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-5244 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-5244 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-5245 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-5245 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5245 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-5245 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-5245 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-7545 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-7545 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-7545 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-7545 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7545 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-7546 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-7546 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-7546 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-7546 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7546 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-8224 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8224 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8224 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8224 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-8224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-8225 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8225 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8225 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8225 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.2 An update that solves 27 vulnerabilities and has one fix can now be installed. ## Description: This update for binutils fixes the following issues: Changes in binutils: * Update to current 2.45 branch at 94cb1c075 to include fix for PR33584 (a problem related to LTO vs fortran COMMON blocks). * Do not enable '-z gcs=implicit' on aarch64 for old codestreams. Update to version 2.45: * New versioned release of libsframe.so.2 * s390: tools now support SFrame format 2; recognize "z17" as CPU name [bsc#1247105, jsc#IBM-1485] * sframe sections are now of ELF section type SHT_GNU_SFRAME. * sframe secions generated by the assembler have SFRAME_F_FDE_FUNC_START_PCREL set. * riscv: Support more extensions: standard: Zicfiss v1.0, Zicfilp v1.0, Zcmp v1.0, Zcmt v1.0, Smrnmi v1.0, S[sm]dbltrp v1.0, S[sm]ctr v1.0, ssqosid v1.0, ssnpm v1.0, smnpm v1.0, smmpm v1.0, sspm v1.0, supm v1.0, sha v1.0, zce v1.0, smcdeleg v1.0, ssccfg v1.0, svvptc v1.0, zilsd v1.0, zclsd v1.0, smrnmi v1.0; vendor: CORE-V, xcvbitmanip v1.0 and xcvsimd v1.0; SiFive, xsfvqmaccdod v1.0, xsfvqmaccqoqv1.0 and xsfvfnrclipxfqf v1.0; T-Head: xtheadvdot v1.0; MIPS: xmipscbop v1.0, xmipscmov v1.0, xmipsexectl v1.0, xmipslsp v1.0. * Support RISC-V privileged version 1.13, profiles 20/22/23, and .bfloat16 directive. * x86: Add support for these ISAs: Intel Diamond Rapids AMX, MOVRS, AVX10.2 (including SM4), MSR_IMM; Zhaoxin PadLock PHE2, RNG2, GMI, XMODX. Drop support for AVX10.2 256 bit rounding. * arm: Add support for most of Armv9.6, enabled by -march=armv9.6-a and extensions '+cmpbr', '+f8f16mm', '+f8f32mm', '+fprcvt', '+lsfe', '+lsui', '+occmo', '+pops', '+sme2p2', '+ssve-aes', '+sve-aes', '+sve-aes2', '+sve- bfscale', '+sve-f16f32mm' and '+sve2p2'. * Predefined symbols "GAS(version)" and, on non-release builds, "GAS(date)" are now being made available. * Add .errif and .warnif directives. * linker: * Add --image-base= option to the ELF linker to behave the same as -Ttext-segment for compatibility with LLD. * Add support for mixed LTO and non-LTO codes in relocatable output. * s390: linker generates .eh_frame and/or .sframe for linker generated .plt sections by default (can be disabled by --no-ld-generated-unwind-info). * riscv: add new PLT formats, and GNU property merge rules for zicfiss and zicfilp extensions. * gold is no longer included * Contains fixes for these non-CVEs (not security bugs per upstreams SECURITY.md): * bsc#1236632 aka CVE-2025-0840 aka PR32560 * bsc#1236977 aka CVE-2025-1149 aka PR32576 * bsc#1236978 aka CVE-2025-1148 aka PR32576 * bsc#1236999 aka CVE-2025-1176 aka PR32636 * bsc#1237000 aka CVE-2025-1153 aka PR32603 * bsc#1237001 aka CVE-2025-1152 aka PR32576 * bsc#1237003 aka CVE-2025-1151 aka PR32576 * bsc#1237005 aka CVE-2025-1150 aka PR32576 * bsc#1237018 aka CVE-2025-1178 aka PR32638 * bsc#1237019 aka CVE-2025-1181 aka PR32643 * bsc#1237020 aka CVE-2025-1180 aka PR32642 * bsc#1237021 aka CVE-2025-1179 aka PR32640 * bsc#1237042 aka CVE-2025-1182 aka PR32644 * bsc#1240870 aka CVE-2025-3198 aka PR32716 * bsc#1243756 aka CVE-2025-5244 aka PR32858 * bsc#1243760 aka CVE-2025-5245 aka PR32829 * bsc#1246481 aka CVE-2025-7545 aka PR33049 * bsc#1246486 aka CVE-2025-7546 aka PR33050 * bsc#1247114 aka CVE-2025-8224 aka PR32109 * bsc#1247117 aka CVE-2025-8225 no PR * bsc#1236976 aka CVE-2025-1147 aka PR32556 * bsc#1250632 aka CVE-2025-11083 aka PR33457 * bsc#1251275 aka CVE-2025-11412 aka PR33452 * bsc#1251276 aka CVE-2025-11413 aka PR33456 * bsc#1251277 aka CVE-2025-11414 aka PR33450 * bsc#1251794 aka CVE-2025-11494 aka PR33499 * bsc#1251795 aka CVE-2025-11495 aka PR33502 binutils-2.43-branch.diff.gz ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-98=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * libctf0-2.45-160000.1.1 * binutils-2.45-160000.1.1 * binutils-debugsource-2.45-160000.1.1 * libctf-nobfd0-2.45-160000.1.1 * libctf0-debuginfo-2.45-160000.1.1 * libctf-nobfd0-debuginfo-2.45-160000.1.1 * binutils-debuginfo-2.45-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0840.html * https://www.suse.com/security/cve/CVE-2025-11083.html * https://www.suse.com/security/cve/CVE-2025-11412.html * https://www.suse.com/security/cve/CVE-2025-11413.html * https://www.suse.com/security/cve/CVE-2025-11414.html * https://www.suse.com/security/cve/CVE-2025-1147.html * https://www.suse.com/security/cve/CVE-2025-1148.html * https://www.suse.com/security/cve/CVE-2025-1149.html * https://www.suse.com/security/cve/CVE-2025-11494.html * https://www.suse.com/security/cve/CVE-2025-11495.html * https://www.suse.com/security/cve/CVE-2025-1150.html * https://www.suse.com/security/cve/CVE-2025-1151.html * https://www.suse.com/security/cve/CVE-2025-1152.html * https://www.suse.com/security/cve/CVE-2025-1153.html * https://www.suse.com/security/cve/CVE-2025-1176.html * https://www.suse.com/security/cve/CVE-2025-1178.html * https://www.suse.com/security/cve/CVE-2025-1179.html * https://www.suse.com/security/cve/CVE-2025-1180.html * https://www.suse.com/security/cve/CVE-2025-1181.html * https://www.suse.com/security/cve/CVE-2025-1182.html * https://www.suse.com/security/cve/CVE-2025-3198.html * https://www.suse.com/security/cve/CVE-2025-5244.html * https://www.suse.com/security/cve/CVE-2025-5245.html * https://www.suse.com/security/cve/CVE-2025-7545.html * https://www.suse.com/security/cve/CVE-2025-7546.html * https://www.suse.com/security/cve/CVE-2025-8224.html * https://www.suse.com/security/cve/CVE-2025-8225.html * https://bugzilla.suse.com/show_bug.cgi?id=1236632 * https://bugzilla.suse.com/show_bug.cgi?id=1236976 * https://bugzilla.suse.com/show_bug.cgi?id=1236977 * https://bugzilla.suse.com/show_bug.cgi?id=1236978 * https://bugzilla.suse.com/show_bug.cgi?id=1236999 * https://bugzilla.suse.com/show_bug.cgi?id=1237000 * https://bugzilla.suse.com/show_bug.cgi?id=1237001 * https://bugzilla.suse.com/show_bug.cgi?id=1237003 * https://bugzilla.suse.com/show_bug.cgi?id=1237005 * https://bugzilla.suse.com/show_bug.cgi?id=1237018 * https://bugzilla.suse.com/show_bug.cgi?id=1237019 * https://bugzilla.suse.com/show_bug.cgi?id=1237020 * https://bugzilla.suse.com/show_bug.cgi?id=1237021 * https://bugzilla.suse.com/show_bug.cgi?id=1237042 * https://bugzilla.suse.com/show_bug.cgi?id=1240870 * https://bugzilla.suse.com/show_bug.cgi?id=1243756 * https://bugzilla.suse.com/show_bug.cgi?id=1243760 * https://bugzilla.suse.com/show_bug.cgi?id=1246481 * https://bugzilla.suse.com/show_bug.cgi?id=1246486 * https://bugzilla.suse.com/show_bug.cgi?id=1247105 * https://bugzilla.suse.com/show_bug.cgi?id=1247114 * https://bugzilla.suse.com/show_bug.cgi?id=1247117 * https://bugzilla.suse.com/show_bug.cgi?id=1250632 * https://bugzilla.suse.com/show_bug.cgi?id=1251275 * https://bugzilla.suse.com/show_bug.cgi?id=1251276 * https://bugzilla.suse.com/show_bug.cgi?id=1251277 * https://bugzilla.suse.com/show_bug.cgi?id=1251794 * https://bugzilla.suse.com/show_bug.cgi?id=1251795 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 20:30:48 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 20:30:48 -0000 Subject: SUSE-SU-2025:21195-1: important: Security update for binutils Message-ID: <176583064884.4867.4424516047294865072@smelt2.prg2.suse.org> # Security update for binutils Announcement ID: SUSE-SU-2025:21195-1 Release Date: 2025-12-12T15:58:27Z Rating: important References: * bsc#1236632 * bsc#1236976 * bsc#1236977 * bsc#1236978 * bsc#1236999 * bsc#1237000 * bsc#1237001 * bsc#1237003 * bsc#1237005 * bsc#1237018 * bsc#1237019 * bsc#1237020 * bsc#1237021 * bsc#1237042 * bsc#1240870 * bsc#1243756 * bsc#1243760 * bsc#1246481 * bsc#1246486 * bsc#1247105 * bsc#1247114 * bsc#1247117 * bsc#1250632 * bsc#1251275 * bsc#1251276 * bsc#1251277 * bsc#1251794 * bsc#1251795 Cross-References: * CVE-2025-0840 * CVE-2025-11083 * CVE-2025-11412 * CVE-2025-11413 * CVE-2025-11414 * CVE-2025-1147 * CVE-2025-1148 * CVE-2025-1149 * CVE-2025-11494 * CVE-2025-11495 * CVE-2025-1150 * CVE-2025-1151 * CVE-2025-1152 * CVE-2025-1153 * CVE-2025-1176 * CVE-2025-1178 * CVE-2025-1179 * CVE-2025-1180 * CVE-2025-1181 * CVE-2025-1182 * CVE-2025-3198 * CVE-2025-5244 * CVE-2025-5245 * CVE-2025-7545 * CVE-2025-7546 * CVE-2025-8224 * CVE-2025-8225 CVSS scores: * CVE-2025-0840 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-0840 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-0840 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-0840 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-0840 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-11083 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11083 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-11083 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-11083 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-11412 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11412 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11412 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11412 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11413 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11413 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11413 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11413 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11413 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11414 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11414 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11414 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11414 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11414 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-1147 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1147 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2025-1147 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1147 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1147 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-1148 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1148 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1148 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1148 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1148 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1149 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1149 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1149 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1149 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-11494 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11494 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11494 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11494 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11494 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11495 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-1150 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-1150 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1150 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1150 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1150 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1151 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1151 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1151 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1151 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1152 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1152 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1152 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1152 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1153 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1153 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1153 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1153 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1153 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-1176 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1176 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1176 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1176 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1176 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1178 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1178 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1178 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1178 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-1179 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1179 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1179 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1179 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1179 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-1180 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1180 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1180 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1180 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1181 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1181 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1181 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1181 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1182 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1182 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1182 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1182 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-3198 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3198 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-3198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3198 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5244 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5244 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-5244 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-5244 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-5245 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-5245 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5245 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-5245 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-5245 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-7545 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-7545 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-7545 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-7545 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7545 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-7546 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-7546 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-7546 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-7546 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7546 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-8224 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8224 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8224 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8224 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-8224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-8225 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8225 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8225 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8225 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves 27 vulnerabilities and has one fix can now be installed. ## Description: This update for binutils fixes the following issues: Changes in binutils: * Update to current 2.45 branch at 94cb1c075 to include fix for PR33584 (a problem related to LTO vs fortran COMMON blocks). * Do not enable '-z gcs=implicit' on aarch64 for old codestreams. Update to version 2.45: * New versioned release of libsframe.so.2 * s390: tools now support SFrame format 2; recognize "z17" as CPU name [bsc#1247105, jsc#IBM-1485] * sframe sections are now of ELF section type SHT_GNU_SFRAME. * sframe secions generated by the assembler have SFRAME_F_FDE_FUNC_START_PCREL set. * riscv: Support more extensions: standard: Zicfiss v1.0, Zicfilp v1.0, Zcmp v1.0, Zcmt v1.0, Smrnmi v1.0, S[sm]dbltrp v1.0, S[sm]ctr v1.0, ssqosid v1.0, ssnpm v1.0, smnpm v1.0, smmpm v1.0, sspm v1.0, supm v1.0, sha v1.0, zce v1.0, smcdeleg v1.0, ssccfg v1.0, svvptc v1.0, zilsd v1.0, zclsd v1.0, smrnmi v1.0; vendor: CORE-V, xcvbitmanip v1.0 and xcvsimd v1.0; SiFive, xsfvqmaccdod v1.0, xsfvqmaccqoqv1.0 and xsfvfnrclipxfqf v1.0; T-Head: xtheadvdot v1.0; MIPS: xmipscbop v1.0, xmipscmov v1.0, xmipsexectl v1.0, xmipslsp v1.0. * Support RISC-V privileged version 1.13, profiles 20/22/23, and .bfloat16 directive. * x86: Add support for these ISAs: Intel Diamond Rapids AMX, MOVRS, AVX10.2 (including SM4), MSR_IMM; Zhaoxin PadLock PHE2, RNG2, GMI, XMODX. Drop support for AVX10.2 256 bit rounding. * arm: Add support for most of Armv9.6, enabled by -march=armv9.6-a and extensions '+cmpbr', '+f8f16mm', '+f8f32mm', '+fprcvt', '+lsfe', '+lsui', '+occmo', '+pops', '+sme2p2', '+ssve-aes', '+sve-aes', '+sve-aes2', '+sve- bfscale', '+sve-f16f32mm' and '+sve2p2'. * Predefined symbols "GAS(version)" and, on non-release builds, "GAS(date)" are now being made available. * Add .errif and .warnif directives. * linker: * Add --image-base= option to the ELF linker to behave the same as -Ttext-segment for compatibility with LLD. * Add support for mixed LTO and non-LTO codes in relocatable output. * s390: linker generates .eh_frame and/or .sframe for linker generated .plt sections by default (can be disabled by --no-ld-generated-unwind-info). * riscv: add new PLT formats, and GNU property merge rules for zicfiss and zicfilp extensions. * gold is no longer included * Contains fixes for these non-CVEs (not security bugs per upstreams SECURITY.md): * bsc#1236632 aka CVE-2025-0840 aka PR32560 * bsc#1236977 aka CVE-2025-1149 aka PR32576 * bsc#1236978 aka CVE-2025-1148 aka PR32576 * bsc#1236999 aka CVE-2025-1176 aka PR32636 * bsc#1237000 aka CVE-2025-1153 aka PR32603 * bsc#1237001 aka CVE-2025-1152 aka PR32576 * bsc#1237003 aka CVE-2025-1151 aka PR32576 * bsc#1237005 aka CVE-2025-1150 aka PR32576 * bsc#1237018 aka CVE-2025-1178 aka PR32638 * bsc#1237019 aka CVE-2025-1181 aka PR32643 * bsc#1237020 aka CVE-2025-1180 aka PR32642 * bsc#1237021 aka CVE-2025-1179 aka PR32640 * bsc#1237042 aka CVE-2025-1182 aka PR32644 * bsc#1240870 aka CVE-2025-3198 aka PR32716 * bsc#1243756 aka CVE-2025-5244 aka PR32858 * bsc#1243760 aka CVE-2025-5245 aka PR32829 * bsc#1246481 aka CVE-2025-7545 aka PR33049 * bsc#1246486 aka CVE-2025-7546 aka PR33050 * bsc#1247114 aka CVE-2025-8224 aka PR32109 * bsc#1247117 aka CVE-2025-8225 no PR * bsc#1236976 aka CVE-2025-1147 aka PR32556 * bsc#1250632 aka CVE-2025-11083 aka PR33457 * bsc#1251275 aka CVE-2025-11412 aka PR33452 * bsc#1251276 aka CVE-2025-11413 aka PR33456 * bsc#1251277 aka CVE-2025-11414 aka PR33450 * bsc#1251794 aka CVE-2025-11494 aka PR33499 * bsc#1251795 aka CVE-2025-11495 aka PR33502 binutils-2.43-branch.diff.gz ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-98=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-98=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * binutils-devel-2.45-160000.1.1 * bpftool-7.5.0-160000.2.3 * bpftool-bash-completion-7.5.0-160000.2.3 * libctf0-2.45-160000.1.1 * binutils-2.45-160000.1.1 * bpftool-debugsource-7.5.0-160000.2.3 * binutils-debugsource-2.45-160000.1.1 * libctf-nobfd0-2.45-160000.1.1 * libctf0-debuginfo-2.45-160000.1.1 * bpftool-debuginfo-7.5.0-160000.2.3 * libctf-nobfd0-debuginfo-2.45-160000.1.1 * binutils-debuginfo-2.45-160000.1.1 * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * gprofng-2.45-160000.1.1 * gprofng-debuginfo-2.45-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * binutils-devel-2.45-160000.1.1 * bpftool-7.5.0-160000.2.3 * bpftool-bash-completion-7.5.0-160000.2.3 * libctf0-2.45-160000.1.1 * binutils-2.45-160000.1.1 * bpftool-debugsource-7.5.0-160000.2.3 * binutils-debugsource-2.45-160000.1.1 * libctf-nobfd0-2.45-160000.1.1 * libctf0-debuginfo-2.45-160000.1.1 * bpftool-debuginfo-7.5.0-160000.2.3 * libctf-nobfd0-debuginfo-2.45-160000.1.1 * binutils-debuginfo-2.45-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * gprofng-2.45-160000.1.1 * gprofng-debuginfo-2.45-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0840.html * https://www.suse.com/security/cve/CVE-2025-11083.html * https://www.suse.com/security/cve/CVE-2025-11412.html * https://www.suse.com/security/cve/CVE-2025-11413.html * https://www.suse.com/security/cve/CVE-2025-11414.html * https://www.suse.com/security/cve/CVE-2025-1147.html * https://www.suse.com/security/cve/CVE-2025-1148.html * https://www.suse.com/security/cve/CVE-2025-1149.html * https://www.suse.com/security/cve/CVE-2025-11494.html * https://www.suse.com/security/cve/CVE-2025-11495.html * https://www.suse.com/security/cve/CVE-2025-1150.html * https://www.suse.com/security/cve/CVE-2025-1151.html * https://www.suse.com/security/cve/CVE-2025-1152.html * https://www.suse.com/security/cve/CVE-2025-1153.html * https://www.suse.com/security/cve/CVE-2025-1176.html * https://www.suse.com/security/cve/CVE-2025-1178.html * https://www.suse.com/security/cve/CVE-2025-1179.html * https://www.suse.com/security/cve/CVE-2025-1180.html * https://www.suse.com/security/cve/CVE-2025-1181.html * https://www.suse.com/security/cve/CVE-2025-1182.html * https://www.suse.com/security/cve/CVE-2025-3198.html * https://www.suse.com/security/cve/CVE-2025-5244.html * https://www.suse.com/security/cve/CVE-2025-5245.html * https://www.suse.com/security/cve/CVE-2025-7545.html * https://www.suse.com/security/cve/CVE-2025-7546.html * https://www.suse.com/security/cve/CVE-2025-8224.html * https://www.suse.com/security/cve/CVE-2025-8225.html * https://bugzilla.suse.com/show_bug.cgi?id=1236632 * https://bugzilla.suse.com/show_bug.cgi?id=1236976 * https://bugzilla.suse.com/show_bug.cgi?id=1236977 * https://bugzilla.suse.com/show_bug.cgi?id=1236978 * https://bugzilla.suse.com/show_bug.cgi?id=1236999 * https://bugzilla.suse.com/show_bug.cgi?id=1237000 * https://bugzilla.suse.com/show_bug.cgi?id=1237001 * https://bugzilla.suse.com/show_bug.cgi?id=1237003 * https://bugzilla.suse.com/show_bug.cgi?id=1237005 * https://bugzilla.suse.com/show_bug.cgi?id=1237018 * https://bugzilla.suse.com/show_bug.cgi?id=1237019 * https://bugzilla.suse.com/show_bug.cgi?id=1237020 * https://bugzilla.suse.com/show_bug.cgi?id=1237021 * https://bugzilla.suse.com/show_bug.cgi?id=1237042 * https://bugzilla.suse.com/show_bug.cgi?id=1240870 * https://bugzilla.suse.com/show_bug.cgi?id=1243756 * https://bugzilla.suse.com/show_bug.cgi?id=1243760 * https://bugzilla.suse.com/show_bug.cgi?id=1246481 * https://bugzilla.suse.com/show_bug.cgi?id=1246486 * https://bugzilla.suse.com/show_bug.cgi?id=1247105 * https://bugzilla.suse.com/show_bug.cgi?id=1247114 * https://bugzilla.suse.com/show_bug.cgi?id=1247117 * https://bugzilla.suse.com/show_bug.cgi?id=1250632 * https://bugzilla.suse.com/show_bug.cgi?id=1251275 * https://bugzilla.suse.com/show_bug.cgi?id=1251276 * https://bugzilla.suse.com/show_bug.cgi?id=1251277 * https://bugzilla.suse.com/show_bug.cgi?id=1251794 * https://bugzilla.suse.com/show_bug.cgi?id=1251795 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 20:30:52 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 20:30:52 -0000 Subject: SUSE-SU-2025:21194-1: critical: Security update for keylime Message-ID: <176583065201.4867.17059921213935383686@smelt2.prg2.suse.org> # Security update for keylime Announcement ID: SUSE-SU-2025:21194-1 Release Date: 2025-12-12T09:46:14Z Rating: critical References: * bsc#1237153 * bsc#1254199 Cross-References: * CVE-2025-1057 * CVE-2025-13609 CVSS scores: * CVE-2025-1057 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-13609 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H * CVE-2025-13609 ( SUSE ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-13609 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for keylime fixes the following issues: Update to version 7.13.0+40. Security issues fixed: * CVE-2025-13609: possible agent identity takeover due to registrar allowing the registration of agents with duplicate UUIDs (bsc#1254199). * CVE-2025-1057: registrar denial-of-service due to backward incompatibility in database type handling (bsc#1237153). Other issues fixed and changes: * Version 7.13.0+40: * Include new attestation information fields (#1818) * Fix Database race conditions and SQLAlchemy 2.0 compatibility (#1823) * push-model: require HTTPS for authentication and attestation endpoints * Fix operational_state tracking in push mode attestations * templates: add push model authentication config options to 2.5 templates * Security: Hash authentication tokens in logs * Fix stale IMA policy cache in verification * Fix authentication behavior on failed attestations for push mode * Add shared memory infrastructure for multiprocess communication * Add agent authentication (challenge/response) protocol for push mode * Add agent-driven (push) attestation protocol with PULL mode regression fixes (#1814) * docs: Fix man page RST formatting for rst2man compatibility (#1813) * Apply limit on keylime-policy workers * tpm: fix ECC signature parsing to support variable-length coordinates * tpm: fix ECC P-521 credential activation with consistent marshaling * tpm: fix ECC P-521 coordinate validation * Remove deprecated disabled_signing_algorithms configuration option (#1804) * algorithms: add support for specific RSA algorithms * algorithms: add support for specific ECC curve algorithms * Created manpage for keylime-policy and edited manpages for keylime verifier, registrar, agent * Manpage for keylime agent * Manpage for keylime verifier * Manpage for keylime registrar * Use constants for timeout and max retries defaults * verifier: Use timeout from `request_timeout` config option * revocation_notifier: Use timeout setting from config file * tenant: Set timeout when getting version from agent * verify/evidence: SEV-SNP evidence type/verifier * verify/evidence: Add evidence type to request JSON * Version v7.13.0: * Avoid re-encoding certificate stored in DB * Revert "models: Do not re-encode certificate stored in DB" * Revert "registrar_agent: Use pyasn1 to parse PEM" * policy/sign: use print() when writing to /dev/stdout * registrar_agent: Use pyasn1 to parse PEM * models: Do not re-encode certificate stored in DB * mba: normalize vendor_db in EV_EFI_VARIABLE_AUTHORITY events * mb: support vendor_db as logged by newer shim versions * mb: support EV_EFI_HANDOFF_TABLES events on PCR1 * Remove unnecessary configuration values * cloud_verifier_tornado: handle exception in notify_error() * requests_client: close the session at the end of the resource manager * Manpage for keylime_tenant (#1786) * Add 2.5 templates including Push Model changes * Initial version of verify evidence API * db: Do not read pool size and max overflow for sqlite * Use context managers to close DB sessions * revocations: Try to send notifications on shutdown * verifier: Gracefully shutdown on signal * Use `fork` as `multiprocessing` start method * Fix inaccuracy in threat model and add reference to SBAT * Explain TPM properties and expand vTPM discussion * Fix invalid RST and update TOC * Expand threat model page to include adversarial model * Add --push-model option to avoid requests to agents * templates: duplicate str_to_version() in the adjust script * policy: fix mypy issues with rpm_repo * revocation_notifier: fix mypy issue by replacing deprecated call * Fix create_runtime_policy in python < 3.12 * Fix after review * fixed CONSTANT names C0103 errors * Extend meta_data field in verifierdb * docs: update issue templates * docs: add GitHub PR template with documentation reminders * tpm_util: fix quote signature extraction for ECDSA * registrar: Log API versions during startup * Remove excessive logging on exception * scripts: Fix coverage information downloading script * Version v7.12.1: * models: Add Base64Bytes type to read and write from the database * Simplify response check from registrar * Version v7.12.0: * API: Add /version endpoint to registrar * scripts: Download coverage data directly from Testing Farm * docs: Add separate documentation for each API version * scripts/create_runtime_policy.sh: fix path for the exclude list * docs: add documentation for keylime-policy * templates: Add the new agent.conf option 'api_versions' * Enable autocompletion using argcomplete * build(deps): bump codecov/codecov-action from 5.1.1 to 5.1.2 * Configure EPEL-10 repo in packit-ci.fmf * build(deps): bump codecov/codecov-action from 5.0.2 to 5.1.1 * build(deps): bump pypa/gh-action-pypi-publish from 1.12.0 to 1.12.3 * build(deps): bump docker/metadata-action from 5.5.1 to 5.6.1 * build(deps): bump docker/build-push-action from 6.9.0 to 6.10.0 * keylime-policy: improve error handling when provided a bad key (sign) * keylime-policy: exit with status 1 when the commands failed * keylime-policy: use Certificate() from models.base to validate certs * keylime-policy: check for valid cert file when using x509 backend (sign) * keylime-policy: fix help for "keylime-policy sign" verb * tenant: Correctly log number of tries when deleting * update TCTI environment variable usage * build(deps): bump codecov/codecov-action from 4.6.0 to 5.0.2 * keylime-policy: add `create measured-boot' subcommand * keylime-policy: add `sign runtime' subcommand * keylime-policy: add logger to use with the policy tool * installer.sh: Restore execution permission * installer: Fix string comparison * build(deps): bump docker/build-push-action from 6.7.0 to 6.9.0 * build(deps): bump codecov/codecov-action from 4.5.0 to 4.6.0 * build(deps): bump pypa/gh-action-pypi-publish from 1.11.0 to 1.12.0 * build(deps): bump actions/setup-python from 5.2.0 to 5.3.0 * installer.sh: updated EPEL, PEP668 Fix, logic fix * build(deps): bump pypa/gh-action-pypi-publish from 1.10.3 to 1.11.0 * build(deps): bump actions/checkout from 4.2.1 to 4.2.2 * postgresql support for docker using psycopg2 * installer.sh: update package list, add workaround for PEP 668 * build(deps): bump actions/checkout from 4.2.0 to 4.2.1 * keylime.conf: full removal * Drop pending SPDX-License-Identifier headers * create_runtime_policy: Validate algorithm from IMA measurement log * create-runtime-policy: Deal with SHA-256 and SM3_256 ambiguity * create_runtime_policy: drop commment with test data * create_runtime_policy: Use a common method to guess algorithm * keylime-policy: rename tool to keylime-policy instead of keylime_policy * keylime_policy: create runtime: remove --use-ima-measurement-list * keylime_policy: use consistent arg names for create_runtime_policy * build(deps): bump pypa/gh-action-pypi-publish from 1.10.2 to 1.10.3 * build(deps): bump actions/checkout from 4.1.7 to 4.2.0 * elchecking/example: workaround empty PK, KEK, db and dbx * elchecking: add handling for EV_EFI_PLATFORM_FIRMWARE_BLOB2 * create_runtime_policy: Fix log level for debug messages * build(deps): bump pypa/gh-action-pypi-publish from 1.10.1 to 1.10.2 * build(deps): bump peter-evans/create-pull-request from 6.1.0 to 7.0.5 * pylintrc: Ignore too-many-positional-arguments check * keylime/web/base/controller: Move TypeAlias definition out of class * create_runtime_policy: Calculate digests in multiple threads * create_runtime_policy: Allow rootfs to be in any directory * keylime_policy: Calculate digests from each source separately * create_runtime_policy: Simplify boot_aggregate parsing * ima: Validate JSON when loading IMA Keyring from string * docs: include IDevID page also in the sidebar * docs: point to installation guide from RHEL and SLE Micro * build(deps): bump actions/setup-python from 5.1.1 to 5.2.0 * build(deps): bump pypa/gh-action-pypi-publish from 1.9.0 to 1.10.1 * change check_tpm_origin_check to a warning that does not prevent registration * docs: Fix Runtime Policy JSON schema to reflect the reality * Sets absolute path for files inside a rootfs dir * policy/create_runtime_policy: fix handling of empty lines in exclude list * keylime_policy: setting 'log_hash_alg' to 'sha1' (template-hash algo) * codestyle: Assign CERTIFICATE_PRIVATE_KEY_TYPES directly (pyright) * codestyle: convert bytearrays to bytes to get expected type (pyright) * codestyle: Use new variables after changing datatype (pyright) * cert_utils: add description why loading using cryptography might fail * ima: list names of the runtime policies * build(deps): bump docker/build-push-action from 6.6.1 to 6.7.0 * tox: Use python 3.10 instead of 3.6 * revocation_notifier: Use web_util to generate TLS context * mba: Add a skip custom policies option when loading mba. * build(deps): bump docker/build-push-action from 6.5.0 to 6.6.1 * build(deps): bump docker/metadata-action from 4.6.0 to 5.5.1 * cmd/keylime_policy: add tool to handle keylime policies * cert_utils: add is_x509_cert() * common/algorithms: transform Encrypt and Sign class into enums * common/algorithms: add method to calculate digest of a file * build(deps): bump docker/build-push-action from 4.2.1 to 6.5.0 * build(deps): bump docker/login-action from 3.2.0 to 3.3.0 * build(deps): bump docker/metadata-action from 4.6.0 to 5.5.1 * build(deps): bump docker/login-action from 3.2.0 to 3.3.0 * build(deps): bump docker/build-push-action from 6.4.1 to 6.5.0 * build(deps): bump docker/build-push-action from 4.2.1 to 6.4.1 * build(deps): bump docker/metadata-action from 4.6.0 to 5.5.1 * build(deps): bump pre-commit/action from 3.0.0 to 3.0.1 * tpm: Replace KDFs and ECDH implementations with python-cryptography * build(deps): bump codecov/codecov-action from 2.1.0 to 4.5.0 * build(deps): bump docker/login-action from 2.2.0 to 3.2.0 * build(deps): bump actions/setup-python from 2.3.4 to 5.1.1 * build(deps): bump actions/first-interaction * build(deps): bump actions/checkout from 2.7.0 to 4.1.7 * revocation_notifier: Explicitly add CA certificate bundle * Introduce new REST API framework and refactor registrar implementation * mba: Support named measured boot policies * tenant: add friendlier error message if mTLS CA is wrongly configured * ca_impl_openssl: Mark extensions as critical following RFC 5280 * Include Authority Key Identifier in KL-generated certs * verifier, tenant: make payload for agent completely optional ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-104=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-104=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * keylime-verifier-7.13.0+40-160000.1.1 * keylime-logrotate-7.13.0+40-160000.1.1 * python313-keylime-7.13.0+40-160000.1.1 * keylime-registrar-7.13.0+40-160000.1.1 * keylime-config-7.13.0+40-160000.1.1 * keylime-tpm_cert_store-7.13.0+40-160000.1.1 * keylime-tenant-7.13.0+40-160000.1.1 * keylime-firewalld-7.13.0+40-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * keylime-verifier-7.13.0+40-160000.1.1 * keylime-logrotate-7.13.0+40-160000.1.1 * python313-keylime-7.13.0+40-160000.1.1 * keylime-registrar-7.13.0+40-160000.1.1 * keylime-config-7.13.0+40-160000.1.1 * keylime-tpm_cert_store-7.13.0+40-160000.1.1 * keylime-tenant-7.13.0+40-160000.1.1 * keylime-firewalld-7.13.0+40-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-1057.html * https://www.suse.com/security/cve/CVE-2025-13609.html * https://bugzilla.suse.com/show_bug.cgi?id=1237153 * https://bugzilla.suse.com/show_bug.cgi?id=1254199 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 20:31:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 20:31:07 -0000 Subject: SUSE-SU-2025:21193-1: important: Security update for go1.24 Message-ID: <176583066711.4867.8338689603134822566@smelt2.prg2.suse.org> # Security update for go1.24 Announcement ID: SUSE-SU-2025:21193-1 Release Date: 2025-12-12T07:45:01Z Rating: important References: * bsc#1236217 * bsc#1245878 * bsc#1247816 * bsc#1248082 * bsc#1249985 * bsc#1251253 * bsc#1251254 * bsc#1251255 * bsc#1251256 * bsc#1251257 * bsc#1251258 * bsc#1251259 * bsc#1251260 * bsc#1251261 * bsc#1251262 * bsc#1254430 * bsc#1254431 Cross-References: * CVE-2025-47912 * CVE-2025-58183 * CVE-2025-58185 * CVE-2025-58186 * CVE-2025-58187 * CVE-2025-58188 * CVE-2025-58189 * CVE-2025-61723 * CVE-2025-61724 * CVE-2025-61725 * CVE-2025-61727 * CVE-2025-61729 CVSS scores: * CVE-2025-47912 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-47912 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-47912 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-58183 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58183 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-58183 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-58185 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58185 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58185 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58186 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58186 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58186 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58187 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58187 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58187 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58188 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-58188 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58188 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58189 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N * CVE-2025-58189 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-58189 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-61723 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-61723 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-61723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61724 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-61724 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-61724 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-61725 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61725 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-61725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61727 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-61729 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61729 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61729 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves 12 vulnerabilities and has five fixes can now be installed. ## Description: This update for go1.24 fixes the following issues: Update to go1.24.11. Security issues fixed: * CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257). * CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261). * CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258). * CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259). * CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254). * CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260). * CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255). * CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256). * CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262). * CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253). * CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430). * CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431). Other issues fixed and changes: * Version 1.24.11: * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores * Version 1.24.10: * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets * go#75951 encoding/pem: regression when decoding blocks with leading garbage * go#76028 pem/encoding: malformed line endings can cause panics * Version 1.24.9: * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot * Version 1.24.8: * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21 * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9 * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9 * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail * go#75538 net/http: internal error: connCount underflow * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value * Version 1.24.7: * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755 * go#74821 cmd/go: "get toolchain at latest" should ignore release candidates * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets * Packaging: migrate from update-alternatives to libalternatives (bsc#1245878). * Package svgpan.js to fix issues with "go tool pprof" (bsc#1249985). * Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-103=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-103=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * go1.24-race-1.24.11-160000.1.1 * go1.24-1.24.11-160000.1.1 * go1.24-doc-1.24.11-160000.1.1 * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * go1.24-libstd-1.24.11-160000.1.1 * go1.24-debuginfo-1.24.11-160000.1.1 * go1.24-libstd-debuginfo-1.24.11-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * go1.24-race-1.24.11-160000.1.1 * go1.24-1.24.11-160000.1.1 * go1.24-doc-1.24.11-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * go1.24-libstd-1.24.11-160000.1.1 * go1.24-debuginfo-1.24.11-160000.1.1 * go1.24-libstd-debuginfo-1.24.11-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47912.html * https://www.suse.com/security/cve/CVE-2025-58183.html * https://www.suse.com/security/cve/CVE-2025-58185.html * https://www.suse.com/security/cve/CVE-2025-58186.html * https://www.suse.com/security/cve/CVE-2025-58187.html * https://www.suse.com/security/cve/CVE-2025-58188.html * https://www.suse.com/security/cve/CVE-2025-58189.html * https://www.suse.com/security/cve/CVE-2025-61723.html * https://www.suse.com/security/cve/CVE-2025-61724.html * https://www.suse.com/security/cve/CVE-2025-61725.html * https://www.suse.com/security/cve/CVE-2025-61727.html * https://www.suse.com/security/cve/CVE-2025-61729.html * https://bugzilla.suse.com/show_bug.cgi?id=1236217 * https://bugzilla.suse.com/show_bug.cgi?id=1245878 * https://bugzilla.suse.com/show_bug.cgi?id=1247816 * https://bugzilla.suse.com/show_bug.cgi?id=1248082 * https://bugzilla.suse.com/show_bug.cgi?id=1249985 * https://bugzilla.suse.com/show_bug.cgi?id=1251253 * https://bugzilla.suse.com/show_bug.cgi?id=1251254 * https://bugzilla.suse.com/show_bug.cgi?id=1251255 * https://bugzilla.suse.com/show_bug.cgi?id=1251256 * https://bugzilla.suse.com/show_bug.cgi?id=1251257 * https://bugzilla.suse.com/show_bug.cgi?id=1251258 * https://bugzilla.suse.com/show_bug.cgi?id=1251259 * https://bugzilla.suse.com/show_bug.cgi?id=1251260 * https://bugzilla.suse.com/show_bug.cgi?id=1251261 * https://bugzilla.suse.com/show_bug.cgi?id=1251262 * https://bugzilla.suse.com/show_bug.cgi?id=1254430 * https://bugzilla.suse.com/show_bug.cgi?id=1254431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 20:31:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 20:31:21 -0000 Subject: SUSE-SU-2025:21192-1: important: Security update for go1.25 Message-ID: <176583068162.4867.18092846484604076523@smelt2.prg2.suse.org> # Security update for go1.25 Announcement ID: SUSE-SU-2025:21192-1 Release Date: 2025-12-12T07:23:58Z Rating: important References: * bsc#1244485 * bsc#1245878 * bsc#1247816 * bsc#1248082 * bsc#1249141 * bsc#1249985 * bsc#1251253 * bsc#1251254 * bsc#1251255 * bsc#1251256 * bsc#1251257 * bsc#1251258 * bsc#1251259 * bsc#1251260 * bsc#1251261 * bsc#1251262 * bsc#1254227 * bsc#1254430 * bsc#1254431 Cross-References: * CVE-2025-47910 * CVE-2025-47912 * CVE-2025-58183 * CVE-2025-58185 * CVE-2025-58186 * CVE-2025-58187 * CVE-2025-58188 * CVE-2025-58189 * CVE-2025-61723 * CVE-2025-61724 * CVE-2025-61725 * CVE-2025-61727 * CVE-2025-61729 CVSS scores: * CVE-2025-47910 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-47910 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-47912 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-47912 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-47912 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-58183 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58183 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-58183 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-58185 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58185 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58185 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58186 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58186 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58186 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58187 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58187 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58187 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58188 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-58188 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58188 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58189 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N * CVE-2025-58189 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-58189 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-61723 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-61723 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-61723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61724 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-61724 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-61724 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-61725 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61725 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-61725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61727 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-61729 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61729 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61729 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves 13 vulnerabilities and has six fixes can now be installed. ## Description: This update for go1.25 fixes the following issues: Update to go1.25.5. Security issues fixed: * CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431). * CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN (bsc#1254430). * CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253). * CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262). * CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256). * CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255). * CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260). * CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254). * CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259). * CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258). * CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261). * CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257). * CVE-2025-47910: net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141). Other issues fixed and changes: * Version 1.25.5: * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25 * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup * Version 1.25.4: * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64 * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets * go#75952 encoding/pem: regression when decoding blocks with leading garbage * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should * go#76029 pem/encoding: malformed line endings can cause panics * Version 1.25.3: * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot * go#75777 spec: Go1.25 spec should be dated closer to actual release date * Version 1.25.2: * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt * go#75116 os: Root.MkdirAll can return "file exists" when called concurrently on the same path * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21 * go#75255 cmd/compile: export to DWARF types only referenced through interfaces * go#75347 testing/synctest: test timeout with no runnable goroutines * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9 * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail * go#75537 context: Err can return non-nil before Done channel is closed * go#75539 net/http: internal error: connCount underflow * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value * go#75669 runtime: debug.decoratemappings don't work as expected * Version 1.25.1: * go#74822 cmd/go: "get toolchain at latest" should ignore release candidates * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755 * go#75021 testing/synctest: bubble not terminating * go#75083 os: File.Seek doesn't set the correct offset with Windows overlapped handles * Packaging: migrate from update-alternatives to libalternatives (bsc#1245878). * Fix runtime condition for gcc/gcc7 dependency. * Use at least gcc 7 for all architectures (bsc#1254227). * Package svgpan.js to fix issues with "go tool pprof" (boo#1249985). * Drop unused gccgo bootstrap code in go1.22+ (bsc#1248082). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-102=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-102=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * go1.25-doc-1.25.5-160000.1.1 * go1.25-race-1.25.5-160000.1.1 * go1.25-1.25.5-160000.1.1 * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * go1.25-libstd-debuginfo-1.25.5-160000.1.1 * go1.25-debuginfo-1.25.5-160000.1.1 * go1.25-libstd-1.25.5-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * go1.25-doc-1.25.5-160000.1.1 * go1.25-race-1.25.5-160000.1.1 * go1.25-1.25.5-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * go1.25-libstd-debuginfo-1.25.5-160000.1.1 * go1.25-debuginfo-1.25.5-160000.1.1 * go1.25-libstd-1.25.5-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47910.html * https://www.suse.com/security/cve/CVE-2025-47912.html * https://www.suse.com/security/cve/CVE-2025-58183.html * https://www.suse.com/security/cve/CVE-2025-58185.html * https://www.suse.com/security/cve/CVE-2025-58186.html * https://www.suse.com/security/cve/CVE-2025-58187.html * https://www.suse.com/security/cve/CVE-2025-58188.html * https://www.suse.com/security/cve/CVE-2025-58189.html * https://www.suse.com/security/cve/CVE-2025-61723.html * https://www.suse.com/security/cve/CVE-2025-61724.html * https://www.suse.com/security/cve/CVE-2025-61725.html * https://www.suse.com/security/cve/CVE-2025-61727.html * https://www.suse.com/security/cve/CVE-2025-61729.html * https://bugzilla.suse.com/show_bug.cgi?id=1244485 * https://bugzilla.suse.com/show_bug.cgi?id=1245878 * https://bugzilla.suse.com/show_bug.cgi?id=1247816 * https://bugzilla.suse.com/show_bug.cgi?id=1248082 * https://bugzilla.suse.com/show_bug.cgi?id=1249141 * https://bugzilla.suse.com/show_bug.cgi?id=1249985 * https://bugzilla.suse.com/show_bug.cgi?id=1251253 * https://bugzilla.suse.com/show_bug.cgi?id=1251254 * https://bugzilla.suse.com/show_bug.cgi?id=1251255 * https://bugzilla.suse.com/show_bug.cgi?id=1251256 * https://bugzilla.suse.com/show_bug.cgi?id=1251257 * https://bugzilla.suse.com/show_bug.cgi?id=1251258 * https://bugzilla.suse.com/show_bug.cgi?id=1251259 * https://bugzilla.suse.com/show_bug.cgi?id=1251260 * https://bugzilla.suse.com/show_bug.cgi?id=1251261 * https://bugzilla.suse.com/show_bug.cgi?id=1251262 * https://bugzilla.suse.com/show_bug.cgi?id=1254227 * https://bugzilla.suse.com/show_bug.cgi?id=1254430 * https://bugzilla.suse.com/show_bug.cgi?id=1254431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 20:31:29 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 20:31:29 -0000 Subject: SUSE-SU-2025:21189-1: important: Security update for openexr Message-ID: <176583068936.4867.229706530128919652@smelt2.prg2.suse.org> # Security update for openexr Announcement ID: SUSE-SU-2025:21189-1 Release Date: 2025-12-09T16:32:45Z Rating: important References: * bsc#1253713 * bsc#1253714 * bsc#1253715 Cross-References: * CVE-2025-12495 * CVE-2025-12839 * CVE-2025-12840 CVSS scores: * CVE-2025-12495 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12495 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-12839 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12839 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-12840 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12840 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for openexr fixes the following issues: Changes in openexr: * CVE-2025-12495: Fixed a file parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability [bsc#1253714] * CVE-2025-12839: Fixed a file parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability [bsc#1253715] * CVE-2025-12840: Fixed a file parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability [bsc#1253713] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-96=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-96=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libOpenEXRCore-3_2-31-3.2.2-160000.4.1 * libOpenEXRCore-3_2-31-debuginfo-3.2.2-160000.4.1 * libOpenEXR-3_2-31-debuginfo-3.2.2-160000.4.1 * openexr-debugsource-3.2.2-160000.4.1 * libOpenEXRUtil-3_2-31-debuginfo-3.2.2-160000.4.1 * openexr-3.2.2-160000.4.1 * openexr-debuginfo-3.2.2-160000.4.1 * libIex-3_2-31-debuginfo-3.2.2-160000.4.1 * libIlmThread-3_2-31-3.2.2-160000.4.1 * libOpenEXRUtil-3_2-31-3.2.2-160000.4.1 * libIex-3_2-31-3.2.2-160000.4.1 * libIlmThread-3_2-31-debuginfo-3.2.2-160000.4.1 * libOpenEXR-3_2-31-3.2.2-160000.4.1 * SUSE Linux Enterprise Server 16.0 (noarch) * openexr-doc-3.2.2-160000.4.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * libIex-3_2-31-x86-64-v3-debuginfo-3.2.2-160000.4.1 * libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.4.1 * libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.4.1 * libOpenEXRUtil-3_2-31-x86-64-v3-debuginfo-3.2.2-160000.4.1 * libOpenEXR-3_2-31-x86-64-v3-debuginfo-3.2.2-160000.4.1 * libIex-3_2-31-x86-64-v3-3.2.2-160000.4.1 * libOpenEXRCore-3_2-31-x86-64-v3-debuginfo-3.2.2-160000.4.1 * libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.4.1 * libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.4.1 * libIlmThread-3_2-31-x86-64-v3-debuginfo-3.2.2-160000.4.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libOpenEXRCore-3_2-31-3.2.2-160000.4.1 * libOpenEXRCore-3_2-31-debuginfo-3.2.2-160000.4.1 * libOpenEXR-3_2-31-debuginfo-3.2.2-160000.4.1 * openexr-debugsource-3.2.2-160000.4.1 * libOpenEXRUtil-3_2-31-debuginfo-3.2.2-160000.4.1 * openexr-3.2.2-160000.4.1 * openexr-debuginfo-3.2.2-160000.4.1 * libIex-3_2-31-debuginfo-3.2.2-160000.4.1 * libIlmThread-3_2-31-3.2.2-160000.4.1 * libOpenEXRUtil-3_2-31-3.2.2-160000.4.1 * libIex-3_2-31-3.2.2-160000.4.1 * libIlmThread-3_2-31-debuginfo-3.2.2-160000.4.1 * libOpenEXR-3_2-31-3.2.2-160000.4.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * libIex-3_2-31-x86-64-v3-debuginfo-3.2.2-160000.4.1 * libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.4.1 * libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.4.1 * libOpenEXRUtil-3_2-31-x86-64-v3-debuginfo-3.2.2-160000.4.1 * libOpenEXR-3_2-31-x86-64-v3-debuginfo-3.2.2-160000.4.1 * libIex-3_2-31-x86-64-v3-3.2.2-160000.4.1 * libOpenEXRCore-3_2-31-x86-64-v3-debuginfo-3.2.2-160000.4.1 * libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.4.1 * libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.4.1 * libIlmThread-3_2-31-x86-64-v3-debuginfo-3.2.2-160000.4.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * openexr-doc-3.2.2-160000.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12495.html * https://www.suse.com/security/cve/CVE-2025-12839.html * https://www.suse.com/security/cve/CVE-2025-12840.html * https://bugzilla.suse.com/show_bug.cgi?id=1253713 * https://bugzilla.suse.com/show_bug.cgi?id=1253714 * https://bugzilla.suse.com/show_bug.cgi?id=1253715 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 15 20:31:35 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Dec 2025 20:31:35 -0000 Subject: SUSE-SU-2025:4406-1: important: Security update for postgresql15 Message-ID: <176583069523.4867.7818238342962139980@smelt2.prg2.suse.org> # Security update for postgresql15 Announcement ID: SUSE-SU-2025:4406-1 Release Date: 2025-12-15T14:23:17Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql15 fixes the following issues: Upgraded to 15.15: * CVE-2025-12817: Fixed missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332) * CVE-2025-12818: Fixed integer overflow in allocation-size calculations within libpq (bsc#1253333) Other fixes: * Use %product_libs_llvm_ver to determine the LLVM version. * Remove conditionals for obsolete PostgreSQL releases. * Sync spec file from version 18. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4406=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4406=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4406=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4406=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4406=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4406=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4406=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4406=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4406=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4406=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4406=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4406=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4406=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4406=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4406=1 ## Package List: * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Enterprise Storage 7.1 (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Manager Proxy 4.3 LTS (x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Manager Proxy 4.3 LTS (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * postgresql15-docs-15.15-150200.5.49.2 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * postgresql15-contrib-debuginfo-15.15-150200.5.49.2 * postgresql15-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-pltcl-debuginfo-15.15-150200.5.49.2 * postgresql15-server-devel-15.15-150200.5.49.2 * postgresql15-devel-15.15-150200.5.49.2 * postgresql15-plpython-15.15-150200.5.49.2 * postgresql15-pltcl-15.15-150200.5.49.2 * postgresql15-15.15-150200.5.49.2 * postgresql15-server-devel-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-debuginfo-15.15-150200.5.49.2 * postgresql15-contrib-15.15-150200.5.49.2 * postgresql15-server-15.15-150200.5.49.2 * postgresql15-debugsource-15.15-150200.5.49.2 * postgresql15-debuginfo-15.15-150200.5.49.2 * postgresql15-plpython-debuginfo-15.15-150200.5.49.2 * postgresql15-plperl-15.15-150200.5.49.2 * postgresql15-server-debuginfo-15.15-150200.5.49.2 * SUSE Manager Server 4.3 LTS (noarch) * postgresql15-docs-15.15-150200.5.49.2 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 08:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 08:30:08 -0000 Subject: SUSE-SU-2025:4408-1: moderate: Security update for libssh Message-ID: <176587380866.23644.10264606231381721078@smelt2.prg2.suse.org> # Security update for libssh Announcement ID: SUSE-SU-2025:4408-1 Release Date: 2025-12-15T16:56:44Z Rating: moderate References: * bsc#1246974 Cross-References: * CVE-2025-8114 CVSS scores: * CVE-2025-8114 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-8114 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-8114 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-8114 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libssh fixes the following issues: * CVE-2025-8114: Fixed a NULL pointer dereference when calculating session ID during KEX. (bsc#1246974) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4408=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libssh-devel-doc-0.6.3-12.21.1 ## References: * https://www.suse.com/security/cve/CVE-2025-8114.html * https://bugzilla.suse.com/show_bug.cgi?id=1246974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 08:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 08:30:11 -0000 Subject: SUSE-SU-2025:4407-1: moderate: Security update for xkbcomp Message-ID: <176587381108.23644.5521561357282253128@smelt2.prg2.suse.org> # Security update for xkbcomp Announcement ID: SUSE-SU-2025:4407-1 Release Date: 2025-12-15T16:54:15Z Rating: moderate References: * bsc#1105832 Cross-References: * CVE-2018-15853 * CVE-2018-15859 * CVE-2018-15861 * CVE-2018-15863 CVSS scores: * CVE-2018-15853 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15853 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15853 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15859 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15859 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15859 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15861 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15861 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15861 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15863 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15863 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15863 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for xkbcomp fixes the following issues: * CVE-2018-15863: NULL pointer dereference triggered by a a crafted keymap file with a no-op modmask expression can lead to a crash (bsc#1105832). * CVE-2018-15861: NULL pointer dereference triggered by a crafted keymap file that induces an `xkb_intern_atom` failure can lead to a crash (bsc#1105832). * CVE-2018-15859: NULL pointer dereference triggered by a specially a crafted keymap file can lead to a crash (bsc#1105832). * CVE-2018-15853: endless recursion triggered by a crafted keymap file that induces boolean negation can lead to a crash (bsc#1105832). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4407=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * xkbcomp-1.2.4-11.3.1 * xkbcomp-devel-1.2.4-11.3.1 * xkbcomp-debugsource-1.2.4-11.3.1 * xkbcomp-debuginfo-1.2.4-11.3.1 ## References: * https://www.suse.com/security/cve/CVE-2018-15853.html * https://www.suse.com/security/cve/CVE-2018-15859.html * https://www.suse.com/security/cve/CVE-2018-15861.html * https://www.suse.com/security/cve/CVE-2018-15863.html * https://bugzilla.suse.com/show_bug.cgi?id=1105832 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 12:31:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 12:31:10 -0000 Subject: SUSE-SU-2025:21206-1: moderate: Security update for curl Message-ID: <176588827087.31612.666123955119081703@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:21206-1 Release Date: 2025-12-09T16:34:04Z Rating: moderate References: * bsc#1253757 Cross-References: * CVE-2025-11563 CVSS scores: * CVE-2025-11563 ( SUSE ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-11563 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-11563: Fixed wcurl path traversal with percent-encoded slashes (bsc#1253757). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-346=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * curl-debuginfo-8.14.1-slfo.1.1_3.1 * libcurl4-8.14.1-slfo.1.1_3.1 * curl-8.14.1-slfo.1.1_3.1 * libcurl4-debuginfo-8.14.1-slfo.1.1_3.1 * curl-debugsource-8.14.1-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11563.html * https://bugzilla.suse.com/show_bug.cgi?id=1253757 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 12:31:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 12:31:21 -0000 Subject: SUSE-SU-2025:21202-1: moderate: Security update for gnutls Message-ID: <176588828168.31612.15722358301556646702@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2025:21202-1 Release Date: 2025-12-09T15:50:14Z Rating: moderate References: * bsc#1254132 Cross-References: * CVE-2025-9820 CVSS scores: * CVE-2025-9820 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2025-9820: Fixed buffer overflow in gnutls_pkcs11_token_init (bsc#1254132). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-533=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * gnutls-debugsource-3.8.3-5.1 * libgnutls30-debuginfo-3.8.3-5.1 * gnutls-debuginfo-3.8.3-5.1 * gnutls-3.8.3-5.1 * libgnutls30-3.8.3-5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9820.html * https://bugzilla.suse.com/show_bug.cgi?id=1254132 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 12:31:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 12:31:24 -0000 Subject: SUSE-SU-2025:21201-1: moderate: Security update for glib2 Message-ID: <176588828466.31612.10974190810966008076@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2025:21201-1 Release Date: 2025-12-09T15:39:51Z Rating: moderate References: * bsc#1249055 Cross-References: * CVE-2025-7039 CVSS scores: * CVE-2025-7039 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-7039 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7039 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2025-7039: Fixed Buffer Under-read in gfileutils.c (bsc#1249055) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-532=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libgio-2_0-0-debuginfo-2.76.2-10.1 * libgio-2_0-0-2.76.2-10.1 * glib2-tools-debuginfo-2.76.2-10.1 * libgmodule-2_0-0-2.76.2-10.1 * glib2-tools-2.76.2-10.1 * libgobject-2_0-0-2.76.2-10.1 * libglib-2_0-0-2.76.2-10.1 * libgmodule-2_0-0-debuginfo-2.76.2-10.1 * libgobject-2_0-0-debuginfo-2.76.2-10.1 * libglib-2_0-0-debuginfo-2.76.2-10.1 * glib2-debugsource-2.76.2-10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-7039.html * https://bugzilla.suse.com/show_bug.cgi?id=1249055 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 12:31:27 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 12:31:27 -0000 Subject: SUSE-SU-2025:21200-1: important: Security update for libmicrohttpd Message-ID: <176588828784.31612.8507934252744914635@smelt2.prg2.suse.org> # Security update for libmicrohttpd Announcement ID: SUSE-SU-2025:21200-1 Release Date: 2025-12-09T15:27:22Z Rating: important References: * bsc#1253177 * bsc#1253178 Cross-References: * CVE-2025-59777 * CVE-2025-62689 CVSS scores: * CVE-2025-59777 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59777 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59777 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-59777 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-62689 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-62689 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-62689 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-62689 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for libmicrohttpd fixes the following issues: * CVE-2025-59777: Fixed NULL pointer dereference (bsc#1253177). * CVE-2025-62689: Fixed heap-based buffer overflow(bsc#1253178). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-531=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libmicrohttpd-debugsource-0.9.77-2.1 * libmicrohttpd12-debuginfo-0.9.77-2.1 * libmicrohttpd12-0.9.77-2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59777.html * https://www.suse.com/security/cve/CVE-2025-62689.html * https://bugzilla.suse.com/show_bug.cgi?id=1253177 * https://bugzilla.suse.com/show_bug.cgi?id=1253178 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 12:31:32 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 12:31:32 -0000 Subject: SUSE-SU-2025:21199-1: moderate: Security update for python311 Message-ID: <176588829254.31612.14995820520369796447@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2025:21199-1 Release Date: 2025-12-09T07:47:17Z Rating: moderate References: * bsc#1251305 * bsc#1252974 Cross-References: * CVE-2025-6075 * CVE-2025-8291 CVSS scores: * CVE-2025-6075 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-6075 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-6075 ( NVD ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8291 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-8291 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-8291 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for python311 fixes the following issues: Update to 3.11.14: * CVE-2025-8291: Fixed validity of the ZIP64 End of Central Directory (EOCD) is not checked by the 'zipfile' module (bsc#1251305). * CVE-2025-6075: Fixed the value passed to os.path.expandvars() is user- controlled a performance degradation is possible when expanding environment variables (bsc#1252974). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-530=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libpython3_11-1_0-debuginfo-3.11.14-1.1 * python311-debugsource-3.11.14-1.1 * python311-curses-debuginfo-3.11.14-1.1 * python311-3.11.14-1.1 * python311-curses-3.11.14-1.1 * python311-core-debugsource-3.11.14-1.1 * libpython3_11-1_0-3.11.14-1.1 * python311-base-debuginfo-3.11.14-1.1 * python311-base-3.11.14-1.1 * python311-debuginfo-3.11.14-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6075.html * https://www.suse.com/security/cve/CVE-2025-8291.html * https://bugzilla.suse.com/show_bug.cgi?id=1251305 * https://bugzilla.suse.com/show_bug.cgi?id=1252974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 12:31:37 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 12:31:37 -0000 Subject: SUSE-SU-2025:21198-1: moderate: Security update for curl Message-ID: <176588829798.31612.9506165500506012740@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:21198-1 Release Date: 2025-12-09T07:22:34Z Rating: moderate References: * bsc#1253757 Cross-References: * CVE-2025-11563 CVSS scores: * CVE-2025-11563 ( SUSE ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-11563 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-11563: Fixed wcurl path traversal with percent-encoded slashes (bsc#1253757). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-529=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libcurl4-debuginfo-8.14.1-2.1 * curl-debuginfo-8.14.1-2.1 * curl-debugsource-8.14.1-2.1 * libcurl4-8.14.1-2.1 * curl-8.14.1-2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11563.html * https://bugzilla.suse.com/show_bug.cgi?id=1253757 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 16:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 16:30:10 -0000 Subject: SUSE-SU-2025:4413-1: moderate: Security update for wireshark Message-ID: <176590261078.2993.11269829168691544283@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2025:4413-1 Release Date: 2025-12-16T11:40:06Z Rating: moderate References: * bsc#1254108 * bsc#1254472 Cross-References: * CVE-2025-13499 * CVE-2025-13946 CVSS scores: * CVE-2025-13499 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-13499 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2025-13499 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-13499 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-13946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-13946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for wireshark fixes the following issues: * CVE-2025-13499: Fixed Kafka dissector crash due to a malformed packet (bsc#1254108). * CVE-2025-13946: Fixed MEGACO dissector infinite loop that allows a denial of service (bsc#1254472). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4413=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * wireshark-debuginfo-3.6.24-150000.3.127.1 * wireshark-debugsource-3.6.24-150000.3.127.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13499.html * https://www.suse.com/security/cve/CVE-2025-13946.html * https://bugzilla.suse.com/show_bug.cgi?id=1254108 * https://bugzilla.suse.com/show_bug.cgi?id=1254472 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 16:30:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 16:30:17 -0000 Subject: SUSE-SU-2025:4412-1: low: Security update for poppler Message-ID: <176590261711.2993.13379349944246860284@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2025:4412-1 Release Date: 2025-12-16T11:37:24Z Rating: low References: * bsc#1252337 Cross-References: * CVE-2025-11896 CVSS scores: * CVE-2025-11896 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-11896 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-11896 ( NVD ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.5 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2025-11896: Fixed infinite recursion leading to stack overflow due to object loop in PDF CMap (bsc#1252337) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4412=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libpoppler-qt6-3-debuginfo-23.01.0-150500.3.29.1 * libpoppler126-23.01.0-150500.3.29.1 * libpoppler-qt5-devel-23.01.0-150500.3.29.1 * poppler-qt5-debugsource-23.01.0-150500.3.29.1 * libpoppler-devel-23.01.0-150500.3.29.1 * poppler-tools-debuginfo-23.01.0-150500.3.29.1 * libpoppler126-debuginfo-23.01.0-150500.3.29.1 * libpoppler-qt5-1-23.01.0-150500.3.29.1 * libpoppler-qt6-3-23.01.0-150500.3.29.1 * poppler-tools-23.01.0-150500.3.29.1 * poppler-debugsource-23.01.0-150500.3.29.1 * libpoppler-qt6-devel-23.01.0-150500.3.29.1 * libpoppler-glib8-23.01.0-150500.3.29.1 * libpoppler-glib-devel-23.01.0-150500.3.29.1 * typelib-1_0-Poppler-0_18-23.01.0-150500.3.29.1 * libpoppler-cpp0-23.01.0-150500.3.29.1 * libpoppler-cpp0-debuginfo-23.01.0-150500.3.29.1 * poppler-qt6-debugsource-23.01.0-150500.3.29.1 * libpoppler-glib8-debuginfo-23.01.0-150500.3.29.1 * libpoppler-qt5-1-debuginfo-23.01.0-150500.3.29.1 * openSUSE Leap 15.5 (x86_64) * libpoppler126-32bit-debuginfo-23.01.0-150500.3.29.1 * libpoppler-glib8-32bit-debuginfo-23.01.0-150500.3.29.1 * libpoppler-cpp0-32bit-debuginfo-23.01.0-150500.3.29.1 * libpoppler-qt5-1-32bit-debuginfo-23.01.0-150500.3.29.1 * libpoppler-glib8-32bit-23.01.0-150500.3.29.1 * libpoppler-cpp0-32bit-23.01.0-150500.3.29.1 * libpoppler126-32bit-23.01.0-150500.3.29.1 * libpoppler-qt5-1-32bit-23.01.0-150500.3.29.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libpoppler-glib8-64bit-23.01.0-150500.3.29.1 * libpoppler-qt5-1-64bit-23.01.0-150500.3.29.1 * libpoppler-qt5-1-64bit-debuginfo-23.01.0-150500.3.29.1 * libpoppler-glib8-64bit-debuginfo-23.01.0-150500.3.29.1 * libpoppler-cpp0-64bit-23.01.0-150500.3.29.1 * libpoppler126-64bit-debuginfo-23.01.0-150500.3.29.1 * libpoppler126-64bit-23.01.0-150500.3.29.1 * libpoppler-cpp0-64bit-debuginfo-23.01.0-150500.3.29.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11896.html * https://bugzilla.suse.com/show_bug.cgi?id=1252337 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 16:30:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 16:30:24 -0000 Subject: SUSE-SU-2025:4411-1: moderate: Security update for librsvg Message-ID: <176590262450.2993.4564548150845222092@smelt2.prg2.suse.org> # Security update for librsvg Announcement ID: SUSE-SU-2025:4411-1 Release Date: 2025-12-16T11:35:36Z Rating: moderate References: * bsc#1229950 * bsc#1243867 Cross-References: * CVE-2024-12224 * CVE-2024-43806 CVSS scores: * CVE-2024-12224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-12224 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-12224 ( NVD ): 5.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-43806 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves two vulnerabilities can now be installed. ## Description: This update for librsvg fixes the following issues: Update to version 2.52.12. * CVE-2024-12224: idna: incorrect hostname comparisons and URL parsing may be performed due to acceptance of Punycode labels that do not produce any non- ASCII output when decoded (bsc#1243867). * CVE-2024-43806: rustix: unbounded memory explosion leading to an application OOM crash when using the `rustix::fs::Dir` iterator with the `linux_raw` backend (bsc#1229950). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4411=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4411=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4411=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4411=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4411=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4411=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * librsvg-debugsource-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-2.52.12-150400.3.9.1 * typelib-1_0-Rsvg-2_0-2.52.12-150400.3.9.1 * rsvg-convert-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-2.52.12-150400.3.9.1 * librsvg-devel-2.52.12-150400.3.9.1 * openSUSE Leap 15.4 (x86_64) * gdk-pixbuf-loader-rsvg-32bit-debuginfo-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-32bit-2.52.12-150400.3.9.1 * librsvg-2-2-32bit-2.52.12-150400.3.9.1 * librsvg-2-2-32bit-debuginfo-2.52.12-150400.3.9.1 * openSUSE Leap 15.4 (noarch) * rsvg-thumbnailer-2.52.12-150400.3.9.1 * openSUSE Leap 15.4 (aarch64_ilp32) * librsvg-2-2-64bit-debuginfo-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-64bit-2.52.12-150400.3.9.1 * librsvg-2-2-64bit-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-64bit-debuginfo-2.52.12-150400.3.9.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * librsvg-debugsource-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-2.52.12-150400.3.9.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * librsvg-debugsource-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-2.52.12-150400.3.9.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * librsvg-debugsource-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-2.52.12-150400.3.9.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * librsvg-debugsource-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-2.52.12-150400.3.9.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * librsvg-debugsource-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-debuginfo-2.52.12-150400.3.9.1 * librsvg-2-2-2.52.12-150400.3.9.1 * gdk-pixbuf-loader-rsvg-2.52.12-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12224.html * https://www.suse.com/security/cve/CVE-2024-43806.html * https://bugzilla.suse.com/show_bug.cgi?id=1229950 * https://bugzilla.suse.com/show_bug.cgi?id=1243867 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 16:30:35 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 16:30:35 -0000 Subject: SUSE-SU-2025:21207-1: moderate: Security update for python311 Message-ID: <176590263574.2993.4401457883233403828@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2025:21207-1 Release Date: 2025-12-09T17:00:05Z Rating: moderate References: * bsc#1251305 * bsc#1252974 Cross-References: * CVE-2025-6075 * CVE-2025-8291 CVSS scores: * CVE-2025-6075 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-6075 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-6075 ( NVD ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8291 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-8291 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-8291 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for python311 fixes the following issues: Update to 3.11.14: * CVE-2025-8291: Fixed validity of the ZIP64 End of Central Directory (EOCD) is not checked by the 'zipfile' module (bsc#1251305). * CVE-2025-6075: Fixed the value passed to os.path.expandvars() is user- controlled a performance degradation is possible when expanding environment variables (bsc#1252974). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-347=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * python311-base-debuginfo-3.11.14-slfo.1.1_1.1 * python311-core-debugsource-3.11.14-slfo.1.1_1.1 * python311-curses-debuginfo-3.11.14-slfo.1.1_1.1 * python311-base-3.11.14-slfo.1.1_1.1 * python311-3.11.14-slfo.1.1_1.1 * libpython3_11-1_0-debuginfo-3.11.14-slfo.1.1_1.1 * python311-debugsource-3.11.14-slfo.1.1_1.1 * python311-debuginfo-3.11.14-slfo.1.1_1.1 * libpython3_11-1_0-3.11.14-slfo.1.1_1.1 * python311-curses-3.11.14-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6075.html * https://www.suse.com/security/cve/CVE-2025-8291.html * https://bugzilla.suse.com/show_bug.cgi?id=1251305 * https://bugzilla.suse.com/show_bug.cgi?id=1252974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 16 20:30:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Dec 2025 20:30:18 -0000 Subject: SUSE-SU-2025:4416-1: important: Security update for webkit2gtk3 Message-ID: <176591701885.2993.354899475041327995@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2025:4416-1 Release Date: 2025-12-16T15:57:51Z Rating: important References: * bsc#1254164 * bsc#1254165 * bsc#1254166 * bsc#1254167 * bsc#1254168 * bsc#1254169 * bsc#1254170 * bsc#1254171 * bsc#1254172 * bsc#1254174 * bsc#1254175 * bsc#1254176 * bsc#1254177 * bsc#1254179 * bsc#1254208 * bsc#1254473 * bsc#1254498 * bsc#1254509 Cross-References: * CVE-2023-43000 * CVE-2025-13502 * CVE-2025-13947 * CVE-2025-43392 * CVE-2025-43419 * CVE-2025-43421 * CVE-2025-43425 * CVE-2025-43427 * CVE-2025-43429 * CVE-2025-43430 * CVE-2025-43431 * CVE-2025-43432 * CVE-2025-43434 * CVE-2025-43440 * CVE-2025-43443 * CVE-2025-43458 * CVE-2025-43480 * CVE-2025-66287 CVSS scores: * CVE-2023-43000 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-43000 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-43000 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-13502 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-13502 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13502 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13947 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2025-13947 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2025-43392 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-43392 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-43392 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-43419 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-43419 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43419 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43421 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43421 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43421 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43425 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43425 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43425 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43427 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43427 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43427 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43429 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43429 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43429 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43430 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43430 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43430 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43431 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L * CVE-2025-43431 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43432 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43432 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43432 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43434 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43434 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43434 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43440 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43440 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43440 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43443 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43443 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43443 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43458 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43458 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43458 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43480 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-43480 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-43480 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-66287 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-66287 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-66287 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves 18 vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: Update to version 2.50.3. Security issues fixed: * CVE-2025-13502: processing of maliciously crafted payloads by the GLib remote inspector server may lead to a UIProcess crash due to an out-of- bounds read and an integer underflow (bsc#1254208). * CVE-2025-13947: use of the file drag-and-drop mechanism may lead to remote information disclosure due to a lack of verification of the origins of drag operations (bsc#1254473). * CVE-2025-43392: websites may exfiltrate image data cross-origin due to issues with cache handling (bsc#1254165). * CVE-2025-43421: processing maliciously crafted web content may lead to an unexpected process crash due to enabled array allocation sinking (bsc#1254167). * CVE-2025-43425: processing maliciously crafted web content may lead to an unexpected process crash due to improper memory handling (bsc#1254168). * CVE-2025-43427: processing maliciously crafted web content may lead to an unexpected process crash due to issues with state management (bsc#1254169). * CVE-2025-43429: processing maliciously crafted web content may lead to an unexpected process crash due to a buffer overflow issue (bsc#1254174). * CVE-2025-43430: processing maliciously crafted web content may lead to an unexpected process crash due to issues with state management (bsc#1254172). * CVE-2025-43431: processing maliciously crafted web content may lead to memory corruption due to improper memory handling (bsc#1254170). * CVE-2025-43432: processing maliciously crafted web content may lead to an unexpected process crash due to a use-after-free issue (bsc#1254171). * CVE-2025-43434: processing maliciously crafted web content may lead to an unexpected process crash due to a use-after-free issue (bsc#1254179). * CVE-2025-43440: processing maliciously crafted web content may lead to an unexpected process crash due to missing checks (bsc#1254177). * CVE-2025-43443: processing maliciously crafted web content may lead to an unexpected process crash due to missing checks (bsc#1254176). * CVE-2025-43458: processing maliciously crafted web content may lead to an unexpected process crash due to issues with state management (bsc#1254498). * CVE-2025-66287: processing maliciously crafted web content may lead to an unexpected process crash due to improper memory handling (bsc#1254509). Other issues fixed and changes: * Version 2.50.3: * Fix seeking and looping of media elements that set the "loop" property. * Fix several crashes and rendering issues. * Version 2.50.2: * Prevent unsafe URI schemes from participating in media playback. * Make jsc_value_array_buffer_get_data() function introspectable. * Fix logging in to Google accounts that have a WebAuthn second factor configured. * Fix loading webkit://gpu when there are no threads configured for GPU rendering. * Fix rendering gradiants that use the CSS hue interpolation method. * Fix pasting image data from the clipboard. * Fix font-family selection when the font name contains spaces. * Fix the build with standard C libraries that lack execinfo.h, like Musl or uClibc. * Fix capturing canvas snapshots in the Web Inspector. * Fix several crashes and rendering issues. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4416=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4416=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4416=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4416=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4416=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4416=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4416=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4416=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4416=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4416=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4416=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * WebKitGTK-6.0-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.1-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.0-lang-2.50.3-150400.4.130.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk3-devel-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_0-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-debugsource-2.50.3-150400.4.130.4 * webkit2gtk4-debugsource-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_1-2.50.3-150400.4.130.4 * webkitgtk-6_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_1-2.50.3-150400.4.130.4 * webkit2gtk3-debugsource-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-devel-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_0-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-2.50.3-150400.4.130.4 * libwebkit2gtk-4_0-37-2.50.3-150400.4.130.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * WebKitGTK-6.0-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.1-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.0-lang-2.50.3-150400.4.130.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk3-devel-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_0-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-debugsource-2.50.3-150400.4.130.4 * webkit2gtk4-debugsource-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_1-2.50.3-150400.4.130.4 * webkitgtk-6_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_1-2.50.3-150400.4.130.4 * webkit2gtk3-debugsource-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-devel-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_0-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-2.50.3-150400.4.130.4 * libwebkit2gtk-4_0-37-2.50.3-150400.4.130.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * WebKitGTK-6.0-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.1-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.0-lang-2.50.3-150400.4.130.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk3-devel-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_0-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-debugsource-2.50.3-150400.4.130.4 * webkit2gtk4-debugsource-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_1-2.50.3-150400.4.130.4 * webkitgtk-6_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_1-2.50.3-150400.4.130.4 * webkit2gtk3-debugsource-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-devel-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_0-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-2.50.3-150400.4.130.4 * libwebkit2gtk-4_0-37-2.50.3-150400.4.130.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * WebKitGTK-6.0-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.1-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.0-lang-2.50.3-150400.4.130.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk3-devel-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_0-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-debugsource-2.50.3-150400.4.130.4 * webkit2gtk4-debugsource-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_1-2.50.3-150400.4.130.4 * webkitgtk-6_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_1-2.50.3-150400.4.130.4 * webkit2gtk3-debugsource-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-devel-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_0-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-2.50.3-150400.4.130.4 * libwebkit2gtk-4_0-37-2.50.3-150400.4.130.4 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * WebKitGTK-6.0-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.1-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.0-lang-2.50.3-150400.4.130.4 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk3-devel-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_0-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-debugsource-2.50.3-150400.4.130.4 * webkit2gtk4-debugsource-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_1-2.50.3-150400.4.130.4 * webkitgtk-6_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_1-2.50.3-150400.4.130.4 * webkit2gtk3-debugsource-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-devel-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_0-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-2.50.3-150400.4.130.4 * libwebkit2gtk-4_0-37-2.50.3-150400.4.130.4 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * WebKitGTK-6.0-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.1-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.0-lang-2.50.3-150400.4.130.4 * SUSE Linux Enterprise Server 15 SP5 LTSS (ppc64le x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk3-devel-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_0-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-debugsource-2.50.3-150400.4.130.4 * webkit2gtk4-debugsource-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_1-2.50.3-150400.4.130.4 * webkitgtk-6_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_1-2.50.3-150400.4.130.4 * webkit2gtk3-debugsource-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-devel-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_0-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-2.50.3-150400.4.130.4 * libwebkit2gtk-4_0-37-2.50.3-150400.4.130.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * WebKitGTK-6.0-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.1-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.0-lang-2.50.3-150400.4.130.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk3-devel-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_0-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-debugsource-2.50.3-150400.4.130.4 * webkit2gtk4-debugsource-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_1-2.50.3-150400.4.130.4 * webkitgtk-6_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_1-2.50.3-150400.4.130.4 * webkit2gtk3-debugsource-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-devel-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_0-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-2.50.3-150400.4.130.4 * libwebkit2gtk-4_0-37-2.50.3-150400.4.130.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * WebKitGTK-6.0-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.1-lang-2.50.3-150400.4.130.4 * WebKitGTK-4.0-lang-2.50.3-150400.4.130.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk3-devel-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_0-2.50.3-150400.4.130.4 * libwebkit2gtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-debugsource-2.50.3-150400.4.130.4 * webkit2gtk4-debugsource-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_1-2.50.3-150400.4.130.4 * webkitgtk-6_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_1-2.50.3-150400.4.130.4 * webkit2gtk3-debugsource-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-devel-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_0-2.50.3-150400.4.130.4 * libjavascriptcoregtk-6_0-1-2.50.3-150400.4.130.4 * libwebkitgtk-6_0-4-2.50.3-150400.4.130.4 * libwebkit2gtk-4_0-37-2.50.3-150400.4.130.4 * SUSE Manager Proxy 4.3 LTS (noarch) * WebKitGTK-4.0-lang-2.50.3-150400.4.130.4 * SUSE Manager Proxy 4.3 LTS (x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-debugsource-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_0-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-devel-2.50.3-150400.4.130.4 * libwebkit2gtk-4_0-37-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.3-150400.4.130.4 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * WebKitGTK-4.0-lang-2.50.3-150400.4.130.4 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-debugsource-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_0-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-devel-2.50.3-150400.4.130.4 * libwebkit2gtk-4_0-37-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.3-150400.4.130.4 * SUSE Manager Server 4.3 LTS (noarch) * WebKitGTK-4.0-lang-2.50.3-150400.4.130.4 * SUSE Manager Server 4.3 LTS (x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-debugsource-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-2.50.3-150400.4.130.4 * typelib-1_0-JavaScriptCore-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2WebExtension-4_0-2.50.3-150400.4.130.4 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.3-150400.4.130.4 * typelib-1_0-WebKit2-4_0-2.50.3-150400.4.130.4 * webkit2gtk3-soup2-devel-2.50.3-150400.4.130.4 * libwebkit2gtk-4_0-37-2.50.3-150400.4.130.4 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.3-150400.4.130.4 ## References: * https://www.suse.com/security/cve/CVE-2023-43000.html * https://www.suse.com/security/cve/CVE-2025-13502.html * https://www.suse.com/security/cve/CVE-2025-13947.html * https://www.suse.com/security/cve/CVE-2025-43392.html * https://www.suse.com/security/cve/CVE-2025-43419.html * https://www.suse.com/security/cve/CVE-2025-43421.html * https://www.suse.com/security/cve/CVE-2025-43425.html * https://www.suse.com/security/cve/CVE-2025-43427.html * https://www.suse.com/security/cve/CVE-2025-43429.html * https://www.suse.com/security/cve/CVE-2025-43430.html * https://www.suse.com/security/cve/CVE-2025-43431.html * https://www.suse.com/security/cve/CVE-2025-43432.html * https://www.suse.com/security/cve/CVE-2025-43434.html * https://www.suse.com/security/cve/CVE-2025-43440.html * https://www.suse.com/security/cve/CVE-2025-43443.html * https://www.suse.com/security/cve/CVE-2025-43458.html * https://www.suse.com/security/cve/CVE-2025-43480.html * https://www.suse.com/security/cve/CVE-2025-66287.html * https://bugzilla.suse.com/show_bug.cgi?id=1254164 * https://bugzilla.suse.com/show_bug.cgi?id=1254165 * https://bugzilla.suse.com/show_bug.cgi?id=1254166 * https://bugzilla.suse.com/show_bug.cgi?id=1254167 * https://bugzilla.suse.com/show_bug.cgi?id=1254168 * https://bugzilla.suse.com/show_bug.cgi?id=1254169 * https://bugzilla.suse.com/show_bug.cgi?id=1254170 * https://bugzilla.suse.com/show_bug.cgi?id=1254171 * https://bugzilla.suse.com/show_bug.cgi?id=1254172 * https://bugzilla.suse.com/show_bug.cgi?id=1254174 * https://bugzilla.suse.com/show_bug.cgi?id=1254175 * https://bugzilla.suse.com/show_bug.cgi?id=1254176 * https://bugzilla.suse.com/show_bug.cgi?id=1254177 * https://bugzilla.suse.com/show_bug.cgi?id=1254179 * https://bugzilla.suse.com/show_bug.cgi?id=1254208 * https://bugzilla.suse.com/show_bug.cgi?id=1254473 * https://bugzilla.suse.com/show_bug.cgi?id=1254498 * https://bugzilla.suse.com/show_bug.cgi?id=1254509 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 17 08:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Dec 2025 08:30:12 -0000 Subject: SUSE-SU-2025:4419-1: moderate: Security update for xen Message-ID: <176596021229.1028.11946321743384856471@smelt2.prg2.suse.org> # Security update for xen Announcement ID: SUSE-SU-2025:4419-1 Release Date: 2025-12-16T18:57:19Z Rating: moderate References: * bsc#1252692 * bsc#1254180 * jsc#PED-8907 Cross-References: * CVE-2025-58149 CVSS scores: * CVE-2025-58149 ( SUSE ): 4.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-58149 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-58149 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP7 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability, contains one feature and has one security fix can now be installed. ## Description: This update for xen fixes the following issues: Update to Xen 4.20.2 (jsc#PED-8907). Security issues fixed: * CVE-2025-58149: incorrect removal of permissions on PCI device unplug allows PV guests to access memory of devices no longer assigned to it (XSA-476, bsc#1252692). Other issues fixed: * Failure to restart xenstored (bsc#1254180). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4419=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-4419=1 ## Package List: * Basesystem Module 15-SP7 (x86_64) * xen-tools-domU-4.20.2_02-150700.3.19.1 * xen-debugsource-4.20.2_02-150700.3.19.1 * xen-libs-4.20.2_02-150700.3.19.1 * xen-libs-debuginfo-4.20.2_02-150700.3.19.1 * xen-tools-domU-debuginfo-4.20.2_02-150700.3.19.1 * Server Applications Module 15-SP7 (x86_64) * xen-tools-4.20.2_02-150700.3.19.1 * xen-debugsource-4.20.2_02-150700.3.19.1 * xen-4.20.2_02-150700.3.19.1 * xen-devel-4.20.2_02-150700.3.19.1 * xen-tools-debuginfo-4.20.2_02-150700.3.19.1 * Server Applications Module 15-SP7 (noarch) * xen-tools-xendomains-wait-disk-4.20.2_02-150700.3.19.1 ## References: * https://www.suse.com/security/cve/CVE-2025-58149.html * https://bugzilla.suse.com/show_bug.cgi?id=1252692 * https://bugzilla.suse.com/show_bug.cgi?id=1254180 * https://jira.suse.com/browse/PED-8907 -------------- next part -------------- An HTML attachment was scrubbed... URL: